@pesco I am also in the progress of learning cw. What method do you use? I tried lcwo.net first but use "Morse Machine" on my mobile most of the time. I think I have unlocked 2/3 of all characters now, went up to 25wpm and have lots of fun. Thinking of applying to a cwops academy course but am unsure.
I also have a straight key (german Junkers key) but only using a twin paddle with a Morserino-32 for practicing.
Very nice key you have there!
TLDR (https://tldr.sh): Simplified and community-driven man pages. This tool allows you to query usage examples for Linux tools/commands on the command line.
A huge collection of Privilege Escalation & Post-Exploitation tools and resources:
« How to evaluate security solutions? @eddyb0b and I shared our perspectives during this @securityweekly episode: https://youtu.be/KvSZleOozLU »
« WinPwnage : A Collection of Python Scripts for UAC Bypass,Privilege Escalation, Dll Hijack and Many More Techniques : https://github.com/rootm0s/WinPwnage »
« PowerShell: Get all logged on Users per Computer/OU/Domain (Get-UserLogon)
« Because it is so complicated to test if #SMB v1, v2 or v3 is active I've released in open source the smb scanner of #PingCastle. You can test instantly with this powershell script which version of SMB is currently active.
https://github.com/vletoux/SmbScanner https://t.co/I07Gzu0SbT »
« How to use weaponized PDF documents to steal Windows credentials https://securityaffairs.co/wordpress/71856/hacking/weaponized-pdf-hack-windows.html »
« AutoNSE - Massive NSE (Nmap Scripting Engine) AutoSploit And AutoScanner http://www.kitploit.com/2018/04/autonse-massive-nse-nmap-scripting.html »
« All your #sysmon in one place!
« who remembers this? https://t.co/rh9VSArqfG »
« The most unbelievable aspect of the Star Trek universe is that every ship they meet has compatible video conferencing facilities… »