
Djalil Ayed
@DjalilAyed
Followers
584
Following
157K
Media
853
Statuses
2K
#Linux #CyberSecurity #InfoSec #Algeria π©πΏ YouTube channel: https://t.co/IcRYCJXCnV
Johannesburg
Joined September 2012
β‘ New room Windows Threat Detection 2 from @RealTryHackMe . πΈ Discover how to detect and analyze the first steps of threat actors after breaching Windows. π Discovery Overview.πͺ Detecting Discovery.π» Collection Overview.π Detecting Collection.π Ingress Tool Transfer. Room
1
0
1
π πͺ I just pwned GateKeeper on Hack The Box! (@hackthebox_eu ). π This is about macOS. πΈ Sherlock Scenario πΈ. Wika is a highly motivated pre-sales engineer dedicated to achieving his professional goals. To ensure his success, he carefully selected the best tools and
2
0
1
π§ β‘ New room Windows Threat Detection 1 from @RealTryHackMe . πͺ² Explore common Initial Access methods on Windows and learn how to detect them. πͺ Intro to Initial Access.π»ββοΈ Initial Access via RDP.π¦’ Initial Access via Phishing.π§Έ Continuing Phishing Topic.π Initial Access
1
1
13
π€ β‘ New room Detecting Adversarial Attacks from TryHackMe. πΈ Learn how to identify and analyse adversarial attacks. π» This part of the new module: Defensive AI.π»ββοΈ Adversarial Techniques Overview.πͺοΈ Understanding FGSM and variants.πͺ Identifying Adversarial Attacks. Room Link
1
0
1
New room ContAInment from TryHackMe. π€ πΈ Can you help contain the ransomware threat with the help of AI?. π§ π€ This part of New Module: Defensive AI π¦’.π»ββοΈ You use an AI chatbot to assist you on solving this room. β‘ Your Mission π€. You are a Security Analyst at West Tech, a
1
0
0
π€ β‘ New room AI Forensics from @RealTryHackMe . πΈ Explore AI DFIR and learn how it boosts your investigation capabilities. πͺ The AI Forensics Landscape.π§Έ AI & DFIR.π AI Legal & Ethical Implications.π Practical - The Digital Trail. Room Links in first comment: ‡οΈβ€΅οΈβ€΅οΈπ¦π¦
1
0
0
πΈ π€ New room Defending Adversarial Attacks from @RealTryHackMe . π€ Learn defence mechanisms to harden machine learning models. π This part of the new Module: Defensive AI.π§Έ Defence Strategies for Adversarial Attacks: Adversarial Training, Gradient Hiding, Feature Squeezing
1
0
2