Search
Results
Wyze Cam v4 | 2.5K HDR, Indoor/Outdoor, Wired Security Camera | Wyze
10 Useful Digital Forensics Software in 2025
Top 7 Computer Forensics Tools for Digital Evidence Collection | Infosec
[https://www.infosecinstitute.com/resources/digital-forensics/7-best-computer-forensics-tools/] - - public:stevetao
Wordlists in Cybersecurity: RockYou 2024 Includes 10 Billion Stolen Passwords
[https://www.packetlabs.net/posts/wordlists-in-cybersecurity-rockyou-2024-includes-10-billion-stolen-passwords/] - - public:stevetao
encryption - Should we sign-then-encrypt, or encrypt-then-sign? - Cryptography Stack Exchange
[https://crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign] - - public:stevetao
Examples of Defense in Depth: The Stealth Cybersecurity Essential | Learning Tree
[https://www.learningtree.com/blog/defense-in-depth-the-stealth-cybersecurity-essential/] - - public:stevetao
Great “Defense-in-Depth“ InfoGraphic
Defense-in-Depth - Essential Guide to Election Security
12 วิธีการสร้างและวิเคราะห์ Threat Modeling
Biometric security jargon: CER, EER, FRR, FAR
Threat Modeling: 12 Available Methods
What is Cyber Threat Modeling | Importance of Threat Modeling | EC-Council
Types of Security Controls - InfosecTrain
SABSA Executive Summary - The SABSA Institute
SIFT Workstation | SANS Institute
Malware Analysis: Tips & Tricks Poster | SANS DFIR
How You Can Start Learning Malware Analysis | SANS Institute
Navigating the Layers of the Internet: Unveiling the Surface, Deep, and Dark Web
[https://www.insightindia.com/articles/navigating-the-layers-of-the-internet-unveiling-the-surface-deep-and-dark-web-9jt312xq.html] - - public:stevetao
Windows 11 Time Rules
NTFS Timestamp changes on Windows 10 · Senturean
Government of Sikkim, India
Phishing vs Pharming. How to protect yourself from online scams?
Explaining the Difference Between Phishing and Pharming - Cybersecurity Solutions | Email & Network Security
GitHub - irobust/AdvancePenTest: Advance Penetration Test Hands-On
Introduction - OWASP Cheat Sheet Series
BuiltWith Technology Lookup
OWASP IoT Security Verification Standard | OWASP Foundation
OWASP MASVS - OWASP Mobile Application Security
OWASP Application Security Verification Standard (ASVS) | OWASP Foundation
ATT&CK® Navigator
D3FEND Matrix | MITRE D3FEND™
MITRE ATT&CK®
The Penetration Testing Execution Standard
OWASP Web Security Testing Guide | OWASP Foundation
Eric Zimmerman tools
VirusTotal
CIC Honeynet
OWASP Web Security Testing Guide | OWASP Foundation
INE Security - INE Security
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
Security Certification Roadmap - Paul Jerimy Media
TzuHuanTai/RaspberryPi_WebRTC: Native WebRTC uses v4l2 hardware h264 and software openh264 encoder for live streaming on Raspberry Pi.
Is Telegram, Ukraine’s most popular messenger app, a Russian Trojan horse?
[https://kyivindependent.com/is-ukraines-most-popular-messenger-app-a-russian-trojan-horse/] - - public:mzimmerm
Telegram is neither “secure“ nor “encrypted“ | Songs on the Security of Networks
Keep Pavel Durov LOCKED UP
NumCheckr - Detect disposable and virtual phone numbers
xaitax/CVE-2024-6387_Check: CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
Payloads All The Things
[https://swisskyrepo.github.io/PayloadsAllTheThings/] - - public:realjck
A list of useful payloads and bypasses for Web Application Security.
nicanorflavier/spf-dkim-dmarc-simplified: Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer.
How to Create a Temporary SOC 2 Alternative| IANS Research
[https://www.iansresearch.com/resources/all-blogs/post/security-blog/2022/07/07/how-to-create-a-temporary-soc-2-alternative] - - public:mepage