A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Aug 23, 2020
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Security Guide for Developers (实用性开发人员安全须知)
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
List of Computer Science courses with video lectures.
Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Ubuntu x86 64, Ubuntu ARM64, Ubuntu PPC |
| File format of the file you reverse (mandatory) | - |
| Architecture/bits of the file (mandatory) | PPC, x86/64, ARMv |
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
An evolving how-to guide for securing a Linux server.
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
Login and consent challenges time out, but I haven't found a way to determine if this has happened
After being redirected to the login and consent pages, you're given a login/consent challenge. After the user has somehow authenticated himself, the login/consent session is accepted to hydra with the given login/consent challenge. However, if this takes too long (I believe it's a 10 minute ti
The Rogue Access Point Framework
Free cross-platform password manager compatible with KeePass
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Secure Access for Developers that doesn't get in the way.
Not exactly a bug, for for those who have been using Claimable in earlier versions of OZ (for the purpose of transferOwnership followed by claimOwnership) - what are the options in v2.0.0?
Relying solely on Ownable.transferOwnership lacks a safety mechanism for accidentally transferring the ownership to an incorrect address.
At present, the only alternative that I see is copying `Cla
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Exploitation Framework for Embedded Devices
Find, fix (and prevent!) known vulnerabilities in your code
Reliable GitHub repository backup, set up in minutes
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
GuardRails provides continuous security feedback for modern development teams
Keep dependencies up-to-date with automated Pull Requests
https://github.com/caddyserver/caddy/blob/3ee663dee195e5f8ead7879b31131f46cd0fba13/modules/caddyhttp/reverseproxy/reverseproxy.go#L644-L653
As discussed on Reddit, it seems that reverse proxying some applications (in this case Plex) can lead to some extensive error log spamming. Requ