Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Microsoft buys GitHub, the largest free software platform

      Recommended Posts

      Staff

      GitHub, which has more than 28 million users, will become part of the Microsoft Cloud Intelligence business

       

      Hidden Content

        Give reaction to this post to see the hidden content.
      Microsoft offices in New York.  AFP

      Microsoft has reached an agreement to acquire GitHub, a collaborative software development platform, for 7,500 million dollars (6,406 million euros) in shares, as announced by the giant of Redmond, which expects to close the purchase later this year.

      After the closing of the transaction, GitHub, which has more than 28 million users, will present its accounts as part of the business of Intelligence in the Cloud, said Microsoft, who is confident that the acquisition will be reflected in their accounts for the year. fiscal 2020 with a minimum dilutive impact of less than 1% on the earnings per share for the years 2019 and 2020.

      Microsoft Corporate vice president, Nat Friedman, will assume the position of CEO of GitHub after the acquisition, while the current head of the platform, Chris Wanstrath, will become Microsoft's technical partner, reporting to Microsoft's executive vice president, Scott Guthrie, to work on strategic software initiatives.

      Microsoft ensures that GitHub will maintain its distinctive approach of putting developers first and will continue to operate independently to offer an open platform to all developers and industries. In this way, GitHub users will be able to continue using the programming languages, tools and operating systems of their choice for their projects.

      "Microsoft is a platform that puts developers first and by joining forces with GitHub we reinforce our commitment to freedom, openness and innovation," said Satya Nadella, CEO of Microsoft.

      For his part, Wanstrath highlighted the "bright future" for software development, underlining that the union with Microsoft will help make it a reality. "Its scale, tools and global cloud will play a huge role in making GitHub even more valuable to developers around the world," he added.

      GitHub is a repository of online code very popular among open source developers. The price paid by Microsoft, much higher than its last valuation, indicates the interest of the Redmond company to gain a foothold in the world of free software.

      Five alternatives to GitHub 

       

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Features:
          - Multi-threading
          - HTTPS, SOCKS4, SOCKS5 Proxies supported (does not support auth proxy)
          - Detailed Capture (Level,Rank,VP,RP,Skins)
          - Auto Remove Dupes in Wordlist

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The tool generates a wordlist based on a set of words entered by the user.
          For example, during penetration testing, you need to gain access to some service, device, account, or Wi-Fi network that is password protected. For example, let it be the Wi-Fi network of EvilCorp. Sometimes, a password is a combination of device/network/organization name with some date, special character, etc. Therefore, it is simpler and easier to test some combinations before launching more complex and time-consuming checks. For example, cracking a Wi-Fi password with a wordlist can take several hours and can fail, even if you choose a great wordlist because there was no such password in it like Evilcorp2019.
          Therefore, using the generated wordlist, it is possible to organize a targeted and effective online password check.

          Features
          The hashcat rule syntax is used to generate the wordlist. By default, the generator uses a set of rules "online.rule", which performs the following mutations:
              Adding special characters and popular endings to the end of the word - !,[email protected], [email protected]#, 123! etc. evilcorp!, evilcorp!123
              Adding digits from 1 to 31, from 01 to 12 - evilcorp01, evilcorp12.
              Adding the date 2018-2023 - evilcorp2018, evilcorp2019
              Various combinations of 1-3 - evilcorp2018!
              Capitalize the first letter and lower the rest, apply 1-4. Evilcorp!2021
          As a result, for the word evilcorp, the following passwords will be generated (216 in total):
              evilcorp
              Evilcorp
              EVILCORP
              evilcorp123456
              evilcorp2018
              Evilcorp!2021
              Evilcorp!2022
              [email protected]#
          You can use your own hashcat rules, just click "Show rules" and put in the "Rules" textarea them with the list of rules you like best. Rules that are supported (source https://hashcat.net/wiki/doku.php?id=rule_based_attack):

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ).HexorBase allows packet routing through proxies or even metasploit pivoting antics to communicate with remotely inaccessible servers which are hidden within local subnets.
          It works on Linux and Windows running the following:
          ###Requirements:
          python
          python-qt4
          cx_Oracle
          python-mysqldb
          python-psycopg2
          python-pymssql
          python-qscintilla2
          ###Downloads  to download the latest version

          Hidden Content
          Give reaction to this post to see the hidden content. To install simply run the following command in terminal after changing directory to the path were the downloaded package is:
          [email protected]:~# dpkg -i hexorbase_1.0_all.deb
          ###Icons and Running the application:
          Software Icon can be found at the application Menu of the GNOME desktop interfaces
          Icon can also be found at /usr/share/applications for KDE and also GNOME:
          There you find "HexorBase.desktop"
          ###To get the source code for this project from SVN, here's the checkout link:
          [email protected]:~# svn
        • By dEEpEst
          What are the most well-known cyber attacks ?
          The massive so-called SolarWinds attack, detected in December 2020, breached U.S. federal agencies, infrastructure and private corporations in what is believed to be among the worst cyberespionage attacks inflicted on the U.S. On Dec. 13, 2020, it was revealed that Austin-based IT management software company SolarWinds was hit by a supply chain attack that compromised updates for its Orion software platform. As part of this attack, threat actors inserted their own malware, now known as Sunburst or Solorigate, into the updates, which were distributed to many SolarWinds customers. The first confirmed victim of this backdoor was cybersecurity firm FireEye, which had disclosed on Dec. 8 that it had been breached by suspected nation-state hackers. It was soon revealed that SolarWinds attacks affected other organizations, including tech giants Micrososft and VMware and many U.S. government agencies. Investigations showed that the hackers -- believed to be sponsored by the Russian government -- had been infiltrating targeted systems undetected since March 2020. As of January 2021, investigators were still trying to determine the scope of the attack.
          • Here is a rundown of some of the most notorious breaches, dating back to 2009:
          - a July 2020 attack on Twitter, in which hackers were able to access the Twitter accounts of high-profile users.
          - another 2016 attack, this time at FriendFinder, which said more than 20 years' worth of data belonging to 412 million users was compromised.
          - a data breach at Yahoo in 2016 that exposed personal information contained within 500 million user accounts, which was then followed by news of another attack that compromised 1 billion user accounts.
          - a 2014 attack against entertainment company Sony, which compromised both personal data and corporate intellectual property (IP), including yet-to-be-released films, with U.S. officials blaming North Korea for the hack;
          - eBay's May 2014 announcement that hackers used employee credentials to collect personal information on its 145 million users.
           
        • By dEEpEst
          What are the most common types of cyber attacks?
          Cyber attacks most commonly involve the following:
          - Malware in which malicious software is used to attack information systems. Ransomware, spyware and Trojans are examples of malware. Depending on the type of malicious code, malware could be used by hackers to steal or secretly copy sensitive data, block access to files, disrupt system operations or make systems inoperable.
          - Phishing in which hackers socially engineer email messages to entice recipients to open them. The recipients are tricked into downloading the malware contained within the email by either opening an attached file or embedded link.
          - Man-in-the-middle or MitM, where attackers secretly insert themselves between two parties, such as individual computer users and their financial institution. Depending on the details of the actual attack, this type of attack may be more specifically classified as a man-in-the-browser attack, monster-in-the-middle attack or machine-in-the-middle attack. It is also sometimes called an eavesdropping attack.
          - DDoS in which hackers bombard an organization's servers with large volumes of simultaneous data requests, thereby making the servers unable to handle any legitimate requests.
          - SQL injection where hackers insert malicious code into servers using the Structured Query Language programming language to get the server to reveal sensitive data.
          - Zero-day exploit which happens when a newly identified vulnerability in IT infrastructure is first exploited by hackers.
          - Domain name system (DNS) tunneling a sophisticated attack in which attackers establish and then use persistently available access -- or a tunnel -- into their targets' systems.
          - Drive-by or drive-by download, occurs when an individual visits a website that, in turn, infects the unsuspecting individual's computer with malware.
          - Credential-based attacks happen when hackers steal the credentials that IT workers use to access and manage systems and then use that information to illegally access computers to steal sensitive data or otherwise disrupt an organization and its operations.