A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Jul 26, 2021
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
List of Computer Science courses with video lectures.
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
Security Guide for Developers (实用性开发人员安全须知)
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Liberating Web Analytics. Star us on Github? +1. Matomo is the leading open alternative to Google Analytics that gives you full control over your data. Matomo lets you easily collect data from websites & apps and visualise this data and extract insights. Privacy is built-in. We love Pull Requests!
r_anal_esil_pushnum uses snprintf, sdb_itoa is faster
The generated and installed config files permission are too open, any user logined on the system can read and write them. So i suggest append a chmod command into Extract tar step to keep config files more safty.
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
An evolving how-to guide for securing a Linux server.
The ECDSA contract has a function toEthSignedMessage(bytes32), but we should have a function that works for any length of a bytes array:
function toEthSignedMessage(bytes s) pure internal returns (bytes32) {
return keccak256(
"\x19Ethereum Signed Message:\n",
uintToBytes(s.length),
s);
}
Where uintToBytes is implemented from an ideally
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
The upstream pull got closed. It is referenced in:
This issue was created by the ORY Closed Reference Notifier GitHub action.
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
Free cross-platform password manager compatible with KeePass
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
The Rogue Access Point Framework
Find, fix (and prevent!) known vulnerabilities in your code
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Automatic, daily GitHub repository and metadata backups, restored in seconds
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Backups your GitHub repositories, fast and secure
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Lift helps you find and fix your most elusive bugs so you can spend time writing great code, not debugging it
Keep dependencies up-to-date with automated Pull Requests
GuardRails provides continuous security feedback for modern development teams
Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email
I'm managing a bunch of servers and they're running Caddy v2. The upgrade command works great for upgrading with the packages previously chosen. In the future, it's likely I'll want to add/remove packages from that list over time.
Would it make sense to add flags to add and remove packages from the caddy build on upgrade?