Morpheus : Te voilà enfin. Bienvenue, Néo. Comme tu as du le deviner, je suis Morpheus. Neo : Très honoré de te voir enfin. Morpheus : Non, tout l'honneur est pour moi. Par ici, viens, assieds-toi.. Je suppose que pour l'instant tu te sens un peu comme Alice, tombée dans le terrier du lapin blanc. Neo :
Computer button pusher // Autodidact since my childhood || SIN - SIN HACK - HACK || NO-CODE evangelist || Skiddie learning REDTEAMING - Black coffee like my sense of humor Saltinbank-SyS
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Today, after working with Windows for over 15 years now, I finally came across the solution to the | |
dreadfull BSOD STOP 0x0000007B after replacing the motherboard of a computer, or after moving the | |
harddrive to another computer, or after doing a P2V, or after ... you get the point. | |
Requirements: | |
- Windows install / boot CD | |
- Chipset / Mobo / Storage drivers of the new motherboard or storage controller | |
Steps: | |
- extract all the drivers to a USB thumb drive |
Github for other repositories and more content https://lnkd.in/e4jNvHEn Extended Programming Guide [2000 links]: https://lnkd.in/e5JhiCug Cyber Security Guide [1500 links]: https://lnkd.in/d7qsdQcG Backend Developer Guide [500 links]: https://lnkd.in/eEn9XFmM Frontend Developer Guide [500 links]: https://lnkd.in/e5GsCMZW
BIG SHOUT OUT TO ZORS /./ ONE LUV
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How-tos (text based) | |
The Havoc C2 Framework - https://lnkd.in/gUnkxpRg | |
Havoc C2 Basics - https://lnkd.in/gps2mKaH | |
Havoc C2 Intro & Inline C# Compilation within PowerShell - https://lnkd.in/gf4rTRck | |
Home Grown Red Team: Getting System On Windows 11 With Havoc C2 - https://lnkd.in/gpwJi4fi | |
Home Grown Red Team: From Workstation To Domain Controller With Havoc C2 and Microsoft EDR - https://lnkd.in/gvBY2KqY | |
How-to (video) | |
IRL Hacker: EP #37 - Havoc C2 With #C5pider - https://lnkd.in/gvG_NEAJ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🎡 Attack-Defense - https://buff.ly/3FMbOB6 | |
🎡 Alert to win - https://buff.ly/3BtqJOb | |
🎡 Bancocn - https://buff.ly/3HpEWzo | |
✨ CTF Komodo Security - https://buff.ly/3FLdtXs | |
✨ CryptoHack - https://buff.ly/2XkGXpC | |
✨ CMD Challenge -https://buff.ly/3oJR9E7 | |
❄ Exploitation Education - https://buff.ly/3llfSNt | |
❄ Google CTF - https://buff.ly/3hht1c8 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
FOR /F "tokens=1,2*" %%V IN ('bcdedit') DO SET adminTest=%%V | |
IF (%adminTest%)==(Access) goto noAdmin | |
for /F "tokens=*" %%G in ('wevtutil.exe el') DO (call :do_clear "%%G") | |
echo. | |
echo Event Logs are now in Heaven .. // Event Logs sont au Paradis! <Press any Key ^^ // Pressez une Touche ^^> | |
goto theEnd | |
:do_clear | |
echo effacement %1 | |
wevtutil.exe cl %1 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. 🎓Certified in Cybersecurity℠ - CC by ICS2: https://lnkd.in/gW3w8Jqu | |
2. 🎓Cybersecurity Essentials by Cisco Academy: https://lnkd.in/gZe6bf-t | |
3. 🎓Networking Essentials by Cisco Academy: https://lnkd.in/gjipDpgG | |
4. 🎓Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp | |
5. 🎓Network Security by Udacity: https://lnkd.in/gSHx2tJQ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
𝐋𝐢𝐬𝐭 𝐨𝐟 𝟓𝟎 𝐓𝐨𝐩 𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜𝐬 𝐓𝐎𝐎𝐋𝐒 . | |
1. Autopsy: https://www.autopsy.com/ | |
2. EnCase: https://lnkd.in/dRwh9VwZ | |
3. AccessData Forensic Toolkit (FTK): https://lnkd.in/dwhkAFKt | |
4. X-Ways Forensics: https://www.x-ways.net/ | |
5. Sleuth Kit: https://www.sleuthkit.org/ | |
6. Volatility: https://lnkd.in/dXX7-Vwc | |
7. Wireshark: https://www.wireshark.org/ | |
8. Cellebrite UFED: https://lnkd.in/dqm7x8cs |
OlderNewer