white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023

Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline

DevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software.

This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.

#book #SecDevOps
👍5
Packt.Implementing.DevSecOps.Practices.pdf
12.2 MB
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023
👍5🔥1
Useful CLI Tools for Linux Admin by Dan Nanni

#linux
🔥7👍1
Privilege Escalation Attacks by Dan Nanni, 2024

#linux #pentest
🔥7😁2
World Password Day 2024

Thursday, May 2, 2024, is World Password Day.

Established in 2013, the event is observed on the first Thursday of May with the goal of improving awareness of the importance of creating complex and unique passwords and adopting password best practices to keep sensitive information private and confidential

#fun
🎉6👍3
Certified Ethical Hacking (CEH) notes, 2024

I express my gratitude to the author for producing such valuable notes for CEH

#exam
👍7
Certified_Ethical_Hacking notes_2024.pdf
1.9 MB
Certified Ethical Hacking (CEH) notes, 2024
👍3🔥1
Firmware Security Testing Methodology by OWASP, 2024

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.

#penter #hardware
👍7🔥1
Firmware_Security_Testing_Methodology_Version1.pdf
3.3 MB
Firmware Security Testing Methodology by OWASP, 2024
🔥11
😺😺😺

#fun
😁20👍4🤣3
Reset Password Vulnerabilities Testing Methods by Shubham Rooter, 2024

#web
👍2🔥1
Reset Password Vulnerabilities Testing Methods.pdf
53.6 KB
Reset Password Vulnerabilities Testing Methods by Shubham Rooter, 2024
🔥11
What vulns are in this and how would you exploit them?

IaC via Docker config file

Text your idea on comments of the post

#AppSec
👍5
Security with Go. Explore the power of Golang to secure host, web, and cloud services by John Daniel Leon, 2018

The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion

Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.

Defensive topics
include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.

#book #coding
🔥5👍2
security-go-explore-golang-services.pdf
2.9 MB
Security with Go. Explore the power of Golang to secure host, web, and cloud services by John Daniel Leon, 2018
🔥53
Cybersecurity Career Roadmap

2024 Cybersecurity Career Roadmap: Paving the Path to Cyber
Excellence

#job #newbie #world
👍10