Forums

  1. Informatii generale

    1. Anunturi importante

      Anunturile importante si regulile forumului. Cititi regulamentu​l inainte de a posta.

      7656
      posts
    2. Bine ai venit

      Bine ati venit pe forumul Romanian Security Team, aici va puteti prezenta (optional)

      17590
      posts
    3. Proiecte RST

      Aici veti putea gasi toate programele, tutorialele, metodele si exploiturile create de catre membrii RST

      4359
      posts
  2. Sectiunea tehnica

    1. Exploituri

      Cele mai noi exploituri, POC-uri sau shellcode-uri

      6829
      posts
    2. Challenges

      Challenge-uri - Wargames, pentru amatorii CTF-urilor

      9562
      posts
    3. Bug Bounty

      Categorie destinata discutiilor referitoare la site-urile care au un program Bug Bounty in desfasurare prin care rasplatesc persoanele care le raporteaza vulnerabilitati

      2019
      posts
    4. Programare

      Coltul programatorilor: C/C++, Visual Basic, .NET, Java, ASM, Shell scripting, Perl, Python

      21776
      posts
    5. Reverse engineering & exploit development

      Tutoriale despre analiza malware, sample-uri, cod sursa, programe utile, reverse engineering si exploit development

      1462
      posts
    6. Mobile phones

      Discutii despre telefoane mobile, root-ing, jailbreak-ing etc.

      11677
      posts
    7. Sisteme de operare si discutii hardware

      Discutii in materie hardware, windows, unix, bsd etc.

      7093
      posts
    8. Electronica

      Discutii generale despre electronica

      2389
      posts
    9. Wireless Pentesting

      Wardriving area, WiFi, Bluetooth si GSM hacking

      3504
      posts
    10. 8430
      posts
  3. Tutoriale

    1. Tutoriale in romana

      Tutoriale in limba romana

      18082
      posts
    2. Tutoriale in engleza

      Tutoriale in limba engleza

      5966
      posts
    3. Tutoriale video

      Tutorialele video

      4916
      posts
  4. Programe

    1. Programe hacking

      Postati aici utilitare cum ar fi sniffere, bruteforcers, fuzzers etc. Nu faceti cereri aici.

      27630
      posts
    2. Programe securitate

      Postati aici programe cum ar fi firewall-uri, antivirusi si programe similare

      2562
      posts
    3. Programe utile

      Programe ce nu se incadreaza in celelalte sectiuni: hack sau securitate

      11928
      posts
    4. Free stuff

      Diverse lucruri utile, fiind excluse root-uri, SMTP-uri, VPS-uri etc.

      8736
      posts
  5. Discutii generale

    1. RST Market

      Orice vanzare/cumparare care are legatura cu frauda online/bancara sau access neautorizat este penalizata cu ban permanent!  Minim 50 de posturi pentru acces!

      22237
      posts
    2. Off-topic

      Discutii pe diverse teme, discutii care nu se incadreaza la celalalte categorii. Doar discutii din domeniul IT!

      134835
      posts
    3. Discutii incepatori

      Daca esti incepator, ai o intrebare simpla sau vrei sa stii mai multe despre un domeniu, aici e sectiunea potrivita

      589
      posts
    4. Stiri securitate

      Stiri din domeniul securitatii IT

      19206
      posts
    5. Ajutor

      Ai o problema si te putem ajuta? Posteaza aici.

      108155
      posts
    6. Cereri

      Cererile se fac doar aici, indiferent de subiect.

      50299
      posts
    7. Sugestii

      Vreti un forum mai bun? Orice sugestie din partea voastra va fi analizata. Doar sugestii pentru site/forum.

      5008
      posts
    8. Linkuri

      Postati aici doar linkurile despre securitate!

      9500
      posts
    9. Cosul de gunoi

      Toate topicurile care au deviat de la raspuns vor fi mutate aici.

      43992
      posts
  • Who's Chatting

  • Topics

  • Posts

    • Ati facut voi , v-ati ales cu 500 euro si eu fara site-uri si aveti gura mare !
    • Urs esti fanul meu , sau valetul lui ManutaDeAur  va invit pe amandoi la puscarie sa imi da-ti banii inapoi pe munca imaginara ce ati facut. Dar maine va promit o plangere interesanta mai ales pentru domnisorul Calian Narcis ! Am sa te adaug si pe tine  asta daca nu esti tot manuta :))). Acum spor
    • Alexandru Cosmin Stan TEPAR din Giurgiu chiar daca se pricepe...
    • Ti-am lasat PM !   @ Please login or register to see this link.   Daca te pricepi la programare iti pot lasa in PM detaliile ! 
    • Depinde de modificari , poti spune aici exact si cine stie iti va face ! si daca este cazul iti va cere banii
    • Salut ,    Caut pe cineva care sa imi faca mici modificari la un site de filme ! Cineva care sa se priceapa bine ! Platesc prin Paypal ..! PM pentru mai multe informatii !
    • Awesome Windows Exploitation Please login or register to see this link. A curated list of awesome Windows Exploitation resources, and shiny things. There is no pre-established order of items in each category, the order is for contribution. If you want to contribute, please read the Please login or register to see this link. . Please login or register to see this link. Table of Contents Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Windows stack overflows Stack Base Overflow Articles. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Dark spyrit [1999] Please login or register to see this link. - by Nish Bhalla’s [2005] Please login or register to see this link. - by Hagen Fritsch [2009] Please login or register to see this link. - by rix [2000] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Windows heap overflows Heap Base Overflow Articles. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Halvar Flake [2002] Please login or register to see this link. - by Dave Aitel (MS03-026) [September 2003] Please login or register to see this link. - by Dave Aitel (MS03-026) [September 2003] Please login or register to see this link. - by David Litchfield [2004] Please login or register to see this link. - by François Goichon [2015] Please login or register to see this link. - by argp & huku Please login or register to see this link. - by blackngel [2010] Please login or register to see this link. - by blackngel [2009] Please login or register to see this link. - by huku Please login or register to see this link. - by Justin N. Ferguson [2007] Please login or register to see this link. - by g463 Please login or register to see this link. - by Phantasmal Phantasmagoria [2005] Please login or register to see this link. - by Phantasmal Phantasmagoria [2004] Please login or register to see this link. - by jp Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Kernel based Windows overflows Kernel Base Exploit Development Articles. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by a Polish group called “sec-labs” [2003] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by S.K Chong [2004] Please login or register to see this link. - by SoBeIt [2005] Please login or register to see this link. - by Eeye Security Please login or register to see this link. - by Matt Miller Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Yu Wang [2016] Please login or register to see this link. - by Moritz Jodeit [2016] Please login or register to see this link. - by Cesar Cerrudo [2012] Please login or register to see this link. - by Simone Cardona 2016 Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Return Oriented Programming Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng [2015] Please login or register to see this link. -by R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein [2013] Please login or register to see this link. -by S.Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy [2010] Please login or register to see this link. -by T. K. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang [2011] Please login or register to see this link. - by L. Davi, A. Sadeghi, and D. Lehmann [2014] Please login or register to see this link. - by E. Göktas, E.Athanasopoulos, M. Polychronakis, H. Bos, and G.Portokalidis [2014] Please login or register to see this link. - by Marco Mastropaolo [2005] Please login or register to see this link. - by Marco Mastropaolo [2005] Please login or register to see this link. - by Dino Dai Zovi [2010] Please login or register to see this link. - by Spencer Pratt [2010] Please login or register to see this link. - by skape Please login or register to see this link. - by Harmony Security and Stephen Fewer [2010] Please login or register to see this link. - by Harmony Security and Stephen Fewer [2010] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Windows memory protections Windows memory protections Introduction Articles. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Bypassing filter and protections Windows memory protections Bypass Methods Articles. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Halvar Flake [2002] Please login or register to see this link. - by Chris Anley Please login or register to see this link. - by Dave Aitel [2003] Please login or register to see this link. - by David Litchfield Please login or register to see this link. - by Matt Conover in cansecwest 2004 Please login or register to see this link. - by Matt Miller [2004] Please login or register to see this link. Please login or register to see this link. - by Skape (Matt Miller) and Skywing (Ken Johnson) [October 2005] Please login or register to see this link. - by Brett Moore [2005] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. by Alexander sotirov [2007] Please login or register to see this link. - by Nicolas Waisman [2007] Please login or register to see this link. - by Brett moore [2008] Please login or register to see this link. - by Mark Dowd and Alex Sotirov [2008] Please login or register to see this link. - by ben hawkes [2008] Please login or register to see this link. - by Hovav Shacham (and others ) [2008] Please login or register to see this link. - by Cesar Cerrudo [2008] Please login or register to see this link. - by Pablo Sole [2008] Please login or register to see this link. - by John McDonald and Chris Valasek [2009] Please login or register to see this link. - by Stefan Le Berre Damien Cauquil [2009] Please login or register to see this link. - by Dionysus Blazakis[2010] Please login or register to see this link. - by Peter Vreugdenhil Please login or register to see this link. - by Ruben Santamarta [2010] Please login or register to see this link. - by Shahin Ramezany [2013] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Typical windows exploits Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Devcode Please login or register to see this link. - by Toto Please login or register to see this link. - by Skape Please login or register to see this link. - by Skylined Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Cesar Cerrudo Please login or register to see this link. - by Cesar Cerrudo Please login or register to see this link. - by Tavis Ormandy KiTra0d Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - by Stephen Fewer Please login or register to see this link. - by redpantz Please login or register to see this link. - by Moritz Jodeit [2016] Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Exploit development tutorial series Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. Tools Disassemblers, debuggers, and other static and dynamic analysis tools. Please login or register to see this link. Please login or register to see this link. Please login or register to see this link. - Platform-agnostic binary analysis framework developed at UCSB's Seclab. Please login or register to see this link. - Multiplatform, open source Binary Analysis and Reverse engineering Framework. Please login or register to see this link. - Binary analysis IDE for reverse engineering based on graph visualization. Please login or register to see this link. - GUI for Pyew and Radare. Please login or register to see this link. - Disassembly framework for binary analysis and reversing, with support for many architectures and bindings in several languages. Please login or register to see this link. - Web based code browser using clang to provide basic code analysis. Please login or register to see this link. - .NET assembly editor, decompiler and debugger. Please login or register to see this link. - A modular debugger with a Qt GUI. Please login or register to see this link. - The GNU debugger. Please login or register to see this link. - GDB Enhanced Features, for exploiters and reverse engineers. Please login or register to see this link. - A utility to search for strings in PE executables including imports, exports, and debug symbols. Please login or register to see this link. - Windows disassembler and debugger, with a free evaluation version. Please login or register to see this link. - Debugger for malware analysis and more, with a Python API. Please login or register to see this link. - Dynamic analysis for Linux executables. Please login or register to see this link. - Part of GNU binutils, for static analysis of Linux binaries. Please login or register to see this link. - An assembly-level debugger for Windows executables. Please login or register to see this link. - Platform for Architecture-Neutral Dynamic Analysis Please login or register to see this link. - Python Exploit Development Assistance for GDB, an enhanced display with added commands. Please login or register to see this link. - Perform static analysis of Windows executables. Please login or register to see this link. - Advanced monitoring tool for Windows programs. Please login or register to see this link. - Python tool for malware analysis. Please login or register to see this link. - Reverse engineering framework, with debugger support. Please login or register to see this link. - Sublime Malware Research Tool, a plugin for Sublime 3 to aid with malware analyis. Please login or register to see this link. - Dynamic analysis for Linux executables. Please login or register to see this link. - Disassembler library and tool for x86 and x86_64. Please login or register to see this link. - Python tool for malware analysis. Please login or register to see this link. - An open-source x64/x32 debugger for windows.   Sursa: Please login or register to see this link.
    • Baza de date din cercetare de piata... Conţine mail tel mobil, vârsta, Consum de produse si servicii, loc de munca  etc