Advertisement
Guest User

A small collection of IT security links

a guest
Sep 17th, 2019
948
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.43 KB | None | 0 0
  1. https://www.qwertee.com/product/ghost-of-disapproval
  2. https://github.com/jlevy/the-art-of-command-line
  3. https://blog.tinned-software.net/restrict-ssh-access-to-port-forwarding-to-one-specific-port/
  4. http://web.mit.edu/~simsong/www/ugh.pdf
  5. http://blindelephant.sourceforge.net/
  6. https://infocon.org/cons/DEF%20CON/DEF%20CON%2026/DEF%20CON%2026%20presentations/
  7. https://www.digitalocean.com/community/tutorials/how-to-audit-docker-host-security-with-docker-bench-for-security-on-ubuntu-16-04
  8. https://github.com/goharbor/harbor
  9. https://microcorruption.com/login
  10. https://github.com/securego/gosec
  11. https://github.com/Subterfuge-Framework/Subterfuge
  12. https://github.com/Netflix/security_monkey
  13. https://github.com/deepzec/Bad-Pdf
  14. https://github.com/michenriksen/gitrob
  15. https://github.com/SpiderLabs/Responder
  16. http://codearcana.com/posts/2013/04/23/exploiting-a-go-binary.html
  17. https://www.elastic.co/blog/elasticsearch-and-siem-implementing-host-portscan-detection
  18. https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
  19. https://dhavalkapil.com/blogs/Attacking-the-OAuth-Protocol/
  20. https://www.kitploit.com/2017/12/gowpt-go-web-application-penetration.html
  21. https://github.com/zdresearch/OWASP-Nettacker
  22. https://darknetdiaries.com/
  23. https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/
  24. https://www.kitploit.com/2018/07/threcon-threat-hunting-reconnaissance.html
  25. https://www.kitploit.com/2018/07/msdat-microsoft-sql-database-attacking.html
  26. https://www.kitploit.com/2018/07/eagleeye-stalk-your-friends-find-their.html
  27. https://github.com/s0md3v/XSStrike
  28. https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4
  29. https://github.com/CoolerVoid/ninja_shell/
  30. https://github.com/DanMcInerney/icebreaker
  31. https://n0where.net/automated-mass-exploiter-autosploit
  32. https://www.abatchy.com/
  33. https://www.kitploit.com/2018/01/ketshash-little-tool-for-detecting.html
  34. https://github.com/WhitewidowScanner/whitewidow
  35. https://github.com/peterpt/pipe_finder
  36. https://github.com/SecurityFTW/cs-suite
  37. https://github.com/s0md3v/sqlmate
  38. https://github.com/haccer/subjack
  39. https://github.com/mailinneberg/BlueBorne
  40. https://github.com/ArmisSecurity/blueborne
  41. https://github.com/mseclab/PyJFuzz
  42. https://github.com/Arachni/arachni
  43. https://github.com/dvyukov/go-fuzz
  44. https://github.com/techgaun/github-dorks
  45. http://stevelosh.com/blog/2010/09/coming-home-to-vim/
  46. https://github.com/DanMcInerney/msf-autopwn
  47. https://github.com/torque59/Garfield
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement