links
links
Tag cloud
Picture wall
Daily
RSS Feed
Login
Remember me
Picture Wall - 114 pics
GitHub - CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. · GitHub
You're a Dumb Security Leader if You Mandate Password Rotation
GitHub - x011/smtp-tunnel-proxy: A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
GitHub - buildplan/du_setup: A Bash script to automate the initial configuration and security hardening of Debian and Ubuntu servers.
Hardware Touch, Stronger SSH
GitHub - zeek/zeek: Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Lynis, la herramienta para auditar la seguridad de tu sistema Linux/Unix – Victorhck in the free world
SystemD Service Hardening
imthenachoman/How-To-Secure-A-Linux-Server: An evolving how-to guide for securing a Linux server.
IHATEGIVINGAUSERNAME/theProtector: Linux Bash Script for the Paranoid Admin on a Budget - real-time monitoring and active threat response
GitHub - salesforce/ja3: JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
TLS Fingerprinting with JA3 and JA3S - Salesforce Engineering Blog
I use Zip Bombs to Protect my Server
OWASP Calls to Build a Unified Framework for Global Vulnerability Intelligence | OWASP Foundation
8 tips to secure your GNU/Linux VPS - Ferron
CVE-2024-9956 - PassKey Account Takeover in All Mobile Browsers | Tobia Righi - Security Researcher
GitHub - Safe3/uuWAF: An industry-leading free, high-performance, AI and semantic technology Web Application Firewall and API Security Gateway (WAAP) - UUSEC WAF.
Cwtch | Cwtch
Toward a Passwordless Future - Privacy Guides
OpenVoiceOS · GitHub
GitHub - antonio-morales/Fuzzing101: An step by step fuzzing tutorial. A GitHub Security Lab initiative
Things you wish you didn't need to know about S3
GitHub - jobinau/pg_gather: Scan PostgreSQL Instance for potential problems. pg_gather is a SQL-only script leveraging the built-in features of psql.
GitHub - MegaManSec/SSH-Snake: SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SSH Protocol Flaw CVE-2023-48795 Terrapin Attack: All You Need To Know
ppom / reaction · GitLab
Darknet Diaries – True stories from the dark side of the Internet.
Smartphones use a 2nd CPU and 2nd OS in their baseband processors
What the !#@% is a Passkey? | Electronic Frontier Foundation
SSH Remote Access NO Port-Forwarding NO Cloudflare - 4rkal
OWASP Top Ten | OWASP Foundation
Content Security Policy (CSP): Everything You Should Know
The Zeek Network Security Monitor
GitHub - r0oth3x49/ghauri: An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
The fascinating world of HTTP Strict-Transport-Security | Ergomake
Secrets Patterns DB: Building Open-Source Regex Database for Secret Detection | Mazin Ahmed
Raspberry Pi security alarm — the basics :: Cavelab blog — Stories from the Cavelab
SSH server hardening | ITTavern.com
GitHub - sullo/nikto: Nikto web server scanner
OpenSSL-2022/README.md at main · NCSC-NL/OpenSSL-2022 · GitHub
GitHub - EmbarkStudios/wg-ui: WireGuard Web UI for self-serve client configurations, with optional auth.
GitHub - Neo23x0/auditd: Best Practice Auditd Configuration
Hunting for Persistence in Linux (Part 1): Auditd, Sysmon, Osquery (and Webshells)
GitHub - jeffbencteux/mailsecchk: POSIX script for mail security checks of domain names
Why You Should Pay Attention to eBPF – Alt + E S V
How to Build a Motion-Triggered Raspberry Pi Security Camera | Tom's Hardware
Top 10 web hacking techniques of 2021 | PortSwigger Research
GitHub - hasherezade/hollows_hunter: Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
cossacklabs/acra: Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
NginRAT parasite targets Nginx – Sansec
Hardening Your HTTP Security Headers - KeyCDN
NO STARTTLS
Cyber 5K / mistborn · GitLab
GitHub - Patrowl/PatrowlDocs: PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Creating Security Decision Trees With Graphviz | Kelly Shortridge
PostgreSQL Security Hardening | Teleport
GitHub - wpscanteam/wpscan: WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites.
GitHub - veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering
Everything You Need to Know About OAuth (2.0) | Teleport
Web Security 101: Cross-Site Scripting (XSS) Attacks - victorzhou.com
Web Security 101: An Interactive Cross-Site Request Forgery (CSRF) Demo - victorzhou.com
Transition to Secure Methods of Wallet Access: the KeyVolution | by MyEtherWallet | MEW Publications | Medium
El protocolo MQTT: impacto en España - Security Art Work
marcan.st - marcan.st
Take These Steps to Secure Your Raspberry Pi Against Attackers
StopTheHacker | Protect your website and your visitors now
lynis
quick-secure
intrace - intrace - Traceroute-like application piggybacking on existing TCP connections - Google Project Hosting
How To Scan Your WordPress Website For Hidden Malware | Elegant Themes Blog
rkhunter, chkrootkit and unhide three Linux handy tools to find out if a Linux server is compromised | Walking in Light with Christ - Faith, Computing, Diary
oleiade/trousseau · GitHub
smtp - How do I configure postfix starttls - Ask Ubuntu
HDDerase.exe review: Freeware utility securely erases drives the old-fashioned way | PCWorld
intimus FAQ - Secure Erase
Service Erase Protocol | Data Destruction Knowledge Base
Secure Erase Definition
My First 5 Minutes On A Server; Or, Essential Security for Linux Servers
Reglas de iptables persistentes en Debian/Ubuntu | systemadmin.es
Fastd - Fast and Secure Tunnelling Daemon (fastd) - Redmine
If you think the cloud isn’t secure you’re dead wrong | PandoDaily
nbs-system/naxsi · GitHub
A (relatively easy to understand) primer on elliptic curve cryptography | Ars Technica
▶ Technology Strategies and Practices for Defending Against DDoS Attacks - YouTube
HTTP Headers for Website and Web Application Security
The paranoid #! Security Guide (Page 1) / Tips, Tricks & Scripts / CrunchBang Linux Forums
gokyle/sshbox · GitHub
mitigating ddos attacks with bgp flow specification | njetwork.si
Sin dejar rastro, el ciberactivista paranoico « Seguridad Informática #BOFHers
Resultado de un ping lanzado a todas las direcciones de Internet | Security Art Work
sysadvent: Day 16 - SSH keys shared with FUSE
Raspberry Pi Tor relay
@unaaldia: Mi última una-al-día: gracias y hasta otra
HOWTO: Run pfSense nanobsd in VirtualBox | FreeBSD News
Hak5 – Technolust since 2005 Hak5 - Technolust since 2005 » Trust Your Technolust
Scapy
Banks-SSL
New Year\'s Resolution: Full Disk Encryption on Every Computer You Own | Electronic Frontier Foundation
Alejandro Ramos - Operación Triunfo Profesional [RootedCON 2010]
Bitcoin implodes, falls more than 90 percent from June peak
cryptocat
Bitcoin: inside the encrypted, peer-to-peer digital currency
Security By Default: Iptables like a pr0
apenwarr/sshuttle - GitHub
The Usability of Passwords (by @baekdal) #tips
DNS Prefetching Implications - Pinkbike.com
OpenVAS en CentOS 5.5 (Escaner de vulnerabilidades) | systemadmin.es
Tor fue creado por el gobierno de EE.UU como herramienta de código abierto para el espionaje — ALT1040
Anonymous speaks: the inside story of the HBGary hack
Security Training, CEH, Ethical Hacking, Penetration Testing, Certified Ethical Hacker, Certified Hacker, Information Security Training, Computer security Training, Information Security Certification
Shon Harris, CISSP | CISSP Training Courses, Boot Camps, Resources | CISSP, CISA, CBT Certification Training
Instalar y configurar fail2ban | systemadmin.es
Maltego 3
Security By Default: Herramienta StegoSense: Automatizando la reja de cardano…
Fold
Fold all
Expand
Expand all
Are you sure you want to delete this link?
Are you sure you want to delete this tag?
The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community