مدل های هوش مصنوعی خوبی رو داره که ایمیل فیشینگ و ... میتونه حداقل باهاشون لذت برد و ترینش کرد و برای بحث تست نفوذ و ردتیم بدرد تون بخوره
https://huggingface.co/
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
https://huggingface.co/
Please open Telegram to view this post
VIEW IN TELEGRAM
huggingface.co
Hugging Face – The AI community building the future.
We’re on a journey to advance and democratize artificial intelligence through open source and open science.
👍2❤1🔥1🎉1
Network Security Channel
Photo
🚨🔴 DARK WEB ≠ “MYSTERY LAND” — It’s an OSINT surface you can monitor (safely).
Not everything “dark web” is shady hacking content. For defenders, it’s mainly early signals: leaked creds, brand mentions, data dumps, threat actor chatter, and infrastructure breadcrumbs.
This graphic is a quick snapshot of dark web search + breach-intel tooling — useful for CTI, SOC, and incident response workflows:
🧭 Discovery & Search (Onion indexing)
Tools like Ahmia / Torch / Haystak / Tor66 / Onion Engine can help discover onion content and references.
🕵️ Leak & Breach Intelligence
Have I Been Pwned, DeHashed, Telemetry, Library of Leaks → fast checks for exposed accounts/domains and leaked datasets.
📌 CTI Collection
Sources like DeepDark CTI can support threat intel enrichment (always validate + cross-check).
🔗 Directories & Link Hubs
Pages like Onion.live / Tor.link / DarkwebDaily often act as link lists (high churn, high risk — treat as untrusted).
🔐 Crypto Hygiene
PGP tools matter for verification when you’re handling sensitive comms / proofs.
🛡 How defenders use this (legally + safely):
Brand monitoring (company name, domains, exec emails)
Credential exposure triage → force resets, MFA enforcement, conditional access
Ransomware leak-site monitoring (signals before PR/legal fire drills)
IR enrichment (match IOCs, victimology, TTP patterns)
⚠️ Safety note: If you’re doing this seriously, use isolated VM, tight OPSEC, and a clear legal policy. Most value comes from breach intel + monitoring, not browsing random onion links.
📩 Want a defender-only “Dark Web Monitoring Playbook” checklist (what to track, queries, and response steps)?
Comment “PLAYBOOK” or drop a 🔴 and I’ll share it.
#CyberSecurity #OSINT #ThreatIntelligence #CTI #BlueTeam #SOC #DFIR #IncidentResponse #BreachMonitoring #IdentitySecurity #SecurityOperations
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Not everything “dark web” is shady hacking content. For defenders, it’s mainly early signals: leaked creds, brand mentions, data dumps, threat actor chatter, and infrastructure breadcrumbs.
This graphic is a quick snapshot of dark web search + breach-intel tooling — useful for CTI, SOC, and incident response workflows:
🧭 Discovery & Search (Onion indexing)
Tools like Ahmia / Torch / Haystak / Tor66 / Onion Engine can help discover onion content and references.
🕵️ Leak & Breach Intelligence
Have I Been Pwned, DeHashed, Telemetry, Library of Leaks → fast checks for exposed accounts/domains and leaked datasets.
📌 CTI Collection
Sources like DeepDark CTI can support threat intel enrichment (always validate + cross-check).
🔗 Directories & Link Hubs
Pages like Onion.live / Tor.link / DarkwebDaily often act as link lists (high churn, high risk — treat as untrusted).
🔐 Crypto Hygiene
PGP tools matter for verification when you’re handling sensitive comms / proofs.
🛡 How defenders use this (legally + safely):
Brand monitoring (company name, domains, exec emails)
Credential exposure triage → force resets, MFA enforcement, conditional access
Ransomware leak-site monitoring (signals before PR/legal fire drills)
IR enrichment (match IOCs, victimology, TTP patterns)
⚠️ Safety note: If you’re doing this seriously, use isolated VM, tight OPSEC, and a clear legal policy. Most value comes from breach intel + monitoring, not browsing random onion links.
📩 Want a defender-only “Dark Web Monitoring Playbook” checklist (what to track, queries, and response steps)?
Comment “PLAYBOOK” or drop a 🔴 and I’ll share it.
#CyberSecurity #OSINT #ThreatIntelligence #CTI #BlueTeam #SOC #DFIR #IncidentResponse #BreachMonitoring #IdentitySecurity #SecurityOperations
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
❤1👏1
استخدام کارشناس SOC T1 -T2
کاشف
تهران
حقوق بعد از مصاحبه بهتون میگن خودشون
ارسال رزومه برای ایشون :
@Developer_Network
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
کاشف
تهران
حقوق بعد از مصاحبه بهتون میگن خودشون
ارسال رزومه برای ایشون :
@Developer_Network
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
سلام اگر در تهران شرکت دارین
یا نیاز به نیروی هلپ دسک خوب و کار بلد دارین
به ایدی زیر اطلاع بدین
یک نیروی خوب هست معرفی بشه براتون
برای استخدام و رزومه شو بفرستیم
@Developer_Network
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
یا نیاز به نیروی هلپ دسک خوب و کار بلد دارین
به ایدی زیر اطلاع بدین
یک نیروی خوب هست معرفی بشه براتون
برای استخدام و رزومه شو بفرستیم
@Developer_Network
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
دلمان با تمام خانوادههاییست که این روزها داغدارند؛ در این غم بزرگ، خود را کنار شما میدانیم. 🥀
در شرایطی که اینترنت همچنان بیثبات است و فضا سنگین، تصمیم گرفتیم فعالیتمان را آرام و با محوریت محتوا از سر بگیریم؛ شاید اندکی مرهم باشد برای دلهای خسته.
در شرایطی که اینترنت همچنان بیثبات است و فضا سنگین، تصمیم گرفتیم فعالیتمان را آرام و با محوریت محتوا از سر بگیریم؛ شاید اندکی مرهم باشد برای دلهای خسته.
❤8