Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 05/27/16 in all areas

  1. https://qph.is.quoracdn.net/main-qimg-da04a1356a3d88f305afe4e9c5e30cd3?convert_to_webp=true
    6 points
  2. @d3c0d3r: Posturile de cacat tind sa atraga comentarii inutile.
    4 points
  3. Daca tu te-ai fi aflat la celalalt capat al tranzactiei acum ai fi tipat pe aici ca din gura de sarpe ca ai fost tepuit si sa iti dam sfaturi cum sa nu ramai pagubit. Nu e vina cumparatorului ca nu primeste exact ce a comandat (dintr-un motiv sau altul) ci doar a ta. So.. ce ar fi daca ai sparge stereotipul roman de a da tepe si odata in viata iti asumi rensposabilitatea pentru faptele comise de tine? Faptul ca i-ai cheltuit deja e doar problema ta. Grow a fucking pair! Closed
    3 points
  4. Ba, de marimea asta de tricou n-am auzit pana acum. #VrajitorPePhotoshop #reclama (fac modele de tricouri in photoshop, gif-uri la comanda, dam jos primari ) #NoSHIT #Edit M-am documentat si chiar exista marimea asta. (#feelingprost)
    2 points
  5. In caz ca deschide caz, ebay-ul ii va da banii inapoi si ti-i va trage tie din PayPal. Daca nu ii ai pe PayPal vei ajunge cu balanta negativa si in final tot ii vei scoate din buzunar. Fa-i reducere omului si nu mai da tepe!
    2 points
  6. Wallet-ul oficial al Ethereum il descarci de pe site-ul oficial: https://ethereum.org/ Ai acolo tot ce vrei pe site. Te poti uita si pe github daca vrei documentii. https://github.com/ethereum/ Echipa din spatele proiectului e foarte buna si de incredere. E ceva legit 100%. Exista o comunitate pe slack unde sunt doar romani: http://ethromania.herokuapp.com/ Ethereum este mai mult decat o crypto-moneda. Este un sistem pe care poti scrie aplicatii si aceste aplicatii sa aiba in spate un sistem financiar bazat pe cryptocurencies, micropayments si tot ce iti poti imagina. Au un limbaj de programare cu care poti sa faci smart contracts, se numeste solidity si e la versiune 0.3 deocamdata daca nu ma insel. Aplicatiile create cu ethereum si care folosesc smart contracts se numesc DAPPS (distributed applications). Un exemplu care a luat mai mult elan din segmentul asta este: https://slock.it/ Cu Slock.it poti sa faci sisteme de incuietori care se deschid in momentul in care le platesti. Pentru mai multe DAPPS te poti uita aici: http://dapps.ethercasts.com/ Sunt super multe de discutat, se lucreaza la foarte multe proiecte si o sa fie ceva mare. La fel de mare ca si Bitcoin sau poate sa il si depaseasca odata cu Halvingul de la bitcoin din iulie. (Desii partea cu halvingul poate sa mearga in oricare directie, ori sa scada pretul dramatic ori sa explodeze intr-o crestere. - asta e totusi o alta discutie si e cam offtopic.) Orice intrebari ai in legatura cu ethereum, poti sa intri pe comunitatea de slack mentionata mai sus si sigur iti raspunde cineva.
    2 points
  7. If a user attempts to copy the text with keyboard shortcuts, i.e. ctrl+c or command+c, an 800ms timer gets set that will override the user's clipboard with malicious code. echo "not evil" Sursa : https://github.com/dxa4481/Pastejacking
    1 point
  8. [h=2]Awesome Penetration Testing[/h] A collection of awesome penetration testing resources, tools, books, confs, magazines and other shiny things Online Resources Penetration Testing Resources Shell Scripting Resources Linux Resources Shellcode development Social Engineering Resources Lock Picking Resources [*] Tools Penetration Testing Distributions Basic Penetration Testing Tools Vulnerability Scanners Network Tools Hex Editors Crackers Windows Utils DDoS Tools Social Engineering Tools Anonimity Tools Reverse Engineering Tools [*] Books Penetration Testing Books Hackers Handbook Series Network Analysis Books Reverse Engineering Books Malware Analysis Books Windows Books Social Engineering Books Lock Picking Books [*]Vulnerability Databases [*]Security Courses [*]Information Security Conferences [*]Information Security Magazines [*]Awesome Lists [*]Contribution [*]License [h=3][/h][h=3]Online Resources[/h] [h=4]Penetration Testing Resources[/h] Metasploit Unleashed - Free Offensive Security metasploit course PTES - Penetration Testing Execution Standard OWASP - Open Web Application Security Project OSSTMM - Open Source Security Testing Methodology Manual [h=4]Shell Scripting Resources[/h] LSST - Linux Shell Scripting Tutorial [h=4]Linux resources[/h] Kernelnewbies - A community of aspiring Linux kernel developers who work to improve their Kernels [h=4][/h][h=4]Shellcode development[/h] Shellcode Tutorials - Tutorials on how to write shellcode Shellcode examples - Shellcodes database [h=4][/h][h=4]Social Engineering Resources[/h] Social Engineering Framework - An information resource for social engineers [h=4][/h][h=4]Lock Picking Resources[/h] Schuyler Towne channel - Lockpicking videos and security talks [h=3][/h][h=3]Tools[/h] [h=4][/h][h=4]Penetration Testing Distributions[/h] Kali - A Linux distribution designed for digital forensics and penetration testing NST - Network Security Toolkit distribution Pentoo - security-focused livecd based on Gentoo BackBox - Ubuntu-based distribution for penetration tests and security assessments [h=4]Basic Penetration Testing Tools[/h] Metasploit - World's most used penetration testing software Burp - An integrated platform for performing security testing of web applications [h=4]Vulnerability Scanners[/h] Netsparker - Web Application Security Scanner Nexpose - Vulnerability Management & Risk Management Software Nessus - Vulnerability, configuration, and compliance assessment Nikto - Web application vulnerability scanner OpenVAS - Open Source vulnerability scanner and manager OWASP Zed Attack Proxy - Penetration testing tool for web applications w3af - Web application attack and audit framework Wapiti - Web application vulnerability scanner [h=4][/h][h=4]Networks Tools[/h] nmap - Free Security Scanner For Network Exploration & Security Audits tcpdump/libpcap - A common packet analyzer that runs under the command line Wireshark - A network protocol analyzer for Unix and Windows Network Tools - Different network tools: ping, lookup, whois, etc netsniff-ng - A Swiss army knife for for network sniffing Intercepter-NG - a multifunctional network toolkit [h=4]SSL Analysis Tools[/h] SSLyze - SSL configuration scanner [h=4]Hex Editors[/h] HexEdit.js - Browser-based hex editing [h=4]Crackers[/h] John the Ripper - Fast password cracker Online MD5 cracker - Online MD5 hash Cracker [h=4]Windows Utils[/h] Sysinternals Suite - The Sysinternals Troubleshooting Utilities Windows Credentials Editor - security tool to list logon sessions and add, change, list and delete associated credentials [h=4]DDoS Tools[/h] LOIC - An open source network stress tool for Windows JS LOIC - JavaScript in-browser version of LOIC [h=4]Social Engineering Tools[/h] SET - The Social-Engineer Toolkit from TrustedSec [h=4]Anonimity Tools[/h] Tor - The free software for enabling onion routing online anonymity I2P - The Invisible Internet Project [h=4]Reverse Engineering Tools[/h] IDA Pro - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger WDK/WinDbg - Windows Driver Kit and WinDbg OllyDbg - An x86 debugger that emphasizes binary code analysis [h=3]Books[/h] [h=4]Penetration Testing Books[/h] The Art of Exploitation by Jon Erickson, 2008 Metasploit: The Penetration Tester's Guide by David Kennedy and others, 2011 Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014 Rtfm: Red Team Field Manual by Ben Clark, 2014 The Hacker Playbook by Peter Kim, 2014 The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013 Professional Penetration Testing by Thomas Wilhelm, 2013 Advanced Penetration Testing for Highly-Secured Environments by Lee Allen,2012 Violent Python by TJ O'Connor, 2012 Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton, Adam Greene, Pedram Amini, 2007 [h=4]Hackers Handbook Series[/h] The Shellcoders Handbook by Chris Anley and others, 2007 The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011 iOS Hackers Handbook by Charlie Miller and others, 2012 Android Hackers Handbook by Joshua J. Drake and others, 2014 The Browser Hackers Handbook by Wade Alcorn and others, 2014 [h=4]Network Analysis Books[/h] Nmap Network Scanning by Gordon Fyodor Lyon, 2009 Practical Packet Analysis by Chris Sanders, 2011 Wireshark Network Analysis by by Laura Chappell, Gerald Combs, 2012 [h=4]Reverse Engineering Books[/h] Reverse Engineering for Beginners by Dennis Yurichev (free!) The IDA Pro Book by Chris Eagle, 2011 Practical Reverse Engineering by Bruce Dang and others, 2014 Reverse Engineering for Beginners [h=4]Malware Analysis Books[/h] Practical Malware Analysis by Michael Sikorski, Andrew Honig, 2012 The Art of Memory Forensics by Michael Hale Ligh and others, 2014 [h=4]Windows Books[/h] Windows Internals by Mark Russinovich, David Solomon, Alex Ionescu [h=4]Social Engineering Books[/h] The Art of Deception by Kevin D. Mitnick, William L. Simon, 2002 The Art of Intrusion by Kevin D. Mitnick, William L. Simon, 2005 Ghost in the Wires by Kevin D. Mitnick, William L. Simon, 2011 No Tech Hacking by Johnny Long, Jack Wiles, 2008 Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010 Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014 [h=4][/h][h=4]Lock Picking Books[/h] Practical Lock Picking by Deviant Ollam, 2012 Keys to the Kingdom by Deviant Ollam, 2012 [h=3]Vulnerability Databases[/h] NVD - US National Vulnerability Database CERT - US Computer Emergency Readiness Team OSVDB - Open Sourced Vulnerability Database Bugtraq - Symantec SecurityFocus Exploit-DB - Offensive Security Exploit Database Fulldisclosure - Full Disclosure Mailing List MS Bulletin - Microsoft Security Bulletin MS Advisory - Microsoft Security Advisories Inj3ct0r - Inj3ct0r Exploit Database Packet Storm - Packet Storm Global Security Resource SecuriTeam - Securiteam Vulnerability Information CXSecurity - CSSecurity Bugtraq List Vulnerability Laboratory - Vulnerability Research Laboratory ZDI - Zero Day Initiative [h=3][/h][h=3]Security Courses[/h] Offensive Security Training - Training from BackTrack/Kali developers SANS Security Training - Computer Security Training & Certification Open Security Training - Training material for computer security classes CTF Field Guide - everything you need to win your next CTF competition [h=3]Information Security Conferences[/h] DEF CON - An annual hacker convention in Las Vegas Black Hat - An annual security conference in Las Vegas BSides - A framework for organising and holding security conferences CCC - An annual meeting of the international hacker scene in Germany DerbyCon - An annual hacker conference based in Louisville PhreakNIC - A technology conference held annually in middle Tennessee ShmooCon - An annual US east coast hacker convention CarolinaCon - An infosec conference, held annually in North Carolina HOPE - A conference series sponsored by the hacker magazine 2600 SummerCon - One of the oldest hacker conventions, held during Summer Hack.lu - An annual conference held in Luxembourg HITB - Deep-knowledge security conference held in Malaysia and The Netherlands Troopers - Annual international IT Security event with workshops held in Heidelberg, Germany Hack3rCon - An annual US hacker conference ThotCon - An annual US hacker conference held in Chicago LayerOne - An annual US security conerence held every spring in Los Angeles DeepSec - Security Conference in Vienna, Austria SkyDogCon - A technology conference in Nashville [h=3][/h][h=3]Information Security Magazines[/h] 2600: The Hacker Quarterly - An American publication about technology and computer "underground" Hakin9 - A Polish online, weekly publication on IT Security [h=3]Awesome Lists[/h] SecTools - Top 125 Network Security Tools C/C++ Programming - One of the main language for open source security tools .NET Programming - A software framework for Microsoft Windows platform development Shell Scripting - Command-line frameworks, toolkits, guides and gizmos Ruby Programming by @SiNdresorhus - JavaScript in command-line Node.js Programming by @vndmtrx - JavaScript in command-line Python tools for penetration testers - Lots of pentesting tools are written in Python Python Programming by @svaksha - General Python programming Python Programming by @vinta - General Python programming Andorid Security - A collection of android security related resources Awesome Awesomness - The List of the Lists [h=3][/h][h=3]Contribution[/h] Your contributions and suggestions are heartily? welcome. (????) [h=3][/h][h=3]License[/h] This work is licensed under a Creative Commons Attribution 4.0 International License Sursa: https://github.com/enaqx/awesome-pentest
    1 point
  9. Sunt cazuri in care nu poti verifica totul manual: nu ai timp suficient, aplicatia e prea mare, nu iti trebuie decat un singur punct de intrare, etc. Cele mai bune rezultate pe web le-am avut cu Burp Suite Pro si Netsparker. Mai exista si alternative, destul de multe, poti consulta o lista aici: https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
    1 point
  10. Mr. Looquer MrLooquers is an IPv6 Intelligence search engine. It supports full-text searches (see Doc). Demo Doc Python API for Mrlooquer.com Happy harvesting!
    1 point
  11. Ce legatura are rugina cu transportul ? Iar ce legatura are Limba ROmana cu alta tara , nu esti singurul ce-o uite pe aeroport . Scade din pret si ai rezolvat problema , data viitoare nu mai mintii cumparatorul .
    1 point
  12. Incearca la terminalele Qiwi sa vezi daca accepta asa ceva insa nu sunt sigur, nu le-am folosit. Tine cont de urmatoarele: - Majoritatea operatorilor de telefonie iti vor limita platile prin sms din motive de securitate pentru ca e foarte usor sa trimiti sms de pe un telefon care nu iti apartine si apoi sa le umfle factura altora. De exemplu nu stiu daca vreun operator te va lasa sa efectuezi mai mult de 20eur / tranzactie si daca faci mai multe in mod repetat (de pe abonament) e posibil sa te limiteze. - Operatorul isi asuma un anumit risc pentru ca in caz de frauda, bitcoinul e de nerecuperat si daca e dat si prin mixer nici nu-i mai da de urma. - Comisioanele de procesare a platilor prin sms sunt uriase pentru ca operatorii de telefonie mobila sunt fomisti. Nu stiu cat de rentabil e sa faci astfel de tranzactii. Mai de mult vroiam sa introduc plati prin sms pentru o chestie si in Ro gasisem cel mai ieftin cu comision de 40%
    1 point
  13. ,,,cele "doua bucati de tabla" asigura o mai buna adaptare de impedanta cit si o marire a benzii de frecventa ...!!!
    1 point
  14. 2.4GHz 9dBi Indoor Omni-directional Antenna ,,,pentru ce te intereseaza pe tine cred ca cel mai potrivit ar fi asta...https://apollo.open-resource.org/mission:log:2012:08:02:active-wideband-receiver-antenna-for-sdr
    1 point
  15. XXS e vreo vulnerabilitate noua sau ce?? sqli gasesti manual
    -1 points
  16. Nici o legatura.. dar poate lam trimis fara rugina si a ruginit in 2 saptamani pe avion lol -.-. banii iam cheltuit...
    -2 points
  17. abtinete de la comentari inutile !
    -3 points
×
×
  • Create New...