aboutsummaryrefslogtreecommitdiffstats
path: root/ssh-for-hacking.html
diff options
context:
space:
mode:
Diffstat (limited to 'ssh-for-hacking.html')
-rw-r--r--ssh-for-hacking.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/ssh-for-hacking.html b/ssh-for-hacking.html
index e9261cd..5b607e8 100644
--- a/ssh-for-hacking.html
+++ b/ssh-for-hacking.html
@@ -1,3 +1,3 @@
<!DOCTYPE html><head><meta charset="utf-8" /><meta name="description" content="C.C.M. personal website" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>SSH for Hacking — C.C.M. Homepage</title><link rel="stylesheet" href="/css/default.css" /></head><body><header><div id="block"><p>+&gt;---------------------------&lt;+</p><p>[<a href="/about.html">About</a>]--[<a href="/research.html">Research</a>]--[<a href="/projects.html">Projects</a>]</p><p>+&gt;---------------------------&lt;+</p><br /></div></header><div id="block"><h1>SSH for Hacking</h1><div>February 18, 2024</div><div><h2>SSH usage with high level of security and obfuscation.</h2><h1>My first paper</h1><p>That's my first paper with [<a href="10.5281/zenodo.10676824">DOI</a>] and i talk some
about ssh for hacking.
-<div style="text-align: center"><img src="/images/print.png" /></div></p><h1>Download</h1><h2>[<a href="/download/ssh.tex">TeX</a>] [<a href="/download/ssh.pdf">PDF</a>]</h2><h1>Mirrors:</h1><h2>[<a href="https://www.researchgate.net/publication/378301449_SSH_FOR_HACKING">Research Gate</a>]</h2><h2>[<a href="https://zenodo.org/records/10676824">Zenodo</a>]</h2></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://www.researchgate.net/profile/Cristian-Moises/research">ResearchGate</a>]--[<a href="http://idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion/">TOR</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body> \ No newline at end of file
+<div style="text-align: center"><img src="/images/print.png" /></div></p><h1>Download</h1><h2>[<a href="/download/ssh.tex">TeX</a>] [<a href="/download/ssh.pdf">PDF</a>]</h2><h1>Mirrors:</h1><h2>[<a href="https://www.researchgate.net/publication/378301449_SSH_FOR_HACKING">Research Gate</a>]</h2><h2>[<a href="https://zenodo.org/records/10676824">Zenodo</a>]</h2></div></div><footer><div id="block"><br /><p>+&gt;---------------------------&lt;+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://www.researchgate.net/profile/Cristian-Moises/research">ResearchGate</a>]--[<a href="http://secopscj53y6qltbysxt2bhnr2ohwzi6bh6wbxonycgc6tdemj4xkmyd.onion/">TOR</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+&gt;---------------------------&lt;+</p></div></footer></body> \ No newline at end of file