Incident Response Forensic Framework: nightHawk Response
https://n0where.net/incident-response-forensic-framework-nighthawk-response/
#forensics
#security
https://n0where.net/incident-response-forensic-framework-nighthawk-response/
#forensics
#security
انواع سیستم های مدیریت دیتابیس
https://www.analyticsvidhya.com/blog/2014/11/types-databases-evolution/
https://www.analyticsvidhya.com/blog/2014/11/types-databases-evolution/
لینوکس backbox مخصوص تست نفوذ
بر پایه اوبونتو
https://n0where.net/ubuntu-based-pentest-linux-distribution-backbox/
#backbox
#kali
#linux
#pentest
بر پایه اوبونتو
https://n0where.net/ubuntu-based-pentest-linux-distribution-backbox/
#backbox
#kali
#linux
#pentest
اسکریپت پاورشل WINspect برای بررسی و کنترل موارد امنیتی در ویندوز
https://github.com/A-mIn3/WINspect
https://isc.sans.edu/diary.html
#windows
#ps
#security
https://github.com/A-mIn3/WINspect
https://isc.sans.edu/diary.html
#windows
#ps
#security
GitHub
GitHub - A-mIn3/WINspect: Powershell-based Windows Security Auditing Toolbox
Powershell-based Windows Security Auditing Toolbox - A-mIn3/WINspect
https://cisofy.com/downloads/lynis/
Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security scan
#linux
#security
#virus
#scanner
Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security scan
#linux
#security
#virus
#scanner
Cisofy
Download page for Lynis
The Lynis Enterprise Suite is a toolset consisting of an open source security auditing tool named Lynis. It also includes central management, reporting and plugins.
sqli to root
https://www.jimwilbur.com/2017/09/kioptrix-level-1-1-walkthrough-vulnhub/
#tut
#sqli
#pentest
#web
https://www.jimwilbur.com/2017/09/kioptrix-level-1-1-walkthrough-vulnhub/
#tut
#sqli
#pentest
#web
Jim Wilbur's Blog
Kioptrix: Level 1.1 Walkthrough – Vulnhub - Jim Wilbur's Blog
Kioptrix Level 1.1 Walkthrough from Vulnhub.com. In this walkthrough I take advantage of SQLi and a kernel exploit. Kioptrix Level 1.2 coming soon
چگونه CIA با استفاده از هوش مصنوعی از شبکه های اجتماعی دیتا جمع آوری میکند؟
https://futurism.com/how-the-cia-is-using-artificial-intelligence-to-collect-social-media-data/
#cia
#nsa
#facebook
#AI
#Telegram
#whatsapp
https://futurism.com/how-the-cia-is-using-artificial-intelligence-to-collect-social-media-data/
#cia
#nsa
#AI
#Telegram
Futurism
How the CIA is Using Artificial Intelligence to Collect Social Media Data
The CIA is developing AI to advance data collection and analysis capabilities. These technologies are, and will continue to be, used for social media data.
generate and encode a powershell based metasploit payloads.
https://github.com/CroweCybersecurity/ps1encode
#msf
#ps
#windows
#pentest
#bypass
https://github.com/CroweCybersecurity/ps1encode
#msf
#ps
#windows
#pentest
#bypass
GitHub
GitHub - CroweCybersecurity/ps1encode: Script used to generate and encode a PowerShell based Metasploit payloads.
Script used to generate and encode a PowerShell based Metasploit payloads. - CroweCybersecurity/ps1encode
رایت آپ مسابقه بدست آوردن پرچم با باگ LFI و SSTI
https://github.com/bl4de/ctf/blob/master/2017/ASIS_CTF_2017/Golem/Golem_Web_writeup.md
#ctf
#lfi
#ssti
#writeup
https://github.com/bl4de/ctf/blob/master/2017/ASIS_CTF_2017/Golem/Golem_Web_writeup.md
#ctf
#lfi
#ssti
#writeup
GitHub
ctf/2017/ASIS_CTF_2017/Golem/Golem_Web_writeup.md at master · bl4de/ctf
My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges. - bl4de/ctf
مباحث یادگیری ماشین برای امنیت سایبری
https://github.com/jivoi/awesome-ml-for-cybersecurity
#ml
#AI
#security
#pdf
#speech
#talk
https://github.com/jivoi/awesome-ml-for-cybersecurity
#ml
#AI
#security
#speech
#talk
GitHub
GitHub - jivoi/awesome-ml-for-cybersecurity: Machine Learning for Cyber Security
:octocat: Machine Learning for Cyber Security. Contribute to jivoi/awesome-ml-for-cybersecurity development by creating an account on GitHub.
اجرای لینوکس بک باکس در مرورگر به کمک داکر
https://www.homelab.it/index.php/2016/06/25/backbox4browser-backbox-browser/
#docker
#linux
#browser
#virtualization
https://www.homelab.it/index.php/2016/06/25/backbox4browser-backbox-browser/
#docker
#linux
#browser
#virtualization
HomeLab IT
BackBox4Browser: BackBox in a Browser - HomeLab IT
BackBox4Browser: Tutta la potenza della distribuzione BackBox 4 racchiusa in un container docker gestibile comodamente da browser.
کارشناسان معتقدند، هکرهای کره شمالی برای دور زدن تحریم های اعمال شده علیه این کشور اقدام به دزدیدن و معامله از طریق بیت کوین میکنند.
https://www.infowars.com/north-korean-hackers-stealing-bitcoin-to-circumvent-sanctions/
#btc
#cryptocurrency
#northkorea
#usa
#fireeye
#iran
#sanction
https://www.infowars.com/north-korean-hackers-stealing-bitcoin-to-circumvent-sanctions/
#btc
#cryptocurrency
#northkorea
#usa
#fireeye
#iran
#sanction
Infowars
North Korean Hackers Stealing Bitcoin to Circumvent Sanctions
Pyongyang seeks new revenue streams amid international condemnation