white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Forwarded from CyberSecBastion
Kubernetes Best Practices_Microsoft_2023.pdf
2.4 MB
Kubernetes Best Practices by Microsoft, 2023 (e-book series)
👍1
CEH – Certification Guide - updated 8-5-21

Here is the Latest Exam practice questions and answers for the CEH Certification Exam (with detailed explanation to each of the answers), Crafted by expert.

#docs
👍5
CEH – Certification Guide - updated 8-5-21.pdf
7.2 MB
CEH – Certification Guide - updated 8-5-21
👍6
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023

You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.

You’ll also find:

(+) Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
(+) Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
(+) Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work

#book
👍5
Blockchain.Security.from.the.Bottom.Up.pdf
8 MB
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023
👍5
🔥6😢3🤔1😱1
Windows Privileges HD_[w2hack].png
3.1 MB
Windows Privileges HD (PNG) for download
👍4🤔2😢1
Когда в статьях, райтапах и книгах идут разборы crackme, malware или реверса real word софта - все эти точки входа, битовые сдвиги, HEX математика, условные переходы, вызовы подфункций, ASCII кодировки и т.д. Ты реально вкуриваешь как все это робит?
Anonymous Poll
23%
Все вкуриваю, перечитываю, разбираюсь, все логично, все объяснимо
36%
50/50 иногда норм заходмт, получается, но иногда х#й ногу сломишь в этих дебрях требуется помощь
11%
Это для true красноглазых, нердов и задротов, сам God даровал им талант в этом шарить, но для других
4%
Свой вариант (пиши в чат)
🤔4🔥1👏1
И такой вот зоопарк от раза к разу... или сейчас в 2023 все изменилось?
🤔6🤣2🤩1
GPT_Vuln-analyzer: Uses ChatGPT API To Create Vulnerability Reports Based On Nmap Scan

ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data.

This is a Proof Of Concept application demonstrating how AI can generate accurate results for vulnerability analysis and allows further utilization of the already super helpful ChatGPT. The tool supports both Windows and Linux.

Sources

#pentest
👍4🎉2
Ransomware Control Matrix

This is absolutely amazing Ransomware prevention Matrix

Source

#useful
👍5
Attacking AD: Initial attack vectors, Frankie Thomas, 2023

Extra
Initial attack vectors
GitHub collection

#windows
👍7
Attacking AD_Initial attack vectors.pdf
63 MB
Attacking AD: Initial attack vectors, Frankie Thomas, 2023
👍6
Awesome OSINT(Open-Source Intelligence)

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources).

#OSINT
🔥4