What vulns are in this and how would you exploit them?
Text your idea on comments of the post
#AppSec
Text your idea on comments of the post
#AppSec
🤔6🔥3
300+ Writeups PDF HackTheBox/HTB premium retired by Tamarisk, 2024
Contains all the official writeups from Premium HackTheBox
PEN 200 OSCP Book
#pentest
Contains all the official writeups from Premium HackTheBox
PEN 200 OSCP Book
#pentest
🔥13👍1🤡1
HackTheBoxPDF by Tamarisk.zip
1 GB
300+ Writeups PDF HackTheBox/HTB premium retired by Tamarisk, 2024
👍15🔥6🤡2
Game Hacking: Developing Autonomous Bots for Online Games by Nick Cano, 2016
You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries.
Level up as you learn how to:
–Scan and modify memory with Cheat Engine
–Explore program structure and execution flow with OllyDbg
–Log processes and pinpoint useful data files with Process Monitor
–Manipulate control flow through NOPing, hooking, and more
–Locate and dissect common game memory structures
#book #reverse #coding
You don’t need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.
Bring your knowledge of Windows-based development and memory management, and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries.
Level up as you learn how to:
–Scan and modify memory with Cheat Engine
–Explore program structure and execution flow with OllyDbg
–Log processes and pinpoint useful data files with Process Monitor
–Manipulate control flow through NOPing, hooking, and more
–Locate and dissect common game memory structures
#book #reverse #coding
👍3🔥2
Game-Hacking.pdf
7 MB
Game Hacking: Developing Autonomous Bots for Online Games by Nick Cano, 2016
🔥4👍1
Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012
From being a mere curiosity in the 70’s, computer gaming has become mainstream and grown into being one of the world’s biggest digital entertainment industries. Its popularity has drawn the attention of hackers and exploiters, who quickly put game software security on the agenda. The games of the 90’s and early 00’s were easy to hack, and this effectively ruined online play in some games.
Modern games employ various anti-cheat mechanisms, but different kind of cheats still exist and are being sold through cheater websites. This master thesis seeks to perform an analysis of what kind of cheats exists in the modern gaming market, and what countermeasures are employed.
Also:
DFT article
#reverse #coding
From being a mere curiosity in the 70’s, computer gaming has become mainstream and grown into being one of the world’s biggest digital entertainment industries. Its popularity has drawn the attention of hackers and exploiters, who quickly put game software security on the agenda. The games of the 90’s and early 00’s were easy to hack, and this effectively ruined online play in some games.
Modern games employ various anti-cheat mechanisms, but different kind of cheats still exist and are being sold through cheater websites. This master thesis seeks to perform an analysis of what kind of cheats exists in the modern gaming market, and what countermeasures are employed.
Also:
DFT article
#reverse #coding
👍3❤1🤔1
Cheating in Online Games.pdf
7.5 MB
Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012
👏2🤔2
На берегу Яузы уже сейчас строят два новых корпуса Бауманки (МГТУ им. Баймана)
Санкции, провокации, нападки - все не почем для великой России! Технологическое будущее и новые перспективы уже сейчас! Для МГТУ им. Баумана строят ультрасвоременыне кампусы - будущие инженеры, изобретали, первооткрыватели, вас ждут!
Два здания на Госпитальной набережной вмещают 620 жилых блоков, коворкинг, залы самоподготовки и групповых занятий, зоны неформального общения!
Источники: Mos + STR + RIA + BMSTU
#event
Санкции, провокации, нападки - все не почем для великой России! Технологическое будущее и новые перспективы уже сейчас! Для МГТУ им. Баумана строят ультрасвоременыне кампусы - будущие инженеры, изобретали, первооткрыватели, вас ждут!
Два здания на Госпитальной набережной вмещают 620 жилых блоков, коворкинг, залы самоподготовки и групповых занятий, зоны неформального общения!
Источники: Mos + STR + RIA + BMSTU
#event
🤡27👍13
В апреле 2022 года на фоне обострившегося политического противостояния РФ вышла из болонской системы. Твое мнение - это оправданный шаг, защита русского образования или бездумный поступок и провал РФ на международном рынке?
Anonymous Poll
27%
Все верно сделали, я верю президенту, гнать эту США и ЕС ссаными тряпками
28%
Х#йня полная, сделали только хуже
12%
По х## меня это вообще не волнует, по жизни всего хватает
12%
Я школьник/студент, посмотреть ответ
16%
Не знаю болонскую систему, затрудняюсь ответить
4%
Свой вариант (пиши в чат)
🤡8🤔4👍1🔥1
👍5👏1
Windows API for Red Team 101 by Joas Antonio dos santos, 2024
Using Windows APIs, Red Teams can test the resilience of implemented security solutions against tactics that attempt to disable or bypass these protections.
Teams can create tools that are highly adapted to the target environment and less likely to be detected by conventional security solutions.
#AppSec #coding #pentest
Using Windows APIs, Red Teams can test the resilience of implemented security solutions against tactics that attempt to disable or bypass these protections.
Teams can create tools that are highly adapted to the target environment and less likely to be detected by conventional security solutions.
#AppSec #coding #pentest
👍4
𝐖𝐢𝐧𝐝𝐨𝐰𝐬_𝐀𝐏𝐈_𝐟𝐨𝐫_𝐑𝐞𝐝_𝐓𝐞𝐚𝐦_101.pdf
951.3 KB
Windows API for Red Team 101 by Joas Antonio dos santos, 2024
👍3
OpenAI has just open sourced security bots they've built for themselves
Here's what they do:
🛡Incident Response Slackbot - automatically chats with users who have been part of an incident alert.
✍️ SDLC Slackbot - decides if a project merits a security review.
✉️ Triage Slackbot - inbound requests in a Slack channel to different sub-teams within your organization.
GitHub
#AI
Here's what they do:
🛡Incident Response Slackbot - automatically chats with users who have been part of an incident alert.
✍️ SDLC Slackbot - decides if a project merits a security review.
✉️ Triage Slackbot - inbound requests in a Slack channel to different sub-teams within your organization.
GitHub
#AI
🔥5👍1
Hacker Culture by Hadess, 2024
Crawley meticulously examines the multifaceted nature of hacker culture, shedding light on its evolution, key figures, groundbreaking ideas, and revolutionary gadgets.
#fun
Crawley meticulously examines the multifaceted nature of hacker culture, shedding light on its evolution, key figures, groundbreaking ideas, and revolutionary gadgets.
#fun
🤩3❤2👍1👏1