171 private links
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
I-Blocklist is a service dedicated to the distribution of Internet Protocol address lists.
How does it work?
I-Blocklist distributes lists in standard formats including P2P, DAT, and CIDR.
Our lists can be used with software such as PeerBlock, PeerGuardian, iplist, Vuze, Transmission, uTorrent and, pfBlocker.
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.
“Pour des raisons de sécurité, je ne mets plus les patchs de sécurité, cela fait planter les serveurs.”
I work for OETIKER+PARTNER AG a consultancy company based in Olten, Switzerland. We use OpenSource Software extensively in all our projects. So I made it a habit to open source code we write whenever possible. Below is a list of notable projects I have created or been involved with over the years.
Greetings,
My name is Daniel, and I’m an information security practitioner and writer living in San Francisco, California. Most people come for my tutorials, my essays, or the podcast, but you can find some of my most popular content below.
This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.
Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine. It includes representatives of the most famous Ukrainian and foreign cyber security companies. According to these facts, the pre-trial investigation was initiated by the National Police of Ukraine.
Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine
Коментар: Ярослав Тракало, речник Національної поліції України
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of Kerberos
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
Pure-PHP implementations of:
BigIntegers
RSA
SSH2
SFTP
X.509
Symmetric key encryption
AES
Rijndael
Twofish
Blowfish
DES
3DES
RC4
RC2
phpseclib is designed to be ultra-compatible. It works on PHP4+ (PHP4, assuming the use of PHP_Compat) and doesn't require any extensions. For purposes of speed, mcrypt is used if it's available as is gmp or bcmath (in that order), but they are not required.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
VirusTotal Intelligence allows you to search through our dataset in order to identify files that match certain criteria (antivirus detections, binary content, metadata, submission file names, file format structural properties, file size, etc.). We could say that it is pretty much like the "Google" of malware.
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.
Free Website Malware and Security Scanner:
Enter a URL (ex. sucuri.net) and the Sucuri SiteCheck scanner will check the website for known malware, blacklisting status, website errors, and out-of-date software.
File Analyzer detects and analyses potential malicious executables such as:
.exe (Executables, GUI, CUI, and all variants like PIF, SCR, CPL etc)
.dll (Dynamic Link Libraries)
.vbs (Script files like JS, JSE, VBS, VBE, PS1, PS2, CHM etc)
.any (Available in Pro Version)
File Analyzer is based on Joe Sandbox Desktop which performs deep malware analysis. Compared to others Joe Sandbox performs static, dynamic, graph and hybrid analysis to get the most in-depth analysis possible. The captured behavior is rated and classified by one of the biggest behavior signature sets.
What about evasive malware? Joe Sandbox Desktop is the only solution which uses novel graph based algorithms to detect and spot evasive behavior. Checkout the behavior and execution graphs in the reports. To leave malware no choice for VM detection Joe Sandbox Desktop enables to analyze on bare-metal machines (e.g. on a Laptop or PC from your environment).
Malware Analysis Reports: Latest behavior analysis reports generated by Joe Sandbox
Check out our latest Analysis Reports of Evasive Malware
Windows
Android
Mac
iOS
The Microsoft Security Response Center (MSRC) investigates all reports of security vulnerabilities affecting Microsoft products and services, and provides the information here as part of the ongoing effort to help you manage security risks and help keep your systems protected.
This video show how to developp a complete application within Qradar using the new Qradar Application Editor