pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
r00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability
r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
The Global Business Technology Event, CeBIT Australia 2015
CeBIT Australia 2015 The Global Business Technology Event 5 – 7 May 2015 Sydney Olympic Park CeBIT Australia is the …
SPTechCon, August 24-27 in Boston
SPTechCon, August 24-27 in Boston, is the world’s premier independent event for SharePoint and Office 365. The format includes 70+ …
pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
CISO Chicago Summit: August 20th
The CISO Chicago Summit is a chance for CISOs and IT security executives in Chicago to meet with peers from …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
2nd Annual Kingdom Cyber Security Forum
Dates: 12-13 May 2015Venue: Burj Rafal Kempinski Hotel, Riyadh, Saudi Arabia As cyber threats rise in Saudi Arabia, the Government and …
KMS Technology Participates in $2.5MM Series A Funding Round for QASymphony
Atlanta, GA – February 5, 2015 -- KMS Technology, a leading provider of offshore product development services, announced today their continued …
CISO Gas Summit: June 23rd
The CISO GAS Summit is a chance for CISOs and IT security executives across the Germany/Austria/Switzerland region to meet with …
CISO US Summit: November 8-10th
The CISO Summit is a chance for CISOs and IT security executives across North America to meet with their peers …
InterDrone, The International Drone Conference and Exposition
InterDrone, The International Drone Conference and Exposition, September 9-10-11 in Las Vegas, is the first global scale conference for the …
Cloud MENA Forum
April 13th - 14th 2015 The 5th Annual Cloud MENA event returns to Dubai in April! The only event to …
The Cyber Hack 2014
The Cyber Hack NEW for 2014! The Cyber Hack, in association with 44CON Cyber Security A new live open …
CISO Summit New York
Taking place on April 14, 2015 in New York City, the CISO Summit New York is an invitation-only technology event …
Who is spying on you? by DjiBestBuy
Who is spying on you? The source that is used to spy on you might be closer to you than …
Shadow Admins: What Are They and How Can You Defeat Them?
Managing something you don’t even know exists in your network is always a challenge. This is why the problem of …
SPTechCon Developer Days
SPTechCon Developer Days will feature Microsoft speakers and MVPs, the brightest minds in Microsoft, Web and SharePoint development, to help …
CYBER SECURITY SUMMIT
Event name: CYBER SECURITY SUMMIT Financial Services, MENA Date: 9th – 10th March 2015 Place: Dubai, UAE Headline:“Permanent Focus on …
Testing Checklist: How To Test A Mobile App
It’s a fact of life today that many businesses need mobile apps to be competitive. Consumers these days expect to …
Big Data TechCon - April 26-28 in Boston
Big Data TechCon, April 26-28 in Boston, is the “how-to” show for big data developers, IT managers and practitioners. Big Data TechCon is …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations
The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …
Space Cybersecurity: a Strategic Issue in the Current Geopolitical Context
by Anaïs Shay-Lynn Vydelingum The security of space infrastructures is a geopolitical issue, as space-based resources are increasingly used by …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.