Forwarded from UNDERCODE NEWS
In Europe, Samsung is entering the 5G race to overtake Huawei, but consumers have big reservations
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
To try live streaming, Walmart partnered up with TikTok, recommending fashion designer items.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended free Threat intelligence and IOC resources
* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.
* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.
* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.
* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended free Threat intelligence and IOC resources
* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.
* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.
* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.
* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mandiant/iocs: FireEye Publicly Shared Indicators of Compromise (IOCs)
FireEye Publicly Shared Indicators of Compromise (IOCs) - GitHub - mandiant/iocs: FireEye Publicly Shared Indicators of Compromise (IOCs)
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Git tips:
The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.
info contains a global exclusion file, which can be ignored by the configuration file
logs save log information
The objects directory stores all data content, and the local version repository is placed
The refs directory stores a pointer (branch) to the commit object of the data
The config file contains project-specific configuration options
description is used to display the description of the warehouse
The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*
Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse
Warehouse area (code storage area): representative code enters local version control
β β β Uππ»βΊπ«Δπ¬πβ β β β
Git tips:
The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.
info contains a global exclusion file, which can be ignored by the configuration file
logs save log information
The objects directory stores all data content, and the local version repository is placed
The refs directory stores a pointer (branch) to the commit object of the data
The config file contains project-specific configuration options
description is used to display the description of the warehouse
The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*
Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse
Warehouse area (code storage area): representative code enters local version control
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
wpa2 wifi hacking :
1)pkg update && pkg upgrade
2)pkg install bash
3) pkg install git
4) git clone https://github.com/Anonymous3-SIT/wifi-hacker
5) cd wifi-hacker
6)ls
7) bash wifi-hacker.sh
8) choose otption
β β β Uππ»βΊπ«Δπ¬πβ β β β
1)pkg update && pkg upgrade
2)pkg install bash
3) pkg install git
4) git clone https://github.com/Anonymous3-SIT/wifi-hacker
5) cd wifi-hacker
6)ls
7) bash wifi-hacker.sh
8) choose otption
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT FOR BEGINERS REFERENCES :
https://blog.eccouncil.org/what-is-metasploit-and-how-is-it-used-in-penetration-testing/
https://www.youtube.com/watch?v=8lR27r8Y_ik
https://josephdelgadillo.com/complete-metasploit-system-hacking-tutorial/
https://hub.packtpub.com/pentest-tool-in-focus-metasploit/
https://www.researchgate.net/publication/327572223_Metasploit_Penetration_Testing_Cookbook_-_Third_Edition
https://linuxsecurityblog.com/2018/11/12/payload-in-pdf/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦METASPLOIT FOR BEGINERS REFERENCES :
https://blog.eccouncil.org/what-is-metasploit-and-how-is-it-used-in-penetration-testing/
https://www.youtube.com/watch?v=8lR27r8Y_ik
https://josephdelgadillo.com/complete-metasploit-system-hacking-tutorial/
https://hub.packtpub.com/pentest-tool-in-focus-metasploit/
https://www.researchgate.net/publication/327572223_Metasploit_Penetration_Testing_Cookbook_-_Third_Edition
https://linuxsecurityblog.com/2018/11/12/payload-in-pdf/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Cybersecurity Exchange
Cybersecurity Exchange | Cybersecurity Courses, Training & Certification | EC-Council
Gain exclusive access to cybersecurity news, articles, press releases, research, surveys, expert insights and all other things related to information security.
Forwarded from UNDERCODE NEWS
The most strong cell phone flagship characteristics are revealed: turn alive, smart mute, take a snapshot to test the skin...
#Technologies
#Technologies