Peter Naur's classic 1985 essay "Programming as Theory Building" argues that a program is not its source code. A program is a shared mental construct (he uses the word theory) that lives in the minds of the people who work on it. If you lose the people, you lose the program. The code is merely a written representation of the program, and it's lossy, so you can't reconstruct
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Get-ChildItem * -Recurse | Get-FileHash -Algorithm MD5 | Group-Object hash | Where-Object {$_.Count -gt 1} | Select-Object @{n='DupeCount';e={$_.Count}}, @{n='DupeFiles';e={$_.Group.Path -join [System.Environment]::NewLine}}, @{n='Hash';e={$_.Name}} | Out-GridView |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| From: http://redteams.net/bookshelf/ | |
| Techie | |
| Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp. | |
| Social Engineering: The Art of Human Hacking by Christopher Hadnagy | |
| Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam | |
| The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick | |
| Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others. | |
| Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor | |
| The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors |
- OWASP Mobile Security Testing Guide - Comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers
- https://pages.nist.gov/mobile-threat-catalogue/
- https://attack.mitre.org/matrices/mobile/
- The Art Of Mac Malware - Books about macOS malware, written by Patrick Wardle.
- *OS Internals - macOS and *OS Internals trilogy by Jonathan Levin.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| using System; | |
| using System.Collections.Generic; | |
| using System.DirectoryServices.Protocols; | |
| using System.Globalization; | |
| using System.Linq; | |
| using System.Runtime.InteropServices; | |
| using System.Runtime.InteropServices.ComTypes; | |
| using System.Security.Policy; | |
| using System.Security.Principal; | |
| using System.Text; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| since you can find this on the internet easily anyway, i decided to create this for ya. | |
| I know a lot of ppl wont like this but fuck it, it's ez anyway. | |
| One click batch script download: https://anonfiles.com/59T773t2uf/TransMac_Trial_Resetter_bat | |
| Run this whenever you want or put it in your startup folder | |
| (Win+R and type shell:startup) | |
| For all other users, one time easy way to do it, open Regedit | |
| Navigate to Computer\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\ or paste that in the address bar. |
- Jose Bravo - What is a SIEM? (5 Vídeos): https://www.youtube.com/watch?v=MtqFMe4zSpQ&list=PLHh9jhztlMyp8lyKXt9orVM57ygW_ihPS
- IPPSec - PowerSIEM Analyzing Sysmon Events with PowerShell: https://www.youtube.com/watch?v=MvfhIydxFmw
- Cybrary - AlienVault OSSIM: https://www.cybrary.it/course/alienvault-ossim/
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| n, p = [int(x) for x in input().split()] | |
| import numpy as np | |
| output = np.array([]) | |
| for i in range(n): | |
| values = np.array([float(y) for y in input().split()][:p]) | |
| // np.array.mean() vs round(np.array.sum(), 2) --> number of decimal values after the point | |
| s = values.sum() | |
| m = round(s / p, 2) |
Awesome Leading and Managing - Collection of articles/blogs/etc maintained by the community.
Leaders Eat Last - The science behind being a leader.
Start with Why - How to inspire people to do great work.
The Manager's Path - Advice for technical leaders on how to lead.
NewerOlder