SoNebuntu is a Linux distribution based on Ubuntu with pre installed tools for Social Network Analyzers.
SNA Tools:
Gephi
Cytoscape
MuxViz
SNAP
SocNetV
NetLogo
Visione
Crawler Tools:
Apache Nutch
Heritrix
Norconex
Open Search Server
Open Web Spider
Web Sphinx
https://sonebuntu.com/
SNA Tools:
Gephi
Cytoscape
MuxViz
SNAP
SocNetV
NetLogo
Visione
Crawler Tools:
Apache Nutch
Heritrix
Norconex
Open Search Server
Open Web Spider
Web Sphinx
https://sonebuntu.com/
Forwarded from cissp (Alireza Ghahrood)
https://t.me/cissp
International channel for Transmission Knowledge In the field of Cyber Security with a Focus on the Content of the CISSP-ISC2 course
+also group:
@cisspgroup
International channel for Transmission Knowledge In the field of Cyber Security with a Focus on the Content of the CISSP-ISC2 course
+also group:
@cisspgroup
Telegram
cissp
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
I Think this good question about the CISSP. The website everyday will update new question and free . Share the info to everyone.
https://wentzwu.com/2020/03/13/cissp-practice-questions-20200314/
https://wentzwu.com/2020/03/13/cissp-practice-questions-20200314/
Wentz Wu
CISSP PRACTICE QUESTIONS – 20200314 by Wentz Wu, ISSAP, ISSEP, ISSMP CISSP, CCSP, CSSLP, CGRC, SSCP, CC, CISM, CISA, CRISC, CGEIT…
Your company, with regional offices across the country, sells toys online and ships globally. As the WHO announced that COVID-19 goes pandemic, you are responsible for responding to this crisis and…
SANS
Securing Web Application Technologies (SWAT) Checklist
Poster AppSec
Secure DevOps Toolchain
https://www.sans.org/security-resources/posters/secure-devops-toolchain-swat-checklist/60/download
Securing Web Application Technologies (SWAT) Checklist
Poster AppSec
Secure DevOps Toolchain
https://www.sans.org/security-resources/posters/secure-devops-toolchain-swat-checklist/60/download
Network+ video courses: https://mega.nz/#F!e75VmKJT!8Kc8MzSWKrhqQE4oVhJooA
Security+ video Courses: https://mega.nz/#F!H3pH0ACB!OEtXp59qZIqMh7oQI5Gcdg
CySA+ Video Courses: https://mega.nz/#F!66pXSYTT!GjbQkKXxT3dIWx-w5a47LA
Android Pocketprep Premium apks: https://mega.nz/#F!ijxn1aKC!c-1ENzRpuXKInWwGdy8EGA
various books, course notes, practice exams: https://mega.nz/#F!HrRlAa4a!HN-LxlJ8fM-uPwSHGi5fGg
+ pentest android web - red team👍🏽
https://mega.nz/?fbclid=IwAR0zt050MN2t9T7LrQMuKKr1LUf_21qroTD4ObWIEJCni_mx6SeJGKTcjTY#F!vmICjAiL!2Kib1xFG07oj0Ugn7kq4mg!K3pzVSZA
Security+ video Courses: https://mega.nz/#F!H3pH0ACB!OEtXp59qZIqMh7oQI5Gcdg
CySA+ Video Courses: https://mega.nz/#F!66pXSYTT!GjbQkKXxT3dIWx-w5a47LA
Android Pocketprep Premium apks: https://mega.nz/#F!ijxn1aKC!c-1ENzRpuXKInWwGdy8EGA
various books, course notes, practice exams: https://mega.nz/#F!HrRlAa4a!HN-LxlJ8fM-uPwSHGi5fGg
+ pentest android web - red team👍🏽
https://mega.nz/?fbclid=IwAR0zt050MN2t9T7LrQMuKKr1LUf_21qroTD4ObWIEJCni_mx6SeJGKTcjTY#F!vmICjAiL!2Kib1xFG07oj0Ugn7kq4mg!K3pzVSZA
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
John the Ripper: Pen Testing Product Overview and Analysis:
John the Ripper is a fine tool for checking on password vulnerability. It should be viewed as more of a supplemental tool than a primary one in the penetration arsenal. As it combines several approaches to password cracking into one, it is well worth trying out.
Type of tool: Password cracker
Key Features: Passwords are a weak link in enterprise security. As requirements get stiffer for the number and type of characters, bad habits multiply such as post-it notes on screens, Word docs with passwords listed, retaining default passwords and other workarounds. That's why cybercriminals go after passwords so often. Once a hacker steals credentials, they can enter sensitive systems or wait in ambush to stage a devastating attack against a prized asset.
Penetration testing, therefore, pays close attention to password cracking. John the Ripper is a free, easy to use, open source tool that takes the best aspects of various password crackers and unites them into one package. As such it can be harnessed by pen testers to detect weak passwords and find a way into a system or database.
John the Ripper works by using the dictionary method favored by attackers as the easiest way to guess a password. It takes text string samples from a word list using common dictionary words. It can also deal with encrypted passwords, and address online and offline attacks.
Differentiator: It is a free tool that is easy to use and it is aimed squarely at password cracking.
What it can't do: Vulnerability analysis and test for other areas of penetration beyond passwords.
Cost: Free
John the Ripper is a fine tool for checking on password vulnerability. It should be viewed as more of a supplemental tool than a primary one in the penetration arsenal. As it combines several approaches to password cracking into one, it is well worth trying out.
Type of tool: Password cracker
Key Features: Passwords are a weak link in enterprise security. As requirements get stiffer for the number and type of characters, bad habits multiply such as post-it notes on screens, Word docs with passwords listed, retaining default passwords and other workarounds. That's why cybercriminals go after passwords so often. Once a hacker steals credentials, they can enter sensitive systems or wait in ambush to stage a devastating attack against a prized asset.
Penetration testing, therefore, pays close attention to password cracking. John the Ripper is a free, easy to use, open source tool that takes the best aspects of various password crackers and unites them into one package. As such it can be harnessed by pen testers to detect weak passwords and find a way into a system or database.
John the Ripper works by using the dictionary method favored by attackers as the easiest way to guess a password. It takes text string samples from a word list using common dictionary words. It can also deal with encrypted passwords, and address online and offline attacks.
Differentiator: It is a free tool that is easy to use and it is aimed squarely at password cracking.
What it can't do: Vulnerability analysis and test for other areas of penetration beyond passwords.
Cost: Free
PowerGREP
Windows grep Software to Search (and Replace) through Files and Folders on Your PC and Network
https://www.powergrep.com/
Windows grep Software to Search (and Replace) through Files and Folders on Your PC and Network
https://www.powergrep.com/
Powergrep
PowerGREP: Windows grep Software to Search (and Replace) through Files and Folders on Your PC and Network
Quickly search through large numbers of files on your PC or network using powerful text patterns to find exactly the information you want. Search and replace with plain text or regular expressions to maintain web sites, source code, reports, ...
Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code.
https://www.keycloak.org/about.html
https://www.keycloak.org/about.html