Monthly Shaarli

All links of one month in a single page.

April, 2017

Free IP address to ASN database

Free IP address to ASN database
Downloadable, easy to parse, updated hourly.

Top 10 Developer Crypto Mistakes
thumbnail

After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of stack overflow posts on security, I have composed a list of the top 10 crypto problems I have seen.

GitHub - ibm-security-intelligence/api-samples: Samples code that uses QRadar API's
thumbnail

This package contains sample Python code that demonstrates how to use the QRadar REST API. The API is accessed by sending specially crafted HTTP requests to specific URLs on the QRadar console. These URLs, known as "endpoints", each perform a specific function. Some endpoints perform different functions depending on whether you send a GET, POST, or DELETE request. By linking together calls to these endpoints you can implement you own custom business processes or integrate QRadar data with external systems.

tldr | simplified, community driven man pages

New to the command-line world? Or just a little rusty? Or perhaps you can't always remember the arguments to lsof, or tar? Surely people could benefit from simplified man pages focused on practical examples.

The open archive HAL

HAL is an open archive where authors can deposit scholarly documents from all academic fields.

For the attention of the authors

The deposit must be made in agreement with the co-authors and in the respect for the policy of the publishers.
The deposit is subject of a control, HAL reserves the right to refuse items that do not meet the criteria of the archive.
Any deposit is definitive, no withdrawals will be made after the on-line posting of the publication.
Text files in pdf format or image files are sent to CINES for long-term archiving.

For the attention of the readers

In a context of electronic distribution, every author keep all its intellectual property rights.
IBM Knowledge Center - Ariel Query Language

The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to query and manipulate event and flow data from the Ariel database.

Main :: SixXS - IPv6 Deployment & Tunnel Broker

SixXS (Six Access) is a free, non-profit, non-cost service for Local Internet Registries (LIR's) and endusers. The main target is to create a common portal to help company engineers find their way with IPv6 networks deploying IPv6 to their customers in a rapid and controllable fashion. To reach these targets we are providing a whitelabel IPv6 Tunnel Broker and Ghost Route Hunter, an IPv6 route monitoring tool and various other services to help out where needed.

A Community-Developed List of Software Weakness Types - CWE List Version 2.10

At its core, the Common Weakness Enumeration (CWE™) is a list of software weaknesses types. Creating the list is a community initiative aimed at creating specific and succinct definitions for each common weakness type. By leveraging the widest possible group of interests and talents, the hope is to ensure that item in the list is adequately described and differentiated.he community using this information.

Online Resources & Guides - How Can We Help?

Browse through our Knowledge Base

BroadAnalysis – Threat Intelligence and Malware Research

I am an independent security analyst providing cyber threat intelligence and network traffic associated with malware infections. I am located in the Albany, New York area.
All domains and URLs listed on this website should be considered as dangerous and could cause damage to your computer. We do not provide clickable active hyperlinks to these sites.

Use this website at your own risk!

Penesting, security, development, commerce / Пентестинг, безопасность, разработка, коммерция

I periodically experiment on the Internet with different interests: freelancing, organizing a pseudo-company, collecting and analyzing various kinds of data related to information security, launching a small project or service, self-written or on the basis of some ready-made solution.

TinyNuke Explained - part I - YouTube
thumbnail

In this video we review the setup requirements for installing and deploying TinyNuke.

Dan Farmer

A bit of my life. You can try to reach me: zen @ either fish2.com or trouble.org. I sometimes jot things down at trouble.

Dataquest - Become a Data Scientist
thumbnail

Our hands-on method teaches you all the skills you need to become a data scientist or data analyst.

Learn by writing code, working with data, and building projects in your browser.

Application Threat Modeling - OWASP

Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.

Online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript

Free PCRE-based regular expression debugger with real time explanation, error detection and highlighting.

La Méthode R.A.C.H.E - International Institute of La RACHE
thumbnail

Le but de l’IILaR est de promouvoir la méthodologie de La RACHE. La RACHE, solution globale de génie logiciel, est un ensemble de techniques, de méthodes et de bonnes pratiques décrivant - des spécifications à la maintenance - comment produire du logiciel dans des conditions à peu près satisfaisantes et approximativement optimales.

France is AI - Startup competition of the Artificial Intelligence Event in Paris, France

Discover 180+ French startups leveraging AI in a variety of applications

We believe Artificial Intelligence (AI) will usher the next revolution in technology and accelerate the disruptions in almost every industry.

FRANCE IS AI mission is to support and promote the French Artificial Intelligence ecosystem both locally and internationally, while building bridges with the other AI hubs.

GitHub - k4m4/movies-for-hackers: 🎬 A curated list of movies every hacker & cyberpunk must watch.
thumbnail
A curated list of movies every hacker & cyberpunk must watch.
Andrew Dolgov / tt-rss | GitLab

Web-based news feed aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.

http://tt-rss.org

Détails All - K-net entier

Ce site et ses graphiques sont réalisés à partir de données issues de As24904 du Fournisseur d'accès internet K-Net.

Mes remerciements à Vivien & Lafibre.info, Jack pour leur collaboration.
Ce site utilise ChartJs pour générer les graphiques.

Contact, remarques, signalements de bugs: TiTiDu01, ou sur lafibre.info.

IBM Security App Exchange
thumbnail

IBM X-Force Exchange is a threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers.

Browse, Download, Use. qRadar extensions verified for a better security.

IBM developerWorks : Develop
thumbnail

Start developing with product trials, free downloads, and IBM Bluemix services. Sort by topic or product name and find everything we have to offer.

Computer Security Resource Center :: National Vulnerability Database - CWE Over Time

The two visualizations on this page are simple graphs which provide different views of how the assignment of vulnerability types has changed over time.

Softpanorama Switchboard

The main purpose of the site is to promote "slightly skeptical" approach to IT, to stimulate critical thinking about system administration and software development as professions. To increase resistance to media brainwashing. Skepticism is generally any questioning attitude towards knowledge, facts, or opinions/beliefs stated as facts, or doubt regarding claims that are taken for granted elsewhere.

Stucco-Data

This is a list of data sources that may be useful to cyber security. We are documenting these sources as part of an ongoing project, Stucco.

E.T. Proxy Logs Checker [ETPLC]

Open Source project for finding the Threats on Proxy or Web Server Logs with Emerging Threats Open rules

It's a production ready version, all feedback is welcome.

Intrusion Hunting for the Masses David Sharpe - YouTube
thumbnail

David Sharpe from GE-CIRT. So, mature CIRTs are supposed to have people hunting for APT, right? Don’t have a hunt team yet? Don’t know what to hunt for, or how or where to hunt? You are not alone. This talk will cover a range of effective and practical techniques that have worked over the years for finding targeted intrusions.

Hackmiami Conference 2016

TinyNuke Explained - part II - YouTube
thumbnail

Continuing TinyNuke Explained - part I, we review the available features of TinyNuke through the control panel, deploy a bot to our client machine, and perform attacks against our client.

ThreatHunting Home

Threat hunting is a popular topic these days, and there are a lot of people who want to get started but don’t know how. What should they hunt for? How should they perform the hunts? What data will they need to collect?

On the other hand, there are a lot of individuals out there who have written blog posts, conference presentations or whatever that detail some of their favorite hunting procedures. The problem is that these procedures are scattered all over the Internet, and are sometimes hard to find.

That’s why the ThreatHunting Project exists. Here you will find links to a number of different published hunting procedures. It my hope that this will give you some concrete starting points, or if you are an experienced hunter, help you find additional techniques to add to your repertoire.

Interconnexion réseau & Logiciel Libre ~ inetdoc.net

This website is dedicated to internetworking documentation with FOSS.

It contains articles, guides, labs and presentations which can be used as
teaching or self learning material

As the documents have to be maintained over years, static web pages are the
most suitable way to publish them

SoapUI | Functional Testing for SOAP and REST APIs

SoapUI is the world's most widely-used open source API testing tool for SOAP and REST APIs. SoapUI offers SOAP Web Services functional testing, REST API functional testing, WSDL coverage, message assertion testing and test refactoring. With over 10 years of experience backed by a vast open source community, SoapUI is the de facto method for ensuring quality when developing APIs and Web Services.

DBAD by philsturgeon

The "Dont Be a Dick" Public License

As developers we all want to protect our code from dicks that try to steal, sell, infringe or just generally rip us off. For this we have licenses like GPL, MIT, etc.

Sometimes however, you release a project where you just don't care what happens to the code. For this Sam Hocevar created the WTFPL which is a brilliant license.

theZoo aka Malware DB by ytisf

theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis we have decided to gather all of them for you in an available and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.

Github: https://github.com/ytisf/theZoo

LibreTaxi - free and open source Uber/Lyft alternative.

LibreTaxi makes ridesharing affordable by getting rid of the third party between passengers and drivers. Negotiate the price before the ride is confirmed, pay cash upon arrival. 1-minute hiring for all drivers.

Authorized Users of "CERT" | Incident Management
thumbnail

"CERT" is a registered trademark owned by Carnegie Mellon University. Computer security incident response teams (CSIRTs) that share our commitment to improving the security of networks connected to the internet may apply for authorization to use the "CERT" mark in their names.

The following CSIRTs have been approved to use "CERT."

IBM X-Force Exchange
thumbnail

IBM X-Force Exchange Threat Feed Manager

Introducing threat feed manager: you can now view external sources of threat intelligence within XFE.

Demande de révision de site Webpulse | Bluecoat

WebPulse contains a database of over 15 million entries and is growing every day. It provides URL identification to the PacketShaper via requests to WebPulse service points located across the globe. Each service point is periodically pinged in order to ensure that category, application, and operation IDs are provided from the fastest service point.

NVD - NVD Dashboard

NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.

NVD is a product of the NIST Computer Security Division, Information Technology Laboratory and is sponsored by the Department of Homeland Security’s National Cyber Security Division.

Directory listing - IBM FTP

Directory with qRadar documentation.

IBM Knowledge Center

Welcome to the IBM® Security QRadar® product documentation, where you can find information about how to install, maintain, and use these products.

BGP Looking Glass Database

Welcome to the biggest and most updated BGP Looking Glass and Traceroute list in internet You´ll find out 1073 Looking Glass Servers updated at 02/14/2017. If you find a broken link, or you want to announce a new looking glass site, please feel free to send us an email to info@bgplookingglass.com.

LDAP Admin - a free LDAP directory browser and editor

Ldap Admin is a free Windows LDAP client and administration tool for LDAP directory management. This application lets you browse, search, modify, create and delete objects on LDAP server. It also supports more complex operations such as directory copy and move between remote servers and extends the common edit functions to support specific object types (such as groups and accounts).

You can use it to manage Posix groups and accounts, Samba accounts and it even includes support for Postfix MTA. Ldap Admin is free Open Source software distributed under the GNU General Public License.

Cisco Services for IPS

Cisco Services for IPS protects and enhances the effectiveness of the Cisco Intrusion Prevention System. Supported by the Cisco Global Security Intelligence organization, Cisco Services for IPS delivers continuously updated, comprehensive, and accurate detection technology to identify and block fast-moving and emerging threats.

FIRST - Improving Security Together
thumbnail

FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.

STIG Viewer | Unified Compliance Framework®

Various Security Technical Implementation Guides

Network Security Concepts and Policies > Building Blocks of Information Security

In this chapter, you learn about the following topics:

Fundamental concepts in network security, including identification of common vulnerabilities and threats, and mitigation strategies
Implementation of a security architecture using a lifecycle approach, including the phases of the process, their dependencies, and the importance of a sound security policy

GitHub - aainz/TinyNuke: zeus-style banking trojan
thumbnail

Nuclear or TinyNuke is a full fledged banking trojan its main features are:

  • Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
  • Reverse SOCKS 4
  • HVNC like Hidden Desktop
  • Trusteer Bypass
  • ~32kb binary with obfuscated strings ~20kb without