The Password Game — это популярная в интернете абсурдная браузерная головоломка, созданная Нилом Агарвалем, где игроку нужно создать пароль, соответствующий всё более безумным и нестандартным правилам, включающим математические задачи, шахматные правила, игры типа GeoGuessr и логические головоломки.
Игра начинается с простых требований (длина, цифры, буквы), но быстро усложняется, требуя от игрока использовать логику, ассоциации, эрудицию и смекалку для выполнения всех предыдущих условий, чтобы перейти к следующему этапу.
А сколько уровней игры сможешь пройти ты?
🔖 Yandex Game (Rus)
🏆 Original page (Eng)
🛡 Wiki (Rus)
#fun
Игра начинается с простых требований (длина, цифры, буквы), но быстро усложняется, требуя от игрока использовать логику, ассоциации, эрудицию и смекалку для выполнения всех предыдущих условий, чтобы перейти к следующему этапу.
А сколько уровней игры сможешь пройти ты?
🏆 Original page (Eng)
🛡 Wiki (Rus)
#fun
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8❤4👏1
Kaspersky Reverse Challenge Cup on Zero Nights (Moscow, Russia) likely refers to a reverse engineering malware competition or challenge organized by Kaspersky Lab, possibly with a focus on scenarios where participants have limited time to analyze and solve problems.
Парни, кто решал crackme от ЛК в 2010-х годах? Это было эпично, мой первый дебют после самооучения реверсу (CrackLab, ExeLab many thanks) состоявшийся на ZN 2017. Бинарик уже потерян, но солюшн остался в черновиках. Если интересно ставьте
#fun #malware #reverse
Please open Telegram to view this post
VIEW IN TELEGRAM
👍17❤1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9❤1
THM | TryHackMe - tools, writeups, notes, solutions by DFTF-PConsole, 2022/2025
🔽 GitHub
🔖 Rooms + Tools
See also:
✅ Useful stuff
#pentest
See also:
#pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5🔥4👏1😁1🤝1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9❤3
Стажировка в Solar Cyber Dive
ИБ-компания Solar приглашает на стажировки в Solar JSOC студентов и недавних выпускников, а самым успешным стажерам предлагаем трудоустройство, в том числе на позиции аналитиков SOC.
Финалистов, успешно прошедших собеседование, принимаем в свою команду в городах: Нижний Новгород, Самара, Ростов-на-Дону, Томск и Хабаровск. В отдельных случаях рассматриваем кандидатов в Москве.
Официальный сайт
Подать заявку
#job
ИБ-компания Solar приглашает на стажировки в Solar JSOC студентов и недавних выпускников, а самым успешным стажерам предлагаем трудоустройство, в том числе на позиции аналитиков SOC.
Финалистов, успешно прошедших собеседование, принимаем в свою команду в городах: Нижний Новгород, Самара, Ростов-на-Дону, Томск и Хабаровск. В отдельных случаях рассматриваем кандидатов в Москве.
Официальный сайт
Подать заявку
#job
🤮5👍2🤔1
Forwarded from CyberSecBastion
KrokIT is a startup accelerator with roots in Belarus, created by the business incubator "With us the future". The goal is to help startups quickly achieve success, reduce risks and increase attractiveness for investors.
🔼 first profit (for startups that came at the idea stage);
🔼 increase in profit (for already operating startups);
🔼 assistance in scaling a startup to foreign markets (USA);
🔼 formation of a strong and effective team (6-month training, mentoring, networking);
🔼 promotion of a product or service (media, PR, Demo Day, exhibitions);
🔼 expert support throughout the training and after its completion.
➡️You can apply for participation on the accelerator website. The program is selected depending on the stage of the startup - idea, MVP, sales, scaling.
➡️ If the startup does not receive the first profit or does not increase profit by 2 times, the accelerator returns the payment: money or a share in the project (according to the concluded contract).
#info
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥3🔥3❤2👍1
This media is not supported in your browser
VIEW IN TELEGRAM
National Cryptologic Museum Tour, US, Maryland state
The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Seven Motel, just two blocks from the NSA headquarters at Fort George G. Meade in Maryland. The motel was purchased, creating a buffer zone between the high security main buildings of the NSA and an adjacent highway. The museum opened to the public on December 16, 1993, and now hosts about 50,000 visitors annually from all over the world.
The NCM collection contains thousands of artifacts, including numerous working World War II German Enigma machines (two of them are available for visitors to try out), and a Navy Bombe used to break it. Displays discuss the history of American cryptology and the people, machines, techniques, and locations concerned. Initially housing NSA artifacts for viewing by employees, the museum quickly developed into a collection of U.S. cryptologic history, with some artifacts dating back to pre-American Revolutionary War times.
In addition to exhibits covering equipment used to encrypt, decrypt, and secure information, the museum features exhibits on the people who contributed to cryptography in America, such as George Washington (who integrated military intelligence tactics, including coded messaging, into the Continental Army during the Revolutionary War), the Native American code talkers (who protected U.S. communications during both World Wars by using their native languages to encode message traffic), and the Navy WAVES (who, like the WRENS of the British Royal Navy, operated the Bombe to decrypt German military traffic during WWII).
💻 Official page
🌐 TripAdvisor 2025
✍️ Map of the museum
#fun #crypto #world
The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the National Security Agency (NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Seven Motel, just two blocks from the NSA headquarters at Fort George G. Meade in Maryland. The motel was purchased, creating a buffer zone between the high security main buildings of the NSA and an adjacent highway. The museum opened to the public on December 16, 1993, and now hosts about 50,000 visitors annually from all over the world.
The NCM collection contains thousands of artifacts, including numerous working World War II German Enigma machines (two of them are available for visitors to try out), and a Navy Bombe used to break it. Displays discuss the history of American cryptology and the people, machines, techniques, and locations concerned. Initially housing NSA artifacts for viewing by employees, the museum quickly developed into a collection of U.S. cryptologic history, with some artifacts dating back to pre-American Revolutionary War times.
In addition to exhibits covering equipment used to encrypt, decrypt, and secure information, the museum features exhibits on the people who contributed to cryptography in America, such as George Washington (who integrated military intelligence tactics, including coded messaging, into the Continental Army during the Revolutionary War), the Native American code talkers (who protected U.S. communications during both World Wars by using their native languages to encode message traffic), and the Navy WAVES (who, like the WRENS of the British Royal Navy, operated the Bombe to decrypt German military traffic during WWII).
#fun #crypto #world
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤🔥1
Memory Forensics: A Comprehensive Technical Guide by HADESS, 2025
This comprehensive guide delves into the technical aspects of memory forensics, offering insights into its methodologies, tools, and real-world applications. Whether you are an incident responder, a malware analyst, or a digital forensics professional, this article provides a detailed roadmap for leveraging memory forensics in combating modern cyber threats.
From understanding memory structures to employing cutting-edge tools and techniques, this guide aims to equip readers with the knowledge required to excel in the field of volatile memory analysis.
#book #frorensic
This comprehensive guide delves into the technical aspects of memory forensics, offering insights into its methodologies, tools, and real-world applications. Whether you are an incident responder, a malware analyst, or a digital forensics professional, this article provides a detailed roadmap for leveraging memory forensics in combating modern cyber threats.
From understanding memory structures to employing cutting-edge tools and techniques, this guide aims to equip readers with the knowledge required to excel in the field of volatile memory analysis.
#book #frorensic
❤4🤔2👍1
Memory Forensics_11.pdf
13 MB
Memory Forensics: A Comprehensive Technical Guide by HADESS, 2025
👍6🔥5⚡1
Привет, парни! 👾 Сегодня новый челлендж - разбираемся в безопасности Java приложения на практике
В этом сэмпле кода рабочего приложения на Java спрятано 7 security issues. Ваша задача — найти их все, подробно описать и сделать это быстрее всех!
Три участника предложившие лучшее решение ждет один из призов - годовая TG Premium, 6 месяцев подписка на extra fast server для Outline, WireGuard, фирменная футболка ][акера, книги ИБ на русском языке изданные в 2025 году🏆 🏆
Сложность:⭐️ ⭐️
Категория: source code\SDLC
Команда: AppSec crew
📣 Условия:
👉 Срок предоставления решения - 24 часа с момента публикации поста (msk time zone)
👉 Ответы присылайте в w2hack direct или бот обратной связи
👉 Указывай тип уязвимости, номер строки кода, где нашел баг и краткое его объяснение
😒 Через 2 дня будет выложен салюшн к заданию и объявлены победители
💎 Критерии победы:
🛡 Найдены все 7 уязвимостей
🛡 Правильно указан тип проблемы, причина бага, предложен фикс
🛡 Ранние ответы (первые 3 часа после публикации поста) получают +1 балл в копилку победителя
📢 GitHub (w2haсk official repo)
⬇️ ⬇️ Полный исходный код на Java забирай ниже: ⬇️ ⬇️
(можно открыть как .TXT)
#AppSec #quiz
В этом сэмпле кода рабочего приложения на Java спрятано 7 security issues. Ваша задача — найти их все, подробно описать и сделать это быстрее всех!
Три участника предложившие лучшее решение ждет один из призов - годовая TG Premium, 6 месяцев подписка на extra fast server для Outline, WireGuard, фирменная футболка ][акера, книги ИБ на русском языке изданные в 2025 году
Сложность:
Категория: source code\SDLC
Команда: AppSec crew
import java.sql.*;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.io.*;
public class UserProfileService {
private static final String DB_URL = "jdbc:mysql://localhost:3306/test?useSSL=false";
private static final String DB_USER = "root";
private static final String DB_PASSWORD = "password123";
public void changePassword(String username, String newPassword) {
try {
String hashedPassword = hashPassword(newPassword);
String query = "UPDATE users SET password = '" + hashedPassword + "' WHERE username = '" + username + "'";
Connection conn = DriverManager.getConnection(DB_URL, DB_USER, DB_PASSWORD);
Statement stmt = conn.createStatement();
stmt.executeUpdate(query);
stmt.close();
conn.close();
} catch (SQLException e) {
e.printStackTrace();
}
}
(можно открыть как .TXT)
#AppSec #quiz
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆5👍1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
Send Direct Messages to Channels
You can now send direct messages to channels and have private chats with owners and admins. Content creators can enable this mode to talk with subscribers without sharing personal info.
➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️ ➡️
Друзья, вы можете отправлять сообщения, файлы, оповещения двумя способами -📢 (1) официальный бот w2hack inside и 📢 (2) через нативную опцию в ТГ
Выбираете, что вам удобнее!
🔖 Official TG News (3 Jun, 2025 update)
#info
You can now send direct messages to channels and have private chats with owners and admins. Content creators can enable this mode to talk with subscribers without sharing personal info.
Друзья, вы можете отправлять сообщения, файлы, оповещения двумя способами -
Выбираете, что вам удобнее!
#info
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🤝2🔥1😁1
FREE Harvard University Resume and Cover Letter Samples by Harvard University, 2019
This template has helped 1000’s of job seekers increase callbacks:
The Winning Resume Structure:
1. Education → Show the knowledge foundation you bring
2. Skills → Highlight what you can contribute from day one
3. Work Experience → Prove how your background solves their problems
4. Projects → Demonstrate expertise across diverse skill sets
5. Leadership & Awards → Showcase your complete professional personality
Resume Optimization Tips:
✅ Under 10 years experience? Keep it to 1 page
✅ Pack every bullet with metrics and data
✅ Use this formula: "Accomplished [X] as measured by [Y], by doing [Z]"
✅ Tailor each resume for ATS optimization
The Winning Cover Letter Structure:
1. Opening Hook → Grab attention + mention specific role
2. The Connection → Show genuine company research and interest
3. Value Proposition → 2-3 key achievements with metrics that match their needs
4. The Bridge → Connect your experience to their success
5. Strong Close → Express enthusiasm + request next steps
Cover Letter Optimization Tips:
✅ Keep it 3-4 paragraphs max (6-second scan rule!)
✅ Mirror job posting keywords for ATS
✅ Use this power formula: "At [Company], I [achievement + numbers] = [quantifiable impact]"
✅ Research the hiring manager's name on LinkedIn (40% higher response rate!)
Your application is your first impression. Make it count!
#job
This template has helped 1000’s of job seekers increase callbacks:
The Winning Resume Structure:
1. Education → Show the knowledge foundation you bring
2. Skills → Highlight what you can contribute from day one
3. Work Experience → Prove how your background solves their problems
4. Projects → Demonstrate expertise across diverse skill sets
5. Leadership & Awards → Showcase your complete professional personality
Resume Optimization Tips:
✅ Under 10 years experience? Keep it to 1 page
✅ Pack every bullet with metrics and data
✅ Use this formula: "Accomplished [X] as measured by [Y], by doing [Z]"
✅ Tailor each resume for ATS optimization
The Winning Cover Letter Structure:
1. Opening Hook → Grab attention + mention specific role
2. The Connection → Show genuine company research and interest
3. Value Proposition → 2-3 key achievements with metrics that match their needs
4. The Bridge → Connect your experience to their success
5. Strong Close → Express enthusiasm + request next steps
Cover Letter Optimization Tips:
✅ Keep it 3-4 paragraphs max (6-second scan rule!)
✅ Mirror job posting keywords for ATS
✅ Use this power formula: "At [Company], I [achievement + numbers] = [quantifiable impact]"
✅ Research the hiring manager's name on LinkedIn (40% higher response rate!)
Your application is your first impression. Make it count!
#job
👍3🔥3❤1👎1
FREE Harvard University Resume and Cover Letter Samples.pdf
3.4 MB
FREE Harvard University Resume and Cover Letter Samples by Harvard University, 2019
❤2👍2👎2
Многие ИТ селебрети, хакеры, разработчики в детстве начинали с ретро девайсов типо ZX Spectrum, Atari 2600, Commandore 64 и т.д. Игры на кассетн, псевдографика, возможность писать код C, Pascal, etc. А у тебя в детстве были такие технологичные игрушки??🤔
Anonymous Poll
5%
Да, несколько разных девайсов
16%
Sinclair ZX Spectrum
2%
Atari
4%
Commandore 64
3%
EC1841 (советская реплика IBM PC)
3%
Amiga 500/3000
24%
Ничего не было :(
39%
Я слишком молод) эту эпоху не застал
4%
Свой вариант (пиши в чат)
❤🔥6❤2👍1🤔1