cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

FreeSkills

Stand With Palestine ✌️🇵🇸✌️

إظهار المزيد
مشاركات الإعلانات
995
المشتركون
+224 ساعات
+47 أيام
+1830 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

A couple of interesting blog posts on hiding Linux processes https://dfir.ch/posts/slash-proc/ https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/ #Linux #Cybersecurity
إظهار الكل...
The 'Invisibility Cloak' - Slash-Proc Magic | dfir.ch

Technical blog by Stephan Berger (@malmoeb)

𝗢𝗵𝗦𝗛𝗜𝗡𝗧 •Introduction to OSINT Web Resources •Search Engines •Social Media Intelligence [SOCMINT] •Mapping and Geospatial Intelligence [GEOINT] •Imagery Intelligence [IMINT] •Orbital Intelligence [ORBINT] •Business Research and Trade Intelligence [TRADINT] •Financial Intelligence [FININT] •Vehicle and Transportation Intelligence [VATINT] •Digital Network Intelligence [DNINT] •Signals Intelligence [SIGINT] •Deep Webs and Darknets •People Investigations •Email Addresses •Phone Numbers •Usernames •Gaming •Real Estate •Data Sets •Organized Crime and Illicit Trade •Stolen Property •War, Crisis and Conflicts •Weapons and Equipment •Identification •Government Information •Dictionaries, Translation and •Decoding https://ohshint.gitbook.io/oh-shint-its-a-blog
إظهار الكل...
OH SHINT! Welcome Aboard | OH SHINT! It's A Blog!

So what is this site all about? Yep, it's an OSINT blog.

إظهار الكل...
Painless Guide to Building the Reverse Engineering and Malware Analysis Lab

Legal Disclaimer:

stay updated with CVEs
curl cvedb.shodan.io/cves | jq | grep "cve_id"
Konwar
إظهار الكل...

👍 1
إظهار الكل...
Shared by PDF Reader. It's so easy and convenient to view & edit PDFs. Download for free now:https://st.simpledesign.ltd/2AFfEz
إظهار الكل...
windows-kernel-programming-pavel-yosifovich.pdf5.07 MB
2
-- Reading books with ReadEra https://readera.org
إظهار الكل...
Modern Operating Systems 4e - Tanenbaum and Bos.pdf6.25 MB
👍 3
Malware Development #malware Part I - Analysis and DFIR Series Part II - Analysis and DFIR Series Part III - Analysis and DFIR Series Part IV - Analysis and DFIR
إظهار الكل...
Malware Development, Analysis and DFIR Series - Part I

1st post of Malware Development, Analysis and DFIR Series. This post will be focussed on developing Malwares for ethical purposes only, The author is not liable for any damages caused.

👍 5
إظهار الكل...
Cracking/De-compile Open JAR Files: A Developer’s Guide to De-compiling

In this blog post, we’ll explore the process of decompiling JAR files in Java. You’ll learn why someone might want to decompile a JAR file…

👍 1
اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.