Whirldata | Artificial Intelligence and Neural Networks
Provide a data analysis system to process the data being collected by a set of remote IoT sensors embedded in Alaskan glaciers. Solution Whirldata solution architecture team engaged with the client over a face-to-face meeting at the client’s San Francisco office to understand the various sensors, the nature of data being collected, and the frequency.…
CIA Lock Picking Field Operative Training Manual
CIA Lock Picking Field Operative Training Manual - Free download as PDF File (.pdf) or read online for free. They'll get into your things!
Most Basic Git Commands with Examples
To learn Git and its most basic commands, you’ll need something better than a simple Git cheat sheet. The following article breaks down Git concepts for you.
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers [Roger A. Grimes] on Amazon.com. *FREE* shipping on qualifying offers. Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Improving Your Single Pin Picking Skills - By Jgor
Want to learn how the North American Lock Picking Champion Jgor, got good at single pin picking. Check out this guide on his advice on getting better at single pin picking!
Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups
A simple python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific thre...
pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack
pydictor is a powerful and useful hacker dictionary builder for a brute-force attack. Why I need to use pydictor ? 1. it always...
EvilApp - Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA)
Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor a...
C Programming For Beginners - Master the C Language
C Programming will increase career options. Become a better dev in other languages by learning C. Pointers explained
Rootkits and Bootkits
About Rootkits and Bootkits Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you…
THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way
THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way - Kindle edition by James, Kevin. Download it once and read it on your Kindle device, PC, phones or tablets. Use features like bookmarks, note taking and highlighting while reading THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way.
TorStat - Tor Statistics
Tor Statistics Requirements ProxyChains (Optional - only if you need more features to work) Colorama psutil Installation and execution Then...
Nexphisher : Advanced Phishing Tool For Linux & Termux
NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 .
Practical Binary Analysis
About Practical Binary Analysis Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way. As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out–binary analysis can help…