LinkPlace
152 subscribers
262 photos
32 videos
103 files
3.43K links
يه جایی که
لينكایی كه به نظرمون باحاله رو به اشتراک ميذاريم؛ از پروگرمينگ تا نجوم و ...! بقيه هم استفاده كنن و منبع های بیشتری در اختیارشون قرار بگیره

a place for sharing our researchs links to use them again and for others to have with more sources
Download Telegram
هاست مخصوص توسعه‌دهندگان
هاستهای مدرن با قابلیت ssh به هاست و دسترسی به نصب‌کننده لینوکس و نصب نیازمندیها توسط کاربر

https://www.haio.ir/
Forwarded from CodeBaz.dev (محمدرضا)
خییییییلی هم از دوستمون که این مطلبو فرستادن سپاس گزاریم و هم از نویسنده که به رایگان در اختیار گذاشته - با خیال راحت استفاده کنید
🆔 @ProgrammersFun
PyNUM.pdf
2.1 MB
The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.

Although the keylogger component is disabled by default, hackers can make use of available open source tools for bypassing User Account Control (UAC) to enable built-in keylogger "by setting a registry value."

https://thehackernews.com/2017/12/hp-laptop-keylogger.html?m=1
Open source workshops that teach web software skills.

https://nodeschool.io
Forwarded from Tech C**P (Alireza Hos.)
Commit part of a file in git:

You can use git add --patch <filename> (or -p for short), and git will begin to break down your file into what it thinks are sensible hunks (portions of the file). It will then prompt you with this question:
Stage this hunk [y,n,q,a,d,/,j,J,g,s,e,?]?

Here is a description of each option:
y stage this hunk for the next commit
n do not stage this hunk for the next commit
q quit; do not stage this hunk or any of the remaining hunks
a stage this hunk and all later hunks in the file
d do not stage this hunk or any of the later hunks in the file
g select a hunk to go to
/ search for a hunk matching the given regex
j leave this hunk undecided, see next undecided hunk
J leave this hunk undecided, see next hunk
k leave this hunk undecided, see previous undecided hunk
K leave this hunk undecided, see previous hunk
s split the current hunk into smaller hunks
e manually edit the current hunk

#git #patch #commit #hunk #stage #git_add #git_add_patch
Forwarded from از نگاه احسان
adminCounter.py
1.8 KB
😯 سورس کد ربات @admyab_bot که دیشب تلگرام باگ رو پچ کرد.
@PentesterSchool
Forwarded from از نگاه احسان
برای ساخت این ربات از python-telegram-bot و BeautifulSoup استفاده شده. آموزش BeautifulSoup‌رو می تونید توی دوره پایتون برای تست نفوذ پیدا کنید:
https://goo.gl/X9Ho4O
#python_for_pentesting
Forwarded from DLeX: AI Python (Mohammad Saeedi)
https://interestingengineering.com/brain-controlled-prosthetics-are-progressing-faster-than-we-could-imagine پیشرفت پروتزهای قابل کاشت بی سی آی در بدن، رشد سریع فناوری رابط‌های مغز و کامپیوتر طی سال‌های گذشته و نزدیک شدن این فناوری به بازار است به‌طوری که رابط‌های قابل کاشت در بدن رشدی بسیار بیشتر از آنچه که پیش از این تصور می‌شد، داشته‌اند
اسلایدهای آموزشی هادوپ Hadoop (انگلیسی) 78 اسلاید، دکتر مهدی حبیب زاده، دانشگاه خارزمی
#اسلاید #ارائه #بیگ_دیتا #هادوپ
#Slides #Hadoop #HDFS #MapReduce #Yarn #Spark
@Computer_IT_Engineering
Hadoop.Kharazmi-@Computer_IT_Engineering.pdf
4.5 MB
اسلایدهای آموزشی هادوپ Hadoop (انگلیسی) 78 اسلاید، دکتر مهدی حبیب زاده، دانشگاه خارزمی
#اسلاید #ارائه #بیگ_دیتا #هادوپ
#Slides #Hadoop #HDFS #MapReduce #Yarn #Spark
@Computer_IT_Engineering
This info leak is a result of uninitialized stack variables that may be
returned to an attacker in their uninitialized state.
By manipulating the code flows that precede the handling of these
configuration messages, an attacker can also gain some control over which
data will be held in the uninitialized stack variables.

This can allow him to bypass KASLR, and stack canaries protection - as both
pointers and stack canaries may be leaked in this manner.

http://seclists.org/oss-sec/2017/q4/357
This list is just an overview to give an idea of what libraries are available.

https://nmap.org/book/nse-library.html#nse-library-list
Forwarded from Defensive and Offensive Research (DOR) (Милад Кахсари Алхади)
Malwares composed by kernel drivers, which use the PsSetLegoNotifyRoutine() kernel callback to register a malicious routine for getting called during the thread termination.

https://t.me/doresearch