Looking to step up your web app pentesting and bug bounty skills? In this video, Alex from TCM Security walks you through some of the best FREE tools and resources to help you sharpen your AppSec knowledge and techniques. Whether you’re just starting out or looking to boost your skill set, these tools are must-haves!
Author: tmack
NetExec for SMB Enumeration
What is NetExec? NetExec (formerly CrackMapExec) is a powerful “Swiss Army knife” tool for offensive security engagements, particularly useful for interacting with Active Directory (AD) environments. For someone learning about offensive security, here’s a quick summary of how to use NetExec in an engagement, focusing on SMB enumeration: NetExec is a command-line tool that automates Read More …
Machine Learning – Journey Through the Mind of the Machine
The dream of creating artificial intelligence, of imbuing machines with the capacity to think and learn, is a long-standing one, stretching back centuries in philosophical thought and fictional tales. However, the formal history of Artificial Intelligence (AI) as a scientific discipline began in the mid-20th century, fueled by advancements in computing and a group of Read More …
Random Forests in Artificial Intelligence
Random Forests are an ensemble learning method widely used in artificial intelligence (AI) for classification and regression tasks. This technique builds upon the concept of decision trees, combining the predictions of multiple trees to enhance accuracy and robustness. By leveraging the strengths of individual decision trees while mitigating their weaknesses, Random Forests have become a Read More …
Integrating Docker into a CI/CD Pipeline
A typical Dockerized CI/CD pipeline, often orchestrated by tools like Jenkins, GitLab CI/CD, GitHub Actions, or Azure DevOps, follows these stages: Code Commit and Trigger: The process begins when a developer commits code to a version control system (VCS) like Git. This commit, particularly to a designated branch triggers the CI/CD pipeline automatically via a web Read More …
Docker for IT Professionals
Docker containers has moved beyond a buzzword to become a cornerstone of modern infrastructure and software deployment. At its core, Docker addresses long-standing challenges in application portability, dependency management, and environmental consistency, offering a totally new way to approach to how we build, ship, and run software. Historically, the phrase “it works on my machine” Read More …
Conference Video – A deep look into a Chinese advanced attack
These are the videos from Derbycon 2015:
Decision Trees in Artificial Intelligence
Decision trees are a popular and intuitive method used in artificial intelligence (AI) for classification and regression tasks. They represent a model in the form of a tree-like structure, where each internal node corresponds to a decision based on an input feature, each branch represents the outcome of that decision, and each leaf node signifies Read More …
SVM – Support Vector Machines
Support Vector Machines (SVMs) are a powerful supervised learning algorithm used in artificial intelligence (AI) for classification and regression tasks. Developed in the 1990s by Vladimir Vapnik and his colleagues, SVMs are particularly effective in high-dimensional spaces and are known for their robustness in handling both linear and non-linear data. How SVMs Work The primary Read More …