Collection of recent infosec/hacking videos from conferences.
The Compilation of SHODAN Filters is a comprehensive list of search filters that can be used on the SHODAN search engine to narrow down results based on specific criteria such as date, location, network details, and more. General Filters: - after: Only show results after the given date (dd/mm/yyyy) - asn: Autonomous system number - before: Only show results before the given date (dd/mm/yyyy) - category: Available categories (e.g., ics, malware) - city: Name of the city - country: 2-letter country code - geo: Accepts between 2 and 4 parameters for location - hash: Hash of the data property - has_ipv6: True/False for IPv6 - has_screenshot: True/False for screenshot availability - hostname: Full hostname for the device - ip: Alias for net filter - isp: ISP managing the netblock - net: Network range in CIDR notation - org: Organization assigned the netblock - os: Operating system - port: Port number for the service - postal: Postal code (US-only) - product: Name of the product
Collection of recent infosec/hacking videos from conferences.
A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
Linux-based operating system intentionally vulnerable for cybersecurity practice.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
A documentation template library for implementing industrial information security management systems.
Comprehensive cheat sheet for SQLite SQL injection techniques and payloads.