BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
🔥9
Как ты относишься ко всяких хакерским приблудам типо Flipper Zero, WiFi Pineapple, поделкам на Raspberry Pi, USB Rubber Ducky, грабилкам NFC, RFID, 4\5G, GPS и т.д. Это игрушки для взрослых дядь или серьезный тул, а может просто брелок для понта?
Anonymous Poll
37%
Серьезные тулы, в умелых руках могут похэкать жертву или нанести шороху точно
25%
Игрушки для дядь, приколюхи для души, чисто фан, но мало практического толку
4%
Полная херня, зря потраченные деньги, никакого толку, бесполезные диковины
21%
50/50 иногда могут подсобить, но все таки решают мозги и "правильный" софт
5%
Это вообще что такое? Я первый раз слышу
2%
Я создатель такого девайса, покупайте мое барохло
5%
Свой вариант (пиши в чат)
🤡8😁3🤔3❤2👍2🤣1
Python for Security and Networking, Third Edition, José Manuel Ortega, 2023
Leverage Python modules and tools in securing your network and applications
The first part of this book will walk you through Python noscripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security noscripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics noscripts.
The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks.
#book #python
Leverage Python modules and tools in securing your network and applications
The first part of this book will walk you through Python noscripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security noscripting and understand how to check for vulnerabilities in your network – including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics noscripts.
The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks.
#book #python
👍4❤1
Python.for.Security.and.Networking.3rd.Edition.pdf
8.5 MB
Python for Security and Networking, Third Edition, José Manuel Ortega, 2023
👍4
Aligning Security Operations with the MITRE ATT&CK Framework, Rebecca Blair, 2023
Level up your security operations center for better security.
In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.
By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.
#book
Level up your security operations center for better security.
In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.
By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.
#book
👍5
Aligning.Security.Operations.with.the.MITRE.ATT.CK.Framework.pdf
7.5 MB
Aligning Security Operations with the MITRE ATT&CK Framework, Rebecca Blair, 2023
👍5
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by David Okeyode, Karl Fosaaen, Charles Horton, 2023
This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, noscripts, and ready-to-use source code.
What you will learn
(+) Identify how administrators misconfigure Azure services
(+) Understand how to detect cloud infrastructure
(+) Explore processes and techniques for exploiting common Azure security issues
(+) Use on-premises networks to pivot and escalate access within Azure
(+) Diagnose gaps and weaknesses in Azure security
#book #windows #DevSecOps
This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, noscripts, and ready-to-use source code.
What you will learn
(+) Identify how administrators misconfigure Azure services
(+) Understand how to detect cloud infrastructure
(+) Explore processes and techniques for exploiting common Azure security issues
(+) Use on-premises networks to pivot and escalate access within Azure
(+) Diagnose gaps and weaknesses in Azure security
#book #windows #DevSecOps
👏5
Penetration_Testing_Azure_for_Ethical_Hackers_Develop_practical.epub
32.2 MB
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments by David Okeyode, Karl Fosaaen, Charles Horton, 2023
👍4
🔥2👍1
Как обсуждать условия и деньги на новой работе, Тинькофф Журнал, 2022
Расскажем, как принимать взвешенные решения и выбрать лучшее предложение о работе из нескольких. Поможем использовать отказы себе на пользу и грамотно все спланировать, чтобы закончить дела на старой работе и быстро влиться в команду на новой. В курсе 4 урока, которые помогут получить лучший оффер!
Загрузить с Облака
Как найти подходящую вакансию и рассказать о себе, Тинькофф Журнал, 2022
Курс о том, как искать хорошие вакансии и попасть на собеседование в компанию мечты.
Загрузить с облака
Как быть взрослым: чему не учат в школе: как жить взрослую, самостоятельную и независимую жизнь, Тинькофф Журнал, 2022
Пройти бесплатно
#job #softskill
Расскажем, как принимать взвешенные решения и выбрать лучшее предложение о работе из нескольких. Поможем использовать отказы себе на пользу и грамотно все спланировать, чтобы закончить дела на старой работе и быстро влиться в команду на новой. В курсе 4 урока, которые помогут получить лучший оффер!
Загрузить с Облака
Как найти подходящую вакансию и рассказать о себе, Тинькофф Журнал, 2022
Курс о том, как искать хорошие вакансии и попасть на собеседование в компанию мечты.
Загрузить с облака
Как быть взрослым: чему не учат в школе: как жить взрослую, самостоятельную и независимую жизнь, Тинькофф Журнал, 2022
Пройти бесплатно
#job #softskill
👍6🤔2❤1🤡1
Docker in Practice, Second Edition, Ian Miell and Aidan Hobson Sayers, 2019
The book teaches you rock-solid, tested Docker techniques, such as replacing VMs, enabling microservices architecture, efficient network modeling, offline productivity, and establishing a container-driven continuous delivery process. Following a cookbook-style problem/solution format, you’ll explore real-world use cases and learn how to apply the lessons to your own dev projects.
#book #SecDevOps
The book teaches you rock-solid, tested Docker techniques, such as replacing VMs, enabling microservices architecture, efficient network modeling, offline productivity, and establishing a container-driven continuous delivery process. Following a cookbook-style problem/solution format, you’ll explore real-world use cases and learn how to apply the lessons to your own dev projects.
#book #SecDevOps
👏2👍1