When autocomplete results are available use up and down arrows to review and enter to select. Touch device users, explore by touch or with swipe gestures.

Computer security

Collection by Jaan T • Last updated 4 weeks ago

713 
Pins
 • 
55 
Followers
Jaan T
  Computer Security, Security Hacking, Computer Tips, Deep Learning, Forensics, Machine Learning, Case Study, Books To Read, Books

Rootkits and Bootkits

About Rootkits and Bootkits Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you…

Hacking: How to Make Your Own Keylogger in C++ Programming Language Python Programming, Programming Languages, Computer Programming, Coding Websites, Cool Websites, Computer Coding, Computer Science, Best Hacking Tools, Cyber Security Awareness

C Programming For Beginners - Master the C Language

C Programming will increase career options. Become a better dev in other languages by learning C. Pointers explained

EvilApp - Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass Computer Basics, Computer Setup, Computer Technology, Hacking Apps For Android, Android Phone Hacks, Best Hacking Tools, Shadows Of The Empire, Game Wallpaper Iphone, Computer Security

EvilApp - Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA)

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor a...

The Hacking Bible: The Dark Secrets Of The Hacking World by Kevin James The book is related to genre of security format of book is PDF, EPUB and size of Best Hacking Tools, Hacking Books, Learn Hacking, Hacking Websites, Life Hacks Computer, Computer Coding, Computer Science, Android Phone Hacks, Smartphone Hacks

THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way

THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way - Kindle edition by James, Kevin. Download it once and read it on your Kindle device, PC, phones or tablets. Use features like bookmarks, note taking and highlighting while reading THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way.

  Linux, Free Reading, Happy Reading, Reading Books, Fun To Be One, Great Books, Reading Online, Books Online, Books To Read

Practical Binary Analysis

About Practical Binary Analysis Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way. As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out–binary analysis can help…

Roger Grimes A. Hacking the Hacker. Learn From the Experts Who Take Down Hackers Learn Computer Science, Computer Coding, Computer Programming, Computer Forensics, Computer Hacker, Python Programming, Hacking Books, Learn Hacking, Hacking Tricks

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers [Roger A. Grimes] on Amazon.com. *FREE* shipping on qualifying offers. Hacking the Hacker: Learn From the Experts Who Take Down Hackers

  Best Hacking Tools, Hacking Books, Auto Follower, Port Forwarding, Game Wallpaper Iphone, Computer Basics, Computer Security, Secret Code, Instagram Tips

Nexphisher : Advanced Phishing Tool For Linux & Termux

NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 .

This article will show you how you can start a process and keep it running even after you have logged out using the nohup command. Background Process, Computer Security, Simple Words, To Loose, Linux, Tutorials, Running, Tips, Keep Running

Keep Commands Running After SSH Log Out With Nohup Linux Command

This article will show you how you can start a process and keep it running even after you have logged out using the nohup command.

GIT cheetsheet and workflow much better resolution in GIT cheatsheet and workflow Basic Computer Programming, Learn Computer Coding, Data Science, Computer Science, Software Development, Software Software, Coding Software, Web Design Basics, Job Interview Preparation

GIT cheetsheet and workflow

A handy cheat sheet by Pierre-Alexandre St-Jean for the hugely popular version control system git.

- Tor Statistics Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ Home Security Alarm System, Computer Security, Computer Technology, Computer Programming, Computer Tips, Computer Build, Computer Engineering, Mechanical Engineering, Best Hacking Tools

TorStat - Tor Statistics

Tor Statistics Requirements ProxyChains (Optional - only if you need more features to work) Colorama psutil Installation and execution Then...

  Computer Security, Pointers, Cobalt, How To Apply, Tools, Stylus, Instruments

CSSG - Cobalt Strike Shellcode Generator

Adds Shellcode - Shellcode Generator to the Cobalt Strike top menu bar

  Security Audit, Linux Kernel, Proxy Server, Computer Security, Use Case, Public, Key, Linux

Ssh-Mitm - Ssh Mitm Server For Security Audits Supporting Public Key Authentication, Session Hijacking And File Manipulation

ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 ...

Read "Digital Forensics with Open Source Tools" by Cory Altheide available from Rakuten Kobo. Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and medi. Cyber Forensics, Computer Forensics, Computer Programming, Technology Hacks, Computer Technology, Computer Science, Computer Hacking, Teaching Technology, Business Technology

Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc

Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc - Kindle edition by Altheide, Cory, Carvey, Harlan. Download it once and read it on your Kindle device, PC, phones or tablets. Use features like bookmarks, note taking and highlighting while reading Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows…

  Security Tools, Computer Security, Dark Websites, Osint Tools, Web Api, Sql Injection, Tech Toys, Data Processing, Open Source

DarkScrape - OSINT Tool For Scraping Dark Websites

OSINT Tool to find Media Links in Tor Sites. Tested On Kali Linux 2019.2 Ubuntu 18.04 Nethunter Arc Linux

Know how to pick a lock? Let one of the best lock pickers in the world give you a little advice on how to take your picking to the next level. Survival Food, Survival Kit, Survival Skills, Cool Lock, Diy Lock, Kydex Sheath, How To Get Better, Skills To Learn, Disaster Preparedness

Improving Your Single Pin Picking Skills - By Jgor

Want to learn how the North American Lock Picking Champion Jgor, got good at single pin picking. Check out this guide on his advice on getting better at single pin picking!

Git Cheatsheet - Working with Branches What Is Software, Software Testing, Software Development, Learn Computer Coding, Computer Basics, Computer Programming Languages, Learn Programming, Data Science, Computer Science

Most Basic Git Commands with Examples

To learn Git and its most basic commands, you’ll need something better than a simple Git cheat sheet. The following article breaks down Git concepts for you.