Top Free Cybersecurity Services and Tools_2023.pdf
1.2 MB
Top Free Cybersecurity Services and Tools 2023 by American cyber security agency
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Honoring a few of our founder Gordon Moore’s most special moments
Легенды уходят... но их вклад остается и продолжает жить, миллионы и миллиарды людей пользуются достижениями. Когда-то и ты уйдешь, каким бы спецом не был.. Оставь свой след в истории и своей жизни
Страничка на сайте Intel
Легенды уходят... но их вклад остается и продолжает жить, миллионы и миллиарды людей пользуются достижениями. Когда-то и ты уйдешь, каким бы спецом не был.. Оставь свой след в истории и своей жизни
Страничка на сайте Intel
👍3❤1😢1
Memory Forensic Volatility framework and workbench
Analysing memory after capturing the ram is extremely important when it comes to collecting information on ports that were in use, the number of processes running, and the path of certain executables on the system while carrying out the investigation.
The Volatility Framework is one such memory analysis tool that works on command-line on Windows and Linux systems. Volatility Workbench is a GUI version of one of the same tool Volatility for analysing the artefacts from a memory dump. It is available free of cost, open-source, and runs on the Windows Operating system.
#forensic
Analysing memory after capturing the ram is extremely important when it comes to collecting information on ports that were in use, the number of processes running, and the path of certain executables on the system while carrying out the investigation.
The Volatility Framework is one such memory analysis tool that works on command-line on Windows and Linux systems. Volatility Workbench is a GUI version of one of the same tool Volatility for analysing the artefacts from a memory dump. It is available free of cost, open-source, and runs on the Windows Operating system.
#forensic
👍4🔥1
Memory Forensic Volatility framework and workbench.pdf
3.6 MB
Memory Forensic Volatility framework and workbench
👍1
Тыж хэкер? А можешь почту взломать? А фотки в облаке удалить я там пароль забыл? Игра не запускается код нужен, взломаешь? А IPhone любое приложение установишь...😂
#fun
#fun
🤣17👍4😁3
Уровни материальной компенсации в российской ИТ отрасли по данным G-mate (постоянно обновляется). Так же можно пройти опрос и поделиться своим уровнем в текущем работодателе
Проверить данные G-mate
Disclaimer:
Все данные представлены "как есть". Выводы каждый делает сам. За достоверность информации из источников ответственность несет ее создатель\автор\ресурс. Пост ни к чему не призывает и ничего не пропагандирует.
#analytics
Проверить данные G-mate
Disclaimer:
Все данные представлены "как есть". Выводы каждый делает сам. За достоверность информации из источников ответственность несет ее создатель\автор\ресурс. Пост ни к чему не призывает и ничего не пропагандирует.
#analytics
👍5
DevSecOps Fundamentals Guidebook: DevSecOps Tools & Activities, March 2021 (Version 2.0), Department of Defense, the USA
The goal of DevSecOps is to improve customer outcomes and mission value through the automation, monitoring, and application of security at every phase of the software lifecycle. Practicing DevSecOps requires an array of purpose-built tools and a wide range of activities that rely on those tools. This document conveys the relationship between each DevSecOps phase, a taxonomy of supporting tools for a given phase, and the set of activities that occur at each phase cross-referenced to the tool(s) that support the specific activity.
#SecDevOps
The goal of DevSecOps is to improve customer outcomes and mission value through the automation, monitoring, and application of security at every phase of the software lifecycle. Practicing DevSecOps requires an array of purpose-built tools and a wide range of activities that rely on those tools. This document conveys the relationship between each DevSecOps phase, a taxonomy of supporting tools for a given phase, and the set of activities that occur at each phase cross-referenced to the tool(s) that support the specific activity.
#SecDevOps
👍4
DevSecOpsTools-Activities_Guide_book_2021.pdf
1009.1 KB
DevSecOps Fundamentals Guidebook: DevSecOps Tools & Activities, March 2021 (Version 2.0), Department of Defense, the USA
👍1
The Linux Command HandBook, Flavio Copes, 2023
This Linux Command Handbook will cover 60 core Bash commands you will need as a developer. Each command includes example code and tips for when to use it.
This Linux Command Handbook follows the 80/20 rule: you'll learn 80% of a topic in around 20% of the time you spend studying it.
Source
#linux #book #newbie
This Linux Command Handbook will cover 60 core Bash commands you will need as a developer. Each command includes example code and tips for when to use it.
This Linux Command Handbook follows the 80/20 rule: you'll learn 80% of a topic in around 20% of the time you spend studying it.
Source
#linux #book #newbie
👍5
Introduction to Doxing, Hadess, 2023
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
👍5
BurpSuite Payload Processing, 2023
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
👍4