white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
File Binding Methods (RTC0015) by Hadess, 2023

#pentest
👍4
File Binding Methods (RTC0015).pdf
2.4 MB
File Binding Methods (RTC0015) by Hadess, 2023
👍4
Linux Performance Analysis in a Nutshell! by Mohammad Tarique

Understanding the health and performance of your Linux system is crucial for ensuring smooth operations. Whether you're a seasoned sysadmin or just diving into Linux, these commands are essential tools in your diagnostic toolkit. In this document, I've broken down some fundamental Linux commands that I use, what to look out for, and potential red flags that might indicate performance issues. Swipe through to level up your Linux diagnostic skills!

#linux
👍5
Linux Performance Analysis in a Nutshell.pdf
877.7 KB
Linux Performance Analysis in a Nutshell! by Mohammad Tarique
👍4
Incident Response Cheatsheet for Windows and Linux platform

For some people who use their computer systems, their systems might seem normal to them, but they might never realise that there could be something really fishy or even that fact that their systems could have been compromised. Making use of Incident Response a large number of attacks at the primary level could be detected. The investigation can be carried out to obtain any digital evidence.

Detecting any intrusion in your system is a very important step towards Incident response. Incident response is quite vast, but it is always better to start small. While performing incident response, you should always focus on suspected systems and the areas where it seems there could be a breach. Making use of Incident Response, you could detect a large number of attacks at the primary level.

#forensic
🔥3
Incident Response Cheatsheet for Windows and Linux platform.pdf
4.4 MB
Incident Response Cheatsheet for Windows and Linux platform
👍6
Хотя бы что-то...😄😄😄

#fun
😁10😢1
Introduction to Cyber Security by Dr. Jeetendra Pande

Welcome to this into to Cybersecurity. It starts out with the "History of the Internet" and quickly delves into Cybercrime, including 20 types of Cybercrime and a brief denoscription of each. Malware, Spyware, and more.

#book
👍5
Introduction to Cyber Security.pdf
5.2 MB
Introduction to Cyber Security by Dr. Jeetendra Pande
👍4🤔2
Cybersecurity Terms Summary FROM A TO Z, 2023

Understanding all the cybersecurity terms can be tough, so we'll take you through some of them in this quick guide.

#english
🔥5
Cybersecurity Terms Summary FROM A TO Z.pdf
22.2 MB
Cybersecurity Terms Summary FROM A TO Z, 2023
👍3🔥2
Windows forensic Commands, unofficial mini guide, 2023

#forensic #windows
👍5
Windows forensic Commands.pdf
470.1 KB
Windows forensic Commands, unofficial mini guide, 2023
👍6
Framework безопасной разработки DAF

GitHub
Статья на Хабре

#SecDevOps
👍4🔥21