In Users/sudosuraj.bash_profile
add
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/tools
cd /Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
from pydriller import RepositoryMining | |
import re | |
import base64 | |
foundSet = set() | |
for commit in RepositoryMining('./').traverse_commits(): | |
for mod in commit.modifications: | |
if mod.source_code_before != None: | |
regex = re.findall(r"<text encoding=\"base64\">[^>]+</text>", mod.source_code_before) | |
for result in regex: |
#!/bin/bash | |
# | |
# crt.sh sub-domain check by 1N3@CrowdShield | |
# https://crowdshield.com | |
# | |
OKBLUE='\033[94m' | |
OKRED='\033[91m' | |
OKGREEN='\033[92m' | |
OKORANGE='\033[93m' |
In Users/sudosuraj.bash_profile
add
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/tools
cd /Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
Checklist of the most important security countermeasures when designing, testing, and releasing your API.
What It Does:
Completes the entire TCP three-way handshake (SYN → SYN-ACK → ACK) to fully establish a connection and then tears it down (often with an RST).
Pros & Cons:
Nmap Example:
NetBIOS (Network Basic Input/Output System) is a legacy protocol that still plays a role in many Windows networks. It handles several functions:
Name Servicing:
NetBIOS allows computers to register and resolve 16-character names. This makes it possible to identify and communicate with devices on a local network using human-readable names.
Connectionless Communication:
It supports communication methods that don’t require a sustained connection. This means messages can be sent without establishing a persistent link.
Session Layer Functions:
While primarily associated with lower-level operations, NetBIOS also provides some session layer capabilities to manage communication sessions.
AI | |
├── Machine Learning (ML) | |
│ ├── Supervised Learning | |
│ │ ├── Regression | |
│ │ └── Classification | |
│ ├── Unsupervised Learning | |
│ │ ├── Clustering | |
│ │ └── Dimensionality Reduction | |
│ ├── Reinforcement Learning | |
│ └── Semi-supervised Learning |
OSI Layer | TCP/IP Layer | Protocols | Services | Attacks | Tools |
---|---|---|---|---|---|
7 - Application | 4 - Application | HTTP, HTTPS, DNS, FTP, SMTP, IMAP, SSH, Telnet, SNMP | Web, Email, File Transfer, Remote Login | XSS, SQLi, Command Injection, SSRF, SMTP Spoofing, Auth Bypass | Burp Suite, ZAP, Postman, curl, dig, ffuf, nslookup |
6 - Presentation | 4 - Application | SSL/TLS, JPEG, MPEG, ASCII, EBCDIC | Encryption, Encoding, Compression |