Photos from National Cyber Security Services's post
PwnDoc:-- #Pentesting #report generator.
#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.
#Download #Link:-
https://github.com/pwndoc/pwndoc
PwnDoc:-- #Pentesting #report generator.
#PwnDoc is a #pentest reporting #application making it simple and easy to write your findings and generate a customizable docx report. The main goal is to have more time to Pwn and less time to Doc by mutualizing data like #vulnerabilities between users.
#Download #Link:-
https://github.com/pwndoc/pwndoc
Z0FCourse_ReverseEngineering:-- #Reverse #engineering course by Z0F. Focuses on x64 #Windows.
This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of #binaries, then reverse some small samples, #reverse a #DLL and implement it into our own #program, reverse some malware, then look at some realistic situations.
#Download #Link:-
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Z0FCourse_ReverseEngineering:-- #Reverse #engineering course by Z0F. Focuses on x64 #Windows.
This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of #binaries, then reverse some small samples, #reverse a #DLL and implement it into our own #program, reverse some malware, then look at some realistic situations.
#Download #Link:-
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of #binaries, then reverse some small samples, #reverse a #DLL and implement it into our own #program, reverse some malware, then look at some realistic situations.
#Download #Link:-
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Z0FCourse_ReverseEngineering:-- #Reverse #engineering course by Z0F. Focuses on x64 #Windows.
This course is going to teach anyone how to reverse engineer x64 Windows. We will start by covering some basics of #binaries, then reverse some small samples, #reverse a #DLL and implement it into our own #program, reverse some malware, then look at some realistic situations.
#Download #Link:-
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Websheep:-- #Websheep is an app based on a willingly #vulnerable #ReSTful #APIs.
#Download #Link:--
https://github.com/marmicode/websheep
Websheep:-- #Websheep is an app based on a willingly #vulnerable #ReSTful #APIs.
#Download #Link:--
https://github.com/marmicode/websheep
#Download #Link:--
https://github.com/marmicode/websheep
Websheep:-- #Websheep is an app based on a willingly #vulnerable #ReSTful #APIs.
#Download #Link:--
https://github.com/marmicode/websheep
Photos from National Cyber Security Services's post
#Citrix #ADC #vulnerability explanation and #exploitation. This video shows how to find hosts #vulnerable to CVE-2019-19781. Vulnerable hosts can be found easily using #Shodan.
#Link:- https://www.youtube.com/watch?v=cALcgyq42kI
To learn more:
1. https://support.citrix.com/article/CT...
2. https://www.exploit-db.com/exploits/4...
#Citrix #ADC #vulnerability explanation and #exploitation. This video shows how to find hosts #vulnerable to CVE-2019-19781. Vulnerable hosts can be found easily using #Shodan.
#Link:- https://www.youtube.com/watch?v=cALcgyq42kI
To learn more:
1. https://support.citrix.com/article/CT...
2. https://www.exploit-db.com/exploits/4...
CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
CryptoAPI:-- A #PoC for CVE-2020-0601
#Windows #CryptoAPI #Spoofing #Vulnerability #exploitation.
#Download #Link:-
https://github.com/kudelskisecurity/chainoffools
Forwarded from Anonymous TV
❌حصرياً❌
دوره تعلم لمحبي الشبكات👨💻👨💻(Networking)👨💻👨💻
مجانا على يوتيوب مع المدرب
Mr.Mohamed Alush👨🎓
والتي من خلالها ستتعلم برمجه اي مودم
1-Tp-link 🔧
2-netis 🔧
3-nanostaion 🔧
4-Mikrotik problem 🔧
والعديد من الفيديوهات المختصه في تعليم 💻الشبكات والميكروتيك بشكل عام من الرابط التالي - اشتراك + تفعيل الجرس فضلاً
https://www.youtube.com/playlist?list=PLrl1JxlDFimg3j-BOHiA6OO1dtHX449OE
دوره تعلم لمحبي الشبكات👨💻👨💻(Networking)👨💻👨💻
مجانا على يوتيوب مع المدرب
Mr.Mohamed Alush👨🎓
والتي من خلالها ستتعلم برمجه اي مودم
1-Tp-link 🔧
2-netis 🔧
3-nanostaion 🔧
4-Mikrotik problem 🔧
والعديد من الفيديوهات المختصه في تعليم 💻الشبكات والميكروتيك بشكل عام من الرابط التالي - اشتراك + تفعيل الجرس فضلاً
https://www.youtube.com/playlist?list=PLrl1JxlDFimg3j-BOHiA6OO1dtHX449OE
YouTube
دورة ضبط قطع الشبكات اللاسلكية
انشأنا هذه الدورة للاشخاص الذين لا يعرفون ضبط اعدادت بعض قطع الشبكات المنتشره بكثرة مثل الانتينات m2/m5 و الروترات