cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

white2hack

][-андерграунд, софт, статьи, инструкции, гайды для новичков и экспертов по информационной безопасности. Этичный хакинг и защита своих данных 🔊 Связь @w2hack_feed_bot 💬 Чат https://t.me/+VdkEIWudTi5m3dsA 🏛 Обмен @w2h_storage

Show more
Advertising posts
9 859
Subscribers
+324 hours
+177 days
+11030 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

😺😺😺 #fun
Show all...
😁 15👍 4🤣 2
Firmware Security Testing Methodology by OWASP, 2024
Show all...
🔥 10
Firmware Security Testing Methodology by OWASP, 2024 The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. #penter #hardware
Show all...
👍 7🔥 1
Certified Ethical Hacking (CEH) notes, 2024
Show all...
👍 3
Certified Ethical Hacking (CEH) notes, 2024 I express my gratitude to the author for producing such valuable notes for CEH #exam
Show all...
👍 7
World Password Day 2024 Thursday, May 2, 2024, is World Password Day. Established in 2013, the event is observed on the first Thursday of May with the goal of improving awareness of the importance of creating complex and unique passwords and adopting password best practices to keep sensitive information private and confidential. #fun
Show all...
🎉 5👍 3
Privilege Escalation Attacks by Dan Nanni #linux #pentest
Show all...
🔥 7😁 2
Useful CLI Tools for Linux Admin by Dan Nanni #linux
Show all...
🔥 6
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023
Show all...
👍 5🔥 1
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023 Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline DevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software. This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles. #book #SecDevOps
Show all...
👍 5