A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Oct 4, 2020
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
Security Guide for Developers (实用性开发人员安全须知)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
List of Computer Science courses with video lectures.
Scripts to build your own IPsec VPN server, with IPsec/L2TP and Cisco IPsec on Ubuntu, Debian and CentOS
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
C:\projects\radare2\shlr\tree-sitter\lib\src\alloc.h(57,21): warning C4477: 'fprintf' : format string '%lu' requires an argument of ty
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
An evolving how-to guide for securing a Linux server.
Is your feature request related to a problem? Please describe.
AWS Fargate and ECS is a popular container cluster. Jaeger and datadog are not native to AWS, require additional setup, cost and operations. AWS X-Ray support distributed tracing for ECS and AWS lambda. A custom lambda can be developed for oauth2 token validation against Hydra. Currently tracing between lambda authorizer and hyd
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
The Rogue Access Point Framework
Free cross-platform password manager compatible with KeePass
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Secure Access for Developers that doesn't get in the way.
Create simple ERC20 and ERC777 presets with fixed supply.
The benefits are:
Community members are creating their own simple ERC20 tokens, so it would be good if they
Exploitation Framework for Embedded Devices
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
Reliable GitHub repository backup, set up in minutes
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Keep dependencies up-to-date with automated Pull Requests
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
GuardRails provides continuous security feedback for modern development teams
Find, fix (and prevent!) known vulnerabilities in your code
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Caddy version:
v2.2.0 h1:sMUFqTbVIRlmA8NkFnNt9l7s0e+0gw+7GPIrhty905A=I am trying to pass pem-encoded client certificate to proxied service via a X-SSL-Cert header, like so: