SHARE
TWEET

A small collection of IT security links

a guest Sep 17th, 2019 118 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. https://www.qwertee.com/product/ghost-of-disapproval
  2. https://github.com/jlevy/the-art-of-command-line
  3. https://blog.tinned-software.net/restrict-ssh-access-to-port-forwarding-to-one-specific-port/
  4. http://web.mit.edu/~simsong/www/ugh.pdf
  5. http://blindelephant.sourceforge.net/
  6. https://infocon.org/cons/DEF%20CON/DEF%20CON%2026/DEF%20CON%2026%20presentations/
  7. https://www.digitalocean.com/community/tutorials/how-to-audit-docker-host-security-with-docker-bench-for-security-on-ubuntu-16-04
  8. https://github.com/goharbor/harbor
  9. https://microcorruption.com/login
  10. https://github.com/securego/gosec
  11. https://github.com/Subterfuge-Framework/Subterfuge
  12. https://github.com/Netflix/security_monkey
  13. https://github.com/deepzec/Bad-Pdf
  14. https://github.com/michenriksen/gitrob
  15. https://github.com/SpiderLabs/Responder
  16. http://codearcana.com/posts/2013/04/23/exploiting-a-go-binary.html
  17. https://www.elastic.co/blog/elasticsearch-and-siem-implementing-host-portscan-detection
  18. https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
  19. https://dhavalkapil.com/blogs/Attacking-the-OAuth-Protocol/
  20. https://www.kitploit.com/2017/12/gowpt-go-web-application-penetration.html
  21. https://github.com/zdresearch/OWASP-Nettacker
  22. https://darknetdiaries.com/
  23. https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/
  24. https://www.kitploit.com/2018/07/threcon-threat-hunting-reconnaissance.html
  25. https://www.kitploit.com/2018/07/msdat-microsoft-sql-database-attacking.html
  26. https://www.kitploit.com/2018/07/eagleeye-stalk-your-friends-find-their.html
  27. https://github.com/s0md3v/XSStrike
  28. https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4
  29. https://github.com/CoolerVoid/ninja_shell/
  30. https://github.com/DanMcInerney/icebreaker
  31. https://n0where.net/automated-mass-exploiter-autosploit
  32. https://www.abatchy.com/
  33. https://www.kitploit.com/2018/01/ketshash-little-tool-for-detecting.html
  34. https://github.com/WhitewidowScanner/whitewidow
  35. https://github.com/peterpt/pipe_finder
  36. https://github.com/SecurityFTW/cs-suite
  37. https://github.com/s0md3v/sqlmate
  38. https://github.com/haccer/subjack
  39. https://github.com/mailinneberg/BlueBorne
  40. https://github.com/ArmisSecurity/blueborne
  41. https://github.com/mseclab/PyJFuzz
  42. https://github.com/Arachni/arachni
  43. https://github.com/dvyukov/go-fuzz
  44. https://github.com/techgaun/github-dorks
  45. http://stevelosh.com/blog/2010/09/coming-home-to-vim/
  46. https://github.com/DanMcInerney/msf-autopwn
  47. https://github.com/torque59/Garfield
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top