هاست مخصوص توسعهدهندگان
هاستهای مدرن با قابلیت ssh به هاست و دسترسی به نصبکننده لینوکس و نصب نیازمندیها توسط کاربر
https://www.haio.ir/
هاستهای مدرن با قابلیت ssh به هاست و دسترسی به نصبکننده لینوکس و نصب نیازمندیها توسط کاربر
https://www.haio.ir/
Forwarded from CodeBaz.dev (محمدرضا)
خییییییلی هم از دوستمون که این مطلبو فرستادن سپاس گزاریم و هم از نویسنده که به رایگان در اختیار گذاشته - با خیال راحت استفاده کنید
🆔 @ProgrammersFun
🆔 @ProgrammersFun
The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.
Although the keylogger component is disabled by default, hackers can make use of available open source tools for bypassing User Account Control (UAC) to enable built-in keylogger "by setting a registry value."
https://thehackernews.com/2017/12/hp-laptop-keylogger.html?m=1
Although the keylogger component is disabled by default, hackers can make use of available open source tools for bypassing User Account Control (UAC) to enable built-in keylogger "by setting a registry value."
https://thehackernews.com/2017/12/hp-laptop-keylogger.html?m=1
Forwarded from Tech C**P (Alireza Hos.)
Commit part of a file in git:You can use
git add --patch <filename> (or -p for short), and git will begin to break down your file into what it thinks are sensible hunks (portions of the file). It will then prompt you with this question:Stage this hunk [y,n,q,a,d,/,j,J,g,s,e,?]?
Here is a description of each option:
y stage this hunk for the next commitn do not stage this hunk for the next commitq quit; do not stage this hunk or any of the remaining hunksa stage this hunk and all later hunks in the filed do not stage this hunk or any of the later hunks in the fileg select a hunk to go to/ search for a hunk matching the given regexj leave this hunk undecided, see next undecided hunkJ leave this hunk undecided, see next hunkk leave this hunk undecided, see previous undecided hunkK leave this hunk undecided, see previous hunks split the current hunk into smaller hunkse manually edit the current hunk#git #patch #commit #hunk #stage #git_add #git_add_patch
Forwarded from از نگاه احسان
adminCounter.py
1.8 KB
Forwarded from از نگاه احسان
برای ساخت این ربات از python-telegram-bot و BeautifulSoup استفاده شده. آموزش BeautifulSoupرو می تونید توی دوره پایتون برای تست نفوذ پیدا کنید:
https://goo.gl/X9Ho4O
#python_for_pentesting
https://goo.gl/X9Ho4O
#python_for_pentesting
مقدمه ای بر ساخت API با فریمورک hapi.js
https://roocket.ir/articles/introduction-to-build-an-api-with-hapijs-framework
https://roocket.ir/articles/introduction-to-build-an-api-with-hapijs-framework
مجله آموزشی راکت
مقدمه ای بر ساخت API با فریمورک hapi.js
در این آموزش قصد داریم علاوه بر شرح مقدمه ای در باب فریمورک hapi.js که بر پایه ی Node.js هست, یک پروژه ساده API هم بسازیم و شما میتونید از طریق این لیک به پروژه دسترسی داشته باشید.
Forwarded from DLeX: AI Python (Mohammad Saeedi)
https://interestingengineering.com/brain-controlled-prosthetics-are-progressing-faster-than-we-could-imagine پیشرفت پروتزهای قابل کاشت بی سی آی در بدن، رشد سریع فناوری رابطهای مغز و کامپیوتر طی سالهای گذشته و نزدیک شدن این فناوری به بازار است بهطوری که رابطهای قابل کاشت در بدن رشدی بسیار بیشتر از آنچه که پیش از این تصور میشد، داشتهاند
Interesting Engineering
Brain-Controlled Prosthetics Are Progressing Faster Than We Could Imagine
The march towards progress in the field of neural prosthetics is truly impressive, as reflected by the impressive depth and variety of studies presented at Neuroscience 2017.
Forwarded from Computer & IT Engineering
Forwarded from Computer & IT Engineering
Hadoop.Kharazmi-@Computer_IT_Engineering.pdf
4.5 MB
This info leak is a result of uninitialized stack variables that may be
returned to an attacker in their uninitialized state.
By manipulating the code flows that precede the handling of these
configuration messages, an attacker can also gain some control over which
data will be held in the uninitialized stack variables.
This can allow him to bypass KASLR, and stack canaries protection - as both
pointers and stack canaries may be leaked in this manner.
http://seclists.org/oss-sec/2017/q4/357
returned to an attacker in their uninitialized state.
By manipulating the code flows that precede the handling of these
configuration messages, an attacker can also gain some control over which
data will be held in the uninitialized stack variables.
This can allow him to bypass KASLR, and stack canaries protection - as both
pointers and stack canaries may be leaked in this manner.
http://seclists.org/oss-sec/2017/q4/357
seclists.org
oss-sec: Info Leak in the Linux Kernel via Bluetooth
This list is just an overview to give an idea of what libraries are available.
https://nmap.org/book/nse-library.html#nse-library-list
https://nmap.org/book/nse-library.html#nse-library-list
Forwarded from Defensive and Offensive Research (DOR) (Милад Кахсари Алхади)
Malwares composed by kernel drivers, which use the PsSetLegoNotifyRoutine() kernel callback to register a malicious routine for getting called during the thread termination.
https://t.me/doresearch
https://t.me/doresearch