🛎سری آموزش های دوره کامل Owasp
🌀Owasp Master Class- SQL INJECTION
مدرس: میثم منصف
🔉@infosectube
📌youtube channel
🌀Owasp Master Class- SQL INJECTION
مدرس: میثم منصف
🔉@infosectube
📌youtube channel
YouTube
Owasp Master Class- SQL INJECTION
Owasp Master Class- SQL INJECTION
مدرس: میثم منصف
●▬▬▬۩❁ InfoSecTube ❁۩ ▬▬▬▬●
🔒 جامعه امنیتی دیجیتال، آموزش و آگاهی 🔒
به InfoSecTube خوش آمدید! اینجا جایی است که علاقهمندان به امنیت دیجیتال با هم ارتباط برقرار میکنند و از جدیدترین مطالب و آموزشهای مرتبط…
مدرس: میثم منصف
●▬▬▬۩❁ InfoSecTube ❁۩ ▬▬▬▬●
🔒 جامعه امنیتی دیجیتال، آموزش و آگاهی 🔒
به InfoSecTube خوش آمدید! اینجا جایی است که علاقهمندان به امنیت دیجیتال با هم ارتباط برقرار میکنند و از جدیدترین مطالب و آموزشهای مرتبط…
❤3
🔰Ghidra Software Reverse Engineering Framework
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.
Download Link:
https://github.com/NationalSecurityAgency/ghidra/releases
🔉@infosectube
📌youtube channel
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.
Download Link:
https://github.com/NationalSecurityAgency/ghidra/releases
🔉@infosectube
📌youtube channel
GitHub
Releases · NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
👍3
🌀Zero Trust: Applications, Challenges, and Opportunities
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementations, applications, challenges, and future trends of Zero Trust. Through meticulous analysis, we highlight the relevance of Zero Trust in securing cloud environments, facilitating remote work, and protecting the Internet of Things (IoT) ecosystem. While cultural barriers and technical complexities present challenges, their mitigation unlocks Zero Trust's potential. Integrating Zero Trust with emerging technologies like AI and machine learning augments its efficacy, promising a dynamic and responsive security landscape. Embracing Zero Trust empowers organizations to navigate the ever-evolving cybersecurity realm with resilience and adaptability, redefining trust in the digital age.
Link:
https://arxiv.org/pdf/2309.03582
🔉@infosectube
📌youtube channel
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementations, applications, challenges, and future trends of Zero Trust. Through meticulous analysis, we highlight the relevance of Zero Trust in securing cloud environments, facilitating remote work, and protecting the Internet of Things (IoT) ecosystem. While cultural barriers and technical complexities present challenges, their mitigation unlocks Zero Trust's potential. Integrating Zero Trust with emerging technologies like AI and machine learning augments its efficacy, promising a dynamic and responsive security landscape. Embracing Zero Trust empowers organizations to navigate the ever-evolving cybersecurity realm with resilience and adaptability, redefining trust in the digital age.
Link:
https://arxiv.org/pdf/2309.03582
🔉@infosectube
📌youtube channel
❤2
2023_Pentesting_Active_Directory_and_Windows_based_231112_235439.pdf
23.3 MB
📒 Pentesting Active Directory and
Windows-based Infrastructure
#RedTeam
#ActiveDirectory
🔉@InfoSecTube
📌youtube channel
Windows-based Infrastructure
#RedTeam
#ActiveDirectory
🔉@InfoSecTube
📌youtube channel
👍1
OWASP API Security Top 10 2023.pdf
930.8 KB
📒 OWASP API Security Top 10 2023
This guide provides an overview of the top 10 API security vulnerabilities to watch out for in 2023, along with examples of noncompliant and compliant code.
#WebApi
#OwaspTop10
#SecureCode
🔉@InfoSecTube
📌youtube channel
This guide provides an overview of the top 10 API security vulnerabilities to watch out for in 2023, along with examples of noncompliant and compliant code.
#WebApi
#OwaspTop10
#SecureCode
🔉@InfoSecTube
📌youtube channel
👍1
AS-22-Korkos-AMSI-and-Bypass.pdf
1.3 MB
🔥AMSI Unchained
Review Of Known AMSI Bypass Techniques And Introducing A New One
#RedTeam
#BlackHat2022
🔉@InfoSecTube
📌youtube channel
Review Of Known AMSI Bypass Techniques And Introducing A New One
#RedTeam
#BlackHat2022
🔉@InfoSecTube
📌youtube channel
🔥AMSI BYPASS METHODS
01- https://pentestlaboratories.com/2021/05/17/amsi-bypass-methods/
02- https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
03- https://gustavshen.medium.com/bypass-amsi-on-windows-11-75d231b2cac6
04- https://medium.com/@nullx3d/amsi-overview-and-bypass-methods-76b9d5896eb5
05- https://medium.com/@two06/amsi-as-a-service-automating-av-evasion-2e2f54397ff9
🔉@InfoSecTube
📌youtube channel
01- https://pentestlaboratories.com/2021/05/17/amsi-bypass-methods/
02- https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
03- https://gustavshen.medium.com/bypass-amsi-on-windows-11-75d231b2cac6
04- https://medium.com/@nullx3d/amsi-overview-and-bypass-methods-76b9d5896eb5
05- https://medium.com/@two06/amsi-as-a-service-automating-av-evasion-2e2f54397ff9
🔉@InfoSecTube
📌youtube channel
Pentest Laboratories
AMSI Bypass Methods
Microsoft has developed AMSI (Antimalware Scan Interface) as a method to defend against common malware execution and protect the end user. By default windows defender interacts with the AMSI API to…
Matt_Hand_Evading_EDR_The_Definitive_Guide_to_Defeating_Endpoint.pdf
5.8 MB
📒Evading EDR
The Definitive Guide To Defeating Endpoint Detection Systems
#RedTeam
🔉@InfoSecTube
📌youtube channel
The Definitive Guide To Defeating Endpoint Detection Systems
#RedTeam
🔉@InfoSecTube
📌youtube channel
👍1
⚠️ Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation ⚠️
🔗Read
🔉@InfoSecTube
📌youtube channel
Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.🔗Read
🔉@InfoSecTube
📌youtube channel
Darkreading
Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation
Another two bugs in this month's set of fixes for 63 CVEs were publicly disclosed previously but have not been exploited yet.
👍2
Gray Hat C#.pdf
5 MB
📒 Gray Hat C#
A Hacker's Guide to Creating and Automating Security Tools
304 pages
Publisher: No Starch Press
1st Edition
🔉@InfoSecTube
📌youtube channel
A Hacker's Guide to Creating and Automating Security Tools
304 pages
Publisher: No Starch Press
1st Edition
🔉@InfoSecTube
📌youtube channel
👍3
OSDA-Soc200.pdf
39.7 MB
📕 SOC-200: Foundational Security
Operations and Defensive Analysis
OSDA Certification
Publisher: Offensive Security
618 Pages
🔉@InfoSecTube
📌youtube channel
Operations and Defensive Analysis
OSDA Certification
Publisher: Offensive Security
618 Pages
🔉@InfoSecTube
📌youtube channel
🖥آموزشهای رایگان SIEM
معرفی منابع آموزشی و فیلم های آموزشی ارزشمند و بروز SIEM:
✔️General:
⌘ Windows Logging Basics
⌘ Jose Bravo - What is a SIEM? (5 Vídeos):
⌘ PowerSIEM Analyzing Sysmon Events with PowerShell
✔️AlienVault OSSIM :
⌘ Cybrary - AlienVault OSSIM
✔️Elastic - SIEM :
⌘ Fundamentals
✔️ArcSight :
⌘ Paul Brettle - What is Series
⌘ Paul Brettle - ArcSight ESM 101
⌘ ArcSight Tutorial
✔️QRadar
⌘ Jose Bravo - QRadar
⌘ QRadar SIEM
✔️Splunk
⌘ What is Splunk?
⌘ Intro to Splunk
⌘ Using Fields
⌘ Scheduling Reports & Alerts
⌘ Visualizations
⌘ Search Under the Hood
⌘ Basic Searching
⌘ Splunk - Intro to Knowledge Objects
⌘ Splunk - Intro to Dashboards
⌘ Practical Splunk - Zero to Hero
⌘ Splunk Use Cases
✔️Microsoft Sentinel
⌘ What is Microsoft Sentinel
⌘ Microsoft Sentinel Level 400 training
✔️ Forti SIEM :
⌘ Forti SIEM 6.3 Self-Paced
🔉@InfoSecTube
📌youtube channel
معرفی منابع آموزشی و فیلم های آموزشی ارزشمند و بروز SIEM:
✔️General:
⌘ Windows Logging Basics
⌘ Jose Bravo - What is a SIEM? (5 Vídeos):
⌘ PowerSIEM Analyzing Sysmon Events with PowerShell
✔️AlienVault OSSIM :
⌘ Cybrary - AlienVault OSSIM
✔️Elastic - SIEM :
⌘ Fundamentals
✔️ArcSight :
⌘ Paul Brettle - What is Series
⌘ Paul Brettle - ArcSight ESM 101
⌘ ArcSight Tutorial
✔️QRadar
⌘ Jose Bravo - QRadar
⌘ QRadar SIEM
✔️Splunk
⌘ What is Splunk?
⌘ Intro to Splunk
⌘ Using Fields
⌘ Scheduling Reports & Alerts
⌘ Visualizations
⌘ Search Under the Hood
⌘ Basic Searching
⌘ Splunk - Intro to Knowledge Objects
⌘ Splunk - Intro to Dashboards
⌘ Practical Splunk - Zero to Hero
⌘ Splunk Use Cases
✔️Microsoft Sentinel
⌘ What is Microsoft Sentinel
⌘ Microsoft Sentinel Level 400 training
✔️ Forti SIEM :
⌘ Forti SIEM 6.3 Self-Paced
🔉@InfoSecTube
📌youtube channel
👍1