Search
Results
Tips for Linking Shell Companies to their Secret Owners – Global Investigative Journalism Network
Breaking down Reverse shell commands | Aditya Telange
SECOND EDITION: Firewalls and Internet Security: Repelling the Wily Hacker
Flipper Zero — Portable Multi-tool Device for Geeks
GitHub - mytechnotalent/Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
the_cyber_plumbers_handbook/cph_version_1.4_20210829.pdf at master · opsdisk/the_cyber_plumbers_handbook · GitHub
GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
O.MG Cable - * to USB-A - Hak5
Hacking cable with WiFi and keylogger
Refined Blog
The Full Story of the Stunning RSA Hack Can Finally Be Told | WIRED
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
Cutter
Free and Open Source RE Reverse Engineering Platform powered by radare2
I'll Let Myself In: Tactics of Physical Pen Testers - YouTube
Hackle - Search Engine for Hackers and Security Professionals
Ghidra - reverse engineering framework
Arduino - Wikipedia, the free encyclopedia
Web Application Penetration Testing Cheat Sheet | JDow.io
This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.
GitHub - vitalysim/Awesome-Hacking-Resources: A collection of hacking / penetration testing resources to make you better!
Awesome-Hacking-Resources - A collection of hacking / penetration testing resources to make you better!
Have I Been Pwned
Have I been pwned? Check if your email has been compromised in a data breach
Useful site to check if your email addresses and usernames have been compromised.
Have I been pwned? Check if your email has been compromised in a data breach
Plastimake | Plastic you can shape with your hands
On Hacking MicroSD Cards « bunnie's blog
Data Broker Giants Hacked by ID Theft Service — Krebs on Security
Robotron 2084 Guidebook
SecurityDistro - Security Distributions
Kali Linux
Tools released at Defcon can crack widely used PPTP encryption in under a day - Google Nexus 7 tablet, security, Cisco Systems, Microsoft, Defcon - CSO | The Resource for Data Security Executives
Hacking the Diebold Machine - YouTube
Logicube Talon® - The Complete Data Capture System
פשיעה קיברנטית: מבט מבפנים | Newsgeek
WabLab - The house of web and application developers
Simple instructions for adding a clock and joystick page turns to the PRS-500
"PRS-500 Simple instructions for adding a clock and joystick page turns to the PRS-500"
HowTo: StraightTalk and iPhone! Everything you need to know to make it work!
Detecting Firefox Extensions | Primate Brow Flash
Telehack
Andrew de Quincey's livejournal
Upside-Down-Ternet
10K Apart | Inspire the web with just 10K.
Dedexer user's manual
PaulDotCom: Archives
Security Justice
MSP430 LaunchPad (MSP-EXP430G2) - Texas Instruments Embedded Processors Wiki
Beta - Crictor
הפורום הישראלי לאבטחת מידע
Hacking SenseWear / GoWearFit / BodyBugg: A Trivial Activity Classifier (that works!)
The Nitty Gritty: from rpy import * import csv import sys import string from PIL import Image import numpy f=open("tmp/z709a-full-serial-24hr.csv","r") lns = f.readlines() f.close() rdr = csv.reader(lns, delimiter='\t') rx = [x for x in rdr] recs=[[int(y) for y in x[2:-1]] for x in rx if x[0][:3] == '124'] nil=[sys.stdout.write(rx[i][1] + " " + str(foo[i])+"\n") for i in range(0, len(foo))] mrecs=matrix(recs) cl = r.kmeans(mrecs, 3) foo=[[cl['cluster'][i]] + [z for z in mrecs[i].tolist()[0]] for i in range(0, len(mrecs))] cmap=[255, 0, 128] cline=[[cmap[x[0]-1]]*50 for x in foo] cm=numpy.array(cline,dtype='uint8') # Display image Image.fromarray(cm).show()