An Overview of Cryptography
Sécurité
OSForensics - Download
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
Undocumented Admin
Friendly white-hat hackers who gently access your vulnerable systems and patch them when you are not allowed to.
Firefox Lockwise — password manager — take your passwords everywhere
Firefox Lockwise lets you securely access the passwords you’ve saved in Firefox from anywhere — even outside of the browser. Features 256-bit encryption and Face/Touch ID.
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
write-ups-ctfs-pocs-tutos-articles-infosec-sites-pour-s-entrainer
Venez jouer et apprendre de nouvelles techniques!
How to Process Passwords as a Software Developer - DEV Community 👩💻👨💻
anouarbensaad/vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `} - anouarbensaad/vulnx
OWASP API Security Project - OWASP
security.txt | A proposed standard which allows websites to define security policies
A proposed standard which allows websites to define security policies.
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
Naked Security
Computer Security News, Advice and Research
Ars Technica
Serving the Technologist for more than a decade. IT news, reviews, and analysis.
Threatpost | The first stop for security news
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Technology News, Analysis, Comments and Product Reviews for IT Professionals
ZDNet's breaking news, analysis, and research keeps business technology professionals in touch with the latest IT trends, issues and events.
BleepingComputer
BleepingComputer.com is a premier destination for computer users of all skill levels to learn how to use and receive support for their computer.
Morning Hacked – Cybersecurity news in your inbox every weekday, in the morning!
~this week in security~
~this week in security~ Email Forms
SQL Injection Tutorial for Beginners
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
Open Source Security Platform
Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
Eliminating Known Vulnerabilities With Snyk
The way we consume **open source software (OSS) dramatically changed** over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, such as Apache, MySQL, Linux and OpenSSL. These projects came from well-known software shops that maintained good development and quality practices. It wasn’t our code, but it felt trustworthy, and it was safe to assume it didn’t hold more bugs than our own code. Fast-forward to today and OSS has turned into crowd-sourced marketplaces. Node’s npm carries over 210,000 packages from over 60,000 co...
Analyse your HTTP response headers
Quickly and easily assess the security of your HTTP response headers
Web Security Academy – Cybersecurity Training from PortSwigger
Welcome to the Web Security Academy. This is a free learning resource on web security provided by PortSwigger. Free web security training The Web Security ...
The most common types of ATO attacks
Whether you're new to security or a veteran, you need to stay up to date on threats. Learn what ATO attacks are and what the most common types look like.
lirantal/is-website-vulnerable
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries - lirantal/is-website-vulnerable
apal21/target-blank-vulnerabilities-features
Examples of some features and the vulnerabilities that can exploit any webpage if target="_blank" is used without rel="noopener" - apal21/target-blank-vulnerabilities-features
Introduction · OWASP Cheat Sheet Series
yeahhub/Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download) - yeahhub/Hacking-Security-Ebooks
Why Software Remains Insecure
There are myriad theories as to why software remains insecure after we've spend decades trying to solve the problem. Common reasons include: Get the Audio
The No More Ransom Project