FreeSkills
995
المشتركون
+224 ساعات
+47 أيام
+1830 أيام
- المشتركون
- التغطية البريدية
- ER - نسبة المشاركة
جاري تحميل البيانات...
معدل نمو المشترك
جاري تحميل البيانات...
A couple of interesting blog posts on hiding Linux processes
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
The 'Invisibility Cloak' - Slash-Proc Magic | dfir.ch
Technical blog by Stephan Berger (@malmoeb)
𝗢𝗵𝗦𝗛𝗜𝗡𝗧
•Introduction to OSINT Web Resources
•Search Engines
•Social Media Intelligence [SOCMINT]
•Mapping and Geospatial Intelligence [GEOINT]
•Imagery Intelligence [IMINT]
•Orbital Intelligence [ORBINT]
•Business Research and Trade Intelligence [TRADINT]
•Financial Intelligence [FININT]
•Vehicle and Transportation Intelligence [VATINT]
•Digital Network Intelligence [DNINT]
•Signals Intelligence [SIGINT]
•Deep Webs and Darknets
•People Investigations
•Email Addresses
•Phone Numbers
•Usernames
•Gaming
•Real Estate
•Data Sets
•Organized Crime and Illicit Trade
•Stolen Property
•War, Crisis and Conflicts
•Weapons and Equipment •Identification
•Government Information
•Dictionaries, Translation and •Decoding
https://ohshint.gitbook.io/oh-shint-its-a-blog
OH SHINT! Welcome Aboard | OH SHINT! It's A Blog!
So what is this site all about? Yep, it's an OSINT blog.
إظهار الكل...
Painless Guide to Building the Reverse Engineering and Malware Analysis Lab
Legal Disclaimer:
Mastering the Art of Bypassing Windows UAC
https://hadess.io/user-account-control-uncontrol-mastering-the-art-of-bypassing-windows-uac/
Shared by PDF Reader. It's so easy and convenient to view & edit PDFs.
Download for free now:https://st.simpledesign.ltd/2AFfEz
windows-kernel-programming-pavel-yosifovich.pdf5.07 MB
❤ 2
إظهار الكل...
👍 1
--
Reading books with ReadEra
https://readera.org
Modern Operating Systems 4e - Tanenbaum and Bos.pdf6.25 MB
👍 3
Malware Development
#malware
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR
Malware Development, Analysis and DFIR Series - Part I
1st post of Malware Development, Analysis and DFIR Series. This post will be focussed on developing Malwares for ethical purposes only, The author is not liable for any damages caused.
👍 5
إظهار الكل...
Cracking/De-compile Open JAR Files: A Developer’s Guide to De-compiling
In this blog post, we’ll explore the process of decompiling JAR files in Java. You’ll learn why someone might want to decompile a JAR file…
👍 1
اختر خطة مختلفة
تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.