Hack-tualité by G-echo - Coding - Mois 2019/03

Coding - Mois 2019/03

Tue, 12 Mar 2019 08:31:53 GMT
10 common security gotchas in Python and how to avoid them
Tue, 12 Mar 2019 08:31:53 GMT
Anthony ShawBlockedUnblockFollowFollowing<p>Jun 17, 2018<p>Writing secure code is hard. When you learn a language, a module or a framework, you learn how …
Sat, 02 Mar 2019 13:11:44 GMT
JavaScript quirks in one image from the Internet
Sat, 02 Mar 2019 13:11:44 GMT
Mikhail
Recently I stumbled upon this picture on Google Images:<p>The man on the picture is Brendan Eich by the way, the creator of JavaScript and a co-founder …
Wed, 13 Mar 2019 13:26:16 GMT
WordPress 5.1 CSRF to Remote Code Execution
Wed, 13 Mar 2019 13:26:16 GMT
Author: Simon Scannell
13 Mar 2019 by Simon Scannell<p>Last month we released an authenticated remote code execution (RCE) vulnerability in WordPress 5.0. This blog post …
Fri, 01 Mar 2019 17:15:40 GMT
Data Science vs Machine Learning: What's The Difference?
Fri, 01 Mar 2019 17:15:40 GMT
Zulaikha
<b>Data Science vs Machine Learning:</b><p>Machine Learning and Data Science are the most significant domains in today’s world. All the sci-fi stuff that you …
Mon, 04 Mar 2019 15:13:50 GMT
Programming languages: PowerShell nets more Linux, macOS, Windows developers
Mon, 04 Mar 2019 15:13:50 GMT
Liam Tung
Microsoft's PowerShell open-sourced scripting language is striking a chord with more developers.<p>Microsoft's recent move to open-source its once …
Tue, 12 Mar 2019 22:36:51 GMT
3 topics in 1 JavaScript interview question
Tue, 12 Mar 2019 22:36:51 GMT
Maciek Chmura
Programming interviews are hard. Live coding during the interview is even harder.<br>I have a feeling that as soon as I have to type code in front of …
Mon, 11 Mar 2019 06:12:22 GMT
Reverse Shell Cheat Sheet
Mon, 11 Mar 2019 06:12:22 GMT
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an …
Sat, 16 Mar 2019 09:29:44 GMT
G-echo
Sat, 16 Mar 2019 09:29:44 GMT
SCA - Développez sécurisé<p>Solution transparente et intégrée à votre environnement actuel pour sécuriser vos développements - Demandez une présentation …
Sat, 09 Mar 2019 14:49:02 GMT
Study shows programmers will take the easy way out and not implement proper password security
Sat, 09 Mar 2019 14:49:02 GMT
Catalin Cimpanu
A student or a programmer hired from Freelancer.com? Doesn't really matter. Both don't know that many things about password security.<p>Freelance …
Tue, 19 Mar 2019 08:42:52 GMT
Create a Twitter Bot in Python Using Tweepy
Tue, 19 Mar 2019 08:42:52 GMT
Lucas Kohorst
Lucas KohorstBlockedUnblockFollowFollowing<p>Apr 7, 2018<p>With about 15% of Twitter being composed of bots, I wanted to try my hand at it. I googled how …
Mon, 11 Mar 2019 06:12:02 GMT
Writing a Password Protected Reverse Shell (Linux/x64)
Mon, 11 Mar 2019 06:12:02 GMT
0x0FFB347BlockedUnblockFollowFollowing<p>Mar 10<p>Stage One: General Overview<p>First of all, what are we trying to achieve here? Our goal is to write …
Wed, 06 Mar 2019 21:40:19 GMT
Google introduces TensorFlow Privacy, a machine learning library with ‘strong privacy guarantees’
Wed, 06 Mar 2019 21:40:19 GMT
Kyle Wiggers
Google today announced TensorFlow Privacy, a library for its TensorFlow machine learning framework intended to make it easier for developers to train AI models with strong privacy guarantees. It’s available in open source, and requires “no expertise in privacy” or underlying mathematics, Google …
Mon, 11 Mar 2019 06:11:01 GMT
Heap Exploitation Part 1: Understanding the Glibc Heap Implementation
Mon, 11 Mar 2019 06:11:01 GMT
What is the heap, and why do people use it?<p>First things first: What is the heap, and what is it for?<p>The <i>heap</i> is used by C and C++ programmers to …
Mon, 18 Mar 2019 11:55:43 GMT
What is Web Scraping and How to Implement it using Python?
Mon, 18 Mar 2019 11:55:43 GMT
Kartik Singh
Introduction:<p>Setting up a new business? Or trying to grow an existing one? No matter which one it is, web scraping is the best way to collect data …