#whitehathacking

Ankit BytecodeAnkitBytecode
2025-02-19

🚨 Watch this video to learn about the top tools used for mobile hacking – for educational purposes only! 📱🔍 Stay informed, stay secure! 🔐
.
Follow for more 👇
craw.in/ethical-hacking-course

Ivan Maljukanović 🏳️‍🌈Imoptimal
2023-11-17

I've been reading about the subject of in the recent weeks, and the area of really intrigued me.

There have been similar programs, but only for the core.

I'm glad there's a new financial incentive in the WordPress ecosystem, to help fix bugs and security issues of popular plugins/themes, and make this project remain competitive.

:underheart:

wptavern.com/wordfence-launche

Thomas Schwenkethsch@legal.social
2023-09-27

🕵🏻 "Cybercrime & White-Hat-Hacking" - rechtsbelehrung.com/119-cyberc - Wann Hacking erlaubt ist, warum Hacker dennoch immer auf der Hut sein müssen und wie sie sich vor Strafverfolgung schützen können, erklären wir in der @rechtsbelehrung gemeinsam mit Johanna Voget, LL.M., wissenschaftliche Mitarbeiterin und Doktorandin am Institut für Informations-, Telekommunikations- und Medienrecht (ITM) der Uni Münster. 🎧

/w @monoxyd

#podcast #Rechtsbelehrung #cybercrime #hacking #whiteHatHacking

How to #pwn an airline (#TSA no-fly list and "selectee" lists were found on a unsecured/misconfigured server of a small #airline company in the U.S.)

maia.crimew.gay/posts/how-to-h

#pwnage #whitehathacking #datasecurity #hacked

Victor Jara (Tribute)poetapeligroso@kolektiva.social
2022-12-10

Found this gem on #distro watch it was free. Following the #threatintel hashtag after a dust up with the nzboi trolls

This ain't no ad I just a rank and file antifascist mofo like you.Zero financial interest in the book. If trolls tryn report me the admins here will probably just block the trolls so nazis fuck off.

Had to give a "business" eamil but they took a free one. Imma business, the business of fighint fascsim. Professional revolutionary and all that.

So if yer into #whitehathacking jump on this shit while it's still available. Writer is a Ph D candidate.

I think they are making some kind of marketing database so whatever. Looks pretty legit.

Here is the boiler plate:

#Cyber #ThreatIntelligence converts threat information into evidence-based intelligence that uncovers adversaries' intents, motives, and capabilities for effective defense against all kinds of threats.

This book thoroughly covers the concepts and practices required to develop and drive threat intelligence programs, detailing the tasks involved in each step of the CTI lifecycle.

You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. With the help of practical examples, this book will help you get to grips with threat data processing and analysis. And finally, you'll be well-versed with writing tactical, technical, and strategic intelligence reports and sharing them with the community.

... skills required to drive threat intelligence operations from planning to dissemination phases, protect your organization, and help in critical defense decisions.

ISMS-BlogRoy_ISMS_Blog
2022-07-08

: Forschende, die eine IT- identifizieren und melden, können dafür in Deutschland gemäß den Paragraphen 202a und 202c des StGB strafrechtlich verfolgt werden.
In dem Whitepaper „White-Hat-Hacking in der Forschung“ ()werden die Auswirkungen dieser Paragraphen auf die IT-Sicherheitsforschung aufgezeigt.
hgi.rub.de/news/newsarchiv/hgi
-Blog

WetzWetz' OnlyFriends 🥵🔞markuswet@toot.io
2018-12-12

"Ok, I just became domain admin..... so..... what now??"

#pentest #whitehathacking #postexploitation #activedirectory #domainadmin #postpostexploitstion

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst