MD_MZ.pdf
70.4 MB
Techbook
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥1🤩1
DB_Forensics.pdf
13.2 MB
DFIR
Techbook
A Practical Hands-on Approach to Database Forensics.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Techbook
A Practical Hands-on Approach to Database Forensics.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥1😱1
Cloud_Hacking.pdf
17.7 MB
Techbook
CloudSecurity
Cloud Hacking Playbook 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
CloudSecurity
Cloud Hacking Playbook 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3👍1🔥1😱1🕊1
eBPF_Sec_Model.pdf
1.5 MB
Whitepaper
ThreatResearch
eBPF Security Threat Model 2024.
eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
ThreatResearch
eBPF Security Threat Model 2024.
eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍1🔥1👏1😱1
اسپلانک ؛ پیاده سازی UF با GPO
https://blog.edie.io/2020/03/28/deploying-splunk-universal-forwarders-via-gpo/amp/
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
https://blog.edie.io/2020/03/28/deploying-splunk-universal-forwarders-via-gpo/amp/
Please open Telegram to view this post
VIEW IN TELEGRAM
Michael Edie
Deploying Splunk Universal Forwarders via GPO
When you want to get security event data from your Windows endpoints, there exists a myriad of ways to achieve that objective. Here I am going to outline how to deploy the Splunk Universal Forwarde…
❤4👍1🔥1👏1🎉1
بیایم از یک الگوریتم داده کاوی data mining برای کمک در شکار تهدیدات استفاده کنیم.
شناخت اوضاع غیر نرمال
https://www.huntandhackett.com/blog/kmeans-clustering-for-lateral-movement-detection
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
شناخت اوضاع غیر نرمال
https://www.huntandhackett.com/blog/kmeans-clustering-for-lateral-movement-detection
Please open Telegram to view this post
VIEW IN TELEGRAM
Huntandhackett
K-means Clustering for Lateral Movement Detection
Hunt & Hackett's cybersecurity experts explain how K-means clustering algorithms can be used to detect lateral movement in a network.
❤4👍1🔥1😱1🎉1
گزارش تحلیلی
وقتی کاربران ایرانی نمیتوانند ادوبی را به روز کنند ممکن است در این دام بیفتند
https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part1.html
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
وقتی کاربران ایرانی نمیتوانند ادوبی را به روز کنند ممکن است در این دام بیفتند
https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part1.html
Please open Telegram to view this post
VIEW IN TELEGRAM
JPCERT/CC Eyes
Recent Cases of Watering Hole Attacks, Part 1 - JPCERT/CC Eyes
Nowadays, many people probably recognize exploit of vulnerabilities in publicly exposed assets such as VPN and firewalls as the attack vector. In fact, many security incidents reported to JPCERT/CC also involve such devices. This is because vulnerabilities…
❤4😁2😱1🎉1🤣1
فارنزیکی متفاوت
https://www.mailxaminer.com/blog/gmail-email-forensics
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
https://www.mailxaminer.com/blog/gmail-email-forensics
Please open Telegram to view this post
VIEW IN TELEGRAM
MailXaminer Official Blog
Gmail Email Forensics Analysis to Find Relevant Information
Gmail Email Forensics analysis helps to examine Gmail email information. Forensics detection of the detailed analysis of the Gmail mailbox.
❤3👍2🗿2🎉1👨💻1
CleanCode_v2.pdf
30.3 MB
DevOps
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5👍1🔥1🕊1
Pract_Forensic_IOS_Android.pdf
20.4 MB
DFIR
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.
Please open Telegram to view this post
VIEW IN TELEGRAM
🕊3🔥2❤1🤯1🤩1
LLM_Cybersecurity.pdf
11.8 MB
MLSecOps
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍2🎉1🤩1
IDS_IPS_Snort3.pdf
12.3 MB
Tech book
IDS and IPS with Snort 3:
Get up and running with Snort 3 and discover effective solutions to your security issues", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
IDS and IPS with Snort 3:
Get up and running with Snort 3 and discover effective solutions to your security issues", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍1😢1🤩1🕊1
FDIA.pdf
1.9 MB
SCADA Security
False Data Injection Attacks Against Distribution Automation Systems", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
False Data Injection Attacks Against Distribution Automation Systems", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
👏4🤩2👍1🕊1🤣1
ED_and_RT.pdf
4.5 MB
Whitepaper
Blue Team Techniques
Never Trust, Always Verify: Effectiveness of Endpoint Detection and Response Tools Versus Zero Trust Endpoint Controls in Enterprise Environments", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Blue Team Techniques
Never Trust, Always Verify: Effectiveness of Endpoint Detection and Response Tools Versus Zero Trust Endpoint Controls in Enterprise Environments", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉4❤2👍1🤩1🕊1
LLM_Sec_Playbook.pdf
2.4 MB
MLSecOps
Tech book
"The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Tech book
"The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤2😢1🤩1🕊1
ML_Security.pdf
10.1 MB
Tech book
"Machine Learning Security Principles:
Keep data, networks, users, and applications safe from prying eyes", 2022.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
"Machine Learning Security Principles:
Keep data, networks, users, and applications safe from prying eyes", 2022.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍1🔥1👏1😱1🕊1
سفارت استرالیا تو ایران راننده استخدام میکنه.
تقریبا پیش نیازی نداره به جز زبان.
حقوقش از حدود ۱۱۰ میلیون تومان ماهانه شروع میشه.😑
لینک
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
تقریبا پیش نیازی نداره به جز زبان.
حقوقش از حدود ۱۱۰ میلیون تومان ماهانه شروع میشه.😑
لینک
Please open Telegram to view this post
VIEW IN TELEGRAM
🗿8🤯3😱3👍1😢1🕊1
♨️ AttackRuleMap
🔺 پروژه مپ Atomic Red Team بر روی
🔘 Splunk ESCU ( در حال تکمیل/فعلا ویندوز )
🔘 Sigma Rules
🔗 https://attackrulemap.netlify.app/
#sigma #Splunk #ESCU #BlueTeam #SOC
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
🔺 پروژه مپ Atomic Red Team بر روی
🔘 Splunk ESCU ( در حال تکمیل/فعلا ویندوز )
🔘 Sigma Rules
🔗 https://attackrulemap.netlify.app/
#sigma #Splunk #ESCU #BlueTeam #SOC
Please open Telegram to view this post
VIEW IN TELEGRAM
attackrulemap.netlify.com
ARM - AttackRuleMap
Mapping of open-source detection rules and atomic tests.
❤4🤯1😱1🎉1🤩1
🔖Bug Bounty CheatSheet
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔘 Github: 🔗Link
#pentestin #bugbounty #Tools
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
🔴XSS
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴SQLi
🔘 Github: 🔗Link
🔴SSRF
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴CRLF
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴CSV-Injection
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴Command Injection
🔘 Github: 🔗Link
🔴Directory Traversal
🔘 Github: 🔗Link
🔴LFI
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴XXE
🔘 Github: 🔗Link
🔴Open-Redirect
🔘 Github: 🔗Link
🔴RCE
🔘 Github: 🔗Link
🔴Crypto
🔘 Github: 🔗Link
🔴Template Injection
🔘 Github: 🔗Link
🔘 Github: 🔗Link
🔴XSLT
🔘 Github: 🔗Link
🔴Content Injection
🔘 Github: 🔗Link
🔴LDAP Injection
🔘 Github: 🔗Link
🔴NoSQL Injection
🔘 Github: 🔗Link
🔴CSRF Injection
🔘 Github: 🔗Link
🔴GraphQL Injection
🔘 Github: 🔗Link
🔴IDOR
🔘 Github: 🔗Link
🔴ISCM
🔘 Github: 🔗Link
🔴LaTex Injection
🔘 Github: 🔗Link
🔴OAuth
🔘 Github: 🔗Link
🔴XPATH Injection
🔘 Github: 🔗Link
🔴Bypass Upload Tricky
🔘 Github: 🔗Link
#pentestin #bugbounty #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3🔥2👏1🤯1😱1
هر وقت سازمانی رفت سراغ cobit و SABSA و C2M2 و امثالهم ؛ میشه انتظار داشت اون سازمان از خیلی جنبه ها بالغ شده وگرنه دراکثر سازمانها فعلا تجارت ابزار و نرم افزار داریم تا استفاده از اونها.
اونوقت حتی میشه در مورد کیفیت پذیرایی از پرسنل اون سازمان تا کیفیت رول نویسی روی فایروال نظر داد
سراغ اینها رفتن شاید یه همت ملی میخواد .
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
اونوقت حتی میشه در مورد کیفیت پذیرایی از پرسنل اون سازمان تا کیفیت رول نویسی روی فایروال نظر داد
سراغ اینها رفتن شاید یه همت ملی میخواد .
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯3❤1👎1🔥1👏1🤩1
⚠️شما شماره ملی یکی رو داشته باش
و
موبایلش
نتیجه آزمایشپزشکی اونو در بسیاری از آزمایشگاههای تهران ببین.
همین قدر زیبا
همین قدر بی امنیت و بی اهمیت !!
حریم شخصی ما
🚫پس شماره تلفنت پسوردت شده لذا اونو هرجایی نده !!
چون مسوولین رسیدگی نمیکنن این راهکار رو گفتم .
پی نوشت : در آمریکا قانون حفاظت از اسناد پزشکی تحت نام HIPAA وجود دارد .
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
و
موبایلش
نتیجه آزمایشپزشکی اونو در بسیاری از آزمایشگاههای تهران ببین.
همین قدر زیبا
همین قدر بی امنیت و بی اهمیت !!
حریم شخصی ما
🚫پس شماره تلفنت پسوردت شده لذا اونو هرجایی نده !!
چون مسوولین رسیدگی نمیکنن این راهکار رو گفتم .
پی نوشت : در آمریکا قانون حفاظت از اسناد پزشکی تحت نام HIPAA وجود دارد .
Please open Telegram to view this post
VIEW IN TELEGRAM
😢4🔥2🤯1🎉1🕊1