Attacking AD: Initial attack vectors, Frankie Thomas, 2023
Extra
Initial attack vectors
GitHub collection
#windows
Extra
Initial attack vectors
GitHub collection
#windows
👍7
Attacking AD_Initial attack vectors.pdf
63 MB
Attacking AD: Initial attack vectors, Frankie Thomas, 2023
👍6
Awesome OSINT(Open-Source Intelligence)
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources).
#OSINT
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources).
#OSINT
🔥4
Hackers use 'net' command to enumerate compromised system. This is why SOC analysts set alert for this command.
But, hackers can use 'net1' command, which will work same as the 'net' command. So, when you're threat hunting, don't search only 'net' command rather, search '*net*' as regex to find malicious commands.
#useful
But, hackers can use 'net1' command, which will work same as the 'net' command. So, when you're threat hunting, don't search only 'net' command rather, search '*net*' as regex to find malicious commands.
#useful
👍6🤔3
Forwarded from CyberSecBastion
This media is not supported in your browser
VIEW IN TELEGRAM
ChatGPT can fix your buggy code!
Here’s how…
1. Install ChatGPT addon in VSCode.
2. Get an API key from OpenAI and input when prompted in VSCode.
3. Right click part or all of your code and select ChatGPT-Find Bugs.
4. Click insert from the ChatGPT window to fix your code.
BONUS: ChatGPT will also explain the bug!!
#AppSec
Here’s how…
1. Install ChatGPT addon in VSCode.
2. Get an API key from OpenAI and input when prompted in VSCode.
3. Right click part or all of your code and select ChatGPT-Find Bugs.
4. Click insert from the ChatGPT window to fix your code.
BONUS: ChatGPT will also explain the bug!!
#AppSec
🤔8❤1👍1🤣1
Человек из телевизора сказал "Своих не бросаем!". На днях, впервые года так за 3 пришлось обратится за содействием, сначала к одним потом к другим, далее к третьим, четвертым и везде вилы. Сначала, конечно, стало немного грустно, но потом осталась только улыбка! Ведь, эта ситуация как раз как лакмусовая бумажка показала кто есть кто, где п#здешь ради хайпа, а где деловой подход. Оценивая на трезвую голову все кто сейчас отвалились никогда друзьями и партнерами по настоящему и не были. Так что все идет только в благо, а мир полон возможностей и без этих "патриотов", мусор отсечен, на горизонте только те с кем можно "кашу сварить".
А что скажешь ты? - был ли у тебя подобный опыт, попадал ли в схожие ситуации, правда ли что своих не бросают или все зассано п#здешом?
А что скажешь ты? - был ли у тебя подобный опыт, попадал ли в схожие ситуации, правда ли что своих не бросают или все зассано п#здешом?
👍7
A Burp Suite extension that integrates OpenAI's GPT
Released BurpGPT, a Burp Suite (PortSwigger) extension that uses OpenAI's GPT models to add an extra layer of security to your passive scan.
With BurpGPT, you can easily interact with Open AI models to identify potential vulnerabilities in your web application using custom prompts.
GitHub
#web
Released BurpGPT, a Burp Suite (PortSwigger) extension that uses OpenAI's GPT models to add an extra layer of security to your passive scan.
With BurpGPT, you can easily interact with Open AI models to identify potential vulnerabilities in your web application using custom prompts.
GitHub
#web
👍6🤔1
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier.
The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.
#pentest
This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier.
The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request.
#pentest
👍7