intelligence analysis Offsec – Solve the third stage of the vulnerable car race 15/03/202015/03/2020 At this point, the exploit exploit of the vulnerability in the machine to read the user's flag file is examined. In a broader sense, there was an iot-based vulnerability inside…
intelligence analysis… An explosive new report from Treadstone 71 Link Analysis of Various Iran Cyber Operators and Academics 04/10/2019 From indictments and the indicted to commercial organizations, academia, and cybersecurity conferences and organizations. The indicted Mojtaba Masoumpour maintained a company with current Iranian academics and cybersecurity professionals accepted…
2009… Offsec Conference 2019 27/03/201927/05/2019 Third Conference on Modern Achievements of Cyber and Offensive Attacks in IranThe 3rd conference from Offsec (Offensive Security - offsec.ir / offsecresearch.com / offsecmag) Offsec held the one-day conference on…
amnpardaz… We regard the use of these weapons (nuclear) to be illegal and haram. AEOI CTF – Iranian Nuke Capture the Flag 04/09/201611/05/2019 With respect to the many Iranian cyber professionals doing what is natural, standing up for your country - we find we must post data relative to adversaries. LEARN CYBER INTELLIGENCE…
cyber intelligence What it is like to be a hacker in Iran. 23/02/201623/02/2016 http://www.businessinsider.com/what-its-like-to-be-a-hacker-in-iran-2016-2
amnpardaz… Pathology of Western Games (feminism – video) 22/12/201522/12/2015 PATHOLOGY of WESTERN GAMES as defined by Iranian hackers and their analysis of Western video games - (emulation?) Issues Save the world Femininity Or proof of concept? Nature and culture The relative values Defect creation Cultural…