pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
r00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability
r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
The Global Business Technology Event, CeBIT Australia 2015
CeBIT Australia 2015 The Global Business Technology Event 5 – 7 May 2015 Sydney Olympic Park CeBIT Australia is the …
CISO Chicago Summit: August 20th
The CISO Chicago Summit is a chance for CISOs and IT security executives in Chicago to meet with peers from …
​​SPTechCon, August 24-27 in Boston
​​SPTechCon, August 24-27 in Boston, is the world’s premier independent event for SharePoint and Office 365. The format includes 70+ …
pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
2nd Annual Kingdom Cyber Security Forum
Dates:Â 12-13 May 2015Venue: Burj Rafal Kempinski Hotel, Riyadh, Saudi Arabia As cyber threats rise in Saudi Arabia, the Government and …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
CISO Gas Summit: June 23rd
The CISO GAS Summit is a chance for CISOs and IT security executives across the Germany/Austria/Switzerland region to meet with …
CISO US Summit: November 8-10th
The CISO Summit is a chance for CISOs and IT security executives across North America to meet with their peers …
InterDrone, The International Drone Conference and Exposition
InterDrone, The International Drone Conference and Exposition, September 9-10-11 in Las Vegas, is the first global scale conference for the …
KMS Technology Participates in $2.5MM Series A Funding Round for QASymphonyÂ
Atlanta, GA – February 5, 2015 -- KMS Technology, a leading provider of offshore product development services, announced today their continued …
Shadow Admins: What Are They and How Can You Defeat Them?
Managing something you don’t even know exists in your network is always a challenge. This is why the problem of …
SPTechCon Developer Days
SPTechCon Developer Days will feature Microsoft speakers and MVPs, the brightest minds in Microsoft, Web and SharePoint development, to help …
4 Reasons Why We Need Cybersecurity Innovation
Every day we see news of another cyber breach. Our faith has been shaken as large corporations fall to a …
r00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability
r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be …
Cloud MENA Forum
April 13th - 14th 2015 The 5th Annual Cloud MENA event returns to Dubai in April! The only event to …
The Cyber Hack 2014
The Cyber Hack NEW for 2014! Â The Cyber Hack, in association with 44CON Cyber Security A new live open …
CISO Summit New York
Taking place on April 14, 2015 in New York City, the CISO Summit New York is an invitation-only technology event …
Who is spying on you? by DjiBestBuy
Who is spying on you? The source that is used to spy on you might be closer to you than …
Testing Checklist: How To Test A Mobile App
It’s a fact of life today that many businesses need mobile apps to be competitive. Consumers these days expect to …
Cyber Kill Chain: Reconnaissance
No wonder that cyber threats pose a significant risk to all of us be it individuals, organizations and nations. Cyber-attacks …
Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence
Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …
Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage
Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …