Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:
+ Reconnaissance, resource development, initial access, and execution
+ Persistence, privilege escalation, defense evasion, and credential access
+ Discovery, lateral movement, collection, and command and control
+ Exfiltration and impact
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
#book #python
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:
+ Reconnaissance, resource development, initial access, and execution
+ Persistence, privilege escalation, defense evasion, and credential access
+ Discovery, lateral movement, collection, and command and control
+ Exfiltration and impact
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.
#book #python
👍9🤩6
Python_for_Cybersecurity_Using_Python_for_Cyber_Offense_and_Defense.epub
10.5 MB
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022
👍6
HackerRank Solution is a tech company that focuses on competitive programming challenges for both consumers and businesses, where developers compete by trying to program according to provided specifications.
HackerRank's programming challenges can be solved in a variety of programming languages (including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.
Sources
https://github.com/JayantGoel001/HackerRank
#job #coding #job
HackerRank's programming challenges can be solved in a variety of programming languages (including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.
Sources
https://github.com/JayantGoel001/HackerRank
#job #coding #job
👍4
HackerRank-master.zip
204 KB
HackerRank's programming challenges can be solved in a variety of programming languages and span multiple computer science domains.
👍3
Attacking Active Directory: 0 to 0.9
The purpose of this guide is to view Active Directory from an attacker perspective. I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network.
In order to understand how to attack Active Directory (and any other technology), I think is important to not only know the tools, but how the tools work, what protocols/mechanisms they use, and why these mechanisms/protocols exist.
Sources
https://zer1t0.gitlab.io/posts/attacking_ad/
#pentest #windows
The purpose of this guide is to view Active Directory from an attacker perspective. I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network.
In order to understand how to attack Active Directory (and any other technology), I think is important to not only know the tools, but how the tools work, what protocols/mechanisms they use, and why these mechanisms/protocols exist.
Sources
https://zer1t0.gitlab.io/posts/attacking_ad/
#pentest #windows
🔥5👍3
D3FEND - A knowledge graph of cybersecurity countermeasures
(v.0.10.0-BETA-2)
https://d3fend.mitre.org/
#useful
(v.0.10.0-BETA-2)
https://d3fend.mitre.org/
#useful
👍4
Offensive Software Exploitation (OSE) Course
Include materials and Labs without software
Sources
https://github.com/temka1603/exploitation-course
#education
Include materials and Labs without software
Sources
https://github.com/temka1603/exploitation-course
#education
👍4❤1🤩1
All learning materials
https://portswigger.net/web-security/all-materials
PortSwigger Web Security Academy Labs
https://github.com/roberson-io/portswigger
Writeup PortSwigger WebSecurity Academy
https://gitlab.com/frankleitner/ctf-writeup/portswigger-websecurity-academy
web-security-academy solutions
https://programmersought.com/tag/web-security-academy/
https://programmersought.com/article/18027930711/
Free Training for Finding Web Security Vulnerabilities
https://gbhackers.com/portswigger-web-security-academy/
Автоматизируем многоходовые атаки в Burp Suite
https://xakep.ru/2021/05/13/burp-stepper-intruder/
#web #education
https://portswigger.net/web-security/all-materials
PortSwigger Web Security Academy Labs
https://github.com/roberson-io/portswigger
Writeup PortSwigger WebSecurity Academy
https://gitlab.com/frankleitner/ctf-writeup/portswigger-websecurity-academy
web-security-academy solutions
https://programmersought.com/tag/web-security-academy/
https://programmersought.com/article/18027930711/
Free Training for Finding Web Security Vulnerabilities
https://gbhackers.com/portswigger-web-security-academy/
Автоматизируем многоходовые атаки в Burp Suite
https://xakep.ru/2021/05/13/burp-stepper-intruder/
#web #education
👍4
PEASS - Privilege Escalation Awesome Scripts SUITE
Sources
https://github.com/temka1603/privilege-escalation-awesome-noscripts-suite
#hacktools
Sources
https://github.com/temka1603/privilege-escalation-awesome-noscripts-suite
#hacktools
👍4
Data Privacy: A runbook for engineers by Nishant Bhajaria, 2022
Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book’s constant awareness of business requirements will help you balance trade-offs, and ensure your user’s privacy can be improved without spiraling time and resource costs.
#book #privacy
Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book’s constant awareness of business requirements will help you balance trade-offs, and ensure your user’s privacy can be improved without spiraling time and resource costs.
#book #privacy
👍3
Data Privacy A runbook for engineers.epub
9.4 MB
Data Privacy: A runbook for engineers by Nishant Bhajaria, 2022
👍1
Black Hat Python: программирование для хакеров и пентестеров, авторы Джастин Зейтц, Тим Арнольд, 2-е издание, релиз 2022
Во втором издании бестселлера Black Hat Python вы исследуете темную сторону возможностей Python — все от написания сетевых снифферов, похищения учетных данных электронной почты и брутфорса каталогов до разработки мутационных фаззеров, анализа виртуальных машин и создания скрытых троянов.
#book #python #coding
Во втором издании бестселлера Black Hat Python вы исследуете темную сторону возможностей Python — все от написания сетевых снифферов, похищения учетных данных электронной почты и брутфорса каталогов до разработки мутационных фаззеров, анализа виртуальных машин и создания скрытых троянов.
#book #python #coding
🔥7