Zoomeye It’s one of the search engines that allows you to search for devices, sites and services. it’s a hacker search engine There was a lot of high-profile news related to Zoomeye on the web. The search engine has convenient functionality, flexible search settings and its own API. In this article we will talk about which keys the search engine supports, what you can find interesting, and also compare the results of Zoomeye and Shodan.[Read more…] about Zoomeye hacker search engine
Zsh vs Bash When we talk about UNIX-based programming we usually mean consoles, terminals and command line interfaces. The most common command shell is Bash, but there are other options available and widely used, such as the Z Shell or zsh.
In this article, Zsh vs Bash we will try to draw a line between the two shells and show the differences so that you can understand why you should use one or the other. But first, we will present each of them separately, before comparing them together.[Read more…] about Zsh vs Bash: features and differences
What is data science and how does it work? Data science, big data , machine learning – you probably heard these big words, but how understandable was their meaning for you? For some, they are beautiful marketing lures. Someone thinks that data science is the magic that will force the machine to do whatever it orders for free. Others even believe that this is an easy way to make a lot of money. let’s try to explain what it means in a simple and understandable language.
I work in the field of automatic processing of a natural language, one of the data science applications, and often observe how people use these terms incorrectly, so I wanted to make a little clarity. This article is for those who have a poor idea of what data science is and wants to understand concepts.[Read more…] about What is data science
What are hashes and how are they used?
The hash sum (hash, hash code) is the result of processing some data by the hash function (hashing).
Hashes: type definition, checksum count, non-standard and iterated hashes[Read more…] about What are hashes and how are they used
A practical example of How to use ghidra to attack crackme
First Download crackme from the site MalwareTech , the password to the archive – too MalwareTech.
So, let’s see what is in the archive. We see the executable file vm1.exe and dump file ram.bin. The explanation on the site says that we are dealing with an eight-bit virtual machine. The dump file is nothing more than a chunk of memory, in which random data and a flag that we need to find are interspersed. Let’s leave the dump file alone for a while and take a look at vm1.exe through the DiE program.[Read more…] about How to use ghidra to attack crackme