Black Hat Rust. Deep dive into offensive security with the Rust programming language by Sylvain Kerkour (v2021.23)
We will put on our black hat and explore the world of offensive security, whether it be cyber attacks, cybercrimes, or cyberwar.
Scanners, exploits, phishing toolkit, implants... From theory to practice, we will explore the arcane of offensive security and build our own offensive tools with the Rust programming language, Stack Overflow's most loved language for five years in a row.
The security programming field is defined by its extremely large scope (from shellcodes to servers and web apps). Rust is the long-awaited one-size-fits-all programming language meeting all those requirements thanks to its unparalleled guarantees and feature set.
GitHub
https://github.com/skerkour/black-hat-rust
#book #coding
We will put on our black hat and explore the world of offensive security, whether it be cyber attacks, cybercrimes, or cyberwar.
Scanners, exploits, phishing toolkit, implants... From theory to practice, we will explore the arcane of offensive security and build our own offensive tools with the Rust programming language, Stack Overflow's most loved language for five years in a row.
The security programming field is defined by its extremely large scope (from shellcodes to servers and web apps). Rust is the long-awaited one-size-fits-all programming language meeting all those requirements thanks to its unparalleled guarantees and feature set.
GitHub
https://github.com/skerkour/black-hat-rust
#book #coding
Web Application Pentest Checklist by Frogy
This is one of the largest checklist available so far on the Internet by Frogy
Sources
https://github.com/iamthefrogy/Web-Application-Pentest-Checklist
#web #pentest
This is one of the largest checklist available so far on the Internet by Frogy
Sources
https://github.com/iamthefrogy/Web-Application-Pentest-Checklist
#web #pentest
Linux Firewalls Enhancing Security with nftables and Beyond (Fourth Edition) by Steve Suehring
An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.
Inside, you’ll find just what you need to:
+ Install, configure, and update a Linux firewall running either iptables or nftables
+ Migrate to nftables, or take advantage of the latest iptables enhancements
+ Manage complex multiple firewall configurations
+ Create, debug, and optimize firewall rules
+ Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
+ Harden systems against port scanning and other attacks
+ Uncover exploits such as rootkits and backdoors with chkrootkit
#book #linux
An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.
Inside, you’ll find just what you need to:
+ Install, configure, and update a Linux firewall running either iptables or nftables
+ Migrate to nftables, or take advantage of the latest iptables enhancements
+ Manage complex multiple firewall configurations
+ Create, debug, and optimize firewall rules
+ Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
+ Harden systems against port scanning and other attacks
+ Uncover exploits such as rootkits and backdoors with chkrootkit
#book #linux
Threat Hunting in the Cloud Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks by Chris Peiris, Binil Pillai, Abbas Kudrati
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros.
You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.
#book
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros.
You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.
#book
Core Impact ver. 20, windows platform, english - по просьбам аудитории, тулза для проведения авто-пентестов. Используйте на свой риск!
Описание от разработчика
Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same techniques as today's adversaries.
Replicate attacks across network infrastructure, endpoints, web, and applications to reveal exploited vulnerabilities, empowering you to immediately remediate risks.
Страница разработчика
https://bit.ly/3oDuQRv
История версий
https://bit.ly/3ELDnI0
Доп Инфа
https://bit.ly/3rQ0z3W
#pentest #hacktools
Описание от разработчика
Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same techniques as today's adversaries.
Replicate attacks across network infrastructure, endpoints, web, and applications to reveal exploited vulnerabilities, empowering you to immediately remediate risks.
Страница разработчика
https://bit.ly/3oDuQRv
История версий
https://bit.ly/3ELDnI0
Доп Инфа
https://bit.ly/3rQ0z3W
#pentest #hacktools
Core Impact 20.1.6201 with Crack_2020.zip
283.3 MB
Core Impact ver.20, windows platform, english, patch included
За использование данной тулзы ответственность полностью на пользователе!
За использование данной тулзы ответственность полностью на пользователе!
👍1
CORE IMPACT 21.1 Decrypted (Installer Only).exe
290.9 MB
CORE IMPACT 21.1 Decrypted (Installer Only) - свежий релиз с отвязанной активацией, только установочный файл
За использование данной тулзы ответственность полностью на пользователе!
За использование данной тулзы ответственность полностью на пользователе!
👍1
Shellter Pro v.3.5, unlocked version
Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject shellcode into native Windows applications (currently 32-bit applications only). The shellcode can be something yours or something generated through a framework, such as Metasploit.
How it work
https://bit.ly/3pN32d4
How to use
https://bit.ly/3pKzahr
YouTube
https://bit.ly/3oCC7kE
#malware #hacktools
Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject shellcode into native Windows applications (currently 32-bit applications only). The shellcode can be something yours or something generated through a framework, such as Metasploit.
How it work
https://bit.ly/3pN32d4
How to use
https://bit.ly/3pKzahr
YouTube
https://bit.ly/3oCC7kE
#malware #hacktools
All in one Cybersecurity Mindmap.pdf
4.7 MB
Сборник разных MindMap по тебе киберсека сшитых в однин PDF файл
👍1
[ОПРОС ДЛЯ ДЕВУШЕК] Слышал, что парень ИТ-шник это круто, и не в доходах или стабильности работы вопрос, а просто "быть с ИТ-шником" это как то особенно клево. Так ли это? Вопрос, ко всем девушкам, скажите свое мнение!
Anonymous Poll
3%
Да, мой парень ИТ-шник, всегда хотела что бы он "что то там делал в компьютере"
10%
Не важно из какой области, главное что человек подходит по интересам, целям и взглядам на жизнь
2%
ИТ-шник это "тема", но не обязательно:)
2%
Затрудняюсь ответить, нужно еще потестить xD
79%
Посмотреть ответ [для парней]
4%
Свой вариант (чат/комент)
Инфа для тех кто ищет свою первую работу, задается вопросом о специализации, боится что он "джун" и высшее образование строго обязательно
Как найти первую работу в IT: план действий для начинающих - довольно годная статья описывающая основные этапы и общий сценарий
https://bit.ly/3Gwtcao
Как без высшего образования сделать карьеру в ІТ — опыт 23-летнего тимлида - получить хорошую работу, позицию и деньги можно и без высшего образования, но путь ли это для всех?
https://bit.ly/3GCMxHe
Кризис перепроизводства джунов - начинающих много, этот факт в чем-то деформирует рынок индустрии и отрасль в целом, есть и свои плюсы и недостатки
https://bit.ly/3lWV6Vq
Карьера в IT: специалист по кибербезопасности от EPAM - знаменитая контора пишет о специализа3иях в киберсеке из тех позиций, что комплектует сама
https://bit.ly/33aW1uH
#Job #analytics #newbie
Как найти первую работу в IT: план действий для начинающих - довольно годная статья описывающая основные этапы и общий сценарий
https://bit.ly/3Gwtcao
Как без высшего образования сделать карьеру в ІТ — опыт 23-летнего тимлида - получить хорошую работу, позицию и деньги можно и без высшего образования, но путь ли это для всех?
https://bit.ly/3GCMxHe
Кризис перепроизводства джунов - начинающих много, этот факт в чем-то деформирует рынок индустрии и отрасль в целом, есть и свои плюсы и недостатки
https://bit.ly/3lWV6Vq
Карьера в IT: специалист по кибербезопасности от EPAM - знаменитая контора пишет о специализа3иях в киберсеке из тех позиций, что комплектует сама
https://bit.ly/33aW1uH
#Job #analytics #newbie