> Throw away your paid tools because this is some God level shit. Now with 4 hand written parsers, an intelligent payload generator, powerful fuzzing engine, DOM scanner, hidden parameter discovery and an incredibly fast crawler.
F*cking retweet it!
> Exactly, that's why you have no idea how it works and all. Well, it took me a month and being a developer of 30+ open source software, this is the first time I am saying this is some God level shit and I mean it.
I would also like to highlight the following other creators. For me seeing the process of others has been a lot more fruitful then just following text tutorials:
Wow, thanks for sharing and for your hard work on your channel!
I recommend it to everyone who is even remotely interested in security as your videos provide really valuable knowledge which is very easy to digest in the same time.
I create highly technical videos about various topics of IT security. Many of my videos are walk-throughs of CTF challenges explaining my thought process. I think this playlist could be interesting: https://www.youtube.com/playlist?list=PLhixgUqwRTjywPzsTYz28...
Besides that, I can also really recommend livestreams/screenshares from the following creators. To me, seeing how somebody really does it and where they struggle, really really helped me break through a wall I was hitting:
I really appreciate your videos.. I'm an early early beginner, regardless though the videos and how you construct them is really entertaining and informative.
Keep it up. <3
i love your channel! It contains just enough technical details to be interesting, but isn't made too overly dense so as to be boring or snooze inducing.
I m glad that you made such good videos for me to enjoy!
title is misleading because it's not like Germany broke the encryption. But this has nothing to do with rt, a lot of news outlets reported it in this way. And in the article rt is is pretty clear what it is about: The law makes it legal for the police to install trojans on a phone to gather evidence.
And like the other people responded, there are just wayyyy to many primes to make that feasible. Though it is a common Challenge in security competitions to find the factors to a public key through factordb. Or having two bad keys sharing one same prime - then you can use Euclidean algorithm (greates common divisor).