A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Aug 23, 2020
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Security Guide for Developers (实用性开发人员安全须知)
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
List of Computer Science courses with video lectures.
Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Ubuntu x86 64, Ubuntu ARM64, Ubuntu PPC |
| File format of the file you reverse (mandatory) | - |
| Architecture/bits of the file (mandatory) | PPC, x86/64, ARMv |
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
An evolving how-to guide for securing a Linux server.
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
Describe the bug
In openapi schema, field requested_access_token_audience is required, which means it cannot be null.
But what I received is:
{
"challenge":"eaf5b69b16a441b5a861b8a71c818c0a",
"requested_scope":[
"openid",
"offline",
"profile:
Free cross-platform password manager compatible with KeePass
The Rogue Access Point Framework
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Secure Access for Developers that doesn't get in the way.
Not exactly a bug, for for those who have been using Claimable in earlier versions of OZ (for the purpose of transferOwnership followed by claimOwnership) - what are the options in v2.0.0?
Relying solely on Ownable.transferOwnership lacks a safety mechanism for accidentally transferring the ownership to an incorrect address.
At present, the only alternative that I see is copying `Cla
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Exploitation Framework for Embedded Devices
Find, fix (and prevent!) known vulnerabilities in your code
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Reliable GitHub repository backup, set up in minutes
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
GuardRails provides continuous security feedback for modern development teams
Keep dependencies up-to-date with automated Pull Requests
I would like to be able to prevent certain headers (Authorization: X-Auth-Token:, etc ) from being included in the caddy logs.
I found caddyserver/caddy#3562, which is asking to be able to set an allowlist of headers, which makes sense for their use case.
In my case, a blocklist, makes more sense, as I only want to prevent a single header from being included in the