172 private links
PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast.
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
There are many ways to make a presence on the web and a website is just one of them. Other types of web presence include social media channels and sites that allow customers to review your business. Before you start making a website, make sure you understand what’s provided by the different types of web presence and the costs and benefits associated with each type.
La communauté FrameIP partage gratuitement ses documentations et codes source concernant le monde des réseaux TCPIP.
Visité par plus de 5000 personnes par jours, FrameIP.com nécessite un hébergement performant, une richesse des documentations et un entretient permanent.
Pour continuer à encore mieux partager, votre participation à la communauté sera la bienvenue.
Learn about the latest online threats.
Share and collaborate in developing threat intelligence.
Protect yourself and the community against today’s latest threats.
At the heart of Open Threat Exchange is the pulse, an investigation of an online threat. Pulses describe any type of online threat including malware, fraud campaigns, and even state sponsored hacking.
Pulses are comprised of indicators of compromise (or IoCs), which describe the infrastructure of that threat – including IPs, file hashes, e-mail addresses affiliated with the threat, etc.
The Foofus.Net team is an assortment of security professionals and wannabes located somewhere in the Midwestern United States. This site exists to support the various tools and ideas that we’ve made public, along with aiding to fill our DefCon beer fund.
ThreatMiner is designed to be an analyst's first portal to visit when doing threat research and here's why.
Threat intelligence and intrusion analysts who regularly perform research into malware and network infrastructure often find the need to rely on mutliple websites that individually holds a small piece of the larger puzzle.
Furthermore, it is often the case where pivoting directly from an open source research report is unavailable and that it is sometimes difficult to remember if an indicator has alredy been reported and/or attributed. All these small but frustrating obstacles distract an analyst from what they do best: analyse.
Hurricane Electric operates its own global IPv4 and IPv6 network and is considered the largest IPv6 backbone in the world as measured by number of networks connected. Within its global network, Hurricane Electric is connected to over 150 major exchange points and exchanges traffic directly with more than 6,000 different networks. Employing a resilient fiber-optic topology, Hurricane Electric has no less than four redundant paths crossing North America, two separate paths between the U.S. and Europe, and rings in Europe and Asia. In addition to its vast global network, Hurricane Electric owns and operates two data centers in Fremont, California - including Hurricane Electric Fremont 2, its newest 200,000 square-foot facility. Hurricane Electric offers IPv4 and IPv6 transit solutions over the same connection. Connection speeds available include 100GE (100 gigabits/second), 10GE, and gigabit ethernet.
Discover the best practices that fit the philosophy of the framework as envisioned by its original creator Fabien Potencier. Learn a new pragmatic vision for Symfony application development and boost your productivity.
Cisco's SenderBase.org provides a view into real-time threat intelligence across web and email. SenderBase is powered by Cisco Talos, the industry-leading threat intelligence organization dedicated to providing protection before, during, and after cybersecurity threats. The data is made up of over 100TB of daily security intelligence across over 1.6 million deployed Web, Email, Firewall and IPS appliances. Talos detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open source data sets, endpoint intelligence, and network intrusions. SenderBase is able transform some of Talos's data into actionable threat intelligence and tools to improve your security posture.
sebsauvage.net est le site "perso" d'un internaute qui travaille dans l'informatique.
On y trouve:
Ses coups de gueule.
Des explications sur l'informatique.
Une sélection de logiciels.
Des conseils pour sécuriser votre ordinateur.
Diverses autres choses: programmation Python, un logiciel qui créé des images (webGobbler), des instructions pour créer gratuitement des PDF, etc.
Welcome to slepp.ca. Presently, not a lot to see here. The goal is to finally put some wrappings around all the projects and stuff I've collected over the years. I'll likely resurrect the content from Geeks Anonymous and my other sites and toss it into here.
Welcome to the 'Scan of the Month' challenge. The purpose of these challenges are to help the security community develop the forensic and analysis skills to decode real attacks. It can be difficult finding real attacks that you can analyze and share your results with the community. These challenges address that problem. This is done by taking attacks we have captured in the wild and challenging the security community to decode them. Unfortunately, due to resource limitations, we can no longer provide a new challenge every month.
Free IP address to ASN database
Downloadable, easy to parse, updated hourly.
Le but de l’IILaR est de promouvoir la méthodologie de La RACHE. La RACHE, solution globale de génie logiciel, est un ensemble de techniques, de méthodes et de bonnes pratiques décrivant - des spécifications à la maintenance - comment produire du logiciel dans des conditions à peu près satisfaisantes et approximativement optimales.
This package contains sample Python code that demonstrates how to use the QRadar REST API. The API is accessed by sending specially crafted HTTP requests to specific URLs on the QRadar console. These URLs, known as "endpoints", each perform a specific function. Some endpoints perform different functions depending on whether you send a GET, POST, or DELETE request. By linking together calls to these endpoints you can implement you own custom business processes or integrate QRadar data with external systems.
Discover 180+ French startups leveraging AI in a variety of applications
We believe Artificial Intelligence (AI) will usher the next revolution in technology and accelerate the disruptions in almost every industry.
FRANCE IS AI mission is to support and promote the French Artificial Intelligence ecosystem both locally and internationally, while building bridges with the other AI hubs.
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis we have decided to gather all of them for you in an available and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Github: https://github.com/ytisf/theZoo
New to the command-line world? Or just a little rusty? Or perhaps you can't always remember the arguments to lsof, or tar? Surely people could benefit from simplified man pages focused on practical examples.
"CERT" is a registered trademark owned by Carnegie Mellon University. Computer security incident response teams (CSIRTs) that share our commitment to improving the security of networks connected to the internet may apply for authorization to use the "CERT" mark in their names.
The following CSIRTs have been approved to use "CERT."