2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ ΠΊΠ½ΠΈΠ³ΠΈ Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters ΠΎΡ Π°Π²ΡΠΎΡΠΎΠ² Seitz, Justin, Arnold, Tim, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2021 Π³ΠΎΠ΄Π° (ΠΏΡΠ΅Π΄Π²Π°ΡΠΈΡΠ΅Π»ΡΠ½Π°Ρ Π²Π΅ΡΡΠΈΡ)
Π ΠΊΠ½ΠΈΠ³Π΅ "Black Hat Python" ΠΎΡ Justin Seitz (Π°Π²ΡΠΎΡΠ° Π΄ΡΡΠ³ΠΎΠΉ Ρ ΠΎΡΠΎΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ, "Gray Hat Python"), Π²Ρ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΡΠ΅ ΡΠ΅ΠΌΠ½ΡΡ ΡΡΠΎΡΠΎΠ½Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Python - Π½Π°ΠΏΠΈΡΠ°Π½ΠΈΠ΅ ΡΠ½ΠΈΡΡΠ΅ΡΠΎΠ², ΠΌΠ°Π½ΠΈΠΏΡΠ»ΡΡΠΈΡ ΠΏΠ°ΠΊΠ΅ΡΠ°ΠΌΠΈ, Π·Π°ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΡΡ ΠΌΠ°ΡΠΈΠ½, ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΡΠΊΡΡΡΠ½ΡΡ ΡΡΠΎΡΠ½ΠΎΠ² ΠΈ ΠΏΡΠΎΡΠ΅Π΅. ΠΠ½ΡΠ°ΠΉΠ΄Π΅ΡΡΠΊΠΈΠ΅ ΡΠ΅Ρ Π½ΠΈΠΊΠΈ ΠΈ ΠΊΡΠ΅Π°ΡΠΈΠ²Π½ΡΠ΅ Π·Π°Π΄Π°ΡΠΈ Π½Π° ΠΏΡΠΎΡΡΠΆΠ΅Π½ΠΈΠΈ Π²ΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ ΠΏΠΎΠΊΠ°ΠΆΡΡ Π²Π°ΠΌ, ΠΊΠ°ΠΊ ΡΠ°ΡΡΠΈΡΡΡΡ ΠΏΡΠΈΠ΅ΠΌΡ ΠΈ ΠΏΠΈΡΠ°ΡΡ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΡΠΊΡΠΏΠ»ΠΎΠΉΡΡ
Π ΠΊΠ½ΠΈΠ³Π΅
(1) https://nostarch.com/black-hat-python2E
(2) https://www.amazon.com/Black-Hat-Python-2nd-Programming/dp/1718501129
#book #python
Π ΠΊΠ½ΠΈΠ³Π΅ "Black Hat Python" ΠΎΡ Justin Seitz (Π°Π²ΡΠΎΡΠ° Π΄ΡΡΠ³ΠΎΠΉ Ρ ΠΎΡΠΎΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ, "Gray Hat Python"), Π²Ρ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΡΠ΅ ΡΠ΅ΠΌΠ½ΡΡ ΡΡΠΎΡΠΎΠ½Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΠ΅ΠΉ Python - Π½Π°ΠΏΠΈΡΠ°Π½ΠΈΠ΅ ΡΠ½ΠΈΡΡΠ΅ΡΠΎΠ², ΠΌΠ°Π½ΠΈΠΏΡΠ»ΡΡΠΈΡ ΠΏΠ°ΠΊΠ΅ΡΠ°ΠΌΠΈ, Π·Π°ΡΠ°ΠΆΠ΅Π½ΠΈΠ΅ Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΡΡ ΠΌΠ°ΡΠΈΠ½, ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΡΠΊΡΡΡΠ½ΡΡ ΡΡΠΎΡΠ½ΠΎΠ² ΠΈ ΠΏΡΠΎΡΠ΅Π΅. ΠΠ½ΡΠ°ΠΉΠ΄Π΅ΡΡΠΊΠΈΠ΅ ΡΠ΅Ρ Π½ΠΈΠΊΠΈ ΠΈ ΠΊΡΠ΅Π°ΡΠΈΠ²Π½ΡΠ΅ Π·Π°Π΄Π°ΡΠΈ Π½Π° ΠΏΡΠΎΡΡΠΆΠ΅Π½ΠΈΠΈ Π²ΡΠ΅ΠΉ ΠΊΠ½ΠΈΠ³ΠΈ ΠΏΠΎΠΊΠ°ΠΆΡΡ Π²Π°ΠΌ, ΠΊΠ°ΠΊ ΡΠ°ΡΡΠΈΡΡΡΡ ΠΏΡΠΈΠ΅ΠΌΡ ΠΈ ΠΏΠΈΡΠ°ΡΡ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΡΠΊΡΠΏΠ»ΠΎΠΉΡΡ
Π ΠΊΠ½ΠΈΠ³Π΅
(1) https://nostarch.com/black-hat-python2E
(2) https://www.amazon.com/Black-Hat-Python-2nd-Programming/dp/1718501129
#book #python
Black_Hat_Python,_2nd_Edition_Python_Programming_for_Hackers_and.pdf
4.6 MB
2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ ΠΊΠ½ΠΈΠ³ΠΈ Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
π1
ΠΡΠ΅ ΠΎΠ΄Π½Π° Π½Π΅ ΠΏΠ»ΠΎΡ
Π°Ρ ΠΊΠ½ΠΈΠΆΠΊΠ° Π΄Π»Ρ Π½ΠΎΠ²ΡΠΈΠΊΠΎΠΌ ΠΏΠΎ ΠΏΠΎ ΠΏΡΠΈΠΌΠ΅Π½Π½Π΅ΠΈΡ Π·ΠΌΠ΅ΠΈ Π² ΡΠ΅ΠΊΡΡΠ½ΡΡ
Π·Π°Π΄Π°ΡΠ°Ρ
Python Penetration Testing Essentials (Mohit), ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ²ΠΎ, Π΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΡΡΡΠ΅Π΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ Python Π΄Π»Ρ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΏΠΎΠ΄ΡΠΎΠ±Π½ΡΡ ΠΏΡΠΈΠΌΠ΅ΡΠΎΠ² ΠΊΠΎΠ΄Π°. ΠΡ Π½Π°ΡΠ½ΡΡΠ΅ Ρ ΠΈΠ·ΡΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΠ² ΡΠ°Π±ΠΎΡΡ Π² ΡΠ΅ΡΠΈ Ρ Python, Π° Π·Π°ΡΠ΅ΠΌ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ Π²Π·Π»ΠΎΠΌΡ ΡΠ΅ΡΠΈ. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΡΠ³Π»ΡΠ±ΠΈΡΠ΅ΡΡ Π²ΠΎ Π²Π·Π»ΠΎΠΌ ΡΡΠΎΠ²Π½Ρ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, Π³Π΄Π΅ Π½Π°ΡΠ½ΡΡΠ΅ ΡΠΎ ΡΠ±ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Ρ Π²Π΅Π±-ΡΠ°ΠΉΡΠ°. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΡΠΌ, ΡΠ²ΡΠ·Π°Π½Π½ΡΠΌ ΡΠΎ Π²Π·Π»ΠΎΠΌΠΎΠΌ Π²Π΅Π±-ΡΠ°ΠΉΡΠΎΠ², ΡΠ°ΠΊΠΈΠΌ ΠΊΠ°ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ², DDoS, XSS ΠΈ SQL-ΠΈΠ½ΡΠ΅ΠΊΡΠΈΠΈ
#python #book
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΡΡΠΊΠΎΠ²ΠΎΠ΄ΡΡΠ²ΠΎ, Π΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΡΡΡΠ΅Π΅ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ Python Π΄Π»Ρ ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΏΠΎΠ΄ΡΠΎΠ±Π½ΡΡ ΠΏΡΠΈΠΌΠ΅ΡΠΎΠ² ΠΊΠΎΠ΄Π°. ΠΡ Π½Π°ΡΠ½ΡΡΠ΅ Ρ ΠΈΠ·ΡΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΠ² ΡΠ°Π±ΠΎΡΡ Π² ΡΠ΅ΡΠΈ Ρ Python, Π° Π·Π°ΡΠ΅ΠΌ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ Π²Π·Π»ΠΎΠΌΡ ΡΠ΅ΡΠΈ. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΡΠ³Π»ΡΠ±ΠΈΡΠ΅ΡΡ Π²ΠΎ Π²Π·Π»ΠΎΠΌ ΡΡΠΎΠ²Π½Ρ ΠΏΡΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΡ, Π³Π΄Π΅ Π½Π°ΡΠ½ΡΡΠ΅ ΡΠΎ ΡΠ±ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Ρ Π²Π΅Π±-ΡΠ°ΠΉΡΠ°. ΠΠ°ΡΠ΅ΠΌ Π²Ρ ΠΏΠ΅ΡΠ΅ΠΉΠ΄ΡΡΠ΅ ΠΊ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΡΠΌ, ΡΠ²ΡΠ·Π°Π½Π½ΡΠΌ ΡΠΎ Π²Π·Π»ΠΎΠΌΠΎΠΌ Π²Π΅Π±-ΡΠ°ΠΉΡΠΎΠ², ΡΠ°ΠΊΠΈΠΌ ΠΊΠ°ΠΊ ΠΈΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ², DDoS, XSS ΠΈ SQL-ΠΈΠ½ΡΠ΅ΠΊΡΠΈΠΈ
#python #book
Python_penetration_testing_essentials_employ_the_power_of_Python.epub
4.3 MB
Python Penetration Testing Essentials
Mohit, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
Mohit, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015 Π³ΠΎΠ΄Π°
π1
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ MDSec - Adversary Simulation and Red Team Tactics
This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and perform post-exploitation and lateral movement. You will learn how to bypass defensive controls including anti-virus, EDR, AMSI and application whitelisting that will leave you equipped to target even the most mature environments
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://www.mdsec.co.uk/our-services/adversary-simulation/
#education
This intense course covers the skills required to conduct a simulation of a sophisticated adversary, including the latest tradecraft and offensive tactics. During the training you will gain insight in to planning and conducting a red team operation including all the steps required to perform efficient opensource intelligence, design and automate the deployment of operational infrastructure, gain initial access and perform post-exploitation and lateral movement. You will learn how to bypass defensive controls including anti-virus, EDR, AMSI and application whitelisting that will leave you equipped to target even the most mature environments
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://www.mdsec.co.uk/our-services/adversary-simulation/
#education
β€1
MDSec_Adversary_Simulation_and_Red_Team_Tactics_open_as_XZ_archive!!!!.xz
571.1 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ MDSec - Adversary Simulation and Red Team Tactics (unpacked with XZ archivator compatible tar)
π2
ΠΡΡΠ·ΡΡ, ΠΊΡΠΎ Π·Π°Π½ΡΡ Π² ΡΠ΅ΠΌΠ΅ SecDevOps ΠΈ Π³ΠΎΡΠΎΠ² ΠΎΠ±ΡΠ΅Π΄ΠΈΠ½ΠΈΡΡΡΡ ΡΡΠΎ Π±Ρ Π²ΠΌΠ΅ΡΡΠ΅ ΠΏΠΎΠ΄Π³ΠΎΡΠΎΠ²ΠΈΡΡΡΡ ΠΊ ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½ΠΎΠΉ ΠΊΠΈΠ±Π΅ΡΡΠ΅ΠΊ ΠΊΠΎΠ½ΡΠ΅ΡΠ΅Π½ΡΠΈΠΈ Π½Π° Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΎΠΌ ΡΠ·ΡΠΊΠ΅ Π»Π΅ΡΠΎΠΌ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ Π³ΠΎΠ΄Π°, ΠΏΠΈΡΠΈΡΠ΅ Π² Π»ΠΈΡΠΊΡ, Π΅ΡΡΡ ΡΡΠΎ ΠΎΡΡΠ΄ΠΈΡΡ!
#info
#info
β€1
ΠΡΡΡ Π΄Π°Π½Π½ΡΠ΅ ΠΏΠΎ ΡΡΠΎΠΈΠΌΠΎΡΡΠΈ ΡΡΠ»ΡΠ³ ΠΏΠ΅Π½-ΡΠ΅ΡΡΠ° Π² Π Π€ ΠΈ Π‘Π¨Π (ΠΠ²ΡΠΎΠΏΠ΅) Π½Π° ΡΡΠΈΠ»Π°Π½ΡΠ΅ ΠΈ ΠΎΡ ΠΈΠΌΠ΅Π½ΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ. ΠΠ΅Π»Π°ΡΡ ΠΎΠ±Π·ΠΎΡ?
Anonymous Poll
91%
ΠΠ°Π²Π°ΠΉ, Π΄Π΅Π»Π°ΠΉ, ΠΆΠ΄Π΅ΠΌ!
4%
ΠΡΠΎ Π½Π΅ ΠΈΠ½ΡΠ΅ΡΠ΅ΡΠ½ΠΎ
3%
ΠΡΠΎ ΠΈ ΡΠ°ΠΊ ΡΠΆΠ΅ Π²ΡΠ΅ Π·Π½Π°ΡΡ ΡΠ΅Π³ΠΎ ΡΡΡ Π΅ΡΠ΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΡ ΠΈ ΡΠ°ΡΡΠΊΠ°Π·ΡΠ²Π°ΡΡ
2%
Π‘Π²ΠΎΠΉ Π²Π°ΡΠΈΠ°Π½Ρ (ΡΠ°Ρ/ΠΊΠΎΠΌΠ΅Π½Ρ)
white2hack π
// ΠΠ±Π½ΠΎΠ²Π»Π΅Π½ΠΈΠ΅ ΠΎΡ ΠΠΊΡΡΠ±ΡΡ 2024 // ΠΠ΄ΠΌΠΈΠ½ΠΈΡΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΠΈ ΡΠΊΡΠΏΠ»ΡΠ°ΡΠ°ΡΠΈΡ ΡΡΠ΅Π΄ΡΡΠ² Π·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ AV, IPD\IDS, WAF, SSO, IDM\IAM, DLP, DBF, NAC, GRC, rules, ACL, white listing, ID, SandBox, ΡΠ²ΡΠΈΡΡΠΈΡΠ΅ΡΠΊΠΈΠΉ Π°Π½Π°Π»ΠΈΠ·, ΡΠΌΡΠ»ΡΡΠΈΡ API, REST Penetration test, Red team, Offensiveβ¦
ΠΠ±Π½ΠΎΠ²Π»Π΅Π½ ΡΠΏΠΈΡΠΎΠΊ ΠΊΠ»ΡΡΠ΅Π²ΡΡ
ΡΠ΅ΡΠΌΠΈΠ½ΠΎΠ², Π°Π±Π±ΡΠ΅Π²ΠΈΠ°ΡΡΡ, ΡΠΎΠΊΡΠ°ΡΠ΅Π½ΠΈΠΉ ΠΏΡΠΈΠ½ΡΡΡΡ
Π² ΠΏΡΠ°ΠΊΡΠΈΠΊΠ΅ cyber security (Upd. Jan 2021)
ΠΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ:
+ Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΎ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΉ
P.S. Π£ ΠΊΠΎΠ³ΠΎ Π΅ΡΡΡ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΏΠΎ ΡΠ°ΡΡΠΈΡΠ΅Π½ΠΈΡ/ΠΊΠΎΡΡΠ΅ΠΊΡΠΈΡΠΎΠ²ΠΊΠ΅ ΡΠΏΠΈΡΠΊΠ° - ΠΏΠΈΡΠΈΡΠ΅ @w2hack_feed_bot
ΠΠ·ΠΌΠ΅Π½Π΅Π½ΠΈΡ:
+ Π΄ΠΎΠ±Π°Π²Π»Π΅Π½ΠΎ Π½Π΅ΡΠΊΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΉ
P.S. Π£ ΠΊΠΎΠ³ΠΎ Π΅ΡΡΡ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΏΠΎ ΡΠ°ΡΡΠΈΡΠ΅Π½ΠΈΡ/ΠΊΠΎΡΡΠ΅ΠΊΡΠΈΡΠΎΠ²ΠΊΠ΅ ΡΠΏΠΈΡΠΊΠ° - ΠΏΠΈΡΠΈΡΠ΅ @w2hack_feed_bot
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python 3 For Offensive PenTest: A Complete Practical Course published by Packt, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π° - ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ° ΠΊΡΡΡΠ° Π²ΠΊΠ»ΡΡΠ°Π΅Ρ Π² ΡΠ΅Π±Ρ 21.5 hours on-demand video 14 articles, 19 coding exercises
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΡΠΎΠΊΠΈ ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ΅Π½Π½ΡΠ΅ Π² ΠΊΡΡΡΠ΅:
1. Quick Intro
2. Python 3 Windows 10 Kali 2 Gaining Access β Your First Persistence Shell
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
5. Python 3 How Malware Abuse Cryptography Python Answers
6. Python 3 Windows 10 Kali 2 Passwords Hacking
7. Windows 7 & 10 Privilege Escalation β Weak Service Permission
Udemy
https://bit.ly/3brjiuK
Pack
https://bit.ly/2MQ1b7n
GitHub
https://bit.ly/3q8JFd0
#python #education #kali #pentest
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΡΠΎΠΊΠΈ ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ΅Π½Π½ΡΠ΅ Π² ΠΊΡΡΡΠ΅:
1. Quick Intro
2. Python 3 Windows 10 Kali 2 Gaining Access β Your First Persistence Shell
3. Python 3 Windows 10 Kali 2 Advanced Scriptable Shell
4. Python 3 Windows 10 Kali 2 Catch Me If You Can!
5. Python 3 How Malware Abuse Cryptography Python Answers
6. Python 3 Windows 10 Kali 2 Passwords Hacking
7. Windows 7 & 10 Privilege Escalation β Weak Service Permission
Udemy
https://bit.ly/3brjiuK
Pack
https://bit.ly/2MQ1b7n
GitHub
https://bit.ly/3q8JFd0
#python #education #kali #pentest
π1
Python_3_Offensive_Pentest_A_Complete.7z
939.4 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python 3 For Offensive PenTest: A Complete Practical Course published by Packt
π2
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python for Penetration Testers ΠΎΡ Π»Π΅ΠΊΡΠΎΡΠ° Cristi Zot, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π° - Π²ΠΊΠ»ΡΡΠ°Π΅Ρ Π² ΡΠ΅Π±Ρ 11 Π»Π΅ΠΊΡΠΈΠΉ ΠΎΠ±ΡΠ΅ΠΉ ΠΏΡΠΎΠ΄ΠΎΠ»ΠΆΠΈΡΠ΅Π»ΡΠ½ΠΎΡΡΡΡ 1 Ρ 56 ΠΌΠΈΠ½
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ Building a Basic Port Scanner using NMAP in Python
+ Grabbing Screenshots with Python
+ The Socket Module for Network Communication - A TCP Server-Client
+ The Scapy Module for Network Traffic Sniffing and Manipulation
+ Attacking Web Forms with requests and BeautifulSoup in Python
+ Discovering Subdomains with Python
+ Cracking Hashes with Python and Hashlib
+ Spoofing your MAC Address with Python
+ Finding Hidden Wireless Networks with Python
+ Additional Resources and Personal Message
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3bqn6fu
https://bit.ly/39iY53d
#python
ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ ΡΠ΅ΠΌΡ ΠΎΠ±ΡΡΠ°ΡΡΠ΅Π³ΠΎ ΠΊΡΡΡΠ°:
+ Building a Basic Port Scanner using NMAP in Python
+ Grabbing Screenshots with Python
+ The Socket Module for Network Communication - A TCP Server-Client
+ The Scapy Module for Network Traffic Sniffing and Manipulation
+ Attacking Web Forms with requests and BeautifulSoup in Python
+ Discovering Subdomains with Python
+ Cracking Hashes with Python and Hashlib
+ Spoofing your MAC Address with Python
+ Finding Hidden Wireless Networks with Python
+ Additional Resources and Personal Message
ΠΡΠΈΡΠΈΠ°Π»ΡΠ½ΡΠΉ ΡΠ°ΠΉΡ
https://bit.ly/3bqn6fu
https://bit.ly/39iY53d
#python
Python for Penetration Tester.zip
662.7 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Python for Penetration Testers ΠΎΡ Π»Π΅ΠΊΡΠΎΡΠ° Cristi Zot, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π°
π1
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Practical Network Defense v1 ΠΎΡ eLearnSecurity, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π°
Practical Network Defense is a practical self-study course which covers network and system security topics. The lessons include full practical setup guides, as well as virtual labs in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network
Official page
https://bit.ly/39kS0TN
Guide
https://bit.ly/2LixBHc
#education
Practical Network Defense is a practical self-study course which covers network and system security topics. The lessons include full practical setup guides, as well as virtual labs in Hera for the student to practice their new skills before deploying these technologies and strategies in a production network
Official page
https://bit.ly/39kS0TN
Guide
https://bit.ly/2LixBHc
#education
Practical Network Defense v1_2020_[w2hack].zip
900.5 MB
ΠΠ±ΡΡΠ°ΡΡΠΈΠΉ Π²ΠΈΠ΄Π΅ΠΎ ΠΊΡΡΡ Practical Network Defense v1 ΠΎΡ eLearnSecurity, ΡΠ·ΡΠΊ Π°Π½Π³Π»ΠΈΠΉΡΠΊΠΈΠΉ, ΡΠ΅Π»ΠΈΠ· 2020 Π³ΠΎΠ΄Π°
π1
Π Π΅Π»ΠΈΠ· ΠΊΠΎΠΌΠΌΠ΅ΡΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΡΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΡΠΊΠ°Π½Π΅ΡΠ° Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄Π° (SAST) Checkmarx CxSAST ver.9.20 ΠΏΠΎΠ΄ ΠΠ‘ Windows - Π³ΠΈΠ±ΠΊΠΈΠΉ ΠΏΡΠΎΠ΄ΡΠΊΡ Π΄Π»Ρ Π°Π½Π°Π»ΠΈΠ·Π° ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄Π°, ΠΊΠΎΡΠΎΡΡΠΉ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΡΠΊΡΠΏΠ΅ΡΡΠ°ΠΌ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈ ΠΏΡΠΎΠ²Π΅ΡΡΡΡ Π½Π΅ΡΠΊΠΎΠΌΠΏΠΈΠ»ΠΈΡΠΎΠ²Π°Π½Π½ΡΠΉ ΠΈ Π½Π΅Π·Π°ΠΊΠΎΠ½ΡΠ΅Π½Π½ΡΠΉ ΠΊΠΎΠ΄ Π½Π° ΡΠ°ΠΌΡΡ
ΡΠ°ΡΠΏΡΠΎΡΡΡΠ°Π½Π΅Π½Π½ΡΡ
ΡΠ·ΡΠΊΠ°Ρ
ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ (Java, C++, JS, PHP, Python, Ruby, etc) ΠΈ Π²ΡΡΠ²Π»ΡΡΡ ΡΠΎΡΠ½ΠΈ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠ΅ΠΉ Π΄ΠΎ ΠΌΠΎΠΌΠ΅Π½ΡΠ° Π²ΡΠΏΡΡΠΊΠ° ΠΏΡΠΎΠ΄ΡΠΊΡΠ°
ΠΠ½ΡΡΠ°Π»Π»ΡΡΠΈΠΎΠ½Π½ΡΠΉ ΠΏΠ°ΠΊΠ΅Ρ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ΄ ΠΠ‘ Windows, Π² ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ΅ ΠΈΠ΄Π΅Ρ Π²ΡΠ΅ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡΠ΅Π»ΡΠ½ΠΎΠ΅ ΠΠ Π½Π΅ΠΎΠ±Ρ ΠΎΠ΄ΠΈΠΌΠΎΠ΅ Π΄Π»Ρ ΡΠ°Π±ΠΎΡΡ, Π°ΠΊΡΠΈΠ²Π°ΡΠΈΡ ΠΏΡΠΎΠΈΡΡ ΠΎΠ΄ΠΈΡ ΠΏΡΡΠ΅ΠΌ Π·Π°ΠΌΠ΅Π½Ρ ΠΈΡΠΏΠΎΠ»Π½ΡΠ΅ΠΌΡΡ ΡΠ°ΠΉΠ»ΠΎΠ²
Official page
https://bit.ly/3sbEivj
Release Notes
https://bit.ly/3ntI9jB
PDF
https://bit.ly/2Lkeigv
#hacktools #SSDLC #AppSec
ΠΠ½ΡΡΠ°Π»Π»ΡΡΠΈΠΎΠ½Π½ΡΠΉ ΠΏΠ°ΠΊΠ΅Ρ ΡΠΎΠ»ΡΠΊΠΎ ΠΏΠΎΠ΄ ΠΠ‘ Windows, Π² ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ΅ ΠΈΠ΄Π΅Ρ Π²ΡΠ΅ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡΠ΅Π»ΡΠ½ΠΎΠ΅ ΠΠ Π½Π΅ΠΎΠ±Ρ ΠΎΠ΄ΠΈΠΌΠΎΠ΅ Π΄Π»Ρ ΡΠ°Π±ΠΎΡΡ, Π°ΠΊΡΠΈΠ²Π°ΡΠΈΡ ΠΏΡΠΎΠΈΡΡ ΠΎΠ΄ΠΈΡ ΠΏΡΡΠ΅ΠΌ Π·Π°ΠΌΠ΅Π½Ρ ΠΈΡΠΏΠΎΠ»Π½ΡΠ΅ΠΌΡΡ ΡΠ°ΠΉΠ»ΠΎΠ²
Official page
https://bit.ly/3sbEivj
Release Notes
https://bit.ly/3ntI9jB
https://bit.ly/2Lkeigv
#hacktools #SSDLC #AppSec
π1
Checkmarx CxSAST ver.9.20_Setup-GitMigration_[w2hack].zip
1.4 GB
Π Π΅Π»ΠΈΠ· ΠΊΠΎΠΌΠΌΠ΅ΡΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΡΠΊΠ°Π½Π΅ΡΠ° Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΠΈΡΡ
ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΊΠΎΠ΄Π° (SAST) Checkmarx CxSAST ver.9.20 ΠΏΠΎΠ΄ ΠΠ‘ Windows
π2