Forwarded from Proxy Bar
Linux Red Team
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack
cat /home/redteam/
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack
Forwarded from Ai000 Cybernetics QLab
In April 2025, the threat actor group named Shadowbits claimed to have breached Hamrahe Avval (MCI), Iran's largest mobile operator, and to have gained access to its database. According to the threat actor, a substantial amount of data belonging to MCI's customers was taken, including full names, father names, place of birth, gender, national ID numbers, addresses, postal codes, birth dates, mobile numbers, and SIM card information.
@aioooir | #hack
@aioooir | #hack