کتاب رایگان و بی نظیر یادگیری ماشین و علم داده. 490 صفحه.
اگر به دنبال منبع فارسی و رایگان جهت یادگیری علم داده و یادگیری ماشین هستید، این کتاب فوق العاده می تواند منبع بسیار خوبی براتون باشه که مفاهیم رو خیلی خوب و ساده توضیح داده.
لینک دسترسی :
https://www.researchgate.net/publication/358263339_yadgyry_mashyn_w_lm_dadh_mbany_mfahym_algwrytmha_w_abzarha
با هشتگ
#BigDataWorldLearn
به همه ی فایل های آموزشی دسترسی دارید.
🌐 ما را در تلگرام، اینستاگرام و یوتیوب دنبال کنید
اگر به دنبال منبع فارسی و رایگان جهت یادگیری علم داده و یادگیری ماشین هستید، این کتاب فوق العاده می تواند منبع بسیار خوبی براتون باشه که مفاهیم رو خیلی خوب و ساده توضیح داده.
لینک دسترسی :
https://www.researchgate.net/publication/358263339_yadgyry_mashyn_w_lm_dadh_mbany_mfahym_algwrytmha_w_abzarha
با هشتگ
#BigDataWorldLearn
به همه ی فایل های آموزشی دسترسی دارید.
🌐 ما را در تلگرام، اینستاگرام و یوتیوب دنبال کنید
ResearchGate
(PDF) یادگیری ماشین و علم داده: مبانی، مفاهیم، الگوریتمها و ابزارها
PDF | On Feb 1, 2022, Milad Vazan published یادگیری ماشین و علم داده: مبانی، مفاهیم، الگوریتمها و ابزارها | Find, read and cite all the research you need on ResearchGate
PeStudio
PeStudio is a free tool performing the static investigation of any Windows executable binary. A file being analyzed with PeStudio is never launched.
Professional software for reviewing and analyzing file types EXE, DLL, CPL, OCX, AX, SYS, etc.
https://www.winitor.com/
PeStudio is a free tool performing the static investigation of any Windows executable binary. A file being analyzed with PeStudio is never launched.
Professional software for reviewing and analyzing file types EXE, DLL, CPL, OCX, AX, SYS, etc.
https://www.winitor.com/
Backstab - a tool to kill antimalware protected processes
✅Kill EDR Protected Processes
https://hakin9.org/backstab-a-tool-to-kill-antimalware-protected-processes/
✅Kill EDR Protected Processes
https://hakin9.org/backstab-a-tool-to-kill-antimalware-protected-processes/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
برای علاقمندان به:
SillyRAT - a Cross Platform multifunctional (Windows/Linux/Mac) RAT
https://hakin9.org/sillyrat-a-cross-platform-multifunctional-windows-linux-mac-rat/
SillyRAT - a Cross Platform multifunctional (Windows/Linux/Mac) RAT
https://hakin9.org/sillyrat-a-cross-platform-multifunctional-windows-linux-mac-rat/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
برای علاقمندان به تست نفوذ
مرحله Covering Tracks👇
Phant0m - Windows Event Log Killer
https://hakin9.org/phant0m-windows-event-log-killer/
مرحله Covering Tracks👇
Phant0m - Windows Event Log Killer
https://hakin9.org/phant0m-windows-event-log-killer/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine
Triage Analysis Tool: DFIR-Trident
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is also open source:
Trident
Video language: Persian
https://lnkd.in/e6RTiAad
#dfir
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is also open source:
Trident
Video language: Persian
https://lnkd.in/e6RTiAad
#dfir
YouTube
Triage Analysis Tool: DFIR-Trident
In this video, I introduced an excellent tool in the field of triage analysis that at the level of Windows, using the power of PowerShell, we can track events and discover digital documents and evidence.
The name of this Windows PowerShell tool, which is…
The name of this Windows PowerShell tool, which is…
DFIR Tools
👇👇👇
Windows Live Response Collection
یک ابزار عالی برای کارشناسان و متخصصان شبکه و امنیت
اگر تخصص در حوزه Forensics و یا DFIR ندارید ، اما به دنبال بررسی سیستم ها ی سازمان هستید و احتمال آلودگی را می دهید، این ابزار به صورت اتومات تمامی مدارک و شواهد را از روی سیستم ویندوزی استخراج مینماید.
زمان ویدیو: ۱۱ دقیقه
مدرس: مهندس حسینی
لینک مشاهده:
👇👇👇👇👇👇😘
👇👇👇
Windows Live Response Collection
یک ابزار عالی برای کارشناسان و متخصصان شبکه و امنیت
اگر تخصص در حوزه Forensics و یا DFIR ندارید ، اما به دنبال بررسی سیستم ها ی سازمان هستید و احتمال آلودگی را می دهید، این ابزار به صورت اتومات تمامی مدارک و شواهد را از روی سیستم ویندوزی استخراج مینماید.
زمان ویدیو: ۱۱ دقیقه
مدرس: مهندس حسینی
لینک مشاهده:
👇👇👇👇👇👇😘
برای علاقمندان یکم حرفه ای تر
Windows Process injection
https://modexp.wordpress.com/2019/05/25/windows-injection-finspy/
Windows Process injection
https://modexp.wordpress.com/2019/05/25/windows-injection-finspy/
modexp
Windows Process Injection: KernelCallbackTable used by FinFisher / FinSpy
Introduction The surveillance spyware FinFisher, also known as FinSpy, uses what Microsoft called an “interesting and quite unusual” method of process injection via the KernelCallBackTa…
برای علاقمندان و متخصصین RED Team
آموزش تکنیک های فوق العاده تیم قرمزی
مخزن زیر:
https://github.com/CronUp/Awesome-Red-Teaming
آموزش تکنیک های فوق العاده تیم قرمزی
مخزن زیر:
https://github.com/CronUp/Awesome-Red-Teaming
GitHub
GitHub - CronUp/Awesome-Red-Teaming: List of Awesome Red Teaming Resources
List of Awesome Red Teaming Resources. Contribute to CronUp/Awesome-Red-Teaming development by creating an account on GitHub.
DFIR Tools in Windows
n this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
Video duration 2:30
Video language: Persian
Presented by: Saeed Hosseini
https://lnkd.in/eEeABR5g
n this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
Video duration 2:30
Video language: Persian
Presented by: Saeed Hosseini
https://lnkd.in/eEeABR5g
YouTube
DFIR Tools in Windows
In this video, we teach you how to use various forensic tools at the Windows level to track intrusion into the system.
These tools are in the triage stage of analysis and for live analysis
These tools are in the triage stage of analysis and for live analysis
Types of digital data in DFIR
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are lost quickly, or what traces can hackers erase, and what information about hacker events and activities remains on the system or network.
So a forensic analyst should be aware of the types of information on digital personal and organizational assets.
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/GaQFUxEAJRU
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are lost quickly, or what traces can hackers erase, and what information about hacker events and activities remains on the system or network.
So a forensic analyst should be aware of the types of information on digital personal and organizational assets.
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/GaQFUxEAJRU
YouTube
Types of digital data in DFIR
In this video about what kind of information, documents and evidence we should look for in the face of organizational systems and networks or personal systems in case of analysis. In the world of forensic analysis, what kind of information and documents are…
Incident Response Methodology - part 1
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/T0tPqU3g9Lo
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/T0tPqU3g9Lo
YouTube
Incident Response Methodology - part 1
In this video, I talked about the OoDA disaster response methodology. This excellent methodology discusses how to communicate with the SOC center and interact with it, as well as with various other areas such as threat hunting, threat intelligence, etc.
As…
As…
Incident Response Methodology - part 2
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/rKrMIpWAMRQ
Video language: Persian
Presented by: Saeed Hosseini
https://youtu.be/rKrMIpWAMRQ
YouTube
Incident Response Methodology - part 2
In this video, I presented the process of responding to disasters in a realistic way and based on experience in different organizations.
This process focused on the triage section in the first place, both at the crime scene and in the laboratory. And then…
This process focused on the triage section in the first place, both at the crime scene and in the laboratory. And then…
Windows Incident Response
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools".
https://lnkd.in/d6wkjWbT
#dfir
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th editions), "Windows Registry Forensics", as well as the book I co-authored with Cory Altheide, "Digital Forensics with Open Source Tools".
https://lnkd.in/d6wkjWbT
#dfir
Blogspot
Windows Incident Response
The Windows Incident Response Blog is dedicated to the myriad information surrounding and inherent to the topics of IR and digital analysis of Windows systems. This blog provides information in support of my books; "Windows Forensic Analysis" (1st thru 4th…
دوره های رایگان و دریافت مدرک بین المللی
https://blueteamresources.in/cybersecurity-free-certification-courses/
https://blueteamresources.in/cybersecurity-free-certification-courses/
Blue Team Resources
Best Cybersecurity Free Certification Courses for 2023
Explore Cybersecurity Free Certification Courses for 2023. Boost your career with top online resources, labs, and networking opportunities. Roadmap included.
ویژه💯 حرفه ای 💯 ویژه
برای علاقمندان به تست نفوذ و تیم قرمز
یک لیست جامع از مخازن RED Team
لینک:
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
برای علاقمندان به تست نفوذ و تیم قرمز
یک لیست جامع از مخازن RED Team
لینک:
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
GitHub
GitHub - CyberSecurityUP/Awesome-Red-Team-Operations
Contribute to CyberSecurityUP/Awesome-Red-Team-Operations development by creating an account on GitHub.
whids
Open Source EDR for Windows
EDR with artifact collection driven by detection. The detection engine is built on top of a previous project Gene specially designed to match Windows events against user defined rules.
https://lnkd.in/dPvjdEn
Open Source EDR for Windows
EDR with artifact collection driven by detection. The detection engine is built on top of a previous project Gene specially designed to match Windows events against user defined rules.
https://lnkd.in/dPvjdEn
DroneSploit - A pentesting console framework dedicated to drones
https://hakin9.org/dronesploit-a-pentesting-console-framework-dedicated-to-drones/
https://hakin9.org/dronesploit-a-pentesting-console-framework-dedicated-to-drones/
Hakin9 - IT Security Magazine
404 - Hakin9 - IT Security Magazine