Search
Results
Encoding data for POST requests - JakeArchibald.com
[https://jakearchibald.com/2021/encoding-data-for-post-requests/] - - public:xxx
Javascript passing form data and params using URLSearchParams and FormData
Cryptography from the Ground Up
How to get HTTPS working on localhost - Konstantin Bogomolov | Web Developer
The Full Story of the Stunning RSA Hack Can Finally Be Told | WIRED
[https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/] - - public:xxx
Face Generator – Generate Faces Online Using AI
Deep dive in CORS: History, how it works, and best practices | Ilija Eftimov ⚡️
OWASP Top 10 for API
crt.sh | Certificate Search
Request SSL Certificate from Microsoft CA with Certreq - AventisTech
[https://aventistech.com/2019/09/09/request-ssl-certificate-from-microsoft-ca-with-certreq/] - - public:mepage
The great SameSite confusion :: jub0bs.com
[https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/] - - public:xxx
webdev samesite cookies html security
Hide Folders - Free Windows software
Linux Hardening Guide | Madaidan's Insecurities
התקנת MITM על רספברי פיי | אינטרנט ישראל
[https://internet-israel.com/%d7%9e%d7%93%d7%a8%d7%99%d7%9b%d7%99%d7%9d/raspberrypi/%d7%94%d7%aa%d7%a7%d7%a0%d7%aa-mitm-%d7%a2%d7%9c-%d7%a8%d7%a1%d7%a4%d7%91%d7%a8%d7%99-%d7%a4%d7%99%d7%99/] - - public:xxx
Man in the middle proxy mitm using raspberry pi
Introduction — Open Reference Architecture for Security and Privacy 2020-Q2 documentation
[https://security-and-privacy-reference-architecture.readthedocs.io/en/latest/05-introduction.html] - - public:stevetao
Open Security Architecture
[http://www.opensecurityarchitecture.org/cms/19-foundations/foundations/1-open-security-architecture] - - public:stevetao
Security and Privacy models — Open Reference Architecture for Security and Privacy 2020-Q2 documentation
[https://security-and-privacy-reference-architecture.readthedocs.io/en/latest/06-secmodels.html] - - public:stevetao
Privacy & Security Risk Reduction Model | EDRM
[https://edrm.net/resources/frameworks-and-standards/privacy-and-security-risk-reduction-model/] - - public:stevetao
An Unofficial Active Admin Guide | Svyatoslav Kryukov
[https://skryukov.github.io/rails/activeadmin/2020/09/29/an-unofficial-active-admin-guide] - - public:aguynamedryan
BogusBuster, by SnapDragon
Kaspersky Cyber Map
FireEye Cyber Map
Checkpoint Threat Map
GitHub - wireghoul/graudit: grep rough audit - source code auditing tool
Blocklist OISD by sjhgvr
VPN Comparison by That One Privacy GuyThat One Privacy Site | Welcome
Airtable - Overview of VPN comparisons services
Insecam - World biggest online cameras directory
Mothers Ruin Software
11 Gmail Security Settings to Bulletproof Businesses against Ransomware
Caddy - The Ultimate Server with Automatic HTTPS
Mad Irish :: Writing OSSEC Custom Rules and Decoders
HPI Leak Checker
pwn.college BETA
WireGuard: fast, modern, secure VPN tunnel
Beaker Browser
presidentbeef/brakeman: A static analysis security vulnerability scanner for Ruby on Rails applications
Homas/ioc2rpz: ioc2rpz is a place where threat intelligence meets DNS.
active directory - How to configure Windows to trust a network share using a GPO? - Server Fault
[https://serverfault.com/questions/772256/how-to-configure-windows-to-trust-a-network-share-using-a-gpo] - - public:mepage
How to implement a ‘threat model’ to beef up your organization’s security
[https://thenextweb.com/podium/2020/01/14/how-to-implement-a-threat-model-to-beef-up-your-organizations-security/] - - public:mepage
How to install and use Firejail on Linux - TechRepublic
carpedm20/awesome-hacking: A curated list of awesome Hacking tutorials, tools and resources
down
[https://www.cisco.com/c/en/us/support/web/tac/tac-customer-file-uploads.html] - - public:Nishad14191
sindresorhus/awesome:
paragonie/awesome-appsec: A curated list of resources for learning about application security
Study resources | ThorTeaches CISSP, CISM & CISA
bkimminich/it-security-lecture: University lecture on "IT Security" as Open Educational Resources material
OverTheWire: Level Goal: Bandit Level 3 → Level 4
8 Tips for Developing a Security Awareness Program
[https://blog.commonwealth.com/8-tips-for-developing-a-security-awareness-program] - - public:mepage
Tips on Building Information Security Awareness in Your Workplace | SCORE
[https://www.score.org/resource/tips-building-information-security-awareness-your-workplace] - - public:mepage