recentpopularlog in

whip_lash : development   61

5 Free Courses to Learn C++ Programming in Depth - DZone Web Dev
There are many areas which are tough to grasp, e.g. points, but you will learn them slowly and that’s where these free C++ courses will help you.
c++  development  learning 
2 days ago by whip_lash
Best practices for writing Dockerfiles | Docker Documentation
This document covers recommended best practices and methods for building efficient images.
development  docker  devops 
22 days ago by whip_lash
Learning to Learn | CSS-Tricks
When you’re learning on your own, this part can sometimes be tough — you don’t know what you don’t know. If you’re starting from scratch, learning web development or computer science, here are some resources that might help:
learning  development 
6 weeks ago by whip_lash
Interactive SICP
Interactive SICP n. Interactive Structure and Interpretation of Computer Programs. Online version of SICP with a built-in scheme interpreter to allow readers to edit and run the code embedded in SICP. (Work in progress)
programming  book  sicp  tutorial  development 
11 weeks ago by whip_lash
Insomnia REST Client
Debug APIs like a human, not a robot
Finally, a REST client you'll love
api  rest  software  development 
12 weeks ago by whip_lash
API Marketplace - Free Public & Open Rest APIs | RapidAPI
Discover and connect to thousands of APIs in the world's largest API Hub
api  development  list 
12 weeks ago by whip_lash
Top 5 Frontend Development Topics To Learn in 2019
The barebones of the idea is looking for topics I’m excited to learn about, that will give me some momentum in future learning, and where I can either get paid to take it or there’s a clear market for the skill.

Below I apply that framework based on what I’m seeing right now in the web development ecosystem, and for each area I recommend I’ve rounded up some resources to help you get started.
frontend  webapp  development 
january 2019 by whip_lash
Binary Analysis Course – Max Kersten
This course starts at the very start, where it is assumed that the reader has little to no low level knowledge. It is expected that the reader is able to understand basic programming aspects such as functions/methods, variables, types and system calls. Unlike most courses, this course aims to only use free and open-source software.
reverseengineering  course  reverse-engineering  development 
january 2019 by whip_lash
ngrok - secure introspectable tunnels to localhost
Spend more time programming. One command for an instant, secure URL to your localhost server through any NAT or firewall.
development  networking  proxy  tools  tunnel 
january 2019 by whip_lash
An Introduction to Source Maps - Treehouse Blog
In this blog post you’re going to learn how source maps work and take a look at how to generate them. We’re going to be focussing primarily on source maps for JavaScript code but the principles apply to CSS source maps too.
web  development  sourcemap  javascript 
january 2019 by whip_lash
0x8 Exploit Tutorial: The Elusive Egghunter
This exploit development technique can be quite difficult to understand at first but by the time you reach the end of this mission, you should have a strong foundational sense of how it works. Egghunting can also be performed in Linux Exploitation but after some information gathering, we’ve discovered the Lee server is hosting Windows so we will stick to that operating system for this engagement.
egghunter  exploit  development 
january 2019 by whip_lash
Poster: Doug Lea's malloc() cheatsheet - Support / Beginner Guides - 0x00sec - The Home of the Hacker
I was studying Doug Lea’s malloc() vulnerability and, to keep track of some concepts, I wrote them down and ended up with tables and flowcharts.
Seeing it was pretty helpful to me and also kinda cute, I redid it in a poster format to put it up so I can remember that stuff.
memory  c  exploit  development 
january 2019 by whip_lash
While I am learning Python, what else should I be learning to supplement my resume? : learnpython
Yes, pick up Git as fast as you can, you want the basics of working in a repo to be muscle memory; learn as much of the standard library as you can, I'd tend to say re, itertools, sqlite3, and subprocess are all going to give solid return on time invested. As are support modules like logging and argparse, both of which you're going to be seeing a lot of. Try to develop solid chops writing and running unit tests, it's very helpful to know unittest for that.

Outside of Python try and be at least conversationally familiar with concepts like Agile Development, Continuous Integration/Deployment and Test Driven Development, as in you've read the Wikipedia entries on those terms and know some of the bywords. You'll find that's going to help with getting through the filter screen of first pass HR people.
python  career  jobs  development  software 
january 2019 by whip_lash
GitHub - TheSecondSun/Shellab: Linux and Windows shellcode enrichment utility
Shellab is a tool that can be used to improve existing shellcodes and adapt them for personal needs. Developed to provide an alternative to msfvenom with new functionalities. Suitable for both Windows and Linux shellcode (32 and 64 bit).
hacking  tool  shellcode  exploit  development 
december 2018 by whip_lash
Python interview questions. Part III. Senior
We all know that senior is not just a technical role that bound with years of experience and knowledge about his tools, they also have mentoring skills, some management skills in order to measure tasks and their time, and they tend to have some architecture skills etc. My questions here is only for technical side of Python senior developers.
interview  python  career  jobs  development  programming 
december 2018 by whip_lash
Reversing ALPC: Where are your windows bugs and sandbox escapes?
The goal of this post is to understand my process for finding bugs (which are generally done through any means necessary), so it’s important to note they aren’t indicative of mastery in any given subject. As always, if you find any errors, or corrections, feel free to contact me. This is a personal hobby of mine and do not profess to being a professional vulnerability researcher.
reverse-engineering  reverseengineering  exploit  development 
november 2018 by whip_lash
Exploit Development / Buffer Overflows – VeteranSec
This training section focuses on exploit development and buffer overflows.  We intend to release additional training videos in the near future.  Currently, our plans are to release a video series on 32-bit and 64-bit Windows and Linux operating systems. 
exploit  development  tutorial 
october 2018 by whip_lash
Engineering career development at Khan Academy | Khan Academy Engineering
We’ve previously shared our Engineering Principles. Today we’re releasing our Engineering Career Development guide.
career  development  engineering 
july 2018 by whip_lash
Halcyon IDE
Halcyon IDE lets you quickly and easily develop Nmap scripts for performing advanced scans on applications and infrastructures with a range from recon to exploitation capabilities. It is the first IDE released exclusively for Nmap script development. Halcyon IDE is free and open source project (always will be) to provide an easier development interface to rapidly growing information security community around the world.
ide  programming  Scripting  development  lua  nmap 
june 2018 by whip_lash
Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101
Finding bugs is hard, reverse engineering is hard. Constraint solvers are the heart of many program analysis techniques, and can aid Fuzzing, and software verification.

This post contains a few hands-on experiments with Z3, a high performance theorem prover developed at Microsoft Research by Leonardo de Moura and Nikolaj Bjorner. With KLEE, a Symbolic Execution Engine built on top of the LLVM compiler infrastructure developed by Cristian Cadar, Daniel Dunbar, and Dawson Engler. And, angr, a binary analysis framework developed by the Computer Security Lab at UC Santa Barbara and their associated CTF team, Shellphish.
ctf  assembly  exploit  development  reverse-engineering 
may 2018 by whip_lash
klks/checksec: x64dbg plugin to check security settings
This plugin was inspired by OllySSEH by Mario Ballano and the linux checksec.sh by Tobias Klein. Please report any bugs/improvements/suggestions.
x64dbg  exploit  development  debugger 
may 2018 by whip_lash
!exploitable Crash Analyzer - MSEC Debugger Extensions - CodePlex Archive
The tool first creates hashes to determine the uniqueness of a crash and then assigns an exploitability rating to the crash: Exploitable, Probably Exploitable, Probably Not Exploitable, or Unknown.
security  Microsoft  debugger  windbg  exploit  development 
may 2018 by whip_lash
0x5 Exploit Tutorial: Porting Your First Exploit to Metasploit
In this edition of the Primal Security blog, we will be taking the exploit found in our first tutorial and porting it over to the Metasploit Framework.
metasploit  exploit  development 
april 2018 by whip_lash
ROP, NX and ASLR - A Love Triangle - Remote Code Execution - CVE-2018-5767 - Fidus InfoSecurity | Cyber Security, Penetration Testing, Red Teaming
In this post we will be presenting a pre-authenticated remote code execution vulnerability present in Tenda’s AC15 router. We start by analysing the vulnerability, before moving on to our regular pattern of exploit development – identifying problems and then fixing those in turn to develop a working exploit.
exploit  development 
february 2018 by whip_lash
CNIT 127: Exploit Development -- Sam Bowne
Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.
Advisory: CS 110A or equivalent familiarity with programming
pentest  exploit  development  programming  security  learning  class 
january 2018 by whip_lash
ROP Emporium
Learn return-oriented programming through a series of challenges designed to teach ROP techniques in isolation, with minimal reverse-engineering and bug-hunting.
ctf  programming  security  exploit  development 
january 2018 by whip_lash
The Engineer/Manager Pendulum – charity.wtf
The best frontline eng managers in the world are the ones that are never more than 2-3 years removed from hands-on work, full time down in the trenches. The best individual contributors are the ones who have done time in management.

And the best technical leaders in the world are often the ones who do both. Back and forth.  Like a pendulum.
career  development  management 
august 2017 by whip_lash
Aerotropolis: The Airport-Based Global City of Tomorrow - WSJ.com
Every aerotropolis is locked in competition with every other one, just as every financial center is jostling for position in the new multi-polar international order. The principle is the same: Everyone wants to be the hub; no one wants to be the spokes. This has made the aerotropolis ripe for experimentation when it comes to governance, whether it's simple tax-free zones, the charter cities Mr. Romer proposes, or the "state capitalism" practiced by Dubai or Singapore. (The word "aerotropolis," I should note, was coined by John Kasarda, a business professor at the University of North Carolina and my co-author on the forthcoming book of that title. He is currently working on projects in Indianapolis, Milwaukee and Panama, and has served as a consultant in the past in Detroit, Memphis, Tenn., Dubai, Chongqing and Hyderabad.)
cities  economics  development 
march 2011 by whip_lash

Copy this bookmark:





to read