π° WintellectNow Reverse Engineering π°
βοΈ If you blow the stack in a native C++ application or crash with a memory corruption, thereβs no telling where you will end up. In the previous section titled "Mastering Assembly Language," you learned how to read that sea of assembly language, and in this section, youβll put that knowledge to use. You'll learn about The Visual Studio Disassembly window, how to look up the parameters to functions and methods, how to walk the stack manually, and much more.
Password: bitdownload.ir
Source:- https://www.wintellectnow.com/Videos/Watch?videoId=reverse-engineering
Download:- https://bit.ly/3fUGfoQ
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
βοΈ If you blow the stack in a native C++ application or crash with a memory corruption, thereβs no telling where you will end up. In the previous section titled "Mastering Assembly Language," you learned how to read that sea of assembly language, and in this section, youβll put that knowledge to use. You'll learn about The Visual Studio Disassembly window, how to look up the parameters to functions and methods, how to walk the stack manually, and much more.
Password: bitdownload.ir
Source:- https://www.wintellectnow.com/Videos/Watch?videoId=reverse-engineering
Download:- https://bit.ly/3fUGfoQ
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Wintellectnow
Reverse Engineering
If you blow the stack in a native C++ application or crash with a memory corruption, thereβs no telling where you will end up. In the previous section titled "M
#technews
Google Posts Patches So The Linux Kernel Can Be LTO-Optimized By Clang - Phoronix
https://www.phoronix.com/scan.php?page=news\_item&px=Linux-Kernel-Clang-LTO-Patches
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Google Posts Patches So The Linux Kernel Can Be LTO-Optimized By Clang - Phoronix
https://www.phoronix.com/scan.php?page=news\_item&px=Linux-Kernel-Clang-LTO-Patches
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Phoronix
Linux Hardware Reviews, Open-Source Benchmarks & Linux Performance - Phoronix
Phoronix is the leading technology website for Linux hardware reviews, open-source news, Linux benchmarks, open-source benchmarks, and computer hardware tests.
https://www.omgubuntu.co.uk/2020/03/linux-mint-20-release-features
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
OMG! Ubuntu!
Linux Mint 20 Available to Download, This is Whatβs New
Check out the new features and release date of Linux Mint 20, which is the next major update to this Ubuntu-based Linux distribution and due June 2020.
π° Complete SQL Bootcamp with MySQL, PHP & Python π°
Master yourself in SQL, do practical projects with MySQL, PHP and Python.
Link :- https://anontricks.tech/complete-sql-bootcamp-with-mysql-php-python/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Master yourself in SQL, do practical projects with MySQL, PHP and Python.
Link :- https://anontricks.tech/complete-sql-bootcamp-with-mysql-php-python/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Forwarded from Bug Bounty π
Bypass OTP to conferm any nimber phone
https://medium.com/@minometidji/bypass-otp-to-conferm-any-nimber-phone-66d849e74fb
@bugbountyy
https://medium.com/@minometidji/bypass-otp-to-conferm-any-nimber-phone-66d849e74fb
@bugbountyy
Medium
A Complex Response manipulation leads Bypass OTP
hello evryone :)
HawkScan
Security Tool for Reconnaissance and Information Gathering on a website. https://github.com/c0dejump/HawkScan
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Security Tool for Reconnaissance and Information Gathering on a website. https://github.com/c0dejump/HawkScan
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
GitHub
GitHub - c0dejump/HawkScan: Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)
Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x) - c0dejump/HawkScan
π° Kali Linux - Hacking for beginners π°
Ethical Hacking and penetration testing with Kali Linux! (incl. do a first hacking challenge on our website).
Link :- https://anontricks.tech/kali-linux-hacking-for-beginners/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Ethical Hacking and penetration testing with Kali Linux! (incl. do a first hacking challenge on our website).
Link :- https://anontricks.tech/kali-linux-hacking-for-beginners/
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
Core cybersecurity principles for new companies and products Help Net Security
https://www.helpnetsecurity.com/2020/06/26/core-cybersecurity-principles-for-new-companies-and-products/
#share & #supportus
π @geekcode π
https://www.helpnetsecurity.com/2020/06/26/core-cybersecurity-principles-for-new-companies-and-products/
#share & #supportus
π @geekcode π
Help Net Security
Core cybersecurity principles for new companies and products - Help Net Security
A new World Economic Forum report outlines core cybersecurity principles and points to how companies must reduce cyber risk to remain competitive.
π° Tools SecretFinder π°
βοΈ SecretFinder - A python script for find sensitive data (apikeys, accesstoken) and search anything on javascript files
π©Source :
https://github.com/m4ll0k/SecretFinder
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
βοΈ SecretFinder - A python script for find sensitive data (apikeys, accesstoken) and search anything on javascript files
π©Source :
https://github.com/m4ll0k/SecretFinder
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Tiktok Phishing v2 - Fake Followers Phishing Script
Live Demo:- http://indhuprakash.000webhostapp.com
Source:- https://github.com/swagkarna/Tiktok-Phishing-v2
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Live Demo:- http://indhuprakash.000webhostapp.com
Source:- https://github.com/swagkarna/Tiktok-Phishing-v2
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Forwarded from Bug Bounty π
Privilege Escalation by Changing HTTP Response (Admin Access)
https://medium.com/@bachrudinashari/privilege-escalation-by-changing-http-response-admin-access-5e67c44713f6
@bugbountyy
https://medium.com/@bachrudinashari/privilege-escalation-by-changing-http-response-admin-access-5e67c44713f6
@bugbountyy
Medium
Privilege Escalation by Changing HTTP Response (Admin Access)
A story about how I got a bug from a marketplace in Indonesia.
ββπ°Appspider Rapid7 7.2.123.1 (Latest) & 7.2.122 (Crack)π°
πAppSpider is a dynamic application security testing solution that allows you to scan web and mobile applications for vulnerabilities.
βοΈLink:
bit.ly/38bqZRK
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
πAppSpider is a dynamic application security testing solution that allows you to scan web and mobile applications for vulnerabilities.
βοΈLink:
bit.ly/38bqZRK
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://pentesttools.net/inql-a-burp-extension-for-graphql-security-testing/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π° 30-day Windows Security Crash Course | CQURE Academy (2019) π°
Source :
https://cqureacademy.com/cyber-security-training/30-day-windows-security-crash-course
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Source :
https://cqureacademy.com/cyber-security-training/30-day-windows-security-crash-course
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π₯ MalwareBytes Key Generator With Latest Pattern π₯
https://anonfiles.com/n7Oc4eCeo3/gen\_exe%5C
It generates 100K Keys in Seconds , it will save all Keya in Generated.txt , you need to check those keys to get Free , Premium , Blacklisted hits... Will Update Checker as i get ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://anonfiles.com/n7Oc4eCeo3/gen\_exe%5C
It generates 100K Keys in Seconds , it will save all Keya in Generated.txt , you need to check those keys to get Free , Premium , Blacklisted hits... Will Update Checker as i get ...
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π° Practical Threat Hunting - Applied Network Defense π°
βοΈ Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it.
πSource :
https://www.networkdefense.io/library/threat-hunters-playbook/87345/about/
#share & #supportus
π @geekcodeπ
Don't forget to join ππ»
βοΈ Practical Threat Hunting is a foundational course that will teach you how to approach threat hunting using a proven, structured, repeatable framework. I created this course to help people figure out what to hunt for, where to find it, and how to look for it.
πSource :
https://www.networkdefense.io/library/threat-hunters-playbook/87345/about/
#share & #supportus
π @geekcodeπ
Don't forget to join ππ»
#technews
https://news.softpedia.com/news/mozilla-firefox-78-is-now-available-for-download-on-linux-windows-macos-530396.shtml
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
https://news.softpedia.com/news/mozilla-firefox-78-is-now-available-for-download-on-linux-windows-macos-530396.shtml
#share & #supportus
π @geekcodeπ
Don't forget to join us ππ»
softpedia
Mozilla Firefox 78 Is Now Available for Download on Linux, Windows, macOS
A new version of Firefox browser is now up for grabs
'It's really hard to find maintainers': Linus Torvalds ponders the future of Linux β’ The Register
https://www.theregister.com/2020/06/30/hard\_to\_find\_linux\_maintainers\_says\_torvalds/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://www.theregister.com/2020/06/30/hard\_to\_find\_linux\_maintainers\_says\_torvalds/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»