Bookmarks - wr0ng.name
Tag cloud
Picture wall
Daily
Plugins
  • ► Play Videos
RSS Feed
  • RSS Feed
  • ATOM Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Display

Filter untagged links
page 1 / 3
46 results tagged research  ✕
dn42 https://dn42.eu/home
Wed 28 Apr 2021 04:55:14 PM CEST
QRCode
archive.org
dn42 can be used to learn networking and to connect private networks, such as hackerspaces or community networks. But above all, experimenting with routing in dn42 is fun!

backbone infrastructure internet online research resources
Malpedia (Fraunhofer FKIE) https://malpedia.caad.fkie.fraunhofer.de/
Mon 06 Jul 2020 09:22:59 AM CEST
QRCode
archive.org
Malpedia is a free service offered by Fraunhofer FKIE.
Administration is lead by Daniel Plohmann and Steffen Enders.

Mission Statement
The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.
Please respect the Terms of Service.

Also, please be aware that not all content on Malpedia is publicly available.
More specifically, you will need an account to access all data (malware samples, non-public YARA rules, ...).
In this regard, Malpedia is operated as an invite-only trust group.
analysis forensics malware OSINT research security wiki
NetSA Security Suite Overview https://tools.netsa.cert.org/overview.html
Fri 06 Mar 2020 10:17:38 AM CET
QRCode
archive.org
The NetSA Security Suite network sensing architecture is comprised of four major subsystems described below: sensor, collector, analysis, and alerting. These subsystems interconnect in order to collect, process, store, and analyze network communications.
analysis measures online research resources security systems tools
Samy Kamkar: PoisonTap - exploiting locked computers over USB https://samy.pl/poisontap/
Fri 12 Jul 2019 05:21:26 PM CEST
QRCode
archive.org
Siphons cookies, exposes internal router & installs web backdoor on locked computers
hacking it research resources security tools usb
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale « Global DNS Hijacking Campaign: DNS Record Manipulation at Scale | FireEye Inc https://www.fireeye.com/blog/threat-research/2019/01/global-dns-hijacking-campaign-dns-record-manipulation-at-scale.html
Thu 11 Jul 2019 03:17:47 PM CEST
QRCode
archive.org
thumbnail
FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. While we do not currently link this activity to any tracked group, initial research suggests the actor or actors responsible have a nexus to Iran.
blog dns fireeye it knowledge online research security spy
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: DNSpionage Campaign Targets Middle East https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html
Thu 11 Jul 2019 03:15:53 PM CEST
QRCode
archive.org
thumbnail
Cisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.
blog cisco dns it knowledge online research security spy
HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128 - YouTube https://www.youtube.com/watch?v=0uejy9aCNbI
Sat 20 Oct 2018 10:20:26 PM CEST
QRCode
archive.org
thumbnail
Chrome Bug: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fwww.blackhat.com%2Fdocs%2Fus-17%2Fthursday%2Fus-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
research resources security xss
Adversarial machine learning tutorial https://aaai18adversarial.github.io/
Fri 22 Jun 2018 05:08:12 PM CEST
QRCode
archive.org
Machine learning has seen a remarkable rate of adoption in recent years across a broad spectrum of industries and applications. Many applications of machine learning techniques are adversarial in nature, insofar as the goal is to distinguish instances which are ``bad'' from those which are ``good''. Indeed, adversarial use goes well beyond this simple classification example: forensic analysis of malware which incorporates clustering, anomaly detection, and even vision systems in autonomous vehicles could all potentially be subject to attacks. In response to these concerns, there is an emerging literature on adversarial machine learning, which spans both the analysis of vulnerabilities in machine learning algorithms, and algorithmic techniques which yield more robust learning.
AI knowledge online research resources security
Theses.fr http://www.theses.fr/
Sat 02 Jun 2018 05:02:43 AM CEST
QRCode
archive.org
Moteur de recherche des thèses de doctorat françaises, le site theses.fr a pour objet de donner sur le web un point d’entrée :

    à toutes les thèses de doctorat en cours de préparation en France
    à toutes les thèses de doctorat soutenues en France, quel que soit le support matériel de la thèse (document papier, numérique, édition commerciale…)
    aux personnes et organismes en lien avec ces thèses.
knowledge online repository research resources sciences
Recommended Reading [Abertay Ethical Hacking Society] https://hacksoc.co.uk/other/recommended_reading
Tue 28 Nov 2017 10:03:48 PM CET
QRCode
archive.org
This page lists some good books recommended by current and past students for a variety of subjects related to the degree. Feel free to add books as you read them if they are relevant!
books knowledge list research security wiki
Abertay Cyber Security Recommended Readings http://karenrenaud.com/hallOfFame.html
Tue 28 Nov 2017 10:01:54 PM CET
QRCode
archive.org
Books for the Interested Reader
books knowledge list research security
Have I been pwned? Check if your email has been compromised in a data breach https://haveibeenpwned.com/
Wed 06 Sep 2017 04:29:39 PM CEST
QRCode
archive.org
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
hacking knowledge online research security tools
X-Files https://doc.lagout.org/
Wed 16 Aug 2017 02:39:48 PM CEST
QRCode
archive.org
Bien le bonsoir oiseaux de nuit ou de jour,

J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.

Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :

Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires


Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !

https://www.lagout.org/contact.html

Et si vous voulez m'aider à maintenir ce site :

https://www.lagout.org/dons.html

Merci de votre visite !
download knowledge project repository research resources share tech
Bug Bounty, Vulnerability Coordination - HackerOne https://www.hackerone.com/
Sat 22 Jul 2017 12:07:26 PM CEST
QRCode
archive.org
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
bounty bug community exploit research security sharing
www.baycollege.edu - /BayCollege/media/Academics/Areas of Study/ https://www.baycollege.edu/BayCollege/media/Academics/Areas%20of%20Study/
Thu 06 Jul 2017 05:03:03 PM CEST
QRCode
archive.org
Online resources
books knowledge online repository research
Lagout https://www.lagout.org/
Thu 06 Jul 2017 04:59:34 PM CEST
QRCode
archive.org
README

Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
books documentation free knowledge online repository research resources share tools
VirusShare.com https://virusshare.com/
Wed 05 Jul 2017 10:19:06 AM CEST
QRCode
archive.org
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
analysis data knowledge malware OSINT research security share
Keylength - BSI Cryptographic Key Length Report (2017) https://www.keylength.com/en/8/
Fri 23 Jun 2017 10:06:59 AM CEST
QRCode
archive.org
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.
bestpractices crypto knowledge research security
OpenC2 http://openc2.org/
Fri 23 Jun 2017 09:30:53 AM CEST
QRCode
archive.org
The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.
community forum malware research resources security sharing standards
Computoser http://computoser.com/
Wed 21 Jun 2017 04:33:14 PM CEST
QRCode
archive.org
Computoser uses an algorithm to generate music. Each generated track is a unique combination of tones, rhythm and instruments.
The algorithm is currently experimental - it may generate both good and bad pieces. Feel free to mark the ones you like and the ones you dislike, so that I know how to improve the algorithm.
The performance may sound a bit artificial - that's because it's synthesized music - a computer can hardly have the performance of a human musician.
AI knowledge music online project research
page 1 / 3
764 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn