Forwarded from Computer & IT Engineering
Hadoop.Kharazmi-@Computer_IT_Engineering.pdf
4.5 MB
This info leak is a result of uninitialized stack variables that may be
returned to an attacker in their uninitialized state.
By manipulating the code flows that precede the handling of these
configuration messages, an attacker can also gain some control over which
data will be held in the uninitialized stack variables.
This can allow him to bypass KASLR, and stack canaries protection - as both
pointers and stack canaries may be leaked in this manner.
http://seclists.org/oss-sec/2017/q4/357
returned to an attacker in their uninitialized state.
By manipulating the code flows that precede the handling of these
configuration messages, an attacker can also gain some control over which
data will be held in the uninitialized stack variables.
This can allow him to bypass KASLR, and stack canaries protection - as both
pointers and stack canaries may be leaked in this manner.
http://seclists.org/oss-sec/2017/q4/357
seclists.org
oss-sec: Info Leak in the Linux Kernel via Bluetooth
This list is just an overview to give an idea of what libraries are available.
https://nmap.org/book/nse-library.html#nse-library-list
https://nmap.org/book/nse-library.html#nse-library-list
Forwarded from Defensive and Offensive Research (DOR) (Милад Кахсари Алхади)
Malwares composed by kernel drivers, which use the PsSetLegoNotifyRoutine() kernel callback to register a malicious routine for getting called during the thread termination.
https://t.me/doresearch
https://t.me/doresearch
Forwarded from انجمن علمی ژرفا
📕 #پیشنهاد_درس
آموزش مقدماتی پایتون برای علوم داده(Learn Python for Data Science )
⏱زمان تخمینی : 4 ساعت مداوم
🗣زبان انگلیسی
🌐 https://www.datacamp.com/courses/intro-to-python-for-data-science
🆔 @zharfa90
آموزش مقدماتی پایتون برای علوم داده(Learn Python for Data Science )
⏱زمان تخمینی : 4 ساعت مداوم
🗣زبان انگلیسی
🌐 https://www.datacamp.com/courses/intro-to-python-for-data-science
🆔 @zharfa90
Datacamp
Introduction to Python Course | DataCamp
Discover how to use Python for data science in this four-hour course. Learn how you can use Python to store and manipulate data before you move on to analysis.
Folks, Microsoft is officially considering providing Python support in Excel (finally). If you are interested in this, please visit their uservoice page and let them know what you think. Thank you!
https://excel.uservoice.com/forums/304921-excel-for-windows-desktop-application/suggestions/10549005-python-as-an-excel-scripting-language
https://excel.uservoice.com/forums/304921-excel-for-windows-desktop-application/suggestions/10549005-python-as-an-excel-scripting-language
Forwarded from زندگی سگی سگییی
مردم ایران میتوانند امروز در ساعت ۱۸:۰۷ دقیقه ایستگاه بین المللی فضایی را با چشم غیر مسلح در آسمان ببینند. #محیط_زیست
🆔 @csado60d
🆔 @csado60d
Forwarded from Advanced Programming ❤ (Crypt3r 0f h3ll)
Forwarded from Advanced Programming ❤ (Crypt3r 0f h3ll)
Udemy - blockchain-and-bitcoin-fundamentals 2.rar
740 MB
Forwarded from Advanced Programming ❤ (Crypt3r 0f h3ll)
Udemy - blockchain-and-bitcoin-fundamentals.rar
777.2 MB
Forwarded from Research(dck) (T V)
Python_Game_Development_Creating.rar
860 MB
Forwarded from Linuxgram 🐧
Fossbytes
Linux And Windows Machines Being Attacked By “Zealot” Campaign To Mine Cryptocurrency
Named Zealot Campaign, this malware campaign targets Linux and Windows machines on an internal network. The most noticeable property of Zealot is the use of NSA's EternalBlue and EternalSynergy exploits.
#eve #programming_future #tools_for_thinking #pmkary
اینو ببینین کیف کنین، یکی از اکسپریمنت های جدید ایوه:
https://www.youtube.com/watch?v=zenELksXotI&feature=youtu.be
اینو ببینین کیف کنین، یکی از اکسپریمنت های جدید ایوه:
https://www.youtube.com/watch?v=zenELksXotI&feature=youtu.be
YouTube
[Eve Prototype] Bouncing Balls II