171 private links
LookingGlass delivers the most comprehensive threat intelligence-driven solutions in the market enabling security teams to efficiently and effectively address threats throughout the cyber threat lifecycle.
With a scalable solutions portfolio of threat data feeds, a threat intelligence management platform, threat mitigation solutions, and threat intelligence services, LookingGlass enables security teams to prevent, detect, understand, and respond to analyzed, prioritized, relevant threats.Additionally, with a deep knowledge of the global Internet topology and near real time activity, LookingGlass helps organizations understand threats inside and outside their perimeter - including threats that may be impacting third party trusted partners, other organizations in their industry, and the latest threat trends impacting the global Internet at large.
urlscan.io is a service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates. This includes the domains and IPs contacted, the resources (JavaScript, CSS, etc) requested from those domains, as well as additional information about the page itself. urlscan.io will take a screenshot of the page, record the DOM content, JavaScript global variables, cookies created by the page, and a myriad of other observations.
Finally, urlscan.io will try to make a verdict whether the scanned website is considered malicious or suspicious. If the site is targeting the users one of the almost 400 brands tracked by urlscan.io, this will be shown in the scan results.
Hacker Factor Solutions provides whitepapers and journal articles. Most documents are created and provided privately to customers. The following list represents a sample of documents created by Hacker Factor Solutions and released publicly. The copyrights for these documents have been transfered to their respective owners.
Siphons cookies, exposes internal router & installs web backdoor on locked computers
Le Piratage du télégraphe Chappe est un détournement du réseau de télégraphie optique entrepris par deux hommes d'affaires bordelais, Louis et François Blanc, entre 1834 et 1836, afin de connaître avant tout le monde la clôture des cours de la rente à la Bourse de Paris.
Le piratage a été rendu possible par la corruption d'un agent télégraphique de Tours, qui ajoutait discrètement le chiffre du cours aux messages envoyés par l'État.
La divulgation de cette manœuvre a contribué au vote de la loi de 1837 sur le monopole public des communications télégraphiques. Il s'agit peut-être d'un des premiers cas de hacking, les frères Blanc exploitant une faille structurelle dans un réseau de télécommunication.
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.
Note: A MITRE Partnership Network (MPN) account is not required to view and use the ATT&CK site.
Pour les gens n'étant pas familiers avec les sites de challenges, un site de challenges est un site proposant en particulier des problèmes relatifs à l'informatique. Il existe de nombreux types de challenges. Les plus communs sont les suivants : Cryptographie, Crackme, Stéganographie, Programmation, Logique et Maths/Science. La difficulté de ces épreuves varie de même.
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
Remove a Google malware warning? This site provides website owners with information and tools to assist them in finding and removing hacks - malware, malicious redirects, phishing, spam from their sites.
This Knowledge Base was put together and is maintained by Roberto Salgado, Co-Founder of Websec. It is a compilation of books, papers, cheatsheets and testing done by Roberto over the years.
Operational and technical headquarters was set up to locate large-scale cyber threats by the National Police of Ukraine and the Security Service of Ukraine. It includes representatives of the most famous Ukrainian and foreign cyber security companies. According to these facts, the pre-trial investigation was initiated by the National Police of Ukraine.
Comment: Yaroslav Trakalo, spokesman for the National Police of Ukraine
Коментар: Ярослав Тракало, речник Національної поліції України
HashKiller's purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the Internet by demonstrating the weakness of using hash based storage / authentication.
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.
This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r
The two visualizations on this page are simple graphs which provide different views of how the assignment of vulnerability types has changed over time.
Nuclear or TinyNuke is a full fledged banking trojan its main features are:
- Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
- Reverse SOCKS 4
- HVNC like Hidden Desktop
- Trusteer Bypass
- ~32kb binary with obfuscated strings ~20kb without
Presentation video: Reverse-engineering CPUs for fun and profit
Vous êtes intéressé à collecter des statistiques sur votre réseau avec des outils open source gratuits?
Vous voulez gagner du temps et économiser de l'argent sur vos charges réseaux?
Vous en avez marre de gaspiller des heures à configurer des outils open source et voulez enfin des tutoriaux clairs?
Si les réponses sont oui, ce site web est fait pour vous.
Le « Hacking social » désigne les réflexions et les activités visant à identifier, comprendre, et détourner des structures sociales nuisibles aux individus et aux groupes. Par structures sociales, nous entendons tous les contextes et cadres où les rapports humains sont régis selon des mœurs ou des normes, qu’elles soient accidentelles (par exemple : la vie en famille) ou rationnelles (par exemple : le management dans les entreprises).
KraZhtest - Pony links - Fresh hacks - C'est le bordel
This page shows the components of the CVSS score for example and allows you to refine the CVSS base score. Please read the CVSS standards guide to fully understand how to score CVSS vulnerabilities and to interpret CVSS scores.