NVD - Search and Statistics
Hacking
Firing Range
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
The Pen Testing Tools We’re Thankful for in 2020
Recap of Bishop Fox's favorite penetration testing tools for 2020 including, Nuclei, Spyse Search Engine, Dufflebag, GadgetProbe, RMIScout and more.
Web skimmer hides within EXIF metadata, exfiltrates credit cards via image files
This credit card skimmer hides in plain sight, quite literally, as it resides inside the metadata of image files. We analyze the threat.
How a badly-coded computer virus caused billions in damage
Wearing a striped shirt and Matrix-style dark glasses, Onel de Guzman stared at the floor as he made his way through a crowd of photographers into a hastily arranged press conference in Quezon City, a suburb of the Philippines capital Manila.
The Cuckoo’s Egg Decompiled Course
In the 1980’s, Cliff Stoll discovered a $0.75 accounting error on the computer systems he managed at Lawrence Berkeley Laboratory. This small discovery would eventually lead him on the year-l…
ZonesPirates.com
Sécurité/Surveillance/Hacktualité
That time the US Secret Service mistook a cyberpunk RPG for a hacker's handbook
How GURPS Cyberpunk triggered a Secret Service raid of RPG publisher Steve Jackson Games' offices.
Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]
Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles.
sundowndev/hacker-roadmap
:pushpin: Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security. - sundownd...
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
Quitten/doser.py
DoS tool for HTTP requests (inspired by hulk but has more functionalities) - Quitten/doser.py
Company shuts down because of ransomware, leaves 300 without jobs just before holidays | ZDNet
Company tells employees to seek new employment after suspending all operations right before Christmas.
OSForensics - Download
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
Undocumented Admin
Friendly white-hat hackers who gently access your vulnerable systems and patch them when you are not allowed to.
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
write-ups-ctfs-pocs-tutos-articles-infosec-sites-pour-s-entrainer
Venez jouer et apprendre de nouvelles techniques!
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
The Billion-Dollar Hacking Group Behind a String of Big Breaches
Fin7, also known as JokerStash, Carbanak, and other names, is one of the most successful criminal hacking groups in the world.
How to Become A Hacker in 12 Simple Steps
10 Best Websites To Learn Ethical Hacking In 2018 » TechWorm
Who doesn’t want to learn hacking these days? With the constant threat of cyber-attacks. ; Best hacking websites to learn ethical hacking
Learn to Hack
The best defense against hackers is a well-informed development team. Our interactive exercises can teach your team about today's most common security vulnerabilities. %>
What is Hacking? Introduction & Types
Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Ethical hacking is about improving the security of computer systems.
Cross-site scripting for dummies – Hacker Noon
First of all, I would like to state that my intentions with this are article are entirely dishonourable. I want to help hackers to break…
Les gardiens du nouveau monde, doc 55', VF - YouTube
Docu 55' / Hackers, hacktivistes, militants pour un Internet libre et neutre. LICENCE CREATIVE COMMONS : CC-BY-NC-SA "Vous qui surfez sur le web, vous qui pa...