171 private links
TegraRcmSmash
A reimplementation of fusee-launcher in C++ for Windows platforms.
Lets you launch fusee/shofEL2 payloads to a USB connected Switch in RCM mode.
Chrome Bug: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fwww.blackhat.com%2Fdocs%2Fus-17%2Fthursday%2Fus-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
Backup/Restore your Nand + Get your biskeys+tseckeys+keys.txt Guide
by Canna Jul 31, 2018 at 11:54 PM
This Multi Guide Will help you back up your nand, Backup your system information,
Restore your nand, and also Make exfat work on lower system versions.
Only use the files attached if your following my guide/thread
I also recommend you Backup your nand before any
modification of your system to make yourself a clean backup / A Virgin Nand
Also not to use auto rcm Until after your backup
You may also run the "hekate.bin" from your own dongle or method from the
"Payloads to be used with tegra.zip" if you do not wish to use TegraGui
Interactive online malware analysis service for dynamic and static research of most types of threats using any environments. Replaces a set of tools for research.
Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 898 tasks, 221 draft tasks, and is aware of 704 languages, though we do not (and cannot) have solutions to every task in every language.
Sploitus is а convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities.
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.
Note: A MITRE Partnership Network (MPN) account is not required to view and use the ATT&CK site.
Machine learning has seen a remarkable rate of adoption in recent years across a broad spectrum of industries and applications. Many applications of machine learning techniques are adversarial in nature, insofar as the goal is to distinguish instances which are bad'' from those which are
good''. Indeed, adversarial use goes well beyond this simple classification example: forensic analysis of malware which incorporates clustering, anomaly detection, and even vision systems in autonomous vehicles could all potentially be subject to attacks. In response to these concerns, there is an emerging literature on adversarial machine learning, which spans both the analysis of vulnerabilities in machine learning algorithms, and algorithmic techniques which yield more robust learning.
Moteur de recherche des thèses de doctorat françaises, le site theses.fr a pour objet de donner sur le web un point d’entrée :
à toutes les thèses de doctorat en cours de préparation en France
à toutes les thèses de doctorat soutenues en France, quel que soit le support matériel de la thèse (document papier, numérique, édition commerciale…)
aux personnes et organismes en lien avec ces thèses.
Threat Hunting: Beyond Alerts & IOCs
Welcome to VMware Technology Network
100+ forums
3 million VMware enthusiasts & customers connecting to share knowledge, resources, opinions, and experiences globally
A curated list of awesome Go frameworks, libraries and software. Inspired by awesome-python.
Bien le bonsoir oiseaux de nuit ou de jour,
J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.
Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :
Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires
Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !
https://www.lagout.org/contact.html
Et si vous voulez m'aider à maintenir ce site :
https://www.lagout.org/dons.html
Merci de votre visite !
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of Kerberos
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
README
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
Urbex
Links
OpenNews
ZeroBin
Autoblogs
We Fight Censorship
WFC via Tor SSL
Shaarli RSS
Ecirtam via Tor SSL
Open sources
Biographie
Blog & divers
Photos
Musique
Vidéos
Ami-e-s