New: ethical-hackingAll contenthive-129948krhive-196917zzanhive-183959hive-180932hive-185836steemhive-150122hive-166405hive-101145hive-144064uncommonlabhive-145157hive-188619hive-183397hive-184714lifebitcoinkrsuccesshive-193637motivationhive-180301hive-103599hive-193186TrendingNewHotLikersnigelmarkdias (69)in hive-127392 • 3 years agosteemCreated with Sketch.Yes We Hack at GISEC | Rabih Achkar, Regional Director, Yes We HackYes We Hack at GISEC Rabih Achkar Regional Director Yes We Hack w: www.yeswehack.com e: [email protected] m: +971 55 858 3850cristi (70)in cybersecurity • 6 years agoWriting your Own Exploits as a PentesterIn this video I share my thoughts on the difficulty/feasibility of developing your own exploits as a penetration tester.nethunter957 (41)in ethical-hacking • 7 years agoWhat is ethical hacking!! What are the important things of ethical hacking!!Image source Ethical hacking entails a certified try and benefit unauthorized access to a laptop gadget, application, or facts. Carrying out an ethical hack entails duplicating techniques and…saddam957 (46)in ethical-hacking • 7 years agoWhy Is an Ethical Hacking Course So Important and Why You Need To Learn ItImage source Ethical Hacking is an inalienable phase of the cybersecurity. The enormous ever-increasing business activities of the companies due to globalization raise safety concerns to a giant…cristi (70)in cyber-security • 7 years agoOffensive Security Course from FSU - [Online Lectures]The Department of Computer Science from Florida State University has a page where it's all the materials required for the Offensive Computer Security course from the Spring of 2014. Not many…cristi (70)in offensive-security • 7 years agoA Collection of Vulnerable Machines for Penetration Testing and Offensive Security - [Vulnhub]If you're into offensive security, one of the best places to safely practice your craft is Vulnhub , which is a collection of virtual machines which are vulnerable by design. What do I mean by…ewq (54)in utopian-io • 7 years agoHow to find adresses and their locations with C.EWhat is Cheat-Engine? A powerful memory-analyzer (one of the best) What Is Reverse-Engineering? Some people spend time on coding and some people spend time on de-coding Welcome to the…ewq (54)in utopian-io • 7 years agoReverse-Engineering with Cheat-Engine / Getting into the language of Processors aka ASMWhat is Cheat-Engine? A powerful memory-analyzer (one of the best) What Is Reverse-Engineering? Some people spend time on coding and some people spend time on de-coding Welcome to the…ewq (54)in utopian-io • 7 years agoHow to bypass unclickable okay button to get through to the program to make it useableWhat is Process Hacker? Free and powerful multi-purpose tool that helps you monitor your system resources, debug software or detect malware. What you can do with it? You can view and manage…essenceofchaos (28)in anonymity • 8 years agoWithout a TraceTails is a live operating system used to preserve your privacy and anonymity. It is a complete operating system that boots from a DVD, USB, or SD card. The host computer stores no records of the…