hacksure | Unsorted

Telegram-канал hacksure - Cyber Education Official

3323

You want to get into Ethical cybersecurity. You're in the right place because this course will teach you how to combine or use programming & Hacking to greatly expand your skills as a cybersecurity professional & ‼️Warning: For Educational Purpose Only.

Subscribe to a channel

Cyber Education Official

DO YOU KNOW NOTCOIN IS OUR PROJECT??

/channel/notcoin_bot?start=r_573809_31961190

Читать полностью…

Cyber Education Official

🤔Who interested to work in Cambodia to our Cyber company?
🤔> Ticket , Housing , food is from our company.
Salary : $1000 per month and Many Commissions.

🤔 If you can talk Chinese, the salary is higher.

@SollinkManager DM

Читать полностью…

Cyber Education Official

Huge ANNOUNCEMENT  
IF YOU ARE LOOKING to learn expert hacking STUDY CLASS FOR ETHICAL cyber security or Black Hat , We are arranged Best Class TO teach and practice who want to learn?🥳

Читать полностью…

Cyber Education Official

Metasploit Pro 4.22.0 2023013001

Metasploit is a handy tool and is one of the critical systems used by hackers – including the white hat hacker who performs penetration testing

Читать полностью…

Cyber Education Official

TCM Security - External Pentest Playbook

Читать полностью…

Cyber Education Official

TCM - Linux Privilege Escalation For Beginners

Читать полностью…

Cyber Education Official

We are preparing Best Tools 2023 for Pro Hackers.

Читать полностью…

Cyber Education Official

How does a computer worm spread?
Phishing: Fraudulent emails that look authentic can carry worms in corrupt attachments. Such emails may also invite users to click malicious links or visit websites designed to infect users with worms.
Spear-Phishing: Targeted phishing attempts can carry dangerous malware like ransomware cryptoworms.  
Networks: Worms can self-replicate across networks via shared access.
Security holes: Some worm variants can infiltrate a system by exploiting software vulnerabilities.
File sharing: P2P file networks can carry malware like worms.
Social networks: Social platforms like Myspace have been affected by certain types of worms.
Instant messengers (IMs): All types of malware, including worms, can spread through text messages and IM platforms such as Internet Relay Chat (IRC).  
External devices: Worms can infect USB sticks and external hard drives.
What does a computer worm do?
Once a computer worm has breached your computer’s defenses it can perform several malicious actions:
Drop other malware like spyware or ransomware
Consume bandwidth
Delete files
Overload networks
Steal data
Open a backdoor
Deplete hard drive space

Читать полностью…

Cyber Education Official

hello, We published Kali linux full course on Google play book... go and enjoy

Читать полностью…

Cyber Education Official

Mobile emulation is the process of creating a virtual mobile environment for developers to test different devices and services. It eliminates the need for developers to buy real devices, as they can do everything in a single format. Mobile emulation enables software engineers to develop new features, enhance existing ones and make sure that their applications run effectively across multiple platforms.

Digital currency is a digital representation of value which is used for digital payments and transfers. It can be stored on electronic media, such as computers and phones, or stored on cards or other physical objects. Examples include cryptocurrencies like Bitcoin, Ethereum and Litecoin, as well as newer forms like Facebook’s Libra. Digital currencies offer immense potential to improve existing payment systems and create new financial products due to their decentralized nature, lack of intermediaries and lower transaction costs compared to traditional payment methods.

Читать полностью…

Cyber Education Official

TCM Security - Open-Source Intelligence (OSINT) Fundamentals

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
VM + Exercises

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
Videos

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
PDF

Читать полностью…

Cyber Education Official

Decoder as programming is a type of software that decodes raw data into a readable format. Decoders are often used to process data for computer applications and communications systems. Decoders take a stream of binary data (or other encoded format) and covert it into an understandable form, such as text or images.
The circuit diagram has two inverters, which will provide the complement of two inputs A and B. Each AND gates generates one of the minters as an output.
When Enable(EN) is set at logic 1, one of the outputs(Y0, Y1, Y2, Y3) will be active for a given input. The remaining outputs will be logic 0.

From the above truth table, the operation can be understood. When both the inputs A and B are 0, Y0 will be at active HIGH or logic 1 and the remaining output pins are active LOW or logic 0.
Similarly, output pin Y1 will be at logic 1 for A = 0 and B = 1. The coded output for the inputs A = 1 and B = 1 is ‘1000’, where Y3 pin is at logic 1 and the remaining pins are at logic 0.
In the same way, 3 to 8 binary decoders, 4 to 16 binary decoders can be constructed. When the number of input of a decoder increases, the coded output also increases.
Cascading Decoders
Binary decoders can be cascaded together to form a larger decoder circuit. Using two 2 input decoders, 4 input decoders can be constructed, by cascading each other. Similarly, by cascading two 3 to 8 decoders, 4 to 16 binary decoders can be constructed.
Let us look at the design of 4 to 16 decoder by cascading two 3 to 8 decoder.

To design the 4 to 16 decoders, 4 binary inputs(A, B, C, D) are needed. The three inputs A, B and C are given as input to two 3 to 8 binary decoders. The fourth input D is given as enable input(EN) to both decoders.
As you can see from the above diagram when input D = 0, the decoder at the top will be enabled and that is on the bottom will get disabled. When D = 1, it will enable the bottom decoder and disable the top one.
Decoder ICs
Some of the common ICs are IC 74138, which performs the operation of 3 to 8 decoder, IC 74139, which is a dual 2 to 4 decoder.
Application of Decoder
Some of the decoder application include
Code converters
Used in the memory system of computers to access a particular memory location based on the address produced by a computing device.
To carry out the operations in the Arithmetic Logic Unit of CPU, decoders are used to decode the program instructions to activate the control lines.

Читать полностью…

Cyber Education Official

Urgent job announcement
Job Location: 🇰🇭Cambodia
Gender: It doesn't matter
Age: From 21
Education level:Software or In any field of study, those who can only write English on a computer and Fast skill (speed>30WPM) can earn from $1000-1200 in addition to this, from 1300 to 1350 $ for those who can speak and translate Chinese language.
The organization can provide housing and food.
You are working on joint security and Cyber space.
position is to contact and help based on the keyword given to you by the Online Customer. and Many Software tool will provided
It also covers other expenses incurred during the process.

TICKET is from the company itself.
We can talk about the job.
For more information:
Telegram :- @SollinkManager

Читать полностью…

Cyber Education Official

Urgent job announcement.

Job Location: Dubai
Gender: It doesn't matter
Age: From 20
Education level: For those who can only write English on computer (speed>50WPM) from* $1300 - $1500, in addition to this, from  (2000$- 3500$)  for those who can speak and translate Chinese language You can earn by working a month.
The organization can provide housing and food.
We can discuss if you will cover the other expenses yourself and the work will be done for me.

Call us on +971586320709
and stay Updated.

Читать полностью…

Cyber Education Official

#RedTeam Blueprint

🔺 Red Team Blueprint - A unique Guide to Ethical Hacking 🔺

Info : https://www.udemy.com/course/the-redteam-blueprint/

🔺Size : 20GB

🔺Mega Link : https://mega.nz/folder/PYkhkIiZ#FI8Il1Jm2J0DqkOslkZZBQ

🔺 Drive Link : https://drive.google.com/folderview?id=1B_beUbV_94cOCusjRVzLR9dWNdNXDV4h

Читать полностью…

Cyber Education Official

Kali Linux 2023.1 Release (Kali Purple & Python Changes) | Kali Linux Blog
https://www.kali.org/blog/kali-linux-2023-1-release/

More at @ehackx

Читать полностью…

Cyber Education Official

TCM Security - Windows Privilege Escalation For Beginners

Читать полностью…

Cyber Education Official

Practical Linux for Penetrating & Bug Bounties

info : udemy.com/course/practical-linux-for-pentesting-bug-bounties-hacktify/

Читать полностью…

Cyber Education Official

Computer worm vs. virus
Some people think that a computer worm and computer virus are the same things because the two behave similarly. They may even use the terms like "worm computer virus" or "worm virus malware." The truth is that the two are comparable but different threats.
The defining difference between a virus and a worm is that viruses rely on human action for activation and need a host system to replicate. In other words, a virus won’t harm your system unless you run it. For example, a virus on a flash drive connected to your computer won’t damage your system unless you activate it. And as mentioned above, a worm doesn’t need a host system or user action to spread.
Computer worm examples
Over the years, there have been some particularly devastating worms. Some worms have caused billions in damage. Here is a brief list of some infamous ones:
Morris Worm: Also known as the Internet worm, this was one of the first computer worms to spread via the Internet and earn notoriety in the media.
Bagle: Also known as Beagle, Mitglieder, and Lodeight, this mass-mailing worm had many variants.
Blaster: Also known as MSBlast, Lovesan, and Lovsan, this worm attacked computers running Windows XP and Windows 2000.
Conficker: Also known as Downup, Downadup, and Kido, this worm exploited flaws in Windows to infect millions of computers in over a hundred countries.
ILOVEYOU: The ILOVEYOU worm infected tens of millions of computers globally, resulting in billions of dollars in damage.
Mydoom: This became the fastest-spreading email worm in 2004, sending junk email across computers.
Ryuk: Although Ryuk wasn't always a worm, it's now worm-like ransomware.
SQL Slammer: The SQL Slammer worm gained infamy for slowing down Internet traffic with denial-of-service attacks on some Internet hosts.
Storm Worm: This worm utilized social engineering with fake news of a disastrous storm to drop botnets on compromised machines.
Stuxnet: Some experts believe this sophisticated worm was developed for years to launch a cyberattack

Читать полностью…

Cyber Education Official

COMPUTER WORM

What is a computer worm? 
Several things may come to mind when you think of the word “worm." You may think of delicious soft chewie candies that are sugary and maybe a little sour. Or you may think of the cold-blooded invertebrate animals that wiggle across the Earth’s surface. And if you’re thinking in computing terms, the malware may spring to mind.
Similar to real worms, you can say that computer worms don’t have much of a backbone because they often rely on trickery to infect their hosts. They may also seem a bit coldblooded because they can be remorselessly destructive. Let’s learn more about them.
Worm definition (computer)
A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. Naturally, you must be wondering  and how does it relate to computer worms?   
To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems.  

Читать полностью…

Cyber Education Official

https://ift.tt/ZPvhU7d

Читать полностью…

Cyber Education Official

TCM Security - Open-Source Intelligence (OSINT) Fundamentals

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
VM + Exercises

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
VIdeos

Читать полностью…

Cyber Education Official

SANS SEC595: Applied Data Science and Machine Learning for Cybersecurity Professionals
PDF

Читать полностью…

Cyber Education Official

Programming Resources that may help with Cyber Security and Hacking are shared here

Читать полностью…

Cyber Education Official

Network Basics For Hackers

Читать полностью…
Subscribe to a channel