Sécurité

292 bookmarks
Custom sorting
The most common types of ATO attacks
The most common types of ATO attacks
Whether you're new to security or a veteran, you need to stay up to date on threats. Learn what ATO attacks are and what the most common types look like.
·blog.sqreen.com·
The most common types of ATO attacks
lirantal/is-website-vulnerable
lirantal/is-website-vulnerable
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries - lirantal/is-website-vulnerable
·github.com·
lirantal/is-website-vulnerable
apal21/target-blank-vulnerabilities-features
apal21/target-blank-vulnerabilities-features
Examples of some features and the vulnerabilities that can exploit any webpage if target="_blank" is used without rel="noopener" - apal21/target-blank-vulnerabilities-features
·github.com·
apal21/target-blank-vulnerabilities-features
yeahhub/Hacking-Security-Ebooks
yeahhub/Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download) - yeahhub/Hacking-Security-Ebooks
·github.com·
yeahhub/Hacking-Security-Ebooks
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge (#ceocybersecuritychallenge) is designed to get any organisation to root of their security problems; their people.
·davidfroud.com·
The CEO Cybersecurity Challenge
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
A tout moment, de nombreux concurrents ou individus mal intentionnés aimeraient mettre la main sur les données de votre entreprise. Etes-vous prêts à faire les bons choix ? Avez-vous évaluer le budget dont vous aurez besoin pour mettre en place une politique de sécurité ? Votre compagnie est-elle parée contre toute cyberattaque éventuelle ?
·targetedattacks.trendmicro.com·
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
Why Software Remains Insecure
Why Software Remains Insecure
There are myriad theories as to why software remains insecure after we've spend decades trying to solve the problem. Common reasons include: Get the Audio
·danielmiessler.com·
Why Software Remains Insecure
CSRF in Action 🎭
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
·smellycode.com·
CSRF in Action 🎭
yadox666/The-Hackers-Hardware-Toolkit
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit
·github.com·
yadox666/The-Hackers-Hardware-Toolkit
Defensive Coding Guide
Defensive Coding Guide
Introducing the Defensive Coding Guide The Defensive Coding Guide provides guidelines for improving software security through secure coding. It covers common programming languages and libraries, and focuses on concrete recommendations.
·developers.redhat.com·
Defensive Coding Guide
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
(Heads up before you start reading, this article was written by Ben Bidmead at Delta, formerly known as Sequoia Cyber Solutions, this post is quite old now and so a lot of the stuff here is broken and has been re-posted for completeness). To kick off this series on offensive security techniques, I am going to begin with what I consider to be the most important aspects of pentesting. Passive Recon and OSINT. Now, do not let the word ‘passive’ fool you. This is no light recon; you can uncover vas
·delta.navisec.io·
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
So You Want To Be a Pentester?
So You Want To Be a Pentester?
It goes without saying that being a Professional Penetration Tester is one of the “sexier” jobs in InfoSec. I mean, let’s be honest here - who wouldn’t want to break into buildings, and hack companies like Elliot from Mr. Robot, or carry out crazy hacks against banks and casinos like in the Oceans Series, all while doing it legally?
·jhalon.github.io·
So You Want To Be a Pentester?
Pick a Vulnerability to Learn About
Pick a Vulnerability to Learn About
The best defense against hackers is a well-informed development team. Our interactive exercises can teach your team about today's most common security vulnerabilities. %>
·hacksplaining.com·
Pick a Vulnerability to Learn About
RE for Beginners | Reverse Engineering
RE for Beginners | Reverse Engineering
With Reverse Engineering for Beginners you will learn the basics of x86 and get hands-on experience, all for free!
·begin.re·
RE for Beginners | Reverse Engineering
thomaspatzke/android-nfc-paycardreader
thomaspatzke/android-nfc-paycardreader
NFC card reader Android app. Currently reads the german GeldKarte and some credit cards. - thomaspatzke/android-nfc-paycardreader
·github.com·
thomaspatzke/android-nfc-paycardreader
Havocscope Black Market
Havocscope Black Market
Ranking of market risk and security threats from the global black market. Impact of security threats and risks are based upon public documents.
·havocscope.com·
Havocscope Black Market
CSO Online | Salted Hash
CSO Online | Salted Hash
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.
·csoonline.com·
CSO Online | Salted Hash