Tag: security
- A05 Security Misconfiguration - OWASP Top 10:2021
- HackTricks - HackTricks
- Python FastAPI Postgres SqlAlchemy Row Level Security Multitenancy
- Log - dev.boringcrypto - go - Git at Google
- aquasecurity/tfsec: Security scanner for your Terraform code
- Arris / Arris-variant DSL/Fiber router critical vulnerability exposure | Derek Abdine
- Arris / Arris-variant DSL/Fiber router critical vulnerability exposure | Hacker News
- GitHub - aydinnyunus/exifLooter: finds geolocation on all image urls and directories
- ExifLooter – finds geolocation info on all URLs and directories | Hacker News
- GitHub - anchore/grype: A vulnerability scanner for container images and filesystems
- BLAKE3 Design Specification - One function, fast everywhere
- BLAKE3-team/BLAKE3: the official Rust and C implementations of the BLAKE3 cryptographic hash function
- GitHub - JustinAzoff/http_flood: http server that floods the client with random data
- stryngs/edgedressing: edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of choice.
- Sandboxing and Workload Isolation · Fly
- GitHub - blitzed-org/bopm: Blitzed Open Proxy Monitor
- GitHub - ircd-hybrid/hopm: The hybrid open proxy monitor fully based on BOPM
- Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies | by Alex Birsan | Feb, 2021 | Medium
- bugs.xdavidhu.me - xdavidhu's bug bounty writeups.
- Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
- WireGuard is very hard to run without logging. It simply wasn’t designed for tha... | Hacker News
- swisskyrepo/PayloadsAllTheThings
- freach/kubernetes-security-best-practice
- dev-sec/cis-kubernetes-benchmark
- aquasecurity/kube-bench
- neuvector/kubernetes-cis-benchmark
- PDF - www.iacr.org
- lxc/lxd
- Going down the rabbit hole with go-fuzz
- Going down the rabbit hole with go-fuzz | Hacker News
- Building account systems – Mike’s blog
- Passwords Evolved: Authentication Guidance for the Modern Era
- go-aah/security
- PDF - www.autosectools.com
- ae35unit: Yubikey Nano Annoyance - Fixed
- emersion/go-dkim
- davidlazar/go-dkim
- toorop/go-dkim
- kalloc/dkim
- redsift/dkim
- haproxy: inconsistencies between private key and certificate loaded from PEM file
- lyft/metadataproxy
- mempodippy/vlany
- API providing threat analysis of any given IP address | Hacker News
- skimmers — Search Results — Krebs on Security
- In Defense of Erlang.pdf
- Troy Hunt: Troy’s ultimate list of security links
- osquery :: Home
- grsecurity
- High interaction SSH Honeypot. : golang
- jpf/domain-profiler
- Errata Security: Bash 'shellshock' scan of the Internet
- Errata Security
- Digital Attack Map
- urlquery.net - Free url scanner
- Install sshpass on mac - What is the name of this Blog?
- Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution.
- BackTrack Linux - Penetration Testing Distribution
- S-T-D
- Total security in a PostgreSQL database
- Tarsnap - The spiped secure pipe daemon
- My OpenSSL Cheatsheet « joshdulac.com
- Websockets Over SSL: HAProxy, Node.js, Nginx
- security - What is a Pem file and how does it differ from other OpenSSL Generated Key File Formats? - Server Fault