📡 – Telegram
📡
535 subscribers
68 photos
10 videos
26 files
72 links
Download Telegram
Media is too big
VIEW IN TELEGRAM
NMAP Scanning Techniques | Beginners and Advanced | TryHackMe JR Penetration Tester
🌐Link
channel: @HackLabel
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
OPC UA Deep Dive (Part 3): Exploring the OPC UA Protocol

🌐Link
channel: @HackLabel
Threat_Hunting_in_the_Cloud_Defending_AWS,_Azure_and_Other_Cloud.pdf
29.1 MB
📚Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks.

channel
: @HackLabel
Man in the middle attack framework

#github
🌐Github
channel: @HackLabel
PrivacyTools.io provides services, tools and privacy guides to counter global mass surveillance. Established in 2015 after Edward Snowden's revelations, and is now the most popular privacy website.

🌐Link
channel: @HackLabel
2❤‍🔥1
Open-Source Phishing Framework

Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing.
#phishing #tool
🌐Link
channel: @HackLabel
Configuring and Managing Core Dumps in Linux

A core dump is a file that gets automatically generated by the Linux kernel after a program crashes. This file contains the memory, register values, and the call stack of an application at the point of crashing.

🌐Link
channel: @HackLabel
Media is too big
VIEW IN TELEGRAM
Intro to Syscalls for Windows Malware

channel: @HackLabel
team: @AssassinsCybery
ios_ApplicationSecurity.pdf
14.7 MB
iOS Application Security
The Definitive Guide for Hackers and Developers

channel: @HackLabel
👍2
Media is too big
VIEW IN TELEGRAM
Finding Vulnerabilities in IoT Firmware

channel: @HackLabel
Aligning.Security.Operations.with.the.MITRE.ATT.CK.Framework.pdf
7.5 MB
Aligning Security Operations with the MITRE ATT&CK Framework.

channel: @HackLabel
TCP Reverse Shell in Assembly (ARM 32-bit)
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.

#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
From C, with inline assembly, to shellcode

Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode

channel: @HackLabel
2👏1