171 private links
dn42 can be used to learn networking and to connect private networks, such as hackerspaces or community networks. But above all, experimenting with routing in dn42 is fun!
Malpedia is a free service offered by Fraunhofer FKIE.
Administration is lead by Daniel Plohmann and Steffen Enders.
Mission Statement
The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.
Please respect the Terms of Service.
Also, please be aware that not all content on Malpedia is publicly available.
More specifically, you will need an account to access all data (malware samples, non-public YARA rules, ...).
In this regard, Malpedia is operated as an invite-only trust group.
The NetSA Security Suite network sensing architecture is comprised of four major subsystems described below: sensor, collector, analysis, and alerting. These subsystems interconnect in order to collect, process, store, and analyze network communications.
Siphons cookies, exposes internal router & installs web backdoor on locked computers
FireEye’s Mandiant Incident Response and Intelligence teams have identified a wave of DNS hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities across the Middle East and North Africa, Europe and North America. While we do not currently link this activity to any tracked group, initial research suggests the actor or actors responsible have a nexus to Iran.
Cisco Talos recently discovered a new campaign targeting Lebanon and the United Arab Emirates (UAE) affecting .gov domains, as well as a private Lebanese airline company. Based on our research, it's clear that this adversary spent time understanding the victims' network infrastructure in order to remain under the radar and act as inconspicuous as possible during their attacks.
Chrome Bug: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D841105
Orange Tsai: https://twitter.com/orange_8361
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! - CODE BLUE: https://www.youtube.com/watch?v=2MslLrPinm0
Slides: https://www.youtube.com/redirect?event=video_description&v=0uejy9aCNbI&redir_token=9G29Eg5j2LUdpcHnRWyjz7Bzz5V8MTU0MDE1MzEwNkAxNTQwMDY2NzA2&q=https%3A%2F%2Fwww.blackhat.com%2Fdocs%2Fus-17%2Fthursday%2Fus-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
Machine learning has seen a remarkable rate of adoption in recent years across a broad spectrum of industries and applications. Many applications of machine learning techniques are adversarial in nature, insofar as the goal is to distinguish instances which are bad'' from those which are
good''. Indeed, adversarial use goes well beyond this simple classification example: forensic analysis of malware which incorporates clustering, anomaly detection, and even vision systems in autonomous vehicles could all potentially be subject to attacks. In response to these concerns, there is an emerging literature on adversarial machine learning, which spans both the analysis of vulnerabilities in machine learning algorithms, and algorithmic techniques which yield more robust learning.
Moteur de recherche des thèses de doctorat françaises, le site theses.fr a pour objet de donner sur le web un point d’entrée :
à toutes les thèses de doctorat en cours de préparation en France
à toutes les thèses de doctorat soutenues en France, quel que soit le support matériel de la thèse (document papier, numérique, édition commerciale…)
aux personnes et organismes en lien avec ces thèses.
This page lists some good books recommended by current and past students for a variety of subjects related to the degree. Feel free to add books as you read them if they are relevant!
Books for the Interested Reader
Here's an overview of the various breaches that have been consolidated into this Have I Been Pwned. These are accessible programmatically via the HIBP API and also via the RSS feed.
Bien le bonsoir oiseaux de nuit ou de jour,
J’ai rassemblé des services pour le bonheur des personnes intéressées par l’informatique.
Voici les différents services proposés sur https://www.lagout.org , tous issus du libre :
Zerobin : Partagez vos textes ou codes de manière simple et sécurisée.
Documentation: Base de connaissances portant sur l'informatique
Lutim : Hébergeur d’images
Serveur IRC : Venez échanger sur nos différents salons
Jyrafeau : Hébergeur de fichiers temporaires
Si vous avez de la doc à partager, contactez moi, je me ferais un plaisir de l’ajouter !
https://www.lagout.org/contact.html
Et si vous voulez m'aider à maintenir ce site :
https://www.lagout.org/dons.html
Merci de votre visite !
HackerOne Bounty is a continuous security program in which trusted hackers are incentivized to find critical vulnerabilities before they fall into the wrong hands. A Bounty program can be run privately (invite-only) or publicly (open for all) and is perfect for organizations looking for a security solution that keeps pace with an agile software development lifecycle.
Online resources
README
Welcome to lagout.org !
If you want to make a copy of this website, go ahead, the server can handle the load !
If you think that the library should have new documents, tell us !
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
In most cryptographic functions, the key length is an important security parameter. Both academic and private organizations provide recommendations and mathematical formulas to approximate the minimum key size requirement for security. Despite the availability of these publications, choosing an appropriate key size to protect your system from attacks remains a headache as you need to read and understand all these papers.
This web site implements mathematical formulas and summarizes reports from well-known organizations allowing you to quickly evaluate the minimum security requirements for your system. You can also easily compare all these techniques and find the appropriate key length for your desired level of protection. The lengths provided here are designed to resist mathematic attacks; they do not take algorithmic attacks, hardware flaws, etc. into account.
The OpenC2 Forum defines a language at a level of abstraction that will enable unambiguous command and control of cyber defense technologies. OpenC2 is broad enough to provide flexibility in the implementations of devices and accommodate future products and will have the precision necessary to achieve the desired effect.
Computoser uses an algorithm to generate music. Each generated track is a unique combination of tones, rhythm and instruments.
The algorithm is currently experimental - it may generate both good and bad pieces. Feel free to mark the ones you like and the ones you dislike, so that I know how to improve the algorithm.
The performance may sound a bit artificial - that's because it's synthesized music - a computer can hardly have the performance of a human musician.