Microsoft Word - Cyber-Security in smart grid - a survey - Revised version 2(3).doc - 1809.02609.pdf
Sécurité
Smart Devices, Smart Grids, and Cybersecurity - DZone Security
We explore the emergence of smart grid technology, the cybersecurity implications of this innovation, and ways organizations can ensure their cybersecurity.
Share a secret - One Time
Keep sensitive information out of your chat logs and email. Share a secret link that is available only one time.
XSS Payloads
XSS Payloads
How to Install Kali Linux on VirtualBox: An Expert Guide
Generally, it is not recommended to use Kali as the desktop OS. However, VMs is a great alternative. Read how to install Kali Linux on VirtualBox as a VM.
zricethezav/gitleaks
Scan git repos (or files) for secrets using regex and entropy 🔑 - zricethezav/gitleaks
WSTG - Latest | OWASP
WSTG - Latest on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
Crackstation is the most effective hash cracking service. We crack: MD5, SHA1, SHA2, WPA, and much more...
My Javascript Recon Process - BugBounty
My Javascript Recon Process - BugBounty. GitHub Gist: instantly share code, notes, and snippets.
m4ll0k - Overview
🄷
🄰
🄲
🄺
🄴
🅁
🇲🇦
🇮🇹
🇪🇸 . m4ll0k has 13 repositories available. Follow their code on GitHub.
CVE - CVE
CVE® is a list of records — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities. The mission of the CVE Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
NVD - Search and Statistics
Firing Range
Metasploit — A Walkthrough Of The Powerful Exploitation Framework | by Manish Shivanandhan | Exploitable | Medium
Metasploit can handle everything from scanning to exploitation. In this article, we will take a look at what makes Metasploit the most…
What is a backdoor? Let's build one with Node.js | Snyk
A backdoor in our code that can perform OS injection is one of the most scary scenarios ever. Currently, npm has more than 1.2M of public packages available.
scanyourstuff.app
Personal Data Leak Checker: Your Email & Data - Breached? | CyberNews
Check whether your online credentials have been comprised with our up to date personal data leak checker tool.
veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering
How to systematically secure anything: a repository about security engineering - veeral-patel/how-to-secure-anything
Security in a Box - Digital security tools and tactics
Holistic security
Holistic Security
How to Check Your Devices for Stalkerware | WIRED
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
How to Know If You’ve Been Hacked, and What to Do About It | WIRED
Facebook. Google. Netflix. Sometimes your accounts get compromised, so it’s vital to understand the threats.
Google met en open source son scanner de vulnérabilité Tsunami - ZDNet
Selon Google, Tsunami est un scanner de réseau qui permet de détecter les vulnérabilités critiques avec le moins de faux positifs possible.
A look at password security, Part I: history and background - The Mozilla Blog
Today I'd like to talk about passwords. Yes, I know, passwords are the worst, but why? This is the first of a series of posts about passwords, with this one ...
Why attackers try to take over user accounts - Sqreen Blog
Attackers try to take over user accounts for several reasons and through several different methods. Learn why ATOs occur and what you can do about them.
Guide pratique pour une collectivité et un territoire numérique de confiance
Quel élu ne s’est pas entendu demander si sa collectivité comptait opérer une transformation numérique ? Ou, tout simplement, de quelle façon les services de sa collectivité allaient se « numériser » ou « s’informatiser » ? De nos jours, la notion de territoire numérique apparaît de plus en plus incontournable. L’actualité quotidienne illustre la nécessité de cette maîtrise du numérique, plus particulièrement sous l’angle de la cybersécurité.
Diagnostic : Je pense être victime de cybermalveillance. Je suis - Assistance aux victimes de cybermalveillance
Certificat HTTPS : la clé pour passer votre site web du HTTP au HTTPS
Vous envisagez de passer votre site web en HTTPS ? Pour y parvenir, vous avez besoin d’un certificat HTTPS délivré par une Autorité de Certification. Il vous suffit ensuite de suivre quelques étapes pour activer le protocole HTTPS sur votre site. Voici comment faire.
Les bases de la sécurité des SGBD : un pas à pas
Sécurité : Sécuriser les sites web | CNIL
Tout site web doit garantir son identité et la confidentialité des informations transmises.