Cellebrite is a forensics company specialized in unlocking phones and extracting information.
Some time ago a whistleblower leaked their software and information.
These images show a list of phones they can unlock.
You can download the leak here:
https://ddosecrets.com/article/cellebrite-and-msab
Some time ago a whistleblower leaked their software and information.
These images show a list of phones they can unlock.
You can download the leak here:
https://ddosecrets.com/article/cellebrite-and-msab
I was about to comment on the current cyber-clusterfuck dearly provided by Crowdstrike, but I was too busy laughing with all the memes and people thinking it is a cyber attack when actually it is just potato coding.
Please open Telegram to view this post
VIEW IN TELEGRAM
β€3
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯12β€2
The Practice of Programming.pdf
5 MB
Includes stress testing, markov chain, strategies for speed, algorithms and data structures.
Please open Telegram to view this post
VIEW IN TELEGRAM
/archive/
waddya think? im thinking of showing the piano progress monthly or bimonthly
Media is too big
VIEW IN TELEGRAM
i didn't do my best this year... that was my progress though.
I will try harder in 2025 :)
I will try harder in 2025 :)
π₯5β€1
Reinforcement learning guide that carefully explains the intuition and implementation details behind every single fundamental algorithm in the field.
Written by naklecha
https://naklecha.notion.site/a-reinforcement-learning-guide
Written by naklecha
https://naklecha.notion.site/a-reinforcement-learning-guide
naklecha on Notion
a reinforcement learning guide | naklecha
a reinforcement learning guide that explains the fundamentals of rl from first principles
This website is already well known, but I will leave it here because it is a good source of knowledge.
https://teachyourselfcs.com/
https://teachyourselfcs.com/
Teachyourselfcs
Teach Yourself Computer Science
All the resources you need to give yourself a world class computer science education
Not even your piano is safe anymore: Remote Code Execution using the MIDI interface
https://psi3.ru/blog/swl01u/
https://psi3.ru/blog/swl01u/
psi3.ru
World's First MIDI Shellcode
Blog post about a reverse engineering project
π€―3π’1
Forwarded from vx-underground
As we've been exploring Discord cybersecurity servers here is what we've learned:
- Every Discord is the BEST server for {HACKER_THING}
- Every Discord does {THING} weekly
- Every Discord is noob friendly (as opposed to openly discriminating against uneducated people)
- Every Discord tagged "cybersecurity" will NOT discuss malware (it's illegal and for nerds)
- Highest displayed people must have weird font in their display names, making them difficult to read or impossible to tag
- Everyone is "extremely busy" but on Discord all day, everyday, nonstop, and providing updates on how extremely busy they are
- Everyone who is a "hacker" has a flashy and cool Discord profile (they paid $15.99 for it)
- Everyone is an OSINT expert
- Everyone is a programming expert
- Everyone is a Linux expert
- Everyone is an omnipotent being, capable of bending space and time
- Everyone is top 1% of HTB
- Every Discord is the BEST server for {HACKER_THING}
- Every Discord does {THING} weekly
- Every Discord is noob friendly (as opposed to openly discriminating against uneducated people)
- Every Discord tagged "cybersecurity" will NOT discuss malware (it's illegal and for nerds)
- Highest displayed people must have weird font in their display names, making them difficult to read or impossible to tag
- Everyone is "extremely busy" but on Discord all day, everyday, nonstop, and providing updates on how extremely busy they are
- Everyone who is a "hacker" has a flashy and cool Discord profile (they paid $15.99 for it)
- Everyone is an OSINT expert
- Everyone is a programming expert
- Everyone is a Linux expert
- Everyone is an omnipotent being, capable of bending space and time
- Everyone is top 1% of HTB
π₯4