شبکه عصبی ساده با استفاده از پایتون و keras
https://www.pyimagesearch.com/2016/09/26/a-simple-neural-network-with-python-and-keras
#AI
#neuralNetwork
#machineLearning
#python
https://www.pyimagesearch.com/2016/09/26/a-simple-neural-network-with-python-and-keras
#AI
#neuralNetwork
#machineLearning
#python
PyImageSearch
A simple neural network with Python and Keras - PyImageSearch
Learn how to create a simple neural network using the Keras neural network and deep learning library along with the Python programming language.
Crack WPA/WPA2 WiFi Passwords With Wifiphisher by Jamming the WiFi
https://gbhackers.com/crack-wpawpa2-kali-linux-tutorial/
#wifi
#jammer
#crack
#wpa2
https://gbhackers.com/crack-wpawpa2-kali-linux-tutorial/
#wifi
#jammer
#crack
#wpa2
RemoteRecon
قابلیت های فعلی:
PowerShell
Screenshot
Token Impersonation
Inject ReflectiveDll (Must Export the ReflectiveLoader function from Stephen Fewer)
Inject Shellcode
Keylog
https://github.com/xorrior/RemoteRecon
قابلیت های فعلی:
PowerShell
Screenshot
Token Impersonation
Inject ReflectiveDll (Must Export the ReflectiveLoader function from Stephen Fewer)
Inject Shellcode
Keylog
https://github.com/xorrior/RemoteRecon
GitHub
GitHub - xorrior/RemoteRecon: Remote Recon and Collection
Remote Recon and Collection. Contribute to xorrior/RemoteRecon development by creating an account on GitHub.
Forwarded from vulners
Emergency: Apache Struts2 RCE S2-052 (CVE-2017-9805)
Security researchers have discovered a critical remote code execution vulnerability in the popular Apache Struts web application framework, allowing a remote attacker to run malicious code on the affected servers.
Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for developing web applications in the Java programming language, which supports REST, AJAX, and JSON.
The vulnerability (CVE-2017-9805) is a programming blunder that resides in the way Struts processes data from an untrusted source. Specifically, Struts REST plugin fails to handle XML payloads while deserializing them properly.
All versions of Apache Struts since 2008 (from Struts 2.5 to Struts 2.5.12) are affected, leaving all web applications using the framework’s REST plugin vulnerable to remote attackers.
THN
Seebug
CVE-2017-9805
Metasploit Exploit
Security researchers have discovered a critical remote code execution vulnerability in the popular Apache Struts web application framework, allowing a remote attacker to run malicious code on the affected servers.
Apache Struts is a free, open-source, Model-View-Controller (MVC) framework for developing web applications in the Java programming language, which supports REST, AJAX, and JSON.
The vulnerability (CVE-2017-9805) is a programming blunder that resides in the way Struts processes data from an untrusted source. Specifically, Struts REST plugin fails to handle XML payloads while deserializing them properly.
All versions of Apache Struts since 2008 (from Struts 2.5 to Struts 2.5.12) are affected, leaving all web applications using the framework’s REST plugin vulnerable to remote attackers.
THN
Seebug
CVE-2017-9805
Metasploit Exploit
Google Mass Explorer (PYTHON 3.6)
روبات پایتونی سرچ گوگل با قابلیت جستجوی دورک
https://github.com/anarcoder/google_explorer
#python
#google
#hack
#dork
#web
#pentest
روبات پایتونی سرچ گوگل با قابلیت جستجوی دورک
https://github.com/anarcoder/google_explorer
#python
#hack
#dork
#web
#pentest
GitHub
GitHub - paralelo14/google_explorer: Mass exploitation tool in python
Mass exploitation tool in python. Contribute to paralelo14/google_explorer development by creating an account on GitHub.
راه اندازی سیستم احراز هویت دو مرحله ای (two FA) در لینوکس ابونتو
https://www.maketecheasier.com/setup-two-factor-authentication-ubuntu/
#linux
#2fa
#safety
https://www.maketecheasier.com/setup-two-factor-authentication-ubuntu/
#linux
#2fa
#safety
برنامه bugbounty در سایت uber و دسترسی به تمام سیستم های چت داخلی
https://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
#bugbounty
#web
#pentest
https://blog.mish.re/index.php/2017/09/06/uber-bug-bounty-gaining-access-to-an-internal-chat-system/
#bugbounty
#web
#pentest
https://pierrekim.github.io/advisories/z0-Owning_embedded_devices_and_network_protocols-redacted.pdf
تصاحب دستگاههای نهان و پروتکل های شبکه
#zerocon
#embededDevices
#network
تصاحب دستگاههای نهان و پروتکل های شبکه
#zerocon
#embededDevices
#network
تست آسیب پذیری Java Struts2 در ماشین مجازی
https://medium.com/metasploitable/play-with-java-struts2-rest-plugin-vulnerability-in-metasploitable-3-cve-2017-9805-6d5cf2b12aa9
#apache
#struts
#pentest
https://medium.com/metasploitable/play-with-java-struts2-rest-plugin-vulnerability-in-metasploitable-3-cve-2017-9805-6d5cf2b12aa9
#apache
#struts
#pentest
Medium
Play with Java Struts2 Rest Plugin Vulnerability in Metasploitable 3— CVE-2017–9805
Recently, a critical Remote Code Execution (RCE) vulnerability was discovered in the popular Apache Struts web application framework, which…
امنیت اطلاعات
تست آسیب پذیری Java Struts2 در ماشین مجازی https://medium.com/metasploitable/play-with-java-struts2-rest-plugin-vulnerability-in-metasploitable-3-cve-2017-9805-6d5cf2b12aa9 #apache #struts #pentest
GitHub
GitHub - mazen160/struts-pwn_CVE-2017-9805: An exploit for Apache Struts CVE-2017-9805
An exploit for Apache Struts CVE-2017-9805. Contribute to mazen160/struts-pwn_CVE-2017-9805 development by creating an account on GitHub.