/archive/
deny_shodan.py
Script I created to deny every IP from shodan.io of scanning your VPS.
How to Hack Like a Legend.pdf
6.7 MB
Despite the edgy title, this book contains good information
“Know your enemy, know his sword.” wrote Miyamoto Musashi in his book, A Book of Five Rings: The Classic Guide to Strategy. He also wrote, “You win battles by knowing the enemy’s timing, and using a timing which the enemy does not expect.” Although this was written when swords and spears won battles, it also applies to cyberspace, where attacks are launched via keyboards and crafted packets. The more you know about your target’s infrastructure and personnel, the better you can orchestrate your attacks.
👏1
Forwarded from Android Security & Malware
Telegram: How a messenger turned into a cybercrime ecosystem by 2023
https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf
https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf
😘2🕊1
Forwarded from Android Security & Malware
Resource for Android static analysis and vulnerability assessment
Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications
https://github.com/krizzsk/HackersCave4StaticAndroidSec
Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications
https://github.com/krizzsk/HackersCave4StaticAndroidSec
GitHub
GitHub - krizzsk/HackersCave4StaticAndroidSec: A comprehensive resource for Android static analysis and vulnerability assessment.…
A comprehensive resource for Android static analysis and vulnerability assessment. Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications. -...
Forwarded from vx-underground
GoDaddy has stated an unknown Threat Actor has maintained persistent access to their network since at least 2019. The Threat Actor unveiled themselves 4 times, without losing access, in 2019, 2020, 2021, and 2022
Intel via Gi7w0rm
More information: https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/
Intel via Gi7w0rm
More information: https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/
BleepingComputer
GoDaddy: Hackers stole source code, installed malware in multi-year breach
Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack.
👍1
While researching mobile vendor security, Oversecured found over 130 vulnerabilities in Samsung and ranked top 1 for 2022!
Now I'm describing all the vulnerabilities, and this will be the biggest mobile security article you've ever seen!
https://twitter.com/_bagipro/status/1628032053412519936
Now I'm describing all the vulnerabilities, and this will be the biggest mobile security article you've ever seen!
https://twitter.com/_bagipro/status/1628032053412519936
Twitter
While researching mobile vendor security, Oversecured found over 130 vulnerabilities in Samsung and ranked top 1 for 2022!
Now I'm describing all the vulnerabilities, and this will be the biggest mobile security article you've ever seen!
Now I'm describing all the vulnerabilities, and this will be the biggest mobile security article you've ever seen!
Forwarded from vx-underground
OpenAI performed a great deal of research and risk assessment on GPT-4 prior to it going public. OpenAI has restricted some of its responses based on the tasks performed. See attached images for examples released by OpenAI.
It is very bad.
Information via lukOlejnik
It is very bad.
Information via lukOlejnik
The most important and most difficult thing in any situation is not the search for the right answer but the search for the right question.