VID-20220114-WA0051.mp4
6.9 MB
انیمیشن کوتاه مورچه
این انیمیشن با هنرمندی تمام، تفاوت *رهبری* با *مدیریت* رو نشون میده و اینکه افراد خلاق چطوری میتونن دنیای ما رو به جایی شادتر و بهتر بدل کنند.
#خلاقیت
@Engineer_Computer
این انیمیشن با هنرمندی تمام، تفاوت *رهبری* با *مدیریت* رو نشون میده و اینکه افراد خلاق چطوری میتونن دنیای ما رو به جایی شادتر و بهتر بدل کنند.
#خلاقیت
@Engineer_Computer
👍3❤1
وقتی کاربر تحت خطر و مایکروسافت اصلاح را گردن نمیگیرد
مجبورید شما خود به فکر باشید. آنجا که من به همه دوستان گفته ام باید workaround داشته باشید
کسی به داد شما نمیرسد!!
https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/amp/
@Engineer_Computer
مجبورید شما خود به فکر باشید. آنجا که من به همه دوستان گفته ام باید workaround داشته باشید
کسی به داد شما نمیرسد!!
https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/amp/
@Engineer_Computer
www-bleepingcomputer-com.cdn.ampproject.org
New Windows Driver Signature bypass allows kernel rootkit installs
Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits on fully patched systems.
👍1
یک تغییری مهم واسه اونها که از مایتره و TAXII استفاده میکنند
https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58
@Engineer_Computer
https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58
@Engineer_Computer
Medium
Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server
We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite
Please open Telegram to view this post
VIEW IN TELEGRAM
https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
mizu.re
Exploring the DOMPurify library: Bypasses and Fixes (1/2). Tags:Article - Article - Web - mXSS
Please open Telegram to view this post
VIEW IN TELEGRAM
www-bleepingcomputer-com.cdn.ampproject.org
MITRE shares 2024's top 25 most dangerous software weaknesses
MITRE has shared this year's top 25 list of the most common and dangerous software weaknesses behind more than 31,000 vulnerabilities disclosed between June 2023 and June 2024.
❤1
لینک ابزار deobfuscate
https://github.com/tccontre/DBOBUS
https://www.splunk.com/en_us/blog/security/cracking-braodo-stealer-analyzing-python-malware-and-its-obfuscated-loader.html
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - tccontre/DBOBUS: a simple python script to de-obfuscate ABOBUS Batch script obfuscator
a simple python script to de-obfuscate ABOBUS Batch script obfuscator - tccontre/DBOBUS
https://intel471.com/blog/a-look-at-trending-chinese-apt-techniques
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
Intel 471
A Look at Trending Chinese APT Techniques
Cyber capabilities play a key role in achieving China’s strategic goals. Here's a look at significant state-sponsored actors, which are adopting stealthy…
Please open Telegram to view this post
VIEW IN TELEGRAM
Volexity
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom…
Language : English
Size : 1.9 GB
1 Introduction to Smart contract security audit course
2 Consensus based Vulnerabilities Bitcoin Ethereum BnB Chain Polygon
3 Denial of Service attack Attack Network and transaction Level
4 Smart Contract Attack Vector Denial of Service
5 Smart Contract Attack vector Reentrancy Attack
6 Smart Contract Attack RugPull Pump Dump schemes Limit sell order
7 Smart Contract Attack vector Front Running Signature replay Attack
8 DeFi Decentralized Finance Concepts
9 Capstone project Perform a full Smart Contract audit on Wallet
Download link
https://mega.nz/file/6YkwiY5I#kZqQDCmoNjl5Ub9q_-T2kV5SUW5I5RTwdPEw1IPio_I
@Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
mega.nz
1.92 GB file on MEGA
Network Security Channel
Please open Telegram to view this post
VIEW IN TELEGRAM
بله پروژه های متن باز هم آسیب پذیری دارند که کسی رفع نکرده
و در لینک زیر میبینیم گوگل تعدادی را پیدا کرده
ما در محصولات داخلی چقدر از کمپوننت های اپن سورس استفاده کرده ایم ؟
https://thehackernews.com/2024/11/googles-ai-powered-oss-fuzz-tool-finds.html?m=1
@Engineer_Computer
و در لینک زیر میبینیم گوگل تعدادی را پیدا کرده
ما در محصولات داخلی چقدر از کمپوننت های اپن سورس استفاده کرده ایم ؟
https://thehackernews.com/2024/11/googles-ai-powered-oss-fuzz-tool-finds.html?m=1
@Engineer_Computer
تحلیلی بر عملیات گروه هکری APT-K-47
https://securityonline.info/asyncshell-the-evolution-of-apt-k-47s-cyber-arsenal
@Engineer_Computer
https://securityonline.info/asyncshell-the-evolution-of-apt-k-47s-cyber-arsenal
@Engineer_Computer
Daily CyberSecurity
Asyncshell: The Evolution of APT-K-47's Cyber Arsenal
Uncover the evolving threat from the APT-K-47 group and their sophisticated Asyncshell-v4 malware. Learn how this South Asia-based APT group is using malicious campaigns to infiltrate systems.
Please open Telegram to view this post
VIEW IN TELEGRAM
دور زدن EDR ها توسط بد افزارها
https://medium.com/@IglensonSecurity/dodging-the-guardian-how-malware-evades-edr-detections-72ed61896406
@Engineer_Computer
https://medium.com/@IglensonSecurity/dodging-the-guardian-how-malware-evades-edr-detections-72ed61896406
@Engineer_Computer
Medium
Dodging the Guardian: How Malware Evades EDR Detections
How evasive malware is made, and how it bypasses EDR’s detections. Introduction to malware development.
با این ابزار در جدول ATT&CK بگردید و راحت مپ های لازم بین حملات را داشته باشید
#ssdlc
https://intelligence.any.run/plans/?utm_source=csn&utm_medium=article&utm_campaign=free_black_friday&utm_content=plans&utm_term=251124
@Engineer_Computer
#ssdlc
https://intelligence.any.run/plans/?utm_source=csn&utm_medium=article&utm_campaign=free_black_friday&utm_content=plans&utm_term=251124
@Engineer_Computer
تلریکس افشا کرد؛ نفوذ به شما از طریق آنتی ویروس avast
شما چه میکنید اگر از طریق آنتی ویروس خودتان به خودتان نفوذ بشود ؟ آماده برای مقابله و کشف هستید ؟
https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/?s=35
@Engineer_Computer
شما چه میکنید اگر از طریق آنتی ویروس خودتان به خودتان نفوذ بشود ؟ آماده برای مقابله و کشف هستید ؟
https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/?s=35
@Engineer_Computer
Trellix
When Guardians Become Predators: How Malware Corrupts the Protectors
We often trust our security software to stand as an unbreakable wall against malware and attacks, but what happens when that very wall is weaponized against us?
اکتیو دایرکتوری برای هکر ها
مستندات
https://github.com/soheilsec/Active-Directory-For-Hackers
ویدئوی فارسی
https://m.youtube.com/playlist?list=PLwq8--jsXOElAgM1f6WouKXL69INeLIyY
@Engineer_Computer
مستندات
https://github.com/soheilsec/Active-Directory-For-Hackers
ویدئوی فارسی
https://m.youtube.com/playlist?list=PLwq8--jsXOElAgM1f6WouKXL69INeLIyY
@Engineer_Computer
GitHub
GitHub - soheilsec/Active-Directory-For-Hackers: AD concepts, attack surfaces and attack vectors notes, slides, video...
AD concepts, attack surfaces and attack vectors notes, slides, video... - soheilsec/Active-Directory-For-Hackers
👍1