Not necessarily meant to be followed step by step, although it is recommended. Some steps are valid during all levels, others give way to better alternatives further on.
/********************************************************************* | |
* | |
* Name: user.js | brainfucksec | |
* Date: 2024-10-20 | |
* Version: 0.23.0 | |
* Descr.: Mozilla Firefox configuration file: `user.js` | |
* URL: https://gist.github.com/brainfucksec/68e79da1c965aeaa4782914afd8f7fa2 | |
* Maintainer: brainf+ck | |
* | |
* INFO: |
Name | Package Id | Version | Source |
---|---|---|---|
7Zip | 7zip.7zip | 19.0.0 | winget |
Altap Salamander | salamander | choco | |
Alt-Tab Terminator | alt-tab-terminator | choco | |
AutoHotkey | Lexikos.AutoHotkey | 1.1.33.02 | winget |
AutoHotkey Store Edition | HaukeGtze.AutoHotkeypoweredbyweatherlights.com | Latest | msstore (via winget) |
Carnac |
Botnets (networks of compromised computers) are often used for malicious activities such as spam, click fraud, identity theft, phishing, and distributed denial of service (DDoS) attacks. Most of previous researches have introduced fully or partially signature-based botnet detection approaches.
In this paper, we propose a fully anomaly-based approach that requires no a priori knowledge of bot signatures, botnet C&C protocols, and C&C server addresses. We start from inherent characteristics of botnets. Bots connect to the C&C channel and execute the received commands. Bots belonging to the same botnet receive the same commands that causes them having similar netflows characteristics and performing same attacks. Our method clusters bots with similar netflows and attacks in different time windows and perform correlation to identify bot infected hosts. We have developed a prototype system and evaluated it with real-world traces including normal traffic and several real-world botnet traces. The results show that o
#!/usr/bin/env python3 | |
""" ASF OAuth example in Python 3""" | |
import cgi | |
import os | |
import requests | |
import urllib | |
import uuid | |
def init_oauth(): |
#!/usr/bin/env python3 | |
""" | |
Script used to pull down the current video descriptions from ippsec's youtube channel. | |
The raw output still has a few HTML tags that need to be manually removed and there | |
also seem to be multiple duplicates of videos that have been removed in the output | |
saved as ippsec-details.txt | |
""" | |
import re | |
import sys |
The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019 | |
Original / 1st version here: https://pastebin.com/rMw4WbhX | |
___________________________________________________________________________________ | |
# Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity | |
# These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies # on Earth. | |
. | |
.. | |
........ | |
@ | |
* | |
*.* | |
*.*.* | |
🎠| |
0 |