pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
r00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability
r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …
The Global Business Technology Event, CeBIT Australia 2015
CeBIT Australia 2015 The Global Business Technology Event 5 – 7 May 2015 Sydney Olympic Park CeBIT Australia is the …
CISO Chicago Summit: August 20th
The CISO Chicago Summit is a chance for CISOs and IT security executives in Chicago to meet with peers from …
SPTechCon, August 24-27 in Boston
SPTechCon, August 24-27 in Boston, is the world’s premier independent event for SharePoint and Office 365. The format includes 70+ …
pamspy - Credentials Dumper for Linux using eBPF
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …
2nd Annual Kingdom Cyber Security Forum
Dates: 12-13 May 2015Venue: Burj Rafal Kempinski Hotel, Riyadh, Saudi Arabia As cyber threats rise in Saudi Arabia, the Government and …
UEFI_RETool - A tool for UEFI firmware reverse engineering
UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …
KMS Technology Participates in $2.5MM Series A Funding Round for QASymphony
Atlanta, GA – February 5, 2015 -- KMS Technology, a leading provider of offshore product development services, announced today their continued …
CISO Gas Summit: June 23rd
The CISO GAS Summit is a chance for CISOs and IT security executives across the Germany/Austria/Switzerland region to meet with …
CISO US Summit: November 8-10th
The CISO Summit is a chance for CISOs and IT security executives across North America to meet with their peers …
InterDrone, The International Drone Conference and Exposition
InterDrone, The International Drone Conference and Exposition, September 9-10-11 in Las Vegas, is the first global scale conference for the …
Who is spying on you? by DjiBestBuy
Who is spying on you? The source that is used to spy on you might be closer to you than …
Shadow Admins: What Are They and How Can You Defeat Them?
Managing something you don’t even know exists in your network is always a challenge. This is why the problem of …
SPTechCon Developer Days
SPTechCon Developer Days will feature Microsoft speakers and MVPs, the brightest minds in Microsoft, Web and SharePoint development, to help …
4 Reasons Why We Need Cybersecurity Innovation
Every day we see news of another cyber breach. Our faith has been shaken as large corporations fall to a …
Cloud MENA Forum
April 13th - 14th 2015 The 5th Annual Cloud MENA event returns to Dubai in April! The only event to …
The Cyber Hack 2014
The Cyber Hack NEW for 2014! The Cyber Hack, in association with 44CON Cyber Security A new live open …
CISO Summit New York
Taking place on April 14, 2015 in New York City, the CISO Summit New York is an invitation-only technology event …
Testing Checklist: How To Test A Mobile App
It’s a fact of life today that many businesses need mobile apps to be competitive. Consumers these days expect to …
Big Data TechCon - April 26-28 in Boston
Big Data TechCon, April 26-28 in Boston, is the “how-to” show for big data developers, IT managers and practitioners. Big Data TechCon is …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
IDENTIFYING ATTACKERS IN THE EARLY PHASE OF THE CYBER KILL CHAIN
Modern cyberwarfare requires a deep understanding of attacker tactics and an agile response to protect organizations against evolving threats. In …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.