Tehran – Hasan Khan Castle
Tehran - Hasan Khan Castle - setting fire to the Basij anti-people base by brave youth
We See What Others Cannot
Tehran - Hasan Khan Castle - setting fire to the Basij anti-people base by brave youth
updated exploit development resources for learning:https://github.com/0xZ0F/Z0FCourse_ReverseEngineeringhttps://crackmes.onehttps://0xwyvn.github.iohttps://github.com/jeffssh/exploitshttps://malwareunicorn.org/workshops/re101.html#0https://www.youtube.com/watch?v=qSnPayW6F7Uhttps://twitter.com/pedrib1337/status/1696169136991207844?s=46https://www.pentesteracademy.com/course?id=3https://nora.codes/tutorial/an-intro-to-x86_64-reverse-engineering/https://www.reddit.com/r/ExploitDev/comments/7zdrzc/exploit_development_learning_roadmap/https://github.com/Cryptogenic/Exploit-Writeupshttps://www.youtube.com/@pwncollege/videoshttps://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdfhttp://www.phrack.org/issues/49/14.html#articlehttps://github.com/justinsteven/dostackbufferoverflowgoodhttps://github.com/FabioBaroni/awesome-exploit-developmenthttps://github.com/CyberSecurityUP/Awesome-Exploit-Developmenthttps://github.com/RPISEC/MBEhttps://github.com/hoppersroppers/nightmarehttps://github.com/shellphish/how2heaphttps://www.youtube.com/watch?v=tMN5N5oid2chttps://dayzerosec.com/blog/2021/02/02/getting-started.htmlhttps://github.com/Tzaoh/pwning https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
There is an outbreak of respiratory diseases in China. WHO believes that travel to China and trade should not be restrictedIn China, the incidence of respiratory diseases has been increasing since September 13. There are outbreaks of undiagnosed pneumonia in children in northern China, Chinese hospitals are “overloaded with sick children”, and the outbreak has already spread to Beijing and Liaoning, writes The Telegraph.The children “do not cough or have any symptoms. They just have…
In the past , we exposed the Soori Tech Institute attached to the terrorist Revolutionary Guards Air Forces and their activities. The international agency Iran International also covered this issue in detail. Today, we will expose two of the terrorists of this institution to you: 1. Jafar Khodabakhsh Bonab- This Haram Laqmeh is one of the Quds forces who works in the weapons production projects for Hezbollah at the TIC Institute.- The name of the…
It is noteworthy that it has a kind of “rating” function :) A system for monitoring the media space in Telegram called “Katyusha”.It structures the content for quick study of incoming material. The Russian Ministry of Defense is also used to respond to information from military bloggers and military correspondents. MINISTRY OF DEFENSE OF THE RUSSIAN FEDERATION (MINISTRY OF DEFENSE OF RUSSIA)DEPARTMENT OF INFORMATION AND MASS COMMUNICATIONSDeputy General Director of the Federal State Unitary Enterprise…
We will soon launch a second cyberattack on Israel. In the first attack, we were able to hack 100 Israeli websites and dozens of official sites and leak their data, and shut down several major websitesسنشن قريبًا هجومًا إلكترونيًا ثانيًا على إسرائيلتمكنا في الهجوم الأول من اختراق 100 موقع إسرائيلي وعشرات المواقع الرسمية وتسريب بياناتها، وأغلقنا عدة مواقع رئيسيةСкоро мы начнем вторую кибератаку на Израиль-В ходе первой атаки нам удалось взломать 100 израильских веб-сайтов и…
Deylaman, which was previously reviewed in the channel under the name Damavand-2, is the most complete member of the Moj class frigate family. + The ship's breast cannon is still the 76 mm Fajr-27 cannon with the former spherical shell, and the new stealth shell is not used.30 mm 6-barrel "Lasso" Gatling-type heel cannon, which is currently not equipped with electro-optics for fire control8 anti-ship cruise missile launchers of the Noor/Qader/Qadir family have been used…
real-time confrontation between attackers and defenders of cyber security of infrastructures and industries You can watch the full video of Ravin Academy's report on the fascinating Moscow Hacking Week event; https://youtu.be/q7KGFby8uXQ?si=_qsmXU2Bv4ynQXJH
“The Invisible War”, a docu-fiction series about cybersecurity in Russia. Each episode is a story about a current cyber threat, which is told in its own genre: thriller, animation, drama, action and sci-fi. The game plot is intertwined with documentary footage - the speech of speakers: “white hat” hackers and other cybersecurity experts who tell us how to avoid becoming a target in cyberspace. The purpose of the series is to talk about what can…
The US psychological operations system, how it works, history, trends.- what successes and failures did the Pentagon have during PSYOP (Iraq, Somalia).- the Pentagon's new technological toolkit.- connecting the civilian sector to cognitive warfare.-what is the problem with American narratives and the reason for the inconsistency in the implementation of strategic PSYOPs.- why the Pentagon does not want to share the budget with other actors and services.- whether PSYOP tools are used to solve domestic…
You must be logged in to post a comment.