ट्विट्स

आपण @secur1ty1samyth यांना अवरोधित केले आहे

आपणास निश्चितपणे ही ट्विट्स पहायची आहेत? तसे केल्याने @secur1ty1samyth यांना अनब्लॉक केले जाणार नाही.

  1. पिन केलेल्या ट्विट्स
    ७ एप्रि
    पूर्ववत् करा
  2. १२ तासांपूर्वी

    Part 2/2 While using this command in a terminal, you will get a print of CPU version, memory configuration, cache information, bus speed, and other PowerPC machines running on the backend.

    हा थ्रेड दाखवा
    पूर्ववत् करा
  3. १२ तासांपूर्वी

    Part 1/2 Correct Answer: lshw Explanation: To extract hardware information of the system, the Linux system introduced the command-line utility “lshw.” The “lshw” command is a small tool to display a complete picture of hardware configuration.

    हा थ्रेड दाखवा
    पूर्ववत् करा
  4. ८ एप्रि

    Generate a custom wordlist for your target for targeted . Check this one-liner: echo "" | subfinder -silent | httpx | hakrawler | sed $'s/[./?=:&#]/\n/g' | anew > /root/Desktop/wordlist.txt Tools: subfinder, httpx, hakrawler, anew

    पूर्ववत् करा
  5. ८ एप्रि

    Offensive Security Tool: Proxmark3 is the swiss-army tool of , allowing for interactions with the vast majority of RFID tags on a global scale. Full post:

    पूर्ववत् करा
  6. ८ एप्रि

    paid out $36,000 bug bounty for HTTP request smuggling flaws A security researcher claims they netted $36,000 in bug bounties after uncovering critical request vulnerabilities Full post:

    पूर्ववत् करा
  7. ८ एप्रि

    This episode will let you learn how to automate your own bash script to perform a task at a given time, which is updating your . You'll get to use & chain commands like figlet, lolcat, cron, piping & some commands all at once.

    पूर्ववत् करा
  8. ७ एप्रि

    VMware warns of critical vulnerabilities in multiple products VMware has warned customers to immediately patch critical vulnerabilities in multiple... Full post:

    पूर्ववत् करा
  9. ६ एप्रि

    Wednesday's test of Knowledge! *Offensive Security & Ethical Hacking Course: USE CODE: BHEH50 (FOR 50% OFF!) Quiz: Which command is used to view your Linux System Hardware Information?

    हा थ्रेड दाखवा
    पूर्ववत् करा
  10. ६ एप्रि

    No-Joke Borat RAT Propagates Ransomware, DDoS Attackers are using a newly released remote access trojan, dubbed Borat RAT, to spread ransomware.. Full post:

    पूर्ववत् करा
  11. ५ एप्रि

    Supply chain flaws in PHP package manager PEAR lay undiscovered for 15 years Attackers could have wreaked havoc on the PHP ecosystem by exploiting... Full post:

    पूर्ववत् करा
  12. ४ एप्रि

    Learn using Strategies. Expand your Career with our Tailored . USE THE CODE: BHEH50 FOR 50% OFF Valid until 16/04 Sign up now:

    पूर्ववत् करा
  13. ४ एप्रि

    PHP bug allows attackers to bypass domain filters, stage DoS attacks against servers A bug in one of PHP’s functions made it possible to bypass security... Full post:

    पूर्ववत् करा
  14. २ एप्रि

    Part 2/2 The main feature that makes cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. It comes pre-installed in Kali Linux.

    हा थ्रेड दाखवा
    पूर्ववत् करा
  15. २ एप्रि

    Part 1/2 Correct Answer: cisco-torch Explanation: Cisco Torch is a mass scanning, fingerprinting, and exploitation tool that can be used to exploit Cisco routers. It is one of the best penetration testing and scanning tool used by the Red Team.

    हा थ्रेड दाखवा
    पूर्ववत् करा
  16. १ एप्रि

    Offensive Security Tool: Boomerang Boomerang is a tool to expose multiple internal servers to the web/cloud using HTTP+TCP Tunneling. Full post:

    पूर्ववत् करा
  17. १ एप्रि

    Apple emergency update fixes zero-days used to hack iPhones, Macs Apple has released security updates on Thursday to address two zero-day... Full post:

    पूर्ववत् करा
  18. ३१ मार्च
    पूर्ववत् करा
  19. ३१ मार्च
    पूर्ववत् करा
  20. ३१ मार्च

    Google Chrome Bug Actively Exploited as Zero-Day Google issued an update for the bug, which is found in the open-source V8 JavaScript engine Full post:

    पूर्ववत् करा

लोड करण्या करता काही वेळ लागू शकतो.

Twitter वरची क्षमता ओलांडली गेली आहे किंवा तात्पुरती अडचण अनुभवास येत आहे. पुन्हा प्रयत्न करा किंवा अधिक माहितीसाठी Twitter स्थिती येथे भेट द्या.

    आपण मला सुद्धा विचारू शकता

    ·