@HassanNeme35789 Profile picture

Hassan Nemec

@HassanNeme35789

Hassan Nemec Reposted

If you are having a hard time visualizing all the layers and matrix operations inside an LLM, then you'll love this website! Check it out: bbycroft.net/llm


Hassan Nemec Reposted

The relationship between cells, ribosomes, and the rRNA at the ribosomal core is the most fascinating of all biology. See for yourself! Learn more at smart-biology.com #biology #science #education #visuallearning #3d #animations #lessons #animated


Hassan Nemec Reposted

Just 3 days after the fully open source Protenix release, we now have AlphaFold3 code and weights. Huge credit to all of the great open source efforts: github.com/PaddlePaddle/P… github.com/bytedance/Prot… github.com/Ligo-Bioscienc… github.com/chaidiscovery/… nature.com/articles/d4158…


Hassan Nemec Reposted

SQLMap Command Generator 🔗 -> acorzo1983.github.io/SQLMapCG/

Tweet Image 1

Hassan Nemec Reposted

#Oceanlotus first used MST(MSI TRANSFORMS) files to deliver RUST Malware(Mingw-w64) command: msiexec.exe /qn /i WindowsPCHealthCheckSetup.msi TRANSFORMS=msGFG.mst mp.weixin.qq.com/s/alaZxCd61gJN…

Tweet Image 1

Hassan Nemec Reposted

Active Directory Penetration Testing Mind Map 🔗tajdini.net/blog/penetrati…

Tweet Image 1

Hassan Nemec Reposted

🛡️✨ Another addition to the Caido Store! Introducing "CSRF PoC Generator" by @Tur24Tur Generate various types of CSRF PoC payloads from requests. Check it out: github.com/BugBountyzip/C…


Hassan Nemec Reposted

GitHub - S3N4T0R-0X0/APT-Attack-Simulation: This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stage github.com/S3N4T0R-0X0/AP…


Hassan Nemec Reposted

#APT #Bitter #ManLinghua APT-Q-37 #wmRAT Maybe related to #MysteriousElephant 📍🇮🇳 💥🇨🇳🇲🇳🇧🇩🇳🇵🇸🇦🇵🇰 ⛓️ #Phishing > PDF|OLE|RAR > Download RAR (Fake OLE > #LNK) > #VBS + Persistence > Curl to payload > #RAT > Obtain info > #C2 🔗360 Threat Intelligence: mp.weixin.qq.com/s?__biz=MzUyMj…

Tweet Image 1

Hassan Nemec Reposted

You can bypass path-based WAF restrictions by appending raw/unencoded non-printable and extended-ASCII characters like \x09 (Spring), \xA0 (Express), and \x1C-1F (Flask):

Tweet Image 1

Hassan Nemec Reposted

Hey, hackers 👋🏻 For finding vulnerabilities in the network! 👇🏻✌🏻 Invisible protocol sniffer: github.com/wearecaster/Ab… #Pentesting #Hacking #bugbountytips #infosec #cybersecuritytips #redteam #CTF #pwn #blueteam #Offsec #100DaysOfHacking #networksecurity #Software #coding


Hassan Nemec Reposted

Code search and an AI assistant with the context of the code graph. sourcegraph.com/search #OSINT #Recon #Reconnaissance #Hacking

Tweet Image 1

Hassan Nemec Reposted

new file name payload list updated including xss,iframe,htmli,lfi,sqli etc github.com/coffinxp/img-p…

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.