/archive/
222 subscribers
94 photos
27 videos
88 files
206 links
Cypherpunks do not find comfort in hopes and wishes. They actively interfere with the course of events and shape their own destiny.
Download Telegram
List of WindowsAPI functions commonly used in malware

https://malapi.io/
Linux Bible.pdf
19.2 MB
The_Rootkit_Arsenal_Escape_and_Evasion_in_the_Dark_Corners_of_the.pdf
106.1 MB
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Blog posts related to malware development

https://0xpat.github.io/
IMPERFECT HATRED.zip
56.1 MB
OST from the game Ultrakill (the best game in the entire existence).
Metadata added by myself.
1
INFINITE HYPERDEATH.zip
71.8 MB
OST from Ultrakill, but Act I this time.
(⌐■_■)
Forwarded from 0lab channel
PS - Governance, Risk and Compliance (GRC) Path.7z
1.2 GB
Security Compliance, Governance, and Frameworks

• Information Governance: GDPR
• Compliance Framework: PCI DSS
• Information Governance: HIPAA
• Security Compliance: SOC 2
• Information Governance: CCPA
• Information Governance: CDPA
• Information Governance: SOX
• Security Controls: CIS Controls
• Security Framework: NIST CSF
• Information Governance: COPPA
• Security Governance: FISMA
• Information Governance: GLBA
• Other related topics
• Information Security
• GRC
• Information Governance
• Risk Management
• Compliance Assessment
• Security Frameworks
• Compliance Standards