Forwarded from CyberSecBastion
Kubernetes Best Practices_Microsoft_2023.pdf
2.4 MB
Kubernetes Best Practices by Microsoft, 2023 (e-book series)
👍1
CEH – Certification Guide - updated 8-5-21
Here is the Latest Exam practice questions and answers for the CEH Certification Exam (with detailed explanation to each of the answers), Crafted by expert.
#docs
Here is the Latest Exam practice questions and answers for the CEH Certification Exam (with detailed explanation to each of the answers), Crafted by expert.
#docs
👍5
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023
You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
You’ll also find:
(+) Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
(+) Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
(+) Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work
#book
You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
You’ll also find:
(+) Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
(+) Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
(+) Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work
#book
👍5
Blockchain.Security.from.the.Bottom.Up.pdf
8 MB
Blockchain Security from the Bottom Up - Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Howard E. Poston III, 2023
👍5
Windows Privileges HD (PNG)
Дополнительные материалы:
(1) https://news.1rj.ru/str/w2hack/1885
(2) https://news.1rj.ru/str/w2hack/1512
(3) https://news.1rj.ru/str/w2hack/1516
(4) https://news.1rj.ru/str/w2hack/1618
#windows
Дополнительные материалы:
(1) https://news.1rj.ru/str/w2hack/1885
(2) https://news.1rj.ru/str/w2hack/1512
(3) https://news.1rj.ru/str/w2hack/1516
(4) https://news.1rj.ru/str/w2hack/1618
#windows
🔥6😢3🤔1😱1
white2hack 📚
И еще один мой авторский паблик CyberSecBastion на английском языке целиком ориентированный на вопросы DevSecOps, AppSec, Cloud Security, K8s sec, AWS, GCP, etc Давно не обновлялся, но был сделан с душой, в лучшем стиле, что и @w2hack, выложен весь материал…
Всем недавно присоединившимся представляю отдельный канал CyberSecBastion из w2hack семейства, посвященный DevSecOps, AppSec, Cloud security, K8s, AWS, GCP темам
Telegram
CyberSecBastion
DevSecOps, K8s security, Cloud AWS, Azure, GCP, Secure SDLC, API security and AppSec issues
Direct message, feedback, suggestions, exchange of materials @w2hack_feed_bot
Member of @w2hack family
Direct message, feedback, suggestions, exchange of materials @w2hack_feed_bot
Member of @w2hack family
👍4
Когда в статьях, райтапах и книгах идут разборы crackme, malware или реверса real word софта - все эти точки входа, битовые сдвиги, HEX математика, условные переходы, вызовы подфункций, ASCII кодировки и т.д. Ты реально вкуриваешь как все это робит?
Anonymous Poll
23%
Все вкуриваю, перечитываю, разбираюсь, все логично, все объяснимо
26%
Ох#еваю как это вообще можно читать, как это можно знать и чего-то там разбираться, это же п##дец
36%
50/50 иногда норм заходмт, получается, но иногда х#й ногу сломишь в этих дебрях требуется помощь
11%
Это для true красноглазых, нердов и задротов, сам God даровал им талант в этом шарить, но для других
4%
Свой вариант (пиши в чат)
🤔4🔥1👏1
GPT_Vuln-analyzer: Uses ChatGPT API To Create Vulnerability Reports Based On Nmap Scan
ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data.
This is a Proof Of Concept application demonstrating how AI can generate accurate results for vulnerability analysis and allows further utilization of the already super helpful ChatGPT. The tool supports both Windows and Linux.
Sources
#pentest
ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data.
This is a Proof Of Concept application demonstrating how AI can generate accurate results for vulnerability analysis and allows further utilization of the already super helpful ChatGPT. The tool supports both Windows and Linux.
Sources
#pentest
👍4🎉2
Attacking AD: Initial attack vectors, Frankie Thomas, 2023
Extra
Initial attack vectors
GitHub collection
#windows
Extra
Initial attack vectors
GitHub collection
#windows
👍7
Attacking AD_Initial attack vectors.pdf
63 MB
Attacking AD: Initial attack vectors, Frankie Thomas, 2023
👍6
Awesome OSINT(Open-Source Intelligence)
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources).
#OSINT
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources).
#OSINT
🔥4