This media is not supported in your browser
VIEW IN TELEGRAM
🎩 Hacker Prank
Free Baby. Amazon Web Services (AWS) - Zero to Hero
https://www.udemy.com/course/amazon-web-services-aws-v/
https://www.udemy.com/course/amazon-web-services-aws-v/
Udemy
Free Amazon AWS Tutorial - Amazon Web Services (AWS) - Zero to Hero
Beginners, Zero to Hero. AWS EC2 web server, NodeJS Server, AWS RDS database server, S3, SES & CloudWatch. FREE - Free Course
Hackers Pro's Utilities:
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
GitHub
Abusing ML model file formats to create malware on AI systems: A proof of concept
a CLI that provides a generic automation layer for assessing the security of ML models - Azure/counterfit
Forwarded from UNDERCODE COMMUNITY (dvm)
What is the Tor Nodes Safety Level in 2024 ?
Final Results
71%
1% unsecure
0%
50%
14%
90% Anonymous
14%
Happy new year (I'm a beginer)😊
What operating system does your AirPods run?
Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈
Bluetooth audio SoCs are seldom talked about, but a fascinating field.
AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.
Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.
Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈
Bluetooth audio SoCs are seldom talked about, but a fascinating field.
AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.
Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.
Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Enable Security Defaults in Microsoft Entra ID:
1. Sign in to Microsoft Entra admin center
2. Expand Identity
3. Select Overview
4. Click on Properties
5. Select Manage security defaults
6. Set Security defaults to Enabled
7.Click Save
Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.
1. Sign in to Microsoft Entra admin center
2. Expand Identity
3. Select Overview
4. Click on Properties
5. Select Manage security defaults
6. Set Security defaults to Enabled
7.Click Save
Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.
Ethical Hacking in 15 Hours - 2023 Edition
By The Owner of TCM Security:
https://youtu.be/3FNYvj2U0HM?list=PLLKT__MCUeixqHJ1TRqrHsEd6_EdEvo47
By The Owner of TCM Security:
https://youtu.be/3FNYvj2U0HM?list=PLLKT__MCUeixqHJ1TRqrHsEd6_EdEvo47
YouTube
Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)
0:00 - Introduction/whoami
6:43 - A Day in the Life of an Ethical Hacker
27:44 - Effective Notekeeping
34:27 - Important Tools
39:51 - Networking Refresher: Introduction
41:06 - IP Addresses
54:18 - MAC Addresses
57:35 - TCP, UDP, & the Three-Way Handshake…
6:43 - A Day in the Life of an Ethical Hacker
27:44 - Effective Notekeeping
34:27 - Important Tools
39:51 - Networking Refresher: Introduction
41:06 - IP Addresses
54:18 - MAC Addresses
57:35 - TCP, UDP, & the Three-Way Handshake…
🦑Biggest collections of free cybersecurity resources, here are some top options:
1. Exploit Databases
Exploit-DB: A massive archive of public exploits and software vulnerabilities.
Packet Storm Security: Exploits, tools, and advisories.
0day.today: Exploits and security-related content (registration may be required).
2. Cybersecurity News and CVE Updates
Undercode: Dedicated to cybersecurity, hacking, and tech news.
DailyCVE: A curated resource for the latest CVEs and vulnerability information.
3. Open Source Intelligence (OSINT) Tools
OSINT Framework: A curated collection of OSINT tools and resources.
Maltego Community Edition: OSINT and link analysis software.
4. Cybersecurity Learning Platforms
Hack The Box: Free labs for ethical hacking and pentesting (community edition).
TryHackMe: Interactive hacking and cybersecurity challenges with many free rooms.
OverTheWire: Linux and cybersecurity wargames.
5. Malware and Threat Analysis
VirusShare: Massive collection of malware samples for researchers.
Hybrid Analysis: Free malware analysis service.
ANY.RUN: Free interactive sandbox for analyzing malware.
6. Cybersecurity Tools and Frameworks
Kali Linux: Penetration testing operating system with a large collection of pre-installed tools.
Parrot Security OS: Another Linux distribution for security and privacy.
Metasploit: Penetration testing framework with free options.
7. Online Libraries and Knowledge Bases
MITRE ATT&CK: Knowledge base of adversary tactics and techniques.
CVE Details: Comprehensive vulnerability database.
CyberChef: Cybersecurity and encryption toolkit.
8. Forums and Communities
Reddit: r/cybersecurity: Discussions, resources, and updates.
BleepingComputer: Forums and guides for malware removal and security.
9. Threat Intelligence Platforms
AlienVault OTX: Free threat-sharing platform.
Cisco Talos Intelligence: Free threat intelligence resources.
1. Exploit Databases
Exploit-DB: A massive archive of public exploits and software vulnerabilities.
Packet Storm Security: Exploits, tools, and advisories.
0day.today: Exploits and security-related content (registration may be required).
2. Cybersecurity News and CVE Updates
Undercode: Dedicated to cybersecurity, hacking, and tech news.
DailyCVE: A curated resource for the latest CVEs and vulnerability information.
3. Open Source Intelligence (OSINT) Tools
OSINT Framework: A curated collection of OSINT tools and resources.
Maltego Community Edition: OSINT and link analysis software.
4. Cybersecurity Learning Platforms
Hack The Box: Free labs for ethical hacking and pentesting (community edition).
TryHackMe: Interactive hacking and cybersecurity challenges with many free rooms.
OverTheWire: Linux and cybersecurity wargames.
5. Malware and Threat Analysis
VirusShare: Massive collection of malware samples for researchers.
Hybrid Analysis: Free malware analysis service.
ANY.RUN: Free interactive sandbox for analyzing malware.
6. Cybersecurity Tools and Frameworks
Kali Linux: Penetration testing operating system with a large collection of pre-installed tools.
Parrot Security OS: Another Linux distribution for security and privacy.
Metasploit: Penetration testing framework with free options.
7. Online Libraries and Knowledge Bases
MITRE ATT&CK: Knowledge base of adversary tactics and techniques.
CVE Details: Comprehensive vulnerability database.
CyberChef: Cybersecurity and encryption toolkit.
8. Forums and Communities
Reddit: r/cybersecurity: Discussions, resources, and updates.
BleepingComputer: Forums and guides for malware removal and security.
9. Threat Intelligence Platforms
AlienVault OTX: Free threat-sharing platform.
Cisco Talos Intelligence: Free threat intelligence resources.
Exploit-Db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
itsourcecode Banking Management System admin_class.php username sql injection cve
https://vuldb.com/?ctiid.269168
https://vuldb.com/?ctiid.269168