In Users/sudosuraj.bash_profile add
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/tools
cd /Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools| from pydriller import RepositoryMining | |
| import re | |
| import base64 | |
| foundSet = set() | |
| for commit in RepositoryMining('./').traverse_commits(): | |
| for mod in commit.modifications: | |
| if mod.source_code_before != None: | |
| regex = re.findall(r"<text encoding=\"base64\">[^>]+</text>", mod.source_code_before) | |
| for result in regex: |
| #!/bin/bash | |
| # | |
| # crt.sh sub-domain check by 1N3@CrowdShield | |
| # https://crowdshield.com | |
| # | |
| OKBLUE='\033[94m' | |
| OKRED='\033[91m' | |
| OKGREEN='\033[92m' | |
| OKORANGE='\033[93m' |
In Users/sudosuraj.bash_profile add
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-tools
export PATH=$PATH:/Users/sudosuraj/Documents/AndroidSDKs/sdk/tools
cd /Users/sudosuraj/Documents/AndroidSDKs/sdk/platform-toolsChecklist of the most important security countermeasures when designing, testing, and releasing your API.
What It Does:
Completes the entire TCP three-way handshake (SYN → SYN-ACK → ACK) to fully establish a connection and then tears it down (often with an RST).
Pros & Cons:
Nmap Example:
NetBIOS (Network Basic Input/Output System) is a legacy protocol that still plays a role in many Windows networks. It handles several functions:
Name Servicing:
NetBIOS allows computers to register and resolve 16-character names. This makes it possible to identify and communicate with devices on a local network using human-readable names.
Connectionless Communication:
It supports communication methods that don’t require a sustained connection. This means messages can be sent without establishing a persistent link.
Session Layer Functions:
While primarily associated with lower-level operations, NetBIOS also provides some session layer capabilities to manage communication sessions.
| AI | |
| ├── Machine Learning (ML) | |
| │ ├── Supervised Learning | |
| │ │ ├── Regression | |
| │ │ └── Classification | |
| │ ├── Unsupervised Learning | |
| │ │ ├── Clustering | |
| │ │ └── Dimensionality Reduction | |
| │ ├── Reinforcement Learning | |
| │ └── Semi-supervised Learning |
| OSI Layer | TCP/IP Layer | Protocols | Services | Attacks | Tools |
|---|---|---|---|---|---|
| 7 - Application | 4 - Application | HTTP, HTTPS, DNS, FTP, SMTP, IMAP, SSH, Telnet, SNMP | Web, Email, File Transfer, Remote Login | XSS, SQLi, Command Injection, SSRF, SMTP Spoofing, Auth Bypass | Burp Suite, ZAP, Postman, curl, dig, ffuf, nslookup |
| 6 - Presentation | 4 - Application | SSL/TLS, JPEG, MPEG, ASCII, EBCDIC | Encryption, Encoding, Compression |