https://www.kitploit.com/2018/12/pa-toolkit-collection-of-traffic.html
(Read More..)Rabu, 26 Desember 2018
Senin, 24 Desember 2018
Hacking Android app with Frida
Minggu, 23 Desember 2018
Computer Science - Math Programming
https://jeremykun.com/main-content/
Art, Graphics, and Procedural Generation
Designing Non-repeating Patterns with Prime Numbers
Low-Complexity ArtRandom Psychedelic Art
Seam-carving for Content-Aware Image Scaling
The Cellular Automaton Method for Procedural Cave Generation
Bezier Curves and Picasso
Making Hybrid Images
Low-Complexity ArtRandom Psychedelic Art
Seam-carving for Content-Aware Image Scaling
The Cellular Automaton Method for Procedural Cave Generation
Bezier Curves and Picasso
Making Hybrid Images
Signal Processing
The Fast Fourier Transform Algorithm, and Denoising a Sound Clip
The Two-Dimensional Fourier Transform and Digital Watermarking
Making Hybrid Images
The Welch-Berlekamp Algorithm for Correcting Errors in Data
The Two-Dimensional Fourier Transform and Digital Watermarking
Making Hybrid Images
The Welch-Berlekamp Algorithm for Correcting Errors in Data
Machine Learning and Data Mining
Introduction
K-Nearest-Neighbors and Handwritten Digit ClassificationThe Perceptron, and All the Things it Can’t Perceive
Decision Trees and Political Party Classification
Neural Networks and the Backpropagation Algorithm
K-Means Clustering and Birth Rates
Linear Regression
Eigenfaces, for Facial Recognition (via Principal Component Analysis)
Bandit Learning: the UCB1 Algorithm
Bandit Learning: the EXP3 Algorithm
Bandits and Stocks
Weak Learning, Boosting, and the AdaBoost Algorithm
Fairness in machine learning (introduction, statistical parity)
The Johnson-Lindenstrauss Transform
Singular Value Decomposition (motivation, algorithms)
Support Vector Machines (inner products, primal problem, dual problem)
K-Nearest-Neighbors and Handwritten Digit ClassificationThe Perceptron, and All the Things it Can’t Perceive
Decision Trees and Political Party Classification
Neural Networks and the Backpropagation Algorithm
K-Means Clustering and Birth Rates
Linear Regression
Eigenfaces, for Facial Recognition (via Principal Component Analysis)
Bandit Learning: the UCB1 Algorithm
Bandit Learning: the EXP3 Algorithm
Bandits and Stocks
Weak Learning, Boosting, and the AdaBoost Algorithm
Fairness in machine learning (introduction, statistical parity)
The Johnson-Lindenstrauss Transform
Singular Value Decomposition (motivation, algorithms)
Support Vector Machines (inner products, primal problem, dual problem)
Graphs and Network Science
Binary Search on Graphs
Trees and Tree Traversal
Breadth-First and Depth-First Search
The Erdős-Rényi Random Graph
The Giant Component and Explosive Percolation
Zero-One Laws for Random Graphs
Community Detection in Graphs, a Casual Tour
Google’s PageRank Algorithm:
Introduction,
A First Attempt,
The Final Product,
Why It Doesn’t Work Anymore
Trees and Tree Traversal
Breadth-First and Depth-First Search
The Erdős-Rényi Random Graph
The Giant Component and Explosive Percolation
Zero-One Laws for Random Graphs
Community Detection in Graphs, a Casual Tour
Google’s PageRank Algorithm:
Introduction,
A First Attempt,
The Final Product,
Why It Doesn’t Work Anymore
Combinatorial Optimization
When Greedy is Good Enough: Submodularity and the 1 – 1/e ApproximationWhen Greedy Algorithms are Perfect: the Matroid
Linear Programming and Healthy Diets Part 1
Linear Programming and the Simplex Algorithm
Linear Programming and Healthy Diets Part 2
The Many Faces of Set Cover
Linear Programming and Healthy Diets Part 1
Linear Programming and the Simplex Algorithm
Linear Programming and Healthy Diets Part 2
The Many Faces of Set Cover
Algorithmic Game Theory
Quantum Computing
A Motivation for Quantum Computing
The Quantum Bit
Multiple Qubits and the Quantum Circuit
Concrete Examples of Quantum Gates
The Quantum Bit
Multiple Qubits and the Quantum Circuit
Concrete Examples of Quantum Gates
Cryptography
RSAElliptic Curves IntroductionElliptic Curves as Elementary Equations
Elliptic Curves as Algebraic Structures
Elliptic Curves as Python Objects (over the rational numbers)
Programming with Finite Fields
Connecting Elliptic Curves with Finite Fields
Elliptic Curve Diffie-Hellman
Sending and Authenticating Messages with Elliptic Curves (Shamir-Massey-Omura and ElGamal)
The Mathematics of Secret Sharing
Zero Knowledge Proofs (primer, zero knowledge proofs for NP, definitions and theory)
Elliptic Curves as Algebraic Structures
Elliptic Curves as Python Objects (over the rational numbers)
Programming with Finite Fields
Connecting Elliptic Curves with Finite Fields
Elliptic Curve Diffie-Hellman
Sending and Authenticating Messages with Elliptic Curves (Shamir-Massey-Omura and ElGamal)
The Mathematics of Secret Sharing
Zero Knowledge Proofs (primer, zero knowledge proofs for NP, definitions and theory)
Streaming and Sublinear Algorithms
Natural Language
Computational Category Theory
A Sample of Standard ML (and a Preview of Monoids)
Categories, What’s the Point?
Introducing Categories
Categories as Types
Properties of Morphisms
Universal Properties
Functoriality
The Universal Properties of Map, Fold, and Filter
Categories, What’s the Point?
Introducing Categories
Categories as Types
Properties of Morphisms
Universal Properties
Functoriality
The Universal Properties of Map, Fold, and Filter
Computational Topology
Games
The Wild World of Cellular Automata
Turing Machines and Conway’s DreamsConway’s Game of Life in Conway’s Game of Life
Optimally Stacking the Deck: Kicsi PokerOptimally Stacking the Deck: Texas Hold ‘EmWant to make a great puzzle game? Get inspired by theoretical computer science.
Turing Machines and Conway’s DreamsConway’s Game of Life in Conway’s Game of Life
Optimally Stacking the Deck: Kicsi PokerOptimally Stacking the Deck: Texas Hold ‘EmWant to make a great puzzle game? Get inspired by theoretical computer science.
Miscellaneous
The Reasonable Effectiveness of the Multiplicative Weights Update Algorithm
Hunting Serial Killers
Learning to Love Complex Numbers
Holidays and Homicide
Numerical Integration
Busy Beavers, and the Quest for Big NumbersRow Reduction over a Field
Complete Sequences and Magic Tricks
Well Orderings and Search
Hunting Serial Killers
Learning to Love Complex Numbers
Holidays and Homicide
Numerical Integration
Busy Beavers, and the Quest for Big NumbersRow Reduction over a Field
Complete Sequences and Magic Tricks
Well Orderings and Search
Education
Teaching Mathematics – Graph Theory
Learning Programming – Finger-Painting and Killing Zombies
How to Take a Calculus Test
Why There’s no Hitchhiker’s Guide to Mathematics
Deconstructing the Common Core Mathematical Standard
Learning Programming – Finger-Painting and Killing Zombies
How to Take a Calculus Test
Why There’s no Hitchhiker’s Guide to Mathematics
Deconstructing the Common Core Mathematical Standard
Guest Posts
(Read More..)Powershell Empire
Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework.
Why PowerShell?
PowerShell offers a multitude of offensive advantages, including full .NET access, application whitelisting, direct access to the Win32 API, the ability to assemble malicious binaries in memory, and a default installation on Windows 7+. Offensive PowerShell had a watershed year in 2014, but despite the multitude of useful projects, many pentesters still struggle to integrate PowerShell into their engagements in a secure manner.
Rabu, 28 November 2018
Jumat, 16 November 2018
Kamis, 15 November 2018
How-to Guide: Defeating an Android Packer with FRIDA
Selasa, 25 September 2018
Kamis, 09 Agustus 2018
appium
Appium is an open source test automation framework for
use with native, hybrid and mobile web apps.
It drives iOS, Android, and Windows apps using the WebDriver protocol.
It drives iOS, Android, and Windows apps using the WebDriver protocol.
Jumat, 22 Juni 2018
BOLT
BOLT
BOLT is a post-link optimizer developed to speed up large applications. It achieves the improvements by optimizing application's code layout based on execution profile gathered by sampling profiler, such as Linux
perf
tool.
BOLT can operate on any binary with a symbol table, but for maximum gains
it utilizes relocations saved by a linker (--emit-relocs
).NOTE: current support is limited to non-PIC/non-PIE X86-64 and AArch64 ELF binaries.
https://github.com/facebookincubator/BOLT
(Read More..)Introducing Teleport
Introducing Teleport: Over-the-air hot reloading & debugging for PWA’s
https://medium.com/@ericsimons/introducing-teleport-over-the-air-hot-reloading-debugging-for-pwas-%EF%B8%8F-efd1e2b1c64c
(Read More..)Extensible mobile app debugger
Sonar is a platform for debugging mobile apps on iOS and Android. Visualize, inspect, and control your apps from a simple desktop interface. Use Sonar as is or extend it using the plugin API.
https://fbsonar.com/
(Read More..)Selasa, 29 Mei 2018
Minggu, 27 Mei 2018
ProxyBroker
Proxy [Finder | Checker | Server]. HTTP(S) & SOCKS 🎭 http://proxybroker.readthedocs.io
multitor
A tool that lets you create multiple TOR instances with a load-balancing traffic between them by HAProxy. It's provides one single endpoint for clients. In addition, you can view previously running TOR processes and create a new identity for all or selected processes.
(Read More..)Bootique Project
The home of Bootique Project - a minimally opinionated framework for runnable Java apps
(Read More..)Senin, 26 Februari 2018
Selasa, 23 Januari 2018
Windows one line commands that make life easier, shortcuts and command line fu. wincmdfu
Diposting oleh
kwepik
di
22.59
.
Selasa, 23 Januari 2018 .
Label:
powershell,
shortcuts and command line fu.,
Windows,
Windows one line commands that make life easier
Langganan:
Postingan (Atom)