white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Cross-site noscripting (XSS) cheat sheet by Portswigger's, 2023

This cross-site noscripting (XSS) cheat sheet contains many vectors that can help you bypass WAFs and filters. You can select vectors by the event, tag or browser and a proof of concept is included for every vector.

#web
👍6🔥1
Portswigger's XSS Cheat Sheet!.pdf
22 MB
Cross-site noscripting (XSS) cheat sheet by Portswigger's, 2023
👍5
Threat Hunting Framework, 2023

A threat-hunting framework is a structured approach cybersecurity professionals use to proactively search for and identify potential security threats within a digital wonderland.

Provides a structured and repeatable process to proactively identify and mitigate potential security threats and improve overall cyber defense.

Here is an excellent document by Cyborg Security that covers the following topics:

• Threat Hunting Security Operations
• Pre-Requisites to Threat Hunting
• Hunt Team Maturity
• Threat Hunting Cycle
• Hunting in Action
• Long-Term Benefits of the Hunt

#book #useful
👍4
Threat Hunting Framework!.pdf
1 MB
Threat Hunting Framework, 2023
👍4
Burp Suite Extensions Cheat Sheet

#web
👍3🔥1
Download HD (PNG)
Crackmapexec Cheat Sheet

#pentest
🔥6
Crackmapexec Cheat Sheet.png
3.4 MB
Download HD (PNG)
👍1
white2hack 📚
Для всех вновь прибывших подписчиков и тех, кто c w2hack давно, но по каким-то причинам еще знает - существует отдельный закрытый канал CyberSec way to EU, USA посвященный вопросам трудовой миграции. Данная тема безусловно не для всех, однако, если ты готовишься…
Друзья, коллеги очередной апдейт материалов, и для всех вновь прибывших еще раз анонс отдельного закрытого канала CyberSecWay по теме миграции в страны Европы и США в качестве эксперта ИБ, фрилансера, финансов-независимого лица.

По братски, в течении месяца для всего w2hack комьюнити действует скидка 50% на вход по цене чашки кофе. Все подробности, реквизиты и предыдущие анонсы по линку ниже

https://news.1rj.ru/str/w2hack/2754

#info
4👍2
image_2023-04-15_19-25-38.png
1.4 MB
Zero trust maturity model V2 - from Cybersecurity and Infrastructure Security Agency

#useful
👍4
Activated Directory Notes by Ethical Hackers Academy, 2023

#pentest
🔥3
OSCP NOTES ACTIVE DIRECTORY 1.pdf
2.2 MB
Activated Directory Notes by Ethical Hackers Academy, 2023
🔥5
Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges

Пример того как парсят малварь, копаются под капотом, как описывают поведение в системе и дают рекомендации по детекту и устранению

Source

#malware #useful
👍3
Blockchain Security. A Framework for Trust and Adoption by Nicolas Castellon, CGI Nederland, Peter Cozijnsen, CGI Nederland, Tjerk van Goor, CGI Nederland

#docs
👍2
Blockchain Security A Framework for Trust and Adoption.pdf
4.3 MB
Blockchain Security. A Framework for Trust and Adoption by Nicolas Castellon, CGI Nederland, Peter Cozijnsen, CGI Nederland, Tjerk van Goor, CGI Nederland
👍3
Tshark Guide, 2023

In this article, we will learn about TShark which is a well-known network protocol analyser. It lets us capture the data packets, from the live network. It also allows us, to read or analyse the previously captured data packets of a saved file. Here we will the understand the Statistical Functionalities of TShark and the different ways in which we can sort our traffic capture so that we can analyse it faster and effectively. We will understand the reporting functionalities and some additional tricks that we found while tinkering with TShark.

#docs
🔥5