Continuing to Support the Adversary
پی دی اف آموزش هکر قانونمندزبان فارسیUnidentified_TM
پی دی اف آموزش هکر قانونمندزبان فارسیUnidentified_TM
January 8, 2020 [wpvideo 8e3xd4zJ]
Iran can respond very easily to US regional proxy forces including Israel and Saudi Arabia. They can mine the Persian Gulf; they can target US...
Ayatollah Ali Khamenei's quick election of Ismail Qaani as Quds Force's new commander, but only because he announced that nothing had happened and the body...
Sardar Haji Zadeh, IRGC Air Force Commander:We are among the top five countries in the world in the field of UAVs. Today, the world's largest...
«لب دوختگان» جهت افشای فعالیتهای مذبوحانه جمهوری اسلامی خواهان حمایت مالی شما میباشد. مبالغ دریافت شده تنها در راستای این امر مقدس و به هدف...
Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc....
اطلاعاتInformation in transit is secured in communication networks SATA stands for "Threat Information Sharing and Analysis System" The SATA systemaims to analyze and monitor cyber...
Below is a recent update to the #Iranian #Offensive #Cyber #Security #Roadmap in their own words (original here: https://cybershafarat.com/2019/06/02/irhackersans/ ) #0x01 Network Plus Understand the structure...
Iran purchased the system six months ago from the Russian Defense Ministry. R-330Zh Zhitel The Russian R-330Zh Zhitel automated jamming communication station is designed for...
Work done in the first 3 months of the year 97 Objectives: 1- Collecting information from the Kuwaiti Divan Organization Portals (mail.da-admin.gov.kw) 2- Receiving 1...
The Iranian hacker "Mr.Tekide" who aided cyber espionage attacks on the US unmasked by Treadstone 71. Treadstone 71 - Tekide-Ghavaland-II The Fox News report: Tekide...
The Ministry of Intelligence on the identification of 17 trained intelligence officers (CIA)The Ministry of Intelligence managed to destroy a spy network linked to the...
[wpvideo YcCgKLUn data-temp-aztec-id="25c4d4a3-c5a2-493a-9632-4316505194e6"] [wpvideo myJnaGot] [wpvideo 6zWj7hcZ] [wpvideo tsT5602G data-temp-aztec-id="3a97d249-55c4-4eab-8e09-eb359ce8aa4a"] [wpvideo Q7eDAolj] [wpvideo mlJFnqEj] [video data-wpid="1404" src="https://cybershafarat.com/vid_20190722_013330_849-mp4/" class="size-full"] [wpvideo UtYrknSp] The English Stena Impero seizure...
The Pentagon claimed to have captured its signals through Jamming and the E-UAV first and then targeted it with LMADIS. 📡 US has launched a...
The IRGC sought out terrorist cells on the frontiers of the Kurdistan region with Iraq / Destroying active centers of terrorist groups and killing and...
بیست و پنجمین نمایشگاه بین المللی الکترونیک، کامپیوتر و تجارت الکترونیک با حضور شرکت امنیتی ایران Iranian Cyber Security Company The 25th International Electronics, Computer...
NIAC is not the voice of Iranians Protest vs. NIAC July 19th at 13:00 in Washington DC niacouncil.org #ProtestAgainstNIAC. A group of opposition activists from...
Best Tools for Increasing Access to Linux and Windows - 2019 Full List and then some بهترین ابزارهای افزایش دسترسی لینوکس و ویندوز - «...