white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Russkie.hakery.Nachalo.S01.2021.WEB-DL.1080p.torrent
19.7 KB
Русские хакеры: Начало (мини–сериал), режиссер и сценарист Андрей Лошак, студи Stereotactic, 2021
🤡10👍5
Блистательный Agile. Гибкое управление проектами с помощью Agile, Scrum и Kanban, Роб Коул, Эдвард Скотчер, 2019

Что такое гибкое управление проектами? Нужно ли оно вашему проекту? Будет ли от этого выгода?

Хотите разобраться, как работает гибкое управление проектами и воспользоваться этим мощным подходом? Тогда вы выбрали правильную книгу.

«Блистательный Agile» – это не очередной рассказ о методах и процессах, основное внимание уделено реальным примерам использования Agile в бизнес-средах. Здесь вы найдете практические советы и конкретные техники внедрения Agile, позволяющие сделать ваш проект успешным и реализовать гибкое управление в организации.

#book
👍3🤩2
Блистательный Agile.pdf
2.4 MB
Блистательный Agile. Гибкое управление проектами с помощью Agile, Scrum и Kanban, Роб Коул, Эдвард Скотчер, 2019
👍3🔥1
WEB-200: Foundational Web Application Assessments with Kali Linux (OSWA Certification)

This course teaches learners how to discover and exploit common web vulnerabilities and how to exfiltrate sensitive data from target web applications. Learners will obtain a wide variety of skill sets and competencies for web app assessments.

Learners who complete the course and pass the exam will earn the OffSec Web Assessor (OSWA) certification, demonstrating their ability to leverage web exploitation techniques on modern applications.

Официальный сайт + адженда
Брошюра с тренинга BlackHat
Опыт сдачи экзамена и еще здесь
OSWA Study Overview

#web
🔥10🙏1
WEB-200 Course Video.zip
944 MB
WEB-200: Foundational Web Application Assessments with Kali Linux (OSWA Certification)
🔥10👍1
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool

A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.

GitHub
Review
Awesome Burp Extensions

#web #hacktools
🔥9
Python for Security and Networking, Third Edition, José Manuel Ortega, 2023

Leverage Python modules and tools in securing your network and applications

The first part of this book will walk you through Python noscripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security noscripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics noscripts.

The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks.

#book #python
👍41
Python.for.Security.and.Networking.3rd.Edition.pdf
8.5 MB
Python for Security and Networking, Third Edition, José Manuel Ortega, 2023
👍4
Aligning Security Operations with the MITRE ATT&CK Framework, Rebecca Blair, 2023

Level up your security operations center for better security.

In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.

By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.

#book
👍5
Aligning.Security.Operations.with.the.MITRE.ATT.CK.Framework.pdf
7.5 MB
Aligning Security Operations with the MITRE ATT&CK Framework, Rebecca Blair, 2023
👍5
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by David Okeyode, Karl Fosaaen, Charles Horton, 2023

This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, noscripts, and ready-to-use source code.

What you will learn
(+) Identify how administrators misconfigure Azure services
(+) Understand how to detect cloud infrastructure
(+) Explore processes and techniques for exploiting common Azure security issues
(+) Use on-premises networks to pivot and escalate access within Azure
(+) Diagnose gaps and weaknesses in Azure security

#book #windows #DevSecOps
👏5
Penetration_Testing_Azure_for_Ethical_Hackers_Develop_practical.epub
32.2 MB
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by David Okeyode, Karl Fosaaen, Charles Horton, 2023
👍4