Say you have this setup:
fileA
carrot
cake
tomato
fileB
bread
cake
croissant
To get the lines that are in FileA but not in FileB you can run:
diff fileB fileA | grep '^>' | sed 's/^>\ //'
to get:
carrot
tomato
Test
We recently got the news the Google Bard AI allows us to upload images and do AI stuff with them. This is great and long overdue for ChatGPT, they bragged about it a while back but they still didn’t release it to the public. Remember the video with the napkin turned into a website? Well, … Read more
Heath Adams just offered his Practical Ethical Hacking course for free (you can also pay as little as 5 USD if you want). Grab it now, it’s up for 22 more hours. If you’re new here, hi my name is Heath, I like to give stuff away, and believe education should be affordable. I’d like … Read more
Google recently announced a “New campaign targeting security researchers“. “In order to build credibility and connect with security researchers, the actors established a research blog and multiple Twitter profiles to interact with potential targets. They’ve used these Twitter profiles for posting links to their blog, posting videos of their claimed exploits and for amplifying and … Read more
PortSwigger (the company behind BurpSuite) launched it’s yearly community vote for the Top 10 Web Hacking Techniques of 2020. Visit https://portswigger.net/polls/top-10-web-hacking-techniques-2020 and vote for your favorites. Exploiting POST-based XSSI XSS fun with animated SVG Attacking MS Exchange Web Interfaces Code injection in Workflows leading to SharePoint RCE Researching Polymorphic Images for XSS on Google Scholar … Read more
Wild West Hackin’ Fest offers 3 great “hands-on” courses where you can Pay What You Can. The students will have the opportunity to do hands-on work, in virtual labs provided by the organizers. SOC Core Skills w/ John Strand (Feb 2 – Feb 5 2021, 4 hours/day) This 16-hour (4-days, 4-hour sessions) information security training … Read more
Say you have this setup:
fileA
carrot
cake
tomato
fileB
bread
cake
croissant
To get the lines that are in FileA but not in FileB you can run:
diff fileB fileA | grep '^>' | sed 's/^>\ //'
to get:
carrot
tomato
sed 's/[a-z]/\U&/g'
sed 's/[A-Z]/\L&/g'
Puteți descărca mașini virtuale de Windows (7, 8.1 si 10) direct de la Microsoft, pentru VirtualBox, VMWare, Parallels, Vagrant sau HyperV de aici: – https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/
Ce trebuie să știm despre Meltdown și Spectre, grupat într-o singură pagină (actualizată periodic). https://www.welivesecurity.com/2018/01/05/meltdown-spectre-cpu-vulnerabilities/#vendors
8.8.8.8 Google 8.8.4.4 Google 1.1.1.1 Cloudflare 1.0.0.1 Cloudflare 9.9.9.9 Quad9 9.9.9.10 Quad9 209.244.0.3 Level3 209.244.0.4 Level3 208.67.222.222 OpenDNS 208.67.220.220 OpenDNS 64.6.64.6 Verisign 64.6.65.6 Verisign
wget -U “Mozilla/5.0 (X11; U; Linux; en-US; rv:1.9.1.16) Gecko/20110929 Firefox/3.5.16” –recursive –level=1 –no-clobber –page-requisites — html-extension –convert-links –no-parent –wait=3 –random-wait http://www.example.com/docs/interesting-part/ –domains=www.example.com
Un XSS neașteptat pe Netflix.
https://medium.com/@black_b/vulnerability-netflix-cross-site-scripting-xss-d44010142e2c
Un tutorial excelent despre securizarea Windows.
https://decentsecurity.com/#/securing-your-computer/
https://www.cybintsolutions.com/cyber-security-facts-stats/