A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Mar 18, 2022
{{ message }}
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
A collection of various awesome lists for hackers, pentesters and security researchers
Context: https://caddy.community/t/including-files-scripts/15050/4
Right now, the templates module is inflexible in that only functions the functions registered by Caddy itself are available.
A good refactor would be to make it possible to pass an optional array of modules in the http.handlers.templates.functions.* namespace which get invoked at Provision() time to register additional
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
List of Computer Science courses with video lectures.
None yet, but I'm working on OS X v10.11.6 'El Capitan' client-side. (See 'The way of deployment (cloud or local)' below for details on considered server infrastructure.)
None yet, as I haven't yet gotten that far into setting up Algo.
requirements.txtNot applicable (see above.)
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Security Guide for Developers (实用性开发人员安全须知)
Guide to securing and improving privacy on macOS
SQL powered operating system instrumentation, monitoring, and analytics.
Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2
The ERC721Enumerable must throw according to the specification.
Liberating Web Analytics. Star us on Github? +1. Matomo is the leading open alternative to Google Analytics that gives you full control over your data. Matomo lets you easily collect data from websites & apps and visualise this data and extract insights. Privacy is built-in. We love Pull Requests!
My 2GHz Ryzen 7 laptop needs SEVERAL minutes to compile this 2.2MB autogenerated file. the reason is. because its full of spaguetti that the compiler tries to optimise without much luck because its based on binary logic operands and zillions of consecutive conditionals that don't even try to switch/case. So this is 45KLOC of code that almost nobody uses and will live better in extras.
Sorry for not following the template. It's a straightforward question.
By enabling "WordPress-specific rules", the following codes will be added to the wordpress.conf:
# WordPress: deny general stuff
location ~* ^/(?:xmlrpc\.php|wp-links-opml\.php|wp-config\.php|wp-config-sample\.php|readme\.html|license\.txt)$ {
deny all;
}
However, this disables xmlrpc feature, which disa
How to improve NGINX performance, security, and other important things.
We need a flag (compose-svc-start-wait ) to control how long docker-slim should wait before starting each service when there's a compose file (build, profile, run commands though the run command doesn't have support for compose yet).
The Single Sign-On Multi-Factor portal for web apps
Source code for Hacker101.com - a free online web and mobile security class.
KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
Asking about this since the NSA recently published guidance advising the public and private sectors to transition to cryptographic algorithms that are no less than sha384 & ec384 (elliptic curves).
While Edwards' Curves are different, its worth noting that prior to this update sha256 & secp256k1 were both on the list of acceptable cryptographic algorithms. My deduction was that 128-bit securit
An evolving how-to guide for securing a Linux server.
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
Certificate authority and access plane for SSH, Kubernetes, web apps, databases and desktops
eBPF-based Networking, Security, and Observability
Container scanning schemas below 14.0.0 have been deprecated.
blob/main/contrib/gitlab.tpl:3 is using a deprecated version:
"version": "2.3",
The latest version of the schema is [14.1.0](https://gitlab.com/gitlab-org/gitla
Mar 22 - 24, 2022 • Virtual
Backup your GitHub repos & metadata automatically. Get daily backups that can be restored in seconds – AWS storage available
GuardRails provides continuous security feedback for modern development teams
Code scanning at ludicrous speed. Find bugs and enforce code standards
Find, fix (and prevent!) known vulnerabilities in your code
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
Keep dependencies up-to-date with automated Pull Requests
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
Backups your GitHub repository, code, LFS and metadata, on-demand and on-schedule
Feature type
Quality of life
Describe the feature
I would like to be able to use relative paths in the launcher settings file to point to
x32dbg.exeandx64dbg.exerespectively. I've already tried editing the file manually and assuming my implementation (.\/\//) isn't wrong, the launcher seemingly refuses the use of relative paths.