white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Active Directory Pen-Testing with Kali Linux 📣

Download

#pentest #education
👍2🔥1
SANS DFIR Cheatsheets and Notebooks

What’s Included:
🔹To-Do Checklist
🔹Assorted Notes Section
🔹Networking and People to Follow on Social
🔹DFIR Cheat Sheets
🔹SANS Free Resources

#forensic #book
👍4
SANS DFIR Cheatsheets and Notebooks.pdf
4.6 MB
SANS DFIR Cheatsheets and Notebooks
👍5
ChatGPT Guide by Cyber Press, 2023

#useful
👍5😢1
PentestGPT – A ChatGPT Powered Automated Penetration Testing Too

PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.

To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.

GItHub

#hacktools #pentest
🔥8😢1
Hacking a Windows Machine by Hiding a RAT Inside an Image.

A Remote Access Trojan (RAT) is malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

Инструкция для молодежи что бы знали какие картинки открывать

Источник
🤔41
Announcing the OWASP Top 10 for Large Language Models (AI) Project

arge Language Models (LLMs) are the underlying technology powering transformative AI technologies like OpenAI's ChatGPT and Google's Bard. These technologies have stormed onto the scene over the last few months. One thing that's become clear is that organizations developing using these technologies will have a new and dangerous set of security headaches to contend with.

Official page
GitHub

#useful
👍4
Wireshark Mindmap

#useful
👍5
OWASP Web Application Penetration Checklist

his comprehensive checklist, from the Open Web Application Security Project (OWASP), is a valuable tool for penetration testers and developers alike.

It provides a systematic approach to identifying vulnerabilities, and can be used as a guide to help ensure that your web applications are as secure as possible.

#docs #web
🤔4👍1
OWASP Web Application Penetration Checklist.pdf
413.4 KB
OWASP Web Application Penetration Checklist
👍5
Forwarded from CyberSecBastion
DevSecOps Guides

Our guides cover a wide range of topics related to DevSecOps, including:
🔹Secure coding practices: Learn how to write code that is resistant to common security threats such as SQL injection, cross-site noscripting, and buffer overflow.

🔹Threat modeling: Learn how to identify potential security vulnerabilities in your applications and prioritize them based on their impact and likelihood of occurrence.

🔹Security testing: Learn about different types of security testing, such as penetration testing, vulnerability scanning, and code review, and how to incorporate them into your DevSecOps workflow.

🔹Infrastructure security: Learn about securing the infrastructure that supports your applications, including servers, networks, and databases.

🔹 Compliance and regulations: Learn about compliance requirements and regulations such as GDPR, HIPAA, and PCI-DSS
👍5🔥3
Forwarded from CyberSecBastion
DevSecOps Guides_2023.pdf
16.7 MB
DevSecOps Guides, 2023
👍91
Неплохо для новичков о базе построения DevSecOps

В статей дается обзор стадий базового workflow, ключевых инструментах анализа безопасности CD/CI процесса и некоторых контролях secure pipeline, которые must have

Источник

#SecDevOps
👍4