A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Aug 23, 2020
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Security Guide for Developers (实用性开发人员安全须知)
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
SQL powered operating system instrumentation, monitoring, and analytics.
Guide to securing and improving privacy on macOS
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
List of Computer Science courses with video lectures.
Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Ubuntu x86 64, Ubuntu ARM64, Ubuntu PPC |
| File format of the file you reverse (mandatory) | - |
| Architecture/bits of the file (mandatory) | PPC, x86/64, ARMv |
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
An evolving how-to guide for securing a Linux server.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
Is your feature request related to a problem? Please describe.
When Hydra receives a request with a token that is no longer valid, it logs an error with what appears to be debug output:
{"debug":"Token is expired","description":"Token expired","error":"token_expired","hint":"The token expired.","level":"error","msg":"An error occurred","time":"2020-08-28T20:14:40Z"}
At high lo
Free cross-platform password manager compatible with KeePass
The Rogue Access Point Framework
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Secure Access for Developers that doesn't get in the way.
Not exactly a bug, for for those who have been using Claimable in earlier versions of OZ (for the purpose of transferOwnership followed by claimOwnership) - what are the options in v2.0.0?
Relying solely on Ownable.transferOwnership lacks a safety mechanism for accidentally transferring the ownership to an incorrect address.
At present, the only alternative that I see is copying `Cla
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Exploitation Framework for Embedded Devices
GuardRails provides continuous security feedback for modern development teams
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Reliable GitHub repository backup, set up in minutes
Keep dependencies up-to-date with automated Pull Requests
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Find, fix (and prevent!) known vulnerabilities in your code
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
See the discussion here: https://caddy.community/t/v2-http-handlers-templates-functions-in-file-server-browse-template/9214
The
file_serverdirective has abrowseoption which enables a directory index to be served when a directory is requested. By default, this index is rendered using a template which can be [found in the cod