Found 286 bookmarks
Newest
Why Software Remains Insecure
Why Software Remains Insecure
There are myriad theories as to why software remains insecure after we've spend decades trying to solve the problem. Common reasons include: Get the Audio
·danielmiessler.com·
Why Software Remains Insecure
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge (#ceocybersecuritychallenge) is designed to get any organisation to root of their security problems; their people.
·davidfroud.com·
The CEO Cybersecurity Challenge
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
A tout moment, de nombreux concurrents ou individus mal intentionnés aimeraient mettre la main sur les données de votre entreprise. Etes-vous prêts à faire les bons choix ? Avez-vous évaluer le budget dont vous aurez besoin pour mettre en place une politique de sécurité ? Votre compagnie est-elle parée contre toute cyberattaque éventuelle ?
·targetedattacks.trendmicro.com·
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
CSRF in Action 🎭
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
·smellycode.com·
CSRF in Action 🎭
yadox666/The-Hackers-Hardware-Toolkit
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
·github.com·
yadox666/The-Hackers-Hardware-Toolkit
Defensive Coding Guide
Defensive Coding Guide
Introducing the Defensive Coding Guide The Defensive Coding Guide provides guidelines for improving software security through secure coding. It covers common programming languages and libraries, and focuses on concrete recommendations.
·developers.redhat.com·
Defensive Coding Guide
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
(Heads up before you start reading, this article was written by Ben Bidmead at Delta, formerly known as Sequoia Cyber Solutions, this post is quite old now and so a lot of the stuff here is broken and has been re-posted for completeness). To kick off this series on offensive security techniques, I am going to begin with what I consider to be the most important aspects of pentesting. Passive Recon and OSINT. Now, do not let the word ‘passive’ fool you. This is no light recon; you can uncover vas
·delta.navisec.io·
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
So You Want To Be a Pentester?
So You Want To Be a Pentester?
It goes without saying that being a Professional Penetration Tester is one of the “sexier” jobs in InfoSec. I mean, let’s be honest here - who wouldn’t want to break into buildings, and hack companies like Elliot from Mr. Robot, or carry out crazy hacks against banks and casinos like in the Oceans Series, all while doing it legally?
·jhalon.github.io·
So You Want To Be a Pentester?
Faut-il HTTPS sur mon site ?
Faut-il HTTPS sur mon site ?
Découvrez si votre site web a besoin de passer à HTTPS.
·faut-il-https-sur-mon-site.fr·
Faut-il HTTPS sur mon site ?
Ghidra
Ghidra
·cur.at·
Ghidra
imthenachoman/How-To-Secure-A-Linux-Server
imthenachoman/How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server. - imthenachoman/How-To-Secure-A-Linux-Server
·webopsweekly.com·
imthenachoman/How-To-Secure-A-Linux-Server
Revoking of certificates
Revoking of certificates
Managing certificates, and rotating them in due time can quickly get out of hand.
·security.christmas·
Revoking of certificates
Security Checklist
Security Checklist
A checklist for staying safe on the internet
·hackernewsletter.us1.list-manage.com·
Security Checklist
12 Open Source Web Security Scanner to Find Vulnerabilities
12 Open Source Web Security Scanner to Find Vulnerabilities
An interesting report by Symantec reveals, 76% of scanned websites had malware. and if you are using WordPress then in another report by SUCURI shows, more than 70% of scanned websites were infected with one or more vulnerabilities. As a web application owner, how do you ensure your site is protected from online threats? Doesn’t […]
·geekflare.com·
12 Open Source Web Security Scanner to Find Vulnerabilities
Hack This Site!
Hack This Site!
A legal and safe web application security educational resource.
·hackthissite.org·
Hack This Site!
Levels - HackThis!!
Levels - HackThis!!
Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools.
·hackthis.co.uk·
Levels - HackThis!!
OWASP/OWASPWebGoatPHP
OWASP/OWASPWebGoatPHP
A deliberately vulnerable web application for learning web application security. - OWASP/OWASPWebGoatPHP
·github.com·
OWASP/OWASPWebGoatPHP
Securing Your Site like It’s 1999
Securing Your Site like It’s 1999
Katie Fenn opens the door on our 2018 season by transporting us back to the turn of the century when new lessons were being learned about web security. Those who don’t learn from the past are condemned to repeat it, so fasten up your winter coat and let Katie lead you through some of the darker parts of the forest.
·nodeweekly.com·
Securing Your Site like It’s 1999
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.
·ted.com·
James Lyne: Everyday cybercrime -- and what you can do about it | TED Talk
4 SQL Injection Techniques For Stealing Data
4 SQL Injection Techniques For Stealing Data
Learn how hackers use SQL injection to obtain data from your servers and what you can do through T-SQL code and server settings to stop them.
·dbweekly.com·
4 SQL Injection Techniques For Stealing Data
minimaxir/big-list-of-naughty-strings
minimaxir/big-list-of-naughty-strings
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data. - minimaxir/big-list-of-naughty-strings
·smashingmagazine.us1.list-manage.com·
minimaxir/big-list-of-naughty-strings