white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Python Penetration Testing Essentials (Second Edition), Mohit, 2018

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques.

By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.

GitHub

#book #pentest #python
👍4
Python Penetration Testing Essentials.pdf
8.1 MB
Python Penetration Testing Essentials (Second Edition), Mohit, 2018
👍1
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022

Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)―all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment.

#book #forensic
👍4
Cyber Crime Investigator’s Field Guide.pdf
19.9 MB
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022
👍1
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization, Sehgal, Kunal

Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid.

What you will learn
(+) Understand blue team operations and its role in safeguarding businesses
(+) Explore everyday blue team functions and tools used by them
(+) Become acquainted with risk assessment and management from a blue team perspective
(+) Discover the making of effective defense strategies and their operations
(+) Find out what makes a good governance program
(+) Become familiar with preventive and detective controls for minimizing risk

#book #defensive
👍5
Blue Team Strategies.epub
3.8 MB
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization, Sehgal, Kunal
👍1
Bypass AV mind map and materials

This map lists the essential techniques to bypass anti-virus and EDR

Source

Extra materials
1 2 3 4 5

#malware
2👍2
Bypass-AV_2023.png
2.2 MB
BypassAV (HD PNG)
👍1
Когда рассказываешь на интервью о своих лычках в HTB и призовых местах в CTF 😂

#fun
😁14😢2🤣21👍1
Top Free Cybersecurity Services and Tools 2023 by American cyber security agency

#docs
🔥3👍1
Top Free Cybersecurity Services and Tools_2023.pdf
1.2 MB
Top Free Cybersecurity Services and Tools 2023 by American cyber security agency
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Honoring a few of our founder Gordon Moore’s most special moments

Легенды уходят... но их вклад остается и продолжает жить, миллионы и миллиарды людей пользуются достижениями. Когда-то и ты уйдешь, каким бы спецом не был.. Оставь свой след в истории и своей жизни

Страничка на сайте Intel
👍31😢1
Memory Forensic Volatility framework and workbench

Analysing memory after capturing the ram is extremely important when it comes to collecting information on ports that were in use, the number of processes running, and the path of certain executables on the system while carrying out the investigation.

The Volatility Framework is one such memory analysis tool that works on command-line on Windows and Linux systems. Volatility Workbench is a GUI version of one of the same tool Volatility for analysing the artefacts from a memory dump. It is available free of cost, open-source, and runs on the Windows Operating system.

#forensic
👍4🔥1
Memory Forensic Volatility framework and workbench.pdf
3.6 MB
Memory Forensic Volatility framework and workbench
👍1
Тыж хэкер? А можешь почту взломать? А фотки в облаке удалить я там пароль забыл? Игра не запускается код нужен, взломаешь? А IPhone любое приложение установишь...😂

#fun
🤣17👍4😁3