171 private links
THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.
RegExr is an online tool to learn, build, & test Regular Expressions (RegEx / RegExp).
Results update in real-time as you type.
Roll over a match or expression for details.
Save & share expressions with others.
Use Tools to explore your results.
Browse the Library for help & examples.
Undo & Redo with Ctrl-Z / Y.
Search for & rate Community patterns.
NaCl (pronounced "salt") is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl's goal is to provide all of the core operations needed to build higher-level cryptographic tools.
The current version of NaCl supports C and C++. Support for Python is a high priority.
Here's a collection of Web Services related tools for Windows, some of these support both PocketPC & Desktop variations of Windows.
Here's a collection of applications & developer tools for use with Salesforce.com, these are mostly for Mac OSX.
Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections.
The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security – with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
Sylius is the first eCommerce framework. Developed with the newest methodologies and using PHP and Symfony as a foundation. Discover how easy and pleasant it is to work with it. Just enjoy being a developer again.
API Platform Core is an easy to use and powerful library to create hypermedia-driven REST APIs. It is a component of the API Platform framework. It can be used standalone or with the Symfony framework (recommended).
It embraces JSON for Linked Data (JSON-LD) and Hydra Core Vocabulary web standards.
Build a working and fully-featured CRUD API in minutes. Leverage the awesome features of the tool to develop complex and high performance API-first projects.
If you are starting a new project, the easiest way to get API Platform up is to install the API Platform Standard Edition.
Free IP address to ASN database
Downloadable, easy to parse, updated hourly.
SoapUI is the world's most widely-used open source API testing tool for SOAP and REST APIs. SoapUI offers SOAP Web Services functional testing, REST API functional testing, WSDL coverage, message assertion testing and test refactoring. With over 10 years of experience backed by a vast open source community, SoapUI is the de facto method for ensuring quality when developing APIs and Web Services.
The "Dont Be a Dick" Public License
As developers we all want to protect our code from dicks that try to steal, sell, infringe or just generally rip us off. For this we have licenses like GPL, MIT, etc.
Sometimes however, you release a project where you just don't care what happens to the code. For this Sam Hocevar created the WTFPL which is a brilliant license.
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis we have decided to gather all of them for you in an available and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Github: https://github.com/ytisf/theZoo
A curated list of movies every hacker & cyberpunk must watch.
LibreTaxi makes ridesharing affordable by getting rid of the third party between passengers and drivers. Negotiate the price before the ride is confirmed, pay cash upon arrival. 1-minute hiring for all drivers.
Web-based news feed aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible.
HAL is an open archive where authors can deposit scholarly documents from all academic fields.
For the attention of the authors
The deposit must be made in agreement with the co-authors and in the respect for the policy of the publishers.
The deposit is subject of a control, HAL reserves the right to refuse items that do not meet the criteria of the archive.
Any deposit is definitive, no withdrawals will be made after the on-line posting of the publication.
Text files in pdf format or image files are sent to CINES for long-term archiving.
For the attention of the readers
In a context of electronic distribution, every author keep all its intellectual property rights.
Open Source project for finding the Threats on Proxy or Web Server Logs with Emerging Threats Open rules
It's a production ready version, all feedback is welcome.
Threat hunting is a popular topic these days, and there are a lot of people who want to get started but don’t know how. What should they hunt for? How should they perform the hunts? What data will they need to collect?
On the other hand, there are a lot of individuals out there who have written blog posts, conference presentations or whatever that detail some of their favorite hunting procedures. The problem is that these procedures are scattered all over the Internet, and are sometimes hard to find.
That’s why the ThreatHunting Project exists. Here you will find links to a number of different published hunting procedures. It my hope that this will give you some concrete starting points, or if you are an experienced hunter, help you find additional techniques to add to your repertoire.
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.
This website is dedicated to internetworking documentation with FOSS.
It contains articles, guides, labs and presentations which can be used as
teaching or self learning material
As the documents have to be maintained over years, static web pages are the
most suitable way to publish them
Nuclear or TinyNuke is a full fledged banking trojan its main features are:
- Formgrabber and Webinjects for Firefox, Internet Explorer and Chrome. Can inject x86 as well as x64 browsers.
- Reverse SOCKS 4
- HVNC like Hidden Desktop
- Trusteer Bypass
- ~32kb binary with obfuscated strings ~20kb without