Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
-
Updated
Dec 1, 2019
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offensive mindset performed in the execution many different Malwares in our lab environment.
"Essential Kali Linux commands for ethical hackers and penetration testers."
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Government Cyber Coordination Centre - Vulnerability Reporting Service - Infrastructure as Code
IP Hunter é uma ferramenta Python para obter informações de geolocalização de endereços IP. Com essa ferramenta, você pode obter informações detalhadas, como país, cidade, região, ISP, ASN, latitude/longitude, e muito mais.
🎯 RFI/LFI Payload List
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. With repository stars⭐ and forks🍴
🏥
Add a description, image, and links to the security-researchers topic page so that developers can more easily learn about it.
To associate your repository with the security-researchers topic, visit your repo's landing page and select "manage topics."