hackspace
@hackspace
158
subscribers
279
photos
75
videos
23
files
997
links
hackspace
Download Telegram
Join
hackspace
158 subscribers
hackspace
0:18
This media is not supported in your browser
VIEW IN TELEGRAM
hackspace
https://citizenlab.ca/2024/08/sophisticated-phishing-targets-russias-perceived-enemies-around-the-globe/
The Citizen Lab
Rivers of Phish
A sophisticated spear phishing campaign has been targeting Western and Russian civil society. In collaboration with Access Now, and with the participation of numerous civil society organizations, we uncover this operation and link it to COLDRIVER, a group…
hackspace
https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot
GitHub
Unleashing an Ultimate XSS Polyglot
A container repository for my public web hacks! Contribute to 0xSobky/HackVault development by creating an account on GitHub.
hackspace
https://github.com/7etsuo/windows-api-function-cheatsheets
GitHub
GitHub - 7etsuo/windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations…
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,...
👍
1
hackspace
0:14
This media is not supported in your browser
VIEW IN TELEGRAM
😃
😁
3
hackspace
0:20
This media is not supported in your browser
VIEW IN TELEGRAM
🔥
1
hackspace
https://github.com/jfjallid/go-secdump
GitHub
GitHub - jfjallid/go-secdump: Tool to remotely dump secrets from the Windows registry
Tool to remotely dump secrets from the Windows registry - jfjallid/go-secdump
hackspace
https://github.com/ynwarcs/CVE-2024-38063?s=35
GitHub
GitHub - ynwarcs/CVE-2024-38063: poc for CVE-2024-38063 (RCE in tcpip.sys)
poc for CVE-2024-38063 (RCE in tcpip.sys). Contribute to ynwarcs/CVE-2024-38063 development by creating an account on GitHub.
hackspace
https://github.com/DorsaRoh/Machine-Learning?s=35
GitHub
GitHub - DorsaRoh/Machine-Learning: ML from scratch
ML from scratch. Contribute to DorsaRoh/Machine-Learning development by creating an account on GitHub.
hackspace
https://medium.com/@zehanimehdi49/hacking-llms-101-attention-is-all-i-need-407fa25c1796
Medium
Hacking LLMs 101 : Attention is all I need ?
Large language models (LLMs) have gained significant attention due to their potential applications in various industries. However, as LLMs…
hackspace
https://github.com/CyberAlbSecOP/Awesome_GPT_Super_Prompting
GitHub
GitHub - CyberAlbSecOP/Awesome_GPT_Super_Prompting: ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM…
ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security, Ai Prompt Engineering, Adversarial Machine Learning. - Cybe...
hackspace
0:59
This media is not supported in your browser
VIEW IN TELEGRAM
👍
2
🔥
1
hackspace
https://blog.exploit.org/caster-axis-shift/
exploit.org
Axis Shift: Pivoting using ZeroTier
Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
hackspace
https://youtu.be/V4jXVrUJsfM?si=ieTC08t7jbAV6slJ
YouTube
Python for Aerospace | FREE 10 Hour Comprehensive Python Course
🚀
Welcome to "Python for Aerospace," a free, hands-on course designed to equip you with essential Python skills tailored for the aerospace industry. Through 25 interactive lessons, you'll master the fundamentals of Python and apply them to build practical…
hackspace
The (Anti-)EDR Compendium
https://blog.deeb.ch/posts/how-edr-works/
hackspace
https://blog.exploit.org/caster-violence
exploit.org
Violence: Pivoting using Nebula
Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula
hackspace
https://www.youtube.com/watch?v=MKuaZ7wQICA
hackspace
https://redteamrecipe.com/top-phishing-techniques
ExpiredDomains.com
redteamrecipe.com is for sale! Check it out on ExpiredDomains.com
Buy redteamrecipe.com for 195 on GoDaddy via ExpiredDomains.com. This premium expired .com domain is ideal for establishing a strong online identity.
hackspace
https://github.com/S3N4T0R-0X0/BEAR?s=35
GitHub
GitHub - S3N4T0R-0X0/BEAR: Bear C2 is a compilation of C2 noscripts, payloads, and stagers used in simulated attacks by Russian APT…
Bear C2 is a compilation of C2 noscripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA ...
hackspace
https://github.com/hacksider/Deep-Live-Cam
GitHub
GitHub - hacksider/Deep-Live-Cam: real time face swap and one-click video deepfake with only a single image
real time face swap and one-click video deepfake with only a single image - hacksider/Deep-Live-Cam
hackspace
https://www.elastic.co/security-labs/dprk-code-of-conduct
www.elastic.co
Code of Conduct: DPRK’s Python-fueled intrusions into secured networks — Elastic Security Labs
Investigating the DPRK’s strategic use of Python and carefully crafted social engineering, this publication sheds light on how they breach highly secure networks with evolving and effective cyber attacks.
TWeb.init({scrollToPost:'hackspace/1295'});