Jump to content
  1. Informatii generale

    1. Anunturi importante

      Anunturile importante si regulile forumului. Cititi regulamentu​l inainte de a posta.

    2. Bine ai venit

      Bine ati venit pe forumul Romanian Security Team, aici va puteti prezenta (optional)

    3. Proiecte RST

      Aici veti putea gasi toate programele, tutorialele, metodele si exploiturile create de catre membrii RST

  2. Sectiunea tehnica

    1. Exploituri

      Cele mai noi exploituri, POC-uri sau shellcode-uri

    2. Challenges

      Challenge-uri - Wargames, pentru amatorii CTF-urilor

    3. Bug Bounty

      Categorie destinata discutiilor referitoare la site-urile care au un program Bug Bounty in desfasurare prin care rasplatesc persoanele care le raporteaza vulnerabilitati

    4. Programare

      Coltul programatorilor: C/C++, Visual Basic, .NET, Java, ASM, Shell scripting, Perl, Python

    5. Reverse engineering & exploit development

      Tutoriale despre analiza malware, sample-uri, cod sursa, programe utile, reverse engineering si exploit development

    6. Mobile phones

      Discutii despre telefoane mobile, root-ing, jailbreak-ing etc.

    7. Sisteme de operare si discutii hardware

      Discutii in materie hardware, windows, unix, bsd etc.

    8. Electronica

      Discutii generale despre electronica

    9. Wireless Pentesting

      Wardriving area, WiFi, Bluetooth si GSM hacking

    10. Black SEO & monetizare

      Tips & tricks, questions, monetizare

  3. Programe

    1. Programe hacking

      Postati aici utilitare cum ar fi sniffere, bruteforcers, fuzzers etc. Nu faceti cereri aici.

    2. Programe securitate

      Postati aici programe cum ar fi firewall-uri, antivirusi si programe similare

    3. Programe utile

      Programe ce nu se incadreaza in celelalte sectiuni: hack sau securitate

    4. Free stuff

      Diverse lucruri utile, fiind excluse root-uri, SMTP-uri, VPS-uri etc.

  4. Discutii generale

    1. RST Market

      Orice vanzare/cumparare care are legatura cu frauda online/bancara sau access neautorizat este penalizata cu ban permanent!  Minim 50 de posturi pentru acces!

    2. Off-topic

      Discutii pe diverse teme, discutii care nu se incadreaza la celalalte categorii. Doar discutii din domeniul IT!

    3. Discutii incepatori

      Daca esti incepator, ai o intrebare simpla sau vrei sa stii mai multe despre un domeniu, aici e sectiunea potrivita

    4. Stiri securitate

      Stiri din domeniul securitatii IT

    5. Sugestii

      Vreti un forum mai bun? Orice sugestie din partea voastra va fi analizata. Doar sugestii pentru site/forum.

    6. Linkuri

      Postati aici doar linkurile despre securitate!

    7. Cosul de gunoi

      Toate topicurile care au deviat de la raspuns vor fi mutate aici.

  • Topics

  • Posts

    • Am si eu una, 20k, totul organic, face cam 300 pe zi, 5-800 cand ia vreun post viral.  Reach momentan 8m.   Pagina are 1 an si 1 luna, totul a fost construit de la 0,organic.
    • Type Name Latest commit message Commit time   IoT Update README.md 7 months ago   bootcamp adding temporary guides 7 months ago   buffer_overflow_example Update README.md 7 months ago   build_your_own_lab Update README.md 9 months ago   capture_the_flag Update README.md 17 days ago   cheat_sheets Add files via upload 5 months ago   cloud_resources Adding Additional AWS Pen Testing References last year   cracking_passwords Update cracked.md 7 months ago   crypto Update crypto_algorithms.md last month   dfir Update README.md 4 months ago   exploit_development Update README.md 3 months ago   fuzzing_resources Update README.md last year   game_hacking Create README.md 7 months ago   metasploit_resources adding metasploit info 2 years ago   mobile_security Update output.json last year   osint adding additional OSINT references 8 months ago   pen_testing_reports Update README.md 7 months ago   post_exploitation adding post exploitation, social engineering, and exploit development… last year   python_ruby_and_bash Update quick_scanner.py 5 months ago   recon adding recon info 2 years ago   reverse_engineering Update README.md 3 months ago   social_engineering adding post exploitation, social engineering, and exploit development… last year   threat_hunting adding threat hunting references last year   useful_commands_and_scripts Update letmeout.sh last year   virl_topologies adding VIRL topology last year   vulnerability_scanners Create README.md 9 months ago   vulnerable_servers add https://hack-yourself-first.com/ 7 months ago   web_application_testing Update xss_vectors.md 3 months ago   windows Adding Resources for Windows-based Assessments last year   wireless_resources Update virtual_adapters.md 9 months ago   .gitignore update 11 months ago   CONTRIBUTING.md Update CONTRIBUTING.md 9 months ago   README.md Update README.md 9 months ago   more_tools.md Create more_tools.md 2 months ago   new_tools.md Adding new tools 15 hours ago   Download Link : https://github.com/The-Art-of-Hacking/h4cker
    • Faine carti! Si eu am inceput The Power of Now cu 2 zile in urma si imi place foarte mult. _______________________________________ Dumitru de la https://lumealuifram.ro
    • Deep Exploit - Official Link Fully automatic penetration test tool using Deep Reinforcement Learning. Presentation February 17th,2018: SECCON YOROZU 2018 August 9th,2018: Black Hat USA 2018 Arsenal August 10th,2018: DEF CON 26! AI Village October 24th,2018: CSS2018 November 3rd,2018: AV TOKYO 2018 Hive December 6th,2018: Black Hat EURO 2018 Arsenal Cooperation HITB+ AI Challenge Demonstration See the demo page. Documentation (Installation, Usage) See the project's wiki for installation, usage and changelog. Overview DeepExploit is fully automated penetration test tool linked with Metasploit. DeepExploit identifies the status of all opened ports on the target server and executes the exploit at pinpoint using Machine Learning. It's key features are following.   Efficiently execute exploit. DeepExploit can execute exploits at pinpoint (minimum 1 attempt) using Machine Learning. Deep penetration. If DeepExploit succeeds the exploit to the target server, it further executes the exploit to other internal servers.   Self-learning. DeepExploit can learn how to exploitation by itself (uses Reinforcement Learning). It is not necessary for humans to prepare learning data.   Learning time is very fast. Generally, reinforcement learning takes a lot of time. So, DeepExploit uses distributed learning by multi agents. We adopted an advanced machine learning model called A3C. Powerful intelligence gathering To gather the information of software operated on the target server is very important for successful the exploitation. DeepExploit can identify product name and version using following methods. Port scanning Machine Learning (Analyze HTTP responses gathered by Web crawling) Contents exploration Abilities of "Deep Exploit". Current DeepExploit's version is a beta. But, it can fully automatically execute following actions: Intelligence gathering. Threat modeling. Vulnerability analysis. Exploitation. Post-Exploitation. Reporting. Your benefits. By using our DeepExploit, you will benefit from the following. For pentester: (a) They can greatly improve the test efficiency. (b) The more pentester uses DeepExploit, DeepExploit learns how to method of exploitation using machine learning. As a result, accuracy of test can be improve. For Information Security Officer: (c) They can quickly identify vulnerabilities of own servers. As a result, prevent that attackers attack to your servers using vulnerabilities, and protect your reputation by avoiding the negative media coverage after breach. Since attack methods to servers are evolving day by day, there is no guarantee that yesterday's security countermeasures are safety today. It is necessary to quickly find vulnerabilities and take countermeasures. Our DeepExploit will contribute greatly to keep your safety.
    • Official Link Introduction Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. hXXp:// known malicious executable), IP address (e.g. for known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in discovery of unknown threats (e.g. new malware).
    • ManaTI Project - Official Link Machine Learning for Threat Intuitive Analysis The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery of new security problems. The machine learning will contribute to the analysis by finding new relationships and inferences. The project will include the development of a web interface for the analyst to interact with the data and the machine learning output. This project is partially supported by Cisco Systems. For more information about the project please go to Stratosphere Lab page
    • You rendered them worthless, putting them in plain text on a public internet page will lead to the keys getting blacklisted.
    • CGST-XUTT-78JS-EUB4-WMSN 11.08.2022   FRAJ-WRB5-PR96-6KAT-4UA5 12.06.2020   New 12 version here https://divinesofttech.com/download-eset-nod32.html Free keys here https://divinesofttech.com/
    • Fac deja munca in folosul comunitatii ajunge 1 
    • Acela este "Vulnerability Disclosure Program", nu se plateste, dar se ofera reputatie HackerOne. Bug bounty e momentan privat (invite-only). Parca (nu ma ocup eu de el).
  • Create New...