white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Linux Performance Analysis in a Nutshell.pdf
877.7 KB
Linux Performance Analysis in a Nutshell! by Mohammad Tarique
👍4
Incident Response Cheatsheet for Windows and Linux platform

For some people who use their computer systems, their systems might seem normal to them, but they might never realise that there could be something really fishy or even that fact that their systems could have been compromised. Making use of Incident Response a large number of attacks at the primary level could be detected. The investigation can be carried out to obtain any digital evidence.

Detecting any intrusion in your system is a very important step towards Incident response. Incident response is quite vast, but it is always better to start small. While performing incident response, you should always focus on suspected systems and the areas where it seems there could be a breach. Making use of Incident Response, you could detect a large number of attacks at the primary level.

#forensic
🔥3
Incident Response Cheatsheet for Windows and Linux platform.pdf
4.4 MB
Incident Response Cheatsheet for Windows and Linux platform
👍6
Хотя бы что-то...😄😄😄

#fun
😁10😢1
Introduction to Cyber Security by Dr. Jeetendra Pande

Welcome to this into to Cybersecurity. It starts out with the "History of the Internet" and quickly delves into Cybercrime, including 20 types of Cybercrime and a brief denoscription of each. Malware, Spyware, and more.

#book
👍5
Introduction to Cyber Security.pdf
5.2 MB
Introduction to Cyber Security by Dr. Jeetendra Pande
👍4🤔2
Cybersecurity Terms Summary FROM A TO Z, 2023

Understanding all the cybersecurity terms can be tough, so we'll take you through some of them in this quick guide.

#english
🔥5
Cybersecurity Terms Summary FROM A TO Z.pdf
22.2 MB
Cybersecurity Terms Summary FROM A TO Z, 2023
👍3🔥2
Windows forensic Commands, unofficial mini guide, 2023

#forensic #windows
👍5
Windows forensic Commands.pdf
470.1 KB
Windows forensic Commands, unofficial mini guide, 2023
👍6
Framework безопасной разработки DAF

GitHub
Статья на Хабре

#SecDevOps
👍4🔥21
Пентест. Практика тестирования на проникновение, учебный видео курс, Александр Колесников, Иван Кудрявин, OTUS, 2019

Цель курса показать на практике, как проводится детальный анализ сетевых ресурсов, программного обеспечения, web-ресурсов на наличие уязвимостей, их эксплуатацию и дальнейшее устранение.

Официальный сайт
О курсе на Хабре
Download with Magnet

!!! Только для ознакомления!!! Всем кому понравилось приобретайте официальный учебный курс у разработчика

#education #pentest
🔥14👍2