Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/20/23 in all areas

  1. Hex 65 5B 19 Ce data și ora reprezintă? Se poate converti cu : https://www.epochconverter.com/hex GMT: Wednesday, March 18, 1970 9:07:37 PM Your time zone: Wednesday, March 18, 1970 11:07:37 PM GMT+02:00 Decimal timestamp/epoch: 664245 Mulțumesc!
    1 point
  2. Penetration Testing OffSec Penetration Testing with Kali - Online Security Training Offensive Security Student Support Offensive Security Forums Exploits Database by Offensive Security Windows Privilege Escalation Checklists/Windows-Privilege-Escalation.md at master · netbiosX/Checklists Windows Privilege Escalation - a cheatsheet | Tim Arneaud OSCP - Windows Priviledge Escalation | Hacking and security FuzzySecurity | Windows Privilege Escalation Fundamentals Privilege Escalation | To Shell And Back: Adventures In Pentesting Cheat Sheets Spawning a TTY Shell MSFVennom cheat sheet Msfvenom Cheat Sheet – Security-Geek Path Traversal Cheat Sheet: Linux — GracefulSecurity Path Traversal Cheat Sheet: Windows — GracefulSecurity Reverse Shell Cheat Sheet | pentestmonkey How to Bypassing Filter to Traversal Attacks ? | Hacking & Tricks Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser Escape From SHELLcatraz - Breaking Out of Restricted Unix Shells - Speaker Deck Common Web-services · Security - My notepad Nmap Cheat Sheet Luke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks Penetration Testing Methodology - 0DAYsecurity.com OSCP-Survival-Guide.pdf SQLinjection Login Bypass Using SQL Injection Hacking website using SQL Injection -step by step guide – Ethical Hacking Tutorials | Learn How to Hack | Hacking Tricks | Penetration Testing Lab Vulnhub – Kioptrix: Level 1.2 (#3) – Guillermo Cura Enumeration Visualized Wiki Guides OSCP · Teck_k2 Offensive Security's Complete Guide to Alpha how-to-oscp-final.md Loot and Enumerate · Security - My notepad Offensive Security's PWB and OSCP - My Experience - Security SiftSecurity Sift Jack Hacks Interesting Local File Inclusion method | DiabloHorn ferreirasc/oscp: oscp study Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog Passing OSCP - scund00r BlackWinter Security | Code and Stuff Linux Privilege Escalation Linux Privilege Escalation by Exploiting Cronjobs Basic Linux Privilege Escalation Pentest Practice Links Penetration test lab "Test lab" | Pentestit CTF365 - Capture The Flag | Security Training Platform [PentesterLab] PentesterLab Pro Mainsequence - Exploit Exercises OverTheWire: Natas Level 0 Welcome [Root Me : Hacking and Information Security learning platform] Hack The Box :: Penetration Testing Labs Hack The Box :: Forums Vulnerable By Design ~ VulnHub PentesterAcademy Pentester Academy: Learn Pentesting Online AttackDefense Labs: Pentester Academy Bug Bounty HackerOne Hacker101 CTF Hacker101 | HackerOne Platform Documentation Synack Synack - Dashboard Synack Onboarding Learn to hack and collaborate with other security researchers on bug bounties | BugBountyNotes.com GitHub - jhaddix/tbhm: The Bug Hunters Methodology Tomnomnom Vim Tutorial - Knowledge Base Assetnote Wordlists Penetration Testing with Kali - Online Security Training Offensive Security Student Support Offensive Security - Purchase Page Offensive Security - Exam Scheduling Link Exploits Database by Offensive Security Offensive Security Forums Hack The Box :: Penetration Testing Labs Hack The Box :: Forums IppSec - YouTube Vulnerable By Design ~ VulnHub codingo/Reconnoitre: A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing. Scripts/Enumeration.py at master · MistSpark/Scripts · GitHub Pentesting Links Penetration test lab "Test lab" | Pentestit CTF365 - Capture The Flag | Security Training Platform [PentesterLab] PentesterLab Pro Mainsequence - Exploit Exercises OverTheWire: Natas Level 0 Welcome [Root Me : Hacking and Information Security learning platform] Pentester Academy: Learn Pentesting Online AttackDefense Labs: Pentester Academy Attify Store - Offensive IoT Exploitation | Attify Store Flex Center // Infosec Skills :: Home Reverse Engineering GREM IT and Information Security Cheat Sheets GIAC GREM Certification | Reverse Engineering Malware Cheat Sheet for Analyzing Malicious Software Reading The_Evolution_of_TDL.pdf Detecting DNS Tunneling Two's Complement VirusTotal Learn to Develop with Microsoft Developer Network | MSDN GitHub - ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. MalwareTech - Life of a Malware Analyst The “Ultimate”Anti-Debugging Reference DEF CON CHINA Reverse Engineering challenges ARM Writing ARM Assembly (Part 1) | Azeria Labs Hardware FCC OET Authorization Search IoT Firmware Exploitation Online Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World Intro to Hardware Hacking - Dumping your First Firmware IoT Hacking Tools | Attify Store Electronics – /dev/ttyS0 Extracting Flash Memory over SPI | GracefulSecurity NAND Flash Data Recovery Cookbook Centrifuge Platform® | Firmware Security Analysis | ReFirm Labs Binwalk Pro Network Protocols Reverse Engineering Network Protocols - Jack Hacks hasherezade (hasherezade) Hasherezade's projects SDR Hacking Signal Identification Wiki The Cryptopals Crypto Challenges ExploitDev Corelan ..:: Corelan Team | Peter Van Eeckhoutte (corelanc0d3r) ::.. Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode | Corelan Team Exploit writing tutorial part 3 : SEH Based Exploits | Corelan Team Exploit writing tutorial part 3b : SEH Based Exploits – just another example | Corelan Team Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics | Corelan Team Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development | Corelan Team Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR | Corelan Team Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc | Corelan Team Exploit writing tutorial part 8 : Win32 Egg Hunting | Corelan Team Exploit writing tutorial part 9 : Introduction to Win32 shellcoding | Corelan Team Reverse Engineering and Binary Exploitation Series | PWNTHEBOX! FuzzySecurity | Tutorials ARM Products GitHub - Billy-Ellis/Exploit-Challenges: A collection of vulnerable ARM binaries for practicing exploit development Writing ARM Assembly (Part 1) | Azeria Labs Search [Root Me : Hacking and Information Security learning platform] Corellium arm_exploitation/exploitation_on_arm_based_systems.pdf at master · sashs/arm_exploitation 15/85 Security ROP on ARM with radare2 Microsoft Word - ARM paperF.docx OSCE Offensive Security’s CTP & OSCE Review - Jack Hacks OSCE/CTP Prep Guide – Tulpa Security mona.py – the manual | Corelan Team Resources for OSCE CTP/OSCE Prep – Wrapping Up Our Prep - The Human Machine Interface h0mbre/CTP-OSCE: Scripts I used during CTP jtpereyda/boofuzz: A fork and successor of the Sulley Fuzzing Framework Study Guide & Tips: Offensive Security Certified Expert (OSCE) / Cracking The Perimeter (CTP) - Amin Bohio phra's blog ~ Technical posts about InfoSec abatchy's blog | OSCE Study Plan Upgrade from LFI to RCE via PHP Sessions - RCE Security Taking_Back_Netcat.pdf OSCE Review (CTP Course) - Everything S3curity The Human Machine Interface h0mbre/Learning-C: A series of mini-projects used to learn C for beginners metasploit-payloads/c/meterpreter/workspace at master · rapid7/metasploit-payloads Linux Exploitation xairy/linux-kernel-exploitation: A collection of links related to Linux kernel exploitation OSEE awe_syllabus_2018 OSEE - AWEstralia 2018 preparations | www.jollyfrogs.com timip/OSEE: OSEE Preparation Common WinDbg Commands (Thematically Grouped) Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit abatchy's blog | Tutorials IoT Hardware IoT Firmware Exploitation Online | Registration The best resources for learning exploit development – Fabio Baroni Backdooring PE Files with Shellcode - Red Teaming Experiments Windows Exploitation Ricerca Security: "I'll ask your body": SMBGhost… SMBleedingGhost Writeup: Chaining SMBleed (CVE-20… Windows Internals & Software Drivers – OSR What is this? - Red Teaming Experiments Qemu Installing Qemu for Windows [E-Maculation wiki] Qemu package and guide for Windows available • E-Maculation Forum Index of /lubuntu/releases/16.04/release Building PPC Linux code using QEMU on Ubuntu 18.04 LTS Debian Ports Qemu - Google Drive hugsy/cemu: Cheap EMUlator: lightweight multi-architecture assembly playground Microcontrollers and SDRs Nyan Sat - Satellite Communications Challenge - Chapter 0 GNURadio GNU Radio Tutorials - GNU Radio Embedded Programming FastBit Embedded Brain Academy | Works on Firmware and Embedded Engineering | Udemy WebSecAcademy Web Security Academy: Free Online Training from PortSwigger Sursa: https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
    1 point
  3. Awesome Security Feeds A semi-curated list of Security Feeds You can import the opml file to a service like Feedly Below a list of all the sites, feel free to suggest others! Must Read TorrentFreak Schneier on Security Darknet Troy Hunt's Blog Securelist Dan Kaminsky's Blog ZDNet | The Ed Bott Report RSS Daniel Miessler Infosec Reactions Malwarebytes Labs Security Research & Defense Have I Been Pwned latest breaches Malware Must Die! enigma0x3 SkullSecurity News – – WordPress.org Conferences & Video Paul's Security Weekly Defcon SecurityTube.Net media.ccc.de - NEWS Vimeo / Offensive Security’s videos Irongeek's Security Site Italiano dirittodellinformatica.it - Rivista telematica su diritto e tecnologia oneOpenSource Securityinfo.it D3Lab Trin Tragula 0x2A ICT Security Magazine Andrea Draghetti VoidSec Luca Mercatanti WebSecurity IT Over Security Zeus News - Olimpo Informatico Autistici Dark Space Blogspot Yoroi Warning Archive Feed Baty's Base F-Hack » Feed Arturo Di Corinto Il Disinformatico Cyber Division CyberDifesa.it cavallette TG Soft Software House - News Codice Insicuro, blog di Cyber Security, sviluppo sicuro, code review e altro. Cyber Security IT Service Management News TS-WAY Stories by theMiddle on Medium Fabio Natalucci Post LastKnight.com Feed PANOPTICON ESCAPE CyberIntelligence CyberCrime & Doing Time Cyber Strategies for a World at War Automating OSINT Blog bellingcat IntelTechniques Red Teaming - Red Teams Uncommon Sense Security JestersCourt Silendo Krypt3ia Security Intelligence and Big Data reddit Information Security Training Resources /r/netsec - Information Security News & Discussion Deep Web Reverse Engineering Blackhat Library Computer Forensics Your Hacking Tutorial by Zempirians RedTeam Security Social Engineering Information Security netsecstudents: Subreddit for students studying Network Security and its related subjects Blog Cybrary Joe's Security Blog Kevin Chung Randy Westergren evilsocket Webroot Blog shell-storm BugCrowd ZeroSec - Adventures In Information Security DigiNinja SkullSecurity l.avala.mp's place HighOn.Coffee Max Justicz Null Byte Krebs on Security BREAKDEV EFF ProtonMail Blog SANS Internet Storm Center, InfoCON: green NetSPI Blog 0x00sec - The Home of the Hacker - Monthly top topics Open Web Application Security Project Bromium 🔐Blog of Osanda Coding Horror Application Security Research, News, and Education Blog xorl %eax, %eax TaoSecurity Blog Updates from the Tor Project thinkst Thoughts... David Longenecker JestersCourt Technical phillips321.co.uk Add / Xor / Rol Intercept the planet! @Mediaservice.net Technical Blog AlienVault Labs Blog MalwareDomainList updates winscripting.blog PenTest Labs Brett Buerhaus Jack Hacks 0x27.me The Exploit Laboratory Linux Audit CERT Blogs Forcepoint markitzeroday.com Down the Security Rabbithole Blog - Supplemental Research Blogs Feed NotSoSecure CYBER ARMS Blog – LookingGlass Cyber Solutions Inc. Cofense anti-virus rants Hackw0rm.net Attack and Defense Labs AverageSecurityGuy Shodan Blog BalalaikaCr3w TrustedSec CyberWatch JUMPSEC | CREST Accredited Dave Waterson on Security Shell is Only the Beginning MDSec dotcppfile's Blog #_shellntel binary foray Blog HolisticInfoSec™ Secureworks Blog NETRESEC Network Security Blog The Honeynet Project blogs Pending Technical Errata Security Cylance Blog Red Hat Security Inspired-Sec Furoner.CAT 0xAA - Random notes on security Fzuckerman© HIPAA News, Web & Email Security Tips & News - Plus More | LuxSci Bromium Labs The Ethical Hacker Network Hacking and security The Grymoire Active questions tagged linux - Information Security Stack Exchange /dev/random 0x3a - Security Specialist and programmer by trade Security Research & Defense US-CERT Alerts Strategic Cyber LLC Rapid7 Blog VulnHub ~ Entries Shell is coming ... Lastline Blog Maltego MalwareTech Hacking Articles Microsoft Security Infosec Resources WhiteScope IO Security – Cisco Blogs Unmask Parasites. Blog. TheGeryCorner Imperva Cyber Security Blog Hanno's blog Checkmarx Active Directory Security StopBadware blogs Azeria Labs Pentestmag KernelPicnic Blog - Decent Security SpiderLabs Blog from Trustwave Mogozobo Stealing the Network 4sysops Rhino Security Labs Astr0baby's not so random thoughts _____ rand() % 100; Hakin9 – IT Security Magazine Blog TrendLabs Security Intelligence Blog Appsecco Penetration Testing contagio Security Through Education Blog – WhiteHat Security DEADCODE Javvad Malik Shell is Only the Beginning NetSPI Blog Eric Conrad Andrew Hay Milo2012's Security Blog #!/slash/note Securosis Complete Jump ESP, jump! SerHack – Security research on SerHack – Security researcher Carnal0wnage & Attack Research Blog www.crowdstrike.com/blog harmj0y US-CERT Current Activity Seculert Blog on Breach Detection damsky Black Hills Information Security Mosaic Security Research Sucuri Blog Security Art Work XyliBox Carnal0wnage & Attack Research Blog The Sakurity Blog thepcn3rd - Passion for Infosec | bohops | Real-time communications security on Communication Breakdown - real-time communications security blackMORE Ops Security and risk Qualys Security Blog Securelist Malware Analysis: The Final Frontier myexploit Martin Vigo Common Exploits – Penetration Testing Information RedTeams Corelan Team Cybersecurity Blog PC's Xcetra Support Nat McHugh AppSec-Labs | Application Security gynvael.coldwind//vx.log (en) Blaze's Security Blog Bill Demirkapi’s Blog Infosec Island Latest Articles SANS Institute Security Awareness Tip of the Day Threat Research Cybercrime Magazine Forensic Focus TaoSecurity Security Training Security Zap Wiremask's Feed ExposedBotnets Shell is Only the Beginning SecurityCurrent Posts By SpecterOps Team Members Cheesy Rumbles @D00m3dr4v3n enigma0x3 Posts on malicious.link Hacking Exposed Computer Forensics Blog Volatility Labs Team-Cymru Security Spread Security Basics Cisco Blog » Security Silent Signal Techblog Security on the edge Délimiteur de données sirdarckcat Aditya Agrawal TheHackerBlog Labs PortCullis Fox-IT International blog Lab of a Penetration Tester F-Secure Antivirus Research Weblog HackTips The Life of a Penetration Tester Virus Bulletin's blog Tenable Blog Didier Stevens Oddvar Moe's Blog Google Online Security Blog Sucuri Blog Darknet Yubico Sam Curry F-Secure Antivirus Research Weblog Thoughts on Security Tyranid's Lair Orange Cyberdefense Inspired-Sec Stories by Scott J Roberts on Medium Aditya Agrawal Fortinet Blog Tech Vomit LockBoxx Mozilla Security Blog Blog – NotSoSecure MSitPros Blog CERIAS Combined Feed The World of IT & Cyber Security: ehacking.net BlueKaizen Security Sift KahuSecurity Trend Micro Subliminal Hacking NVISO Labs HACKMAGEDDON Lenny Zeltser Security Christopher Truncer's Website A Few Thoughts on Cryptographic Engineering Project Zero w00tsec I CAN'T HACK IT …OR CAN I? ImperialViolet sploitF-U-N Netwrix Blog | Insights for Cybersecurity and IT Pros RefinePro Knowledge Base for OpenRefine khr@sh#: echo $GREETING Web Security Nibble Security Security Breached Blog Agarri : Sécurité informatique offensive Minded Security Blog Bug Bounty POC Telekom Security Random stuff by yappare Brett Buerhaus FoxGlove Security Noob Ninja! OpnSec WHITE HAT - WRITE UPS - RSS Security Thoughts Nikhil Mittal's Blog mert's blog the world. according to koto Patrik Fehrenbach PortSwigger Blog Hacking Distro BackBox Linux blogs Kali Linux WeakNet Labs DistroWatch.com: News Tails - News Security Tools ToolsWatch.org Network Security™ KitPloit - PenTest Tools! Security News Graham Cluley The Hacker News ThreatPost Security Affairs Trend Micro Simply Security The Register - Security Palo Alto Networks Blog Instapaper: Unread SANS Digital Forensics and Incident Response Blog Dark Reading Sursa: https://github.com/mrtouch93/awesome-security-feed
    1 point
×
×
  • Create New...