Wiki (html based) ΡΡΠ΅Π±Π½ΠΈΠΊ ΠΊ ΠΎΠ±ΡΡΠ°ΡΡΠ΅ΠΌΡ ΠΊΡΡΡΡ SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling ΠΎΡ SANS
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ SEC504.1: Incident Response and Computer Crime Investigations
+ SEC504.2: Recon, Scanning, and Enumeration Attacks
+ SEC504.3: Password and Access Attacks
+ SEC504.4: Public-Facing and Drive-By Attacks
+ SEC504.5: Evasion and Post-Exploitation Attacks
+ SEC504.6: Capture the Flag Event
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3q0RYY1
ΠΠ±Π·ΠΎΡ ΠΊΡΡΡΠ°
https://bit.ly/399VKI0
#education
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ SEC504.1: Incident Response and Computer Crime Investigations
+ SEC504.2: Recon, Scanning, and Enumeration Attacks
+ SEC504.3: Password and Access Attacks
+ SEC504.4: Public-Facing and Drive-By Attacks
+ SEC504.5: Evasion and Post-Exploitation Attacks
+ SEC504.6: Capture the Flag Event
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3q0RYY1
ΠΠ±Π·ΠΎΡ ΠΊΡΡΡΠ°
https://bit.ly/399VKI0
#education
Sec504 Wiki HTML_pack_2020.zip
57 MB
Wiki (html based) ΡΡΠ΅Π±Π½ΠΈΠΊ ΠΊ ΠΎΠ±ΡΡΠ°ΡΡΠ΅ΠΌΡ ΠΊΡΡΡΡ SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling ΠΎΡ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ° SANS
π2
Π‘Π²Π΅ΠΆΠ°Ρ ΡΠ±ΠΎΡΠΊΠ° Π²ΡΠ΅Ρ
Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
cheat sheets ΠΎΡ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ° SANS, Π²ΡΠ³ΡΡΠ·ΠΊΠ° Ρ Π»ΠΈΡΠ½ΠΎΠ³ΠΎ ΠΏΡΠΎΡΠΈΠ»Ρ Π·Π° 2020 Π³ΠΎΠ΄
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3pThZIS
#education #tricks
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3pThZIS
#education #tricks
Complet Sans Cheat Sheet_full_2021_[w2hack].zip
13.8 MB
Π‘Π²Π΅ΠΆΠ°Ρ ΡΠ±ΠΎΡΠΊΠ° Π²ΡΠ΅Ρ
Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
cheat sheets ΠΎΡ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ° SANS
π1
2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ ΠΊΠ½ΠΈΠ³ΠΈ Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters ΠΎΡ Π°Π²ΡΠΎΡΠΎΠ² Seitz, Justin, Arnold, Tim, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2021 Π³ΠΎΠ΄Π° (ΠΏΡΠ΅Π΄Π²Π°ΡΠΈΡΠ΅Π»ΡΠ½Π°Ρ Π²Π΅ΡΡΠΈΡ)
Π ΠΊΠ½ΠΈΠ³Π΅ "Black Hat Python" ΠΎΡ Justin Seitz (Π°Π²ΡΠΎΡΠ° Π΄ΡΡΠ³ΠΎΠΉ Ρ ΠΎΡΠΎΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ, "Gray Hat Python"), Π²Ρ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΡΠ΅ ΡΠ΅ΠΌΠ½ΡΡ ΡΡΠΎΡΠΎΠ½Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Python - Π½Π°ΠΏΠΈΡΠ°Π½ΠΈΠ΅ ΡΠ½ΠΈΡΡΠ΅ΡΠΎΠ², ΠΌΠ°Π½ΠΈΠΏΡΠ»ΡΡΠΈΡ ΠΏΠ°ΠΊΠ΅ΡΠ°ΠΌΠΈ, Π·Π°ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΡΡ ΠΌΠ°ΡΠΈΠ½, ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΡΠΊΡΡΡΠ½ΡΡ ΡΡΠΎΡΠ½ΠΎΠ² ΠΈ ΠΏΡΠΎΡΠ΅Π΅. ΠΠ½ΡΠ°ΠΉΠ΄Π΅ΡΡΠΊΠΈΠ΅ ΡΠ΅Ρ Π½ΠΈΠΊΠΈ ΠΈ ΠΊΡΠ΅Π°ΡΠΈΠ²Π½ΡΠ΅ Π·Π°Π΄Π°ΡΠΈ Π½Π° ΠΏΡΠΎΡΡΠΆΠ΅Π½ΠΈΠΈ Π²ΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ ΠΏΠΎΠΊΠ°ΠΆΡΡ Π²Π°ΠΌ, ΠΊΠ°ΠΊ ΡΠ°ΡΡΠΈΡΡΡΡ ΠΏΡΠΈΠ΅ΠΌΡ ΠΈ ΠΏΠΈΡΠ°ΡΡ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΡΠΊΡΠΏΠ»ΠΎΠΉΡΡ
Π ΠΊΠ½ΠΈΠ³Π΅
(1) https://nostarch.com/black-hat-python2E
(2) https://www.amazon.com/Black-Hat-Python-2nd-Programming/dp/1718501129
#book #python
Π ΠΊΠ½ΠΈΠ³Π΅ "Black Hat Python" ΠΎΡ Justin Seitz (Π°Π²ΡΠΎΡΠ° Π΄ΡΡΠ³ΠΎΠΉ Ρ ΠΎΡΠΎΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ, "Gray Hat Python"), Π²Ρ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΡΠ΅ ΡΠ΅ΠΌΠ½ΡΡ ΡΡΠΎΡΠΎΠ½Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Python - Π½Π°ΠΏΠΈΡΠ°Π½ΠΈΠ΅ ΡΠ½ΠΈΡΡΠ΅ΡΠΎΠ², ΠΌΠ°Π½ΠΈΠΏΡΠ»ΡΡΠΈΡ ΠΏΠ°ΠΊΠ΅ΡΠ°ΠΌΠΈ, Π·Π°ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΡΡ ΠΌΠ°ΡΠΈΠ½, ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΡΠΊΡΡΡΠ½ΡΡ ΡΡΠΎΡΠ½ΠΎΠ² ΠΈ ΠΏΡΠΎΡΠ΅Π΅. ΠΠ½ΡΠ°ΠΉΠ΄Π΅ΡΡΠΊΠΈΠ΅ ΡΠ΅Ρ Π½ΠΈΠΊΠΈ ΠΈ ΠΊΡΠ΅Π°ΡΠΈΠ²Π½ΡΠ΅ Π·Π°Π΄Π°ΡΠΈ Π½Π° ΠΏΡΠΎΡΡΠΆΠ΅Π½ΠΈΠΈ Π²ΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ ΠΏΠΎΠΊΠ°ΠΆΡΡ Π²Π°ΠΌ, ΠΊΠ°ΠΊ ΡΠ°ΡΡΠΈΡΡΡΡ ΠΏΡΠΈΠ΅ΠΌΡ ΠΈ ΠΏΠΈΡΠ°ΡΡ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΡΠΊΡΠΏΠ»ΠΎΠΉΡΡ
Π ΠΊΠ½ΠΈΠ³Π΅
(1) https://nostarch.com/black-hat-python2E
(2) https://www.amazon.com/Black-Hat-Python-2nd-Programming/dp/1718501129
#book #python
Black_Hat_Python,_2nd_Edition_Python_Programming_for_Hackers_and.pdf
4.6 MB
2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ ΠΊΠ½ΠΈΠ³ΠΈ Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
π1
ΠΡΠ΅ ΠΎΠ΄Π½Π° Π½Π΅ ΠΏΠ»ΠΎΡ
Π°Ρ ΠΊΠ½ΠΈΠΆΠΊΠ° Π΄Π»Ρ Π½ΠΎΠ²ΡΠΈΠΊΠΎΠΌ ΠΏΠΎ ΠΏΠΎ ΠΏΡΠΈΠΌΠ΅Π½Π½Π΅ΠΈΡ Π·ΠΌΠ΅ΠΈ Π² ΡΠ΅ΠΊΡΡΠ½ΡΡ
Π·Π°Π΄Π°ΡΠ°Ρ
Python Penetration Testing Essentials (Mohit), ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ²ΠΎ, Π΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΡΡΡΠ΅Π΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ Python Π΄Π»Ρ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΏΠΎΠ΄ΡΠΎΠ±Π½ΡΡ ΠΏΡΠΈΠΌΠ΅ΡΠΎΠ² ΠΊΠΎΠ΄Π°. ΠΡ Π½Π°ΡΠ½ΡΡΠ΅ Ρ ΠΈΠ·ΡΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΠ² ΡΠ°Π±ΠΎΡΡ Π² ΡΠ΅ΡΠΈ Ρ Python, Π° Π·Π°ΡΠ΅ΠΌ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ Π²Π·Π»ΠΎΠΌΡ ΡΠ΅ΡΠΈ. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΡΠ³Π»ΡΠ±ΠΈΡΠ΅ΡΡ Π²ΠΎ Π²Π·Π»ΠΎΠΌ ΡΡΠΎΠ²Π½Ρ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, Π³Π΄Π΅ Π½Π°ΡΠ½ΡΡΠ΅ ΡΠΎ ΡΠ±ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Ρ Π²Π΅Π±-ΡΠ°ΠΉΡΠ°. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΡΠΌ, ΡΠ²ΡΠ·Π°Π½Π½ΡΠΌ ΡΠΎ Π²Π·Π»ΠΎΠΌΠΎΠΌ Π²Π΅Π±-ΡΠ°ΠΉΡΠΎΠ², ΡΠ°ΠΊΠΈΠΌ ΠΊΠ°ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ², DDoS, XSS ΠΈ SQL-ΠΈΠ½ΡΠ΅ΠΊΡΠΈΠΈ
#python #book
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ²ΠΎ, Π΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΡΡΡΠ΅Π΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ Python Π΄Π»Ρ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΏΠΎΠ΄ΡΠΎΠ±Π½ΡΡ ΠΏΡΠΈΠΌΠ΅ΡΠΎΠ² ΠΊΠΎΠ΄Π°. ΠΡ Π½Π°ΡΠ½ΡΡΠ΅ Ρ ΠΈΠ·ΡΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΠ² ΡΠ°Π±ΠΎΡΡ Π² ΡΠ΅ΡΠΈ Ρ Python, Π° Π·Π°ΡΠ΅ΠΌ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ Π²Π·Π»ΠΎΠΌΡ ΡΠ΅ΡΠΈ. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΡΠ³Π»ΡΠ±ΠΈΡΠ΅ΡΡ Π²ΠΎ Π²Π·Π»ΠΎΠΌ ΡΡΠΎΠ²Π½Ρ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, Π³Π΄Π΅ Π½Π°ΡΠ½ΡΡΠ΅ ΡΠΎ ΡΠ±ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Ρ Π²Π΅Π±-ΡΠ°ΠΉΡΠ°. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΡΠΌ, ΡΠ²ΡΠ·Π°Π½Π½ΡΠΌ ΡΠΎ Π²Π·Π»ΠΎΠΌΠΎΠΌ Π²Π΅Π±-ΡΠ°ΠΉΡΠΎΠ², ΡΠ°ΠΊΠΈΠΌ ΠΊΠ°ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ², DDoS, XSS ΠΈ SQL-ΠΈΠ½ΡΠ΅ΠΊΡΠΈΠΈ
#python #book
Python_penetration_testing_essentials_employ_the_power_of_Python.epub
4.3 MB
Python Penetration Testing Essentials
Mohit, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
Mohit, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
π1
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ MDSec - Adversary Simulation and Red Team Tactics
This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and perform post-exploitation and lateral movement. You will learn how to bypass defensive controls including anti-virus, EDR, AMSI and application whitelisting that will leave you equipped to target even the most mature environments
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://www.mdsec.co.uk/our-services/adversary-simulation/
#education
This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and perform post-exploitation and lateral movement. You will learn how to bypass defensive controls including anti-virus, EDR, AMSI and application whitelisting that will leave you equipped to target even the most mature environments
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://www.mdsec.co.uk/our-services/adversary-simulation/
#education
β€1
MDSec_Adversary_Simulation_and_Red_Team_Tactics_open_as_XZ_archive!!!!.xz
571.1 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ MDSec - Adversary Simulation and Red Team Tactics (unpacked with XZ archivator compatible tar)
π2
ΠΡΡΠ·ΡΡ, ΠΊΡΠΎ Π·Π°Π½ΡΡ Π² ΡΠ΅ΠΌΠ΅ SecDevOps ΠΈ Π³ΠΎΡΠΎΠ² ΠΎΠ±ΡΠ΅Π΄ΠΈΠ½ΠΈΡΡΡΡ ΡΡΠΎ Π±Ρ Π²ΠΌΠ΅ΡΡΠ΅ ΠΏΠΎΠ΄Π³ΠΎΡΠΎΠ²ΠΈΡΡΡΡ ΠΊ ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΉ ΠΊΠΈΠ±Π΅ΡΡΠ΅ΠΊ ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΠΈΠΈ Π½Π° Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΎΠΌ ΡΠ·ΡΠΊΠ΅ Π»Π΅ΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ Π³ΠΎΠ΄Π°, ΠΏΠΈΡΠΈΡΠ΅ Π² Π»ΠΈΡΠΊΡ, Π΅ΡΡΡ ΡΡΠΎ ΠΎΡΡΠ΄ΠΈΡΡ!
#info
#info
β€1
ΠΡΡΡ Π΄Π°Π½Π½ΡΠ΅ ΠΏΠΎ ΡΡΠΎΠΈΠΌΠΎΡΡΠΈ ΡΡΠ»ΡΠ³ ΠΏΠ΅Π½-ΡΠ΅ΡΡΠ° Π² Π Π€ ΠΈ Π‘Π¨Π (ΠΠ²ΡΠΎΠΏΠ΅) Π½Π° ΡΡΠΈΠ»Π°Π½ΡΠ΅ ΠΈ ΠΎΡ ΠΈΠΌΠ΅Π½ΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ. ΠΠ΅Π»Π°ΡΡ ΠΎΠ±Π·ΠΎΡ?
Anonymous Poll
91%
ΠΠ°Π²Π°ΠΉ, Π΄Π΅Π»Π°ΠΉ, ΠΆΠ΄Π΅ΠΌ!
4%
ΠΡΠΎ Π½Π΅ ΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ½ΠΎ
3%
ΠΡΠΎ ΠΈ ΡΠ°ΠΊ ΡΠΆΠ΅ Π²ΡΠ΅ Π·Π½Π°ΡΡ ΡΠ΅Π³ΠΎ ΡΡΡ Π΅ΡΠ΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΡ ΠΈ ΡΠ°ΡΡΠΊΠ°Π·ΡΠ²Π°ΡΡ
2%
Π‘Π²ΠΎΠΉ Π²Π°ΡΠΈΠ°Π½Ρ (ΡΠ°Ρ/ΠΊΠΎΠΌΠ΅Π½Ρ)
white2hack π
// ΠΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠ΅ ΠΎΡ ΠΠΊΡΡΠ±ΡΡ 2024 // ΠΠ΄ΠΌΠΈΠ½ΠΈΡΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΠΈ ΡΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΠΈΡ ΡΡΠ΅Π΄ΡΡΠ² Π·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ AV, IPD\IDS, WAF, SSO, IDM\IAM, DLP, DBF, NAC, GRC, rules, ACL, white listing, ID, SandBox, ΡΠ²ΡΠΈΡΡΠΈΡΠ΅ΡΠΊΠΈΠΉ Π°Π½Π°Π»ΠΈΠ·, ΡΠΌΡΠ»ΡΡΠΈΡ API, REST Penetration test, Red team, Offensiveβ¦
ΠΠ±Π½ΠΎΠ²Π»Π΅Π½ ΡΠΏΠΈΡΠΎΠΊ ΠΊΠ»ΡΡΠ΅Π²ΡΡ
ΡΠ΅ΡΠΌΠΈΠ½ΠΎΠ², Π°Π±Π±ΡΠ΅Π²ΠΈΠ°ΡΡΡ, ΡΠΎΠΊΡΠ°ΡΠ΅Π½ΠΈΠΉ ΠΏΡΠΈΠ½ΡΡΡΡ
Π² ΠΏΡΠ°ΠΊΡΠΈΠΊΠ΅ cyber security (Upd. Jan 2021)
ΠΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ:
+ Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΎ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΉ
P.S. Π£ ΠΊΠΎΠ³ΠΎ Π΅ΡΡΡ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΏΠΎ ΡΠ°ΡΡΠΈΡΠ΅Π½ΠΈΡ/ΠΊΠΎΡΡΠ΅ΠΊΡΠΈΡΠΎΠ²ΠΊΠ΅ ΡΠΏΠΈΡΠΊΠ° - ΠΏΠΈΡΠΈΡΠ΅ @w2hack_feed_bot
ΠΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ:
+ Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΎ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΉ
P.S. Π£ ΠΊΠΎΠ³ΠΎ Π΅ΡΡΡ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΏΠΎ ΡΠ°ΡΡΠΈΡΠ΅Π½ΠΈΡ/ΠΊΠΎΡΡΠ΅ΠΊΡΠΈΡΠΎΠ²ΠΊΠ΅ ΡΠΏΠΈΡΠΊΠ° - ΠΏΠΈΡΠΈΡΠ΅ @w2hack_feed_bot
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python 3 For Offensive PenTest: A Complete Practical Course published by Packt, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π° - ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ° ΠΊΡΡΡΠ° Π²ΠΊΠ»ΡΡΠ°Π΅Ρ Π² ΡΠ΅Π±Ρ 21.5 hours on-demand video 14 articles, 19 coding exercises
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΡΠΎΠΊΠΈ ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ΅Π½Π½ΡΠ΅ Π² ΠΊΡΡΡΠ΅:
1. Quick Intro
2. Python 3 Windows 10 Kali 2 Gaining Access β Your First Persistence Shell
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
5. Python 3 How Malware Abuse Cryptography Python Answers
6. Python 3 Windows 10 Kali 2 Passwords Hacking
7. Windows 7 & 10 Privilege Escalation β Weak Service Permission
Udemy
https://bit.ly/3brjiuK
Pack
https://bit.ly/2MQ1b7n
GitHub
https://bit.ly/3q8JFd0
#python #education #kali #pentest
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΡΠΎΠΊΠΈ ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ΅Π½Π½ΡΠ΅ Π² ΠΊΡΡΡΠ΅:
1. Quick Intro
2. Python 3 Windows 10 Kali 2 Gaining Access β Your First Persistence Shell
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
5. Python 3 How Malware Abuse Cryptography Python Answers
6. Python 3 Windows 10 Kali 2 Passwords Hacking
7. Windows 7 & 10 Privilege Escalation β Weak Service Permission
Udemy
https://bit.ly/3brjiuK
Pack
https://bit.ly/2MQ1b7n
GitHub
https://bit.ly/3q8JFd0
#python #education #kali #pentest
π1
Python_3_Offensive_Pentest_A_Complete.7z
939.4 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python 3 For Offensive PenTest: A Complete Practical Course published by Packt
π2
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python for Penetration Testers ΠΎΡ Π»Π΅ΠΊΡΠΎΡΠ° Cristi Zot, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π° - Π²ΠΊΠ»ΡΡΠ°Π΅Ρ Π² ΡΠ΅Π±Ρ 11 Π»Π΅ΠΊΡΠΈΠΉ ΠΎΠ±ΡΠ΅ΠΉ ΠΏΡΠΎΠ΄ΠΎΠ»ΠΆΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡΡ 1 Ρ 56 ΠΌΠΈΠ½
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ Building a Basic Port Scanner using NMAP in Python
+ Grabbing Screenshots with Python
+ The Socket Module for Network Communication - A TCP Server-Client
+ The Scapy Module for Network Traffic Sniffing and Manipulation
+ Attacking Web Forms with requests and BeautifulSoup in Python
+ Discovering Subdomains with Python
+ Cracking Hashes with Python and Hashlib
+ Spoofing your MAC Address with Python
+ Finding Hidden Wireless Networks with Python
+ Additional Resources and Personal Message
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3bqn6fu
https://bit.ly/39iY53d
#python
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ Building a Basic Port Scanner using NMAP in Python
+ Grabbing Screenshots with Python
+ The Socket Module for Network Communication - A TCP Server-Client
+ The Scapy Module for Network Traffic Sniffing and Manipulation
+ Attacking Web Forms with requests and BeautifulSoup in Python
+ Discovering Subdomains with Python
+ Cracking Hashes with Python and Hashlib
+ Spoofing your MAC Address with Python
+ Finding Hidden Wireless Networks with Python
+ Additional Resources and Personal Message
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3bqn6fu
https://bit.ly/39iY53d
#python
Python for Penetration Tester.zip
662.7 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python for Penetration Testers ΠΎΡ Π»Π΅ΠΊΡΠΎΡΠ° Cristi Zot, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π°
π1
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Practical Network Defense v1 ΠΎΡ eLearnSecurity, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π°
Practical Network Defense is a practical self-study course which covers network and system security topics. The lessons include full practical setup guides, as well as virtual labs in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network
Official page
https://bit.ly/39kS0TN
Guide
https://bit.ly/2LixBHc
#education
Practical Network Defense is a practical self-study course which covers network and system security topics. The lessons include full practical setup guides, as well as virtual labs in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network
Official page
https://bit.ly/39kS0TN
Guide
https://bit.ly/2LixBHc
#education