Search
Results
Web Application Penetration Testing Cheat Sheet | JDow.io
[https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/] - - public:xxx
This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.
Guida alla Carta d'Identità Elettronica (CIE): Cos'è, costo, come ottenerla e a cosa serve | Agenda Digitale
[https://www.agendadigitale.eu/cittadinanza-digitale/carta-didentita-elettronica-a-cosa-serve-quanto-costa-e-come-ottenerla/] - - public:drbrandus
Wireless Security Blackpaper : Page 1
Packetattack Wireless Resources
PwnedList
Sucuri SiteCheck - Free Website Malware Scans
Scan Websites for Exploits, Malware and other Malicious Threats - Secu (...)
iso27k toolkit
ITIL Service Management: ISO 9000 - ISO/IEC 27001 - ISO/IEC 20000: How do They Fit Together?
[http://itservicemngmt.blogspot.fr/2012/04/iso-isoiec-27001-isoiec-20000-how-do.html] - - public:lowly
Download Software and Tools - Winic Technologies USA, Inc.
Master Password — Secure your life, forget your passwords.
Teampass
xss game tutorial by google
Generate Mozilla Security Recommended Web Server Configuration Files
Generate fake users for your projects - Random Users Generator
[http://www.designskilz.com/random-users/] - - public:xxx
Online users generator with teams and details
Random User Generator | Home
Bitcoin Paper Wallet Generator: Print Offline Tamper-Resistant Addresses
O&O ShutUp10: download free antispy tool for Windows 10
[https://www.oo-software.com/en/shutup10] - - public:Yabalicious
See https://tech.slashdot.org/comments.pl?sid=9070099&pid=52053827
How to block in Windows10 Telemetry with pfsense
[https://forum.pfsense.org/index.php?topic=98087.0] - - public:Yabalicious
See https://tech.slashdot.org/comments.pl?sid=9070099&pid=52053827
Fail2ban howto increased ban for repeat offenders
Have I Been Pwned
How do I access my IP Camera behind my Sonicwall? (SW12465)
Have I been pwned? Check if your email has been compromised in a data breach
[https://haveibeenpwned.com] - - public:Trinsec
Useful site to check if your email addresses and usernames have been compromised.
HotPlug Field Kit | CRU
How to Be Happy - Less Wrong
[http://lesswrong.com/lw/4su/how_to_be_happy/?utm_content=bufferbad96&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer] - - public:jeffreydbrowngmail.com
How to secure your Android web browsing - APC
Is TrueCrypt dead? – Ask Leo!
Jolly Roger's Security Guide for Beginners - Deep Dot Web
[http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/] - - public:jeffreydbrowngmail.com
Linux Containers: Part 5, Creating Your Own VPN | Linux.org
[http://www.linux.org/threads/linux-containers-part-5-creating-your-own-vpn.4431/] - - public:jeffreydbrowngmail.com
Private VPN Service Anonine — your best VPN provider
ReadThenBurn
Regin: Giving IT security reason to hope NSA is waaaay ahead on malware | Computerworld
[http://www.computerworld.com/article/2851522/regin-giving-it-security-reason-to-hope-nsa-is-waaaay-ahead-on-malware.html?utm_content=buffer8be53&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer#tk.cwfb] - - public:jeffreydbrowngmail.com
Security Tutorials - Deep Dot Web
SSH Public Key Based Authentication – Howto - nixCraft
[http://www.cyberciti.biz/tips/ssh-public-key-based-authentication-how-to.html] - - public:jeffreydbrowngmail.com
Staying Anonymous Online
TOR
Tor Blog
Tor Network Is Under Attack through Directory Authority Servers Seizures - Hacker News
Trace Email Address Source
USB stick encryption using Linux
VeraCrypt - Home
VeraCrypt | SourceForge.net
VPN Reseller - Signup to VPN Program and Resell VPN
VPN Security Services - Perfect Privacy VPN Provider
Why You Should Start Using a VPN (and How to Choose the Best One for Your Needs)
[http://lifehacker.com/5940565/why-you-should-start-using-a-vpn-and-how-to-choose-the-best-one-for-your-needs] - - public:jeffreydbrowngmail.com