Cybercrime (hiding activities in cyberspace) more #Iranian training
Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc. for your own purposes (offensive…
We See What Others Cannot
Friday, September 6, 1:50 pm The purpose of the training course During this course you will learn how to use the internet, social networks, etc. for your own purposes (offensive…
For the first time in Iran Specialty course Bypass security mechanisms (Antivirus - Sandbox) To sign up for the "Bypass Security (Antivirus - Sandbox)" course, you can get a 10-person…
[wpvideo YcCgKLUn data-temp-aztec-id="25c4d4a3-c5a2-493a-9632-4316505194e6"] [wpvideo myJnaGot] [wpvideo 6zWj7hcZ] [wpvideo tsT5602G data-temp-aztec-id="3a97d249-55c4-4eab-8e09-eb359ce8aa4a"] [wpvideo Q7eDAolj] [wpvideo mlJFnqEj] [video data-wpid="1404" src="https://cybershafarat.com/vid_20190722_013330_849-mp4/" class="size-full"] [wpvideo UtYrknSp] The English Stena Impero seizure operation in the Persian Gulf…
خب اول از همه ما به چند برنامه نیاز داریم یک دیباگر Ghidra که محصول سازمان NSA هست دوم Java JDK 11 برای اجرای این دیباگر سوم یک برنامه قربانی…
Major General Salami: We are breaking the monopoly of the great powers in the field of advanced communication technologies. The Sepehr 110 Tactical Communication System was unveiled at the presence…
The security team of the company, for IEDB.IR website has decided to sell the site. This includes all the data from the Iranian Exploit Database focused on hacking, exploits, coding,…
lab_dookhtegan front end release
#Bypass NX-PIE with Ret2Libc یکی از مشکلاتی که هنگام اکسپلویت کردن یک نرم افزار پیش می آید،بیت nx هستش.در واقع این یک قانون ساده برای باینری فایل های لینوکس (elf)…
[wpvideo 96SZLeJ6] [wpvideo fIgkTFtK] [wpvideo VE2orS9C]
You must be logged in to post a comment.