white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Серия туториалов по различным видам хака и набор сорцов эксплойтов от эксперта Ruben Boonen (aka b33f).

Источник
Эксплойт библиотека

#useful #pentest
👍5🎉1
Небольшая подборка OSCP Study Material Study Guide от портала CertCube Labs

Можно поценить новичкам и тем кто хочет составить первое впечатление о OSCP заданиях

Источник
Раздел Offensive Ops

#usefel #pentest
👍5🔥2
All of the Best Links and Resources on Cyber Security by s0cm0nkey - сборка ссылок на различные ресурсы в сети по темам Offensive и немного Defensive

Source
GitHub

#eseful
👍4🔥1
Сборка ссылок на полезные материалы для пен-тестеров, CTF-теров и тех кто солвит машины на HTB

Aii-in-one guide for Vulnerable Machines - большой лонгрид с общим сценарием для большинства уязвимых машин
Linux elevation of privileges ToC - эскалация привилегий под пингвина
Windows elevation of privileges ToC - эскалация привилегий в окнах
GitHub (noscripts and docs) - репо с некоторыми скриптами и доками по их использованию

#pentest #useful
🔥53👍2
Infrastructure Penetration Testing Checklist

#docs #pentest
👍4🔥2
Infrastructure Penetration Testing Checklist.pdf
377.4 KB
Infrastructure Penetration Testing Checklist PDF
👍4🎉1
OWASP Top 10 for Large Language Model Applications

Throughout this article, we will examine how vulnerabilities such as data leakage, unauthorized code execution, inadequate access controls, and more can manifest in the context of LLM applications. We will also explore the specific techniques and attack vectors that malicious actors may employ to exploit LLMs and compromise their security.

By understanding the OWASP Top 10 vulnerabilities and their implications in the context of LLMs, we can take proactive steps to fortify our systems and protect sensitive information, user privacy, and the overall integrity of our applications.

Contents:
LLM01:2023 - Prompt Injections
LLM02:2023 - Data Leakage
LLM03:2023 - Inadequate Sandboxing
LLM04:2023 - Unauthorized Code Execution
LLM05:2023 - SSRF Vulnerabilities
LLM06:2023 - Overreliance on LLM-generated Content
LLM07:2023 - Inadequate AI Alignment
LLM08:2023 - Insufficient Access Controls
LLM09:2023 -g LLM10:2023 - Training Data Poisoning
🔥3👍1
OWASP Top 10 for Large Language Model Applications.pdf
2.2 MB
OWASP Top 10 for Large Language Model Applications PDF
🔥2
CISSP Cheat Sheet

#docs #useful #management
🔥4
CISSP Cheat Sheet.pdf
573.1 KB
CISSP Cheat Sheet

#management
👍2
Forwarded from CyberSecBastion
👍5
Forwarded from CyberSecBastion
60 Methods For Cloud Attacks.pdf
3.2 MB
60 Methods For Cloud Attacks PDF Guide
🔥2
Web Security: Learning HTTP Security Headers, Liran Tal, 2023

18 Lessons, 8 Quizzes, 30 Code Snippets, and 19 Illustrations to help you learn

Takeaway Skills
(+) Secure web applications using HTTP security headers
(+) Understand Content Security Policy
(+) Setup Node.js web applications securely
(+) Learn how to test and monitor for security headers and vulnerable JavaScript libraries
(+) Roadmap for future web controls

For each HTTP security header that can enhance your web application security, you'll learn what is the overall risk of not implementing it, and what does a proposed solution help with. Finally, you'll learn how to implement and configure the security header with Helmet, a popular and well-maintained Node.js package on npm.

#book #web #AppSec
👍51