intelligence officers names.xlsx
5.9 KB
latest names of officers, in combination of other files about intelligence, you can find where they are stationed. their phone numbers in asiaCell and ZainTelecom and so on.
World Password Day was created to emphasize the importance of safe password habits, an ever-increasing need.
Today is the ninth World Password Day, so take the time to be safer online with these tips:
✔️ Use two-factor authentication
✔️ Avoid reusing passwords
✔️ Avoid common passwords
✔️ Protect your password list
✔️ Use a mix of lower case and upper-case letters, numbers and at least one special character in your password
✔️ Change your passwords frequently
✔️ Use passphrases instead of passwords
✔️ Don’t mix the business email account with personal
✔️ Use a VPN when using public Wi-Fi to avoid interception
✔️ Update your antivirus
Today is the ninth World Password Day, so take the time to be safer online with these tips:
✔️ Use two-factor authentication
✔️ Avoid reusing passwords
✔️ Avoid common passwords
✔️ Protect your password list
✔️ Use a mix of lower case and upper-case letters, numbers and at least one special character in your password
✔️ Change your passwords frequently
✔️ Use passphrases instead of passwords
✔️ Don’t mix the business email account with personal
✔️ Use a VPN when using public Wi-Fi to avoid interception
✔️ Update your antivirus
#Offensive_security
PPID Spoofing & BlockDLLs with NtCreateUserProcess
https://offensivedefence.co.uk/posts/ntcreateuserprocess
PPID Spoofing & BlockDLLs with NtCreateUserProcess
https://offensivedefence.co.uk/posts/ntcreateuserprocess
offensivedefence.co.uk
PPID Spoofing & BlockDLLs with NtCreateUserProcess
This week, Capt. Meelo released a great blog post on how to call the NtCreateUserProcess API as a substitue for the typical Win32 CreateProcess API. This post will build upon Meelo’s, so I highly encourage you to read it first.
TL;DR, this code (not counting…
TL;DR, this code (not counting…
#Threat_Research
Set of EVTX samples mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases
https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack
Set of EVTX samples mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases
https://github.com/mdecrevoisier/EVTX-to-MITRE-Attack
GitHub
GitHub - mdecrevoisier/EVTX-to-MITRE-Attack: Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure…
Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases. - mdecrevoisier/EVTX-to-MITRE-Attack
Media is too big
VIEW IN TELEGRAM
1.3 Using Burp Suite Repeater To Discover Vulnerabilities
Media is too big
VIEW IN TELEGRAM
1.4 Analysing JavaScript with Burp to Discover an Open Redirect Vulnerability
Media is too big
VIEW IN TELEGRAM
1.5 Analysing JavaScript with Burp to Discover an XSS Vulnerability
Media is too big
VIEW IN TELEGRAM
1.6 Discovering a HTML Injection Vulnerability.mp4
Media is too big
VIEW IN TELEGRAM
1.7 Discovering a More Advanced XSS Vulnerability.mp4
Media is too big
VIEW IN TELEGRAM
1.8 Discovering an Information Disclosure.mp4
Media is too big
VIEW IN TELEGRAM
1.9 Using FerboxBuseter to Discover Endpoints.mp4
NEW SECTION
NEW SECTION
Media is too big
VIEW IN TELEGRAM
2.1 XXE Basics + Exploiting a basic XXE vulnerability.mp4