white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Programming Linux Anti-Reversing Technique.pdf
935.3 KB
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
👍7🔥1
OpenCRE is an interactive content linking platform for uniting security standards and guidelines into one overview.

It offers easy and robust access to relevant information when designing, developing, testing, procuring and organising secure software.

Source

#useful #docs
👍5
Узнаете?😄

#fun
😁35👍8🤣2
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020

Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.

#book #cisco
👍5
Network Security, Firewall and VPNs.pdf
26.2 MB
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
👍6
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia

The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.

By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.

This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.

#malware
👍5
Malware Sandboxing (Build your own Sandbox).pdf
2.4 MB
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia
👍62
Cybersecurity Checklist by NIST Framework

This handy task checklist is based on the NIST Framework. For each item, it has a checkbox labeled CURRENT ASSESSMENT with another labeled YEAR 1 ASSESSMENT

#docs
👍4
Cybersecurity Checklist.pdf
622.2 KB
Cybersecurity Checklist by NIST Framework
👍3
Секреты Python. 59 рекомендаций по написанию эффективного кода, А.Г. Гузикевич, Бретт Слаткин, 2016

Книга приобщит вас к стилю программирования, выдержанному в истинном "духе Python", и поможет научиться писать исключительно надежный и высокопроизводительный код.

Используя сжатый стиль изложения, пионером которого был Скотт Мейерс, автор приводит 59 описаний лучших методик программирования, дает советы и показывает кратчайшие пути решения различных задач.

#book #python
👍5
sekrety_python_59.pdf
8.9 MB
Секреты Python. 59 рекомендаций по написанию эффективного кода, А.Г. Гузикевич, Бретт Слаткин, 2016
👍5
JavaScript for hackers. Learn to think like a hacker by Gareth Heyes, 2022

Have you ever wondered how a hacker approaches finding flaws in the browser and JavaScript? This book shares the thought processes and gives you tools to find your own flaws. It shares the basics of JavaScript hacking, then dives in and explains how to construct JavaScript payloads that don't use parentheses.

(+) Shows how you can find flaws with fuzzing and how to quickly fuzz millions of characters in seconds.
(+) Want to hack the DOM? This book has you covered.
(+) Read about various browser SOP bypasses that the author found in detail.
(+) No idea about client-side prototype pollution? This is the book for you!
(+) Want to learn the latest & greatest XSS techniques? You need to buy this book.

#book #AppSec
👍51
javanoscriptforhackers.pdf
2.4 MB
JavaScript for hackers. Learn to think like a hacker by Gareth Heyes, 2022
👍71🔥1
Keycloak – Identity and Access Management for Modern Applications, second edition by Stian Thorgersen and
Pedro Igor Silva, 2023

Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications. Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.

#book
👍5
Packt.Keycloak.pdf
7.8 MB
Keycloak – Identity and Access Management for Modern Applications, second edition by Stian Thorgersen and
Pedro Igor Silva, 2023
👍5