آموزش گام به گام نفوذ به ftp در لینوکس اوبونتو
https://www.hackingarticles.in/step-by-step-guide-to-ftp-penetration-testing-in-ubuntu/
#ftp
#linux
#pentest
#vsftpd
https://www.hackingarticles.in/step-by-step-guide-to-ftp-penetration-testing-in-ubuntu/
#ftp
#linux
#pentest
#vsftpd
Hacking Articles
FTP Penetration Testing on Ubuntu (Port 21)
Security on every layer has become mandatory. Port security always make a difference by securing the network as it helps to avoid receiving or sending packets from unknown devices. Using port security, one can limit the number of MAC addresses on a given…
معرفی tensorflow
https://www.datasciencecentral.com/profiles/blogs/tensorflow-tutorial-part-1-introduction?
#python
#tensorflow
#AI
#DeepLearning
https://www.datasciencecentral.com/profiles/blogs/tensorflow-tutorial-part-1-introduction?
#python
#tensorflow
#AI
#DeepLearning
Datasciencecentral
Tensorflow Tutorial : Part 1 – Introduction
In this multi-part series, we will explore how to get started with tensorflow. This tensorflow tutorial will lay a solid foundation to this popular tool that…
ترکیه ۷۵ هزار شهروند رو بخاطر دانلود و استفاده از اپلیکیشن موبایل ByLock که برای گفتگوی رمزنگاری شده استفاده میشه دستگیر کرده.
https://thehackernews.com/2017/09/turkish-coup-bylock-messenger.html
#turkey
#coup
#encryption
#signal
https://thehackernews.com/2017/09/turkish-coup-bylock-messenger.html
#turkey
#coup
#encryption
#signal
The Hacker News
75,000 Turks Arrested So Far for Downloading Encrypted Messaging App
So Far Turkey government has arrested 75,000 people for downloading ByLock encrypted messaging app
D-Link DIR8xx Routers - Root Remote Code Execution
https://www.exploit-db.com/exploits/42730/
#dlink
#botnet
#rce
#network
https://www.exploit-db.com/exploits/42730/
#dlink
#botnet
#rce
#network
لیست دستورات کاربردی در metasploit
https://securityonline.info/metasploit-command-lists/
#msf
#tutorial
https://securityonline.info/metasploit-command-lists/
#msf
#tutorial
Penetration Testing
Metasploit Command Lists • Penetration Testing
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source[2] Metasploit Framework, a tool...
UAC bypass via elevated .NET applications
https://offsec.provadys.com/UAC-bypass-dotnet.html
#windows
#uac
https://offsec.provadys.com/UAC-bypass-dotnet.html
#windows
#uac
Intro to .NET Remoting for Hackers
https://parsiya.net/blog/2015-11-14-intro-to-.net-remoting-for-hackers/
#windows
#dotnet
https://parsiya.net/blog/2015-11-14-intro-to-.net-remoting-for-hackers/
#windows
#dotnet
RDP Pivoting with Metasploit
https://www.hackingarticles.in/rdp-pivoting-metasploit/
#windows
#pivoting
#network
#msf
#rdp
https://www.hackingarticles.in/rdp-pivoting-metasploit/
#windows
#pivoting
#network
#msf
#rdp
Hacking Articles
RDP Pivoting with Metasploit
In our previous tutorial we had discussed on SSH pivoting and today we are going to discuss RDP pivoting. From Offensive Security Pivoting is a technique
Exploit toolkit CVE-2017-8759 - v1.0
https://github.com/bhdresh/CVE-2017-8759
https://www.youtube.com/watch?v=46jEa1bmORM
#windows
https://github.com/bhdresh/CVE-2017-8759
https://www.youtube.com/watch?v=46jEa1bmORM
#windows
GitHub
GitHub - bhdresh/CVE-2017-8759: Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security…
Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a ...
تشریح باگ LFI
Local File inclusion
https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/
#pentest
#web
#hack
#lfi
Local File inclusion
https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/
#pentest
#web
#hack
#lfi
Hakin9 - IT Security Magazine
Web Application Penetration Testing: Local File Inclusion (LFI) Testing
The definitive guide for LFI vulnerability security testing on penetration testing engagements.
Yuki Chan The Auto Pentest
ابزار Yuki Chan برای تست نفوذ بصورت اتوماتیک
قابلیت ها:
Automated
Intel-Gathering
Vulnerability Analysis
Security Auditing
OSINT
Tracking
System Enumeration
Fuzzing
CMS Auditing
SSL Security Auditing
And Off Course This Tool Designed For Targetted Pentesting Too
دانلود:
https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest
#pentest
#web
#osint
#enum
#linux
ابزار Yuki Chan برای تست نفوذ بصورت اتوماتیک
قابلیت ها:
Automated
Intel-Gathering
Vulnerability Analysis
Security Auditing
OSINT
Tracking
System Enumeration
Fuzzing
CMS Auditing
SSL Security Auditing
And Off Course This Tool Designed For Targetted Pentesting Too
دانلود:
https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest
#pentest
#web
#osint
#enum
#linux
توابع خطرناک جاوا اسکریپت
https://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html
#js
#html
https://blog.blueclosure.com/2017/09/javascript-dangerous-functions-part-1.html
#js
#html