好物分享
-
CEHv13 Notes – Module 03: Scanning Networks
Learning Objectives ▪ Describe the network scanning concepts ▪ Use various scanning tools ▪ Perform host discovery to check for live s…… -
Using AI to Generate Commands and Run it From Linux Command Shell
Shell GPT (SGPT) is a command-line tool that integrates with OpenAI’s GPT-4 models to enable natural language processing (NLP) from your Linux …… -
CEHv13 Notes – Module 02: Footprinting and Reconnaissance
Footprinting is the first step in the evaluation of the security posture of the IT infrastructure of a target organization. Through footprinting and…… -
Understanding TCPDUMP Grammar and Output with Examples
These examples's output and command options may have a difference in a different linux release. Basic TCPDUMP Commands: tcpdump p…… -
Underdefense MAXI Platform
UnderDefense is a cybersecurity company that offers services to help businesses protect against cyber threats. UnderDefense MAXI A security-a…… -
Kali Usage Tips and Tricks
Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools whi…… -
CISO Leadership Workshop Overview (Job, Priority, Tabletop, Mindmap)
The Chief Information Security Office (CISO) or vCISO workshop helps accelerate security program modernization with reference strategies built using…… -
MDE Deployment and Configuration Steps with Security Policy Details
The following steps is only used for a selected environment to have a simplified deployments which is to target bringing MDE to all devices as fast …… -
Tailscale VPN Configuration Including Exit Node in 5 Minutes
Tailscale is a modern VPN solution that simplifies secure networking by creating private, encrypted connections between devices, no matter where the…… -
SentinelOne – S1 – Console
This post is used to show SentinelOne Console scrrenshots for future reference. Dashboard Dashboard URL: https://usea1-066.sentinelone.net/……