172 private links
Here are the credentials for an Online LDAP Test Server that you can use for testing your applications that require LDAP-based authentication. Our goal is to eliminate the need for you to download, install and configure an LDAP sever for testing. If all you need is to test connectivity and authentication against a few identities, you have come to the right place. If you find this useful or would like us to enhance/modify this test LDAP server, please leave a comment.
LDAP Server Information (read-only access):
Server: ldap.forumsys.com
Port: 389
Bind DN: cn=read-only-admin,dc=example,dc=com
Bind Password: password
All user passwords are password.
NAT64Check is a tool developed by the Internet Society in collaboration with Stichting IPv6 Nederland, Go6, SJM Steffann, Internetbureau Max and Simply Understand. This allows you to enter the URL of a particular website, and then run tests over IPv4, IPv6 and NAT64 in order to check whether the website is actually reachable in each case, whether identical web pages are returned, and whether all the resources such as images, stylesheets and scripts load correctly. It also compares responsiveness using the different protocols, therefore allowing network and system administrators to easily identify anything is ‘broken’, to pinpoint where any non-IPv6 compatible elements need to be fixed.
Rex eats regular expressions for breakfast. And so can you! This regex tutorial, one of the most detailed on the web, takes you all the way to mastery.
This page explains what makes this site special among all other regex sites, but first let's answer a burning question:
What is the meaning of life?
That's easy. As per the regex humor page, it's simply
^(?=(?!(.)\1)([^\DO:105-93+30])(?-1)(?<!\d(?<=(?![5-90-3])\d))).[^\WHY?]$
Now for the other burning question…
We ultimately architected UberEATS in much the same way as we would a regular React /Redux web app, eschewing iOS patterns and modules wherever possible. Fortunately for our needs and preferences, web concepts and technologies on the whole translate quite nicely to native development.
Interactive online malware analysis service for dynamic and static research of most types of threats using any environments. Replaces a set of tools for research.
Rosetta Code is a programming chrestomathy site. The idea is to present solutions to the same task in as many different languages as possible, to demonstrate how languages are similar and different, and to aid a person with a grounding in one approach to a problem in learning another. Rosetta Code currently has 898 tasks, 221 draft tasks, and is aware of 704 languages, though we do not (and cannot) have solutions to every task in every language.
Find out what any acronym, abbreviation, or initialism stands for
With more than 1,000,000 human-edited definitions, Acronym Finder is the world's largest and most comprehensive dictionary of acronyms, abbreviations, and initialisms. Combined with the Acronym Attic, Acronym Finder contains more than 5 million acronyms and abbreviations. You can also search for more than 850,000 US and Canadian postal codes.
We're the first company in Hackers & Founders startup accelerator and we love solving cross-browser testing problems!
Hey there!
If you have been searching for a place to get started with
Reverse Engineering and get your hands dirty - you are in the right place :)
This is a file share allowing access to all Sysinternals utilities. We have developed this to test an alternate distribution mechanism for our utilities. This will allow you to run these tools from any computer connected to the Internet without having to navigate to a webpage, download and extract the zip file. If you are unfamiliar with Microsoft Windows Sysinternals, it is highly recommended that you visit the website at http://technet.microsoft.com/sysinternals before using these tools. If you have any questions or comments on this file share, please email syssite@microsoft.com
Windows forensic and other free tools by Forensics, Programming, X-Ways. Certified SANS instructor.
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.
Note: A MITRE Partnership Network (MPN) account is not required to view and use the ATT&CK site.
Machine learning has seen a remarkable rate of adoption in recent years across a broad spectrum of industries and applications. Many applications of machine learning techniques are adversarial in nature, insofar as the goal is to distinguish instances which are bad'' from those which are
good''. Indeed, adversarial use goes well beyond this simple classification example: forensic analysis of malware which incorporates clustering, anomaly detection, and even vision systems in autonomous vehicles could all potentially be subject to attacks. In response to these concerns, there is an emerging literature on adversarial machine learning, which spans both the analysis of vulnerabilities in machine learning algorithms, and algorithmic techniques which yield more robust learning.
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux, and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed analysis reports. This website gives you access to the Community Edition of Joe Sandbox Cloud. It allows you to run a maximum of 30 analyses / month, 3 analyses / day on Windows, Linux and Android with limited analysis output.
Robtex uses various sources to gather public information about IP numbers, domain names, host names, Autonomous systems, routes etc. It then indexes the data in a big database and provide free access to the data.
We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet.
Our database now contains billions of documents of internet data collected over more than a decade.
Nous partageons les données qui révèlent comment les règles et les actions des autorités administratives et des entreprises affectent la confidentialité, la sécurité et l'accès aux informations.
A Search Engine for Threats
Moteur de recherche des thèses de doctorat françaises, le site theses.fr a pour objet de donner sur le web un point d’entrée :
à toutes les thèses de doctorat en cours de préparation en France
à toutes les thèses de doctorat soutenues en France, quel que soit le support matériel de la thèse (document papier, numérique, édition commerciale…)
aux personnes et organismes en lien avec ces thèses.
Ce meetup a pour objectif de vous montrer en direct comment capturer et analyser vos premiers malwares, de la mise en place d'un pot de miel (honeypot) jusqu'à l'identification du serveur de contrôle.
Je viens du monde UNIX, monde que je fréquente depuis 1987. J'ai installé mon premier PC sous linux en mars 1994. Une bonne vieille slackware! C'est dire si c'est vieux!
Vous n'allez pas découvrir comment installé linux ou les derniers potins mondains concernant ce système. D'autres sites le font très bien.
Ce site est destiné à vous fournir des trucs et des astuces, des conseils sur et autour d'AIX et éventuellement de Linux et des produits que professionnels que l'on peut trouver (CFT, MQSeries, TWS ..).
Les informations que vous ne trouverez ici, sont synthétiques. C'est une orientation que je donne volontairement. L'objectif de ce site est destiné à faire gagner du temps.