A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Jan 31, 2022
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
An open-source x64/x32 debugger for windows.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
List of Computer Science courses with video lectures.
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
Security Guide for Developers (实用性开发人员安全须知)
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
Liberating Web Analytics. Star us on Github? +1. Matomo is the leading open alternative to Google Analytics that gives you full control over your data. Matomo lets you easily collect data from websites & apps and visualise this data and extract insights. Privacy is built-in. We love Pull Requests!
[0x100001060]> pia 4
str z21, [x2, 0x4a, mul vl]
???
???
???
[0x100001060]> pia 8
str z21, [x2, 0x4a, mul vl]
???
???
???
invalid
???
???
???
[0x100001060]> p8 8
554889e541574156
[0x100001060]> e asm.arch;e asm.bits
arm
64
[0x100001060]>
Sorry for not following the template. It's a straightforward question.
By enabling "WordPress-specific rules", the following codes will be added to the wordpress.conf:
# WordPress: deny general stuff
location ~* ^/(?:xmlrpc\.php|wp-links-opml\.php|wp-config\.php|wp-config-sample\.php|readme\.html|license\.txt)$ {
deny all;
}
However, this disables xmlrpc feature, which disa
How to improve NGINX performance, security, and other important things.
Source code for Hacker101.com - a free online web and mobile security class.
You might have a compose file that doesn't reference the exact version of the container image you want to minified (e.g., the target service might reference the latest tag and you want to minify v1.2.3 for your target image).
The --target-compose-svc-image command parameter (for build and profile commands) should provide a way to use the desired image version without having to rewrite
An evolving how-to guide for securing a Linux server.
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
The Single Sign-On Multi-Factor portal for web apps
Certificate authority and access plane for SSH, Kubernetes, web apps, databases and desktops
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Is your feature request related to a problem? Please describe.
JSDec is by default but doesn't shine as much as ghidra, notably, it doesn't have syntaxic color
Describe the solution you'd like
Add Syntaxic coloring for JSDec
Feb 2 - 3, 2022 • Online
February 16, 2022 • Online
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Keep dependencies up-to-date with automated Pull Requests
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
GuardRails provides continuous security feedback for modern development teams
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Code scanning at ludicrous speed. Find bugs, apply guardrails across your repos, and get feedback in PRs, Slack, or email
Find, fix (and prevent!) known vulnerabilities in your code
Backups your GitHub repositories, fast and secure
Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available
It seems Caddy does not support wildcards/ expression matching in the reverse proxy's header_up.
For example this does not remove any headers:
This works as expected, but is limited in its use:
It'd be great if Caddy would support wildcards/ expression matching in the reverse proxy's header_up/ header_down.