4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 1 / 3
56 results tagged security x
  • thumbnail
    GitHub - kubescape/kubescape: Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
    April 26, 2023 at 8:08:13 PM GMT+2 - permalink - archive.org - https://github.com/kubescape/kubescape
    k8s security tools
  • thumbnail
    safety · PyPI
    March 9, 2023 at 4:30:56 PM GMT+1 - permalink - archive.org - https://pypi.org/project/safety/
    python scan security
  • thumbnail
    Flipper Zero — Portable Multi-tool Device for Geeks
    August 31, 2022 at 9:49:03 AM GMT+2 - permalink - archive.org - https://flipperzero.one/
    device hack secu security
  • thumbnail
    GitHub - armosec/kubescape: Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
    March 7, 2022 at 3:48:55 PM GMT+1 - permalink - archive.org - https://github.com/armosec/kubescape
    k8s security
  • thumbnail
    GitHub - jazzband/django-axes: Keep track of failed login attempts in Django-powered sites.
    November 30, 2020 at 3:08:15 PM GMT+1 - permalink - archive.org - https://github.com/jazzband/django-axes
    django security
  • thumbnail
    Introducing BusKill: A Kill Cord for your Laptop - Michael Altfield's Tech Blog

    Nice!

    January 6, 2020 at 11:51:49 AM GMT+1 - permalink - archive.org - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
    security
  • thumbnail
    CPDoS: Cache Poisoned Denial of Service
    October 23, 2019 at 5:50:53 PM GMT+2 - permalink - archive.org - https://cpdos.org/
    security
  • Conférence sur l’analyse de malwares – Korben

    interessant, ça a l'air sympa comme job!

    TIL : strings command

    March 23, 2018 at 11:38:49 AM GMT+1 - permalink - archive.org - https://korben.info/conference-sur-lanalyse-de-malwares.html
    conf ovh security
  • thumbnail
    buildkite/sockguard: A proxy for docker.sock that enforces access control and isolated privileges
    December 13, 2017 at 9:02:14 AM GMT+1 - permalink - archive.org - https://github.com/buildkite/sockguard
    docket security socket
  • How can I see which sites have set the HSTS flag in my browser? - Information Security Stack Exchange

    Un peu une saloperie ce HSTS tout de même

    Chrome:

    Open Chrome
    Type chrome://net-internals/#hsts in the address bar of chrome
    Query domain: if it appears as a result, it is HSTS enabled

    Firefox:

    Open file explorer
    Copy paste %APPDATA%\Mozilla\Firefox\Profiles\ in the address bar of file explorer (for Linux it is ~/.mozilla/firefox)
    Double click the folder you see (if you have multiple FF profiles, there will be multiple folders)
    Open SiteSecurityServiceState.txt. This textfile contains sites that have enabled HSTS.
    October 20, 2016 at 12:21:27 PM GMT+2 - permalink - archive.org - http://security.stackexchange.com/questions/92954/how-can-i-see-which-sites-have-set-the-hsts-flag-in-my-browser
    browser hsts https security ssl
  • How to Automatically Tag Amazon EC2 Resources in Response to API Events - AWS Security Blog

    Intéressant comme workflow, l'objectif est de laisser les users/soft créer des EC2 comme ils veulent et avoir les droits seulement sur les EC2 qu'ils ont créé.

    Comment ça marche ? auto tagging des EC2 avec l'userid à la création couplé avec une policy qui autorise les action seulement si le tag avec l'userid est présent.

    pacon

    Dans le meme genre sans l'auto tagging :
    http://blogs.aws.amazon.com/security/post/Tx29HCT3ABL7LP3/Resource-level-Permissions-for-EC2-Controlling-Management-Access-on-Specific-Ins

    October 10, 2016 at 3:09:55 PM GMT+2 - permalink - archive.org - https://blogs.aws.amazon.com/security/post/Tx150Z810KS4ZEC/How-to-Automatically-Tag-Amazon-EC2-Resources-in-Response-to-API-Events
    aws security
  • NVD - FAQ

    What is the difference between the NVD and the Common Vulnerabilities and Exposures (CVE) standard vulnerability dictionary?
    The NVD is the CVE dictionary augmented with additional analysis, a database, and a fine-grained search engine. The NVD is a superset of CVE. The NVD is synchronized with CVE such that any updates to CVE appear immediately on the NVD.

    August 10, 2016 at 3:55:35 PM GMT+2 - permalink - archive.org - https://nvd.nist.gov/faq#d18d52fd-d1c7-44a5-b417-f2210724d433
    security
  • My First 10 Minutes On a Server - Primer for Securing Ubuntu
    June 19, 2016 at 8:01:56 PM GMT+2 - permalink - archive.org - http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/
    security
  • How to Safely Store Your Users' Passwords in 2016 - Paragon Initiative Enterprises Blog
    June 16, 2016 at 3:05:04 PM GMT+2 - permalink - archive.org - https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016
    password security
  • Cross-origin resource sharing - Wikipedia, the free encyclopedia

    Petite piqûre de rappel, ça ne fait pas de mal

    May 19, 2016 at 3:34:59 PM GMT+2 - permalink - archive.org - https://en.wikipedia.org/wiki/Cross-origin_resource_sharing
    ajax cors origin request security web
  • Detecting the use of "curl | bash" server side | Application Security

    :o

    April 22, 2016 at 2:18:49 PM GMT+2 - permalink - archive.org - https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/
    bash curl security
  • GitHub - future-architect/vuls: Vulnerability scanner for Linux, agentless, written in golang.

    via doo

    April 19, 2016 at 2:51:03 PM GMT+2 - permalink - archive.org - https://github.com/future-architect/vuls/
    security
  • DROWN Attack
    March 1, 2016 at 2:30:48 PM GMT+1 - permalink - archive.org - https://www.drownattack.com/
    openssl security
  • Distribution packages considered insecure

    Via twitter

    February 15, 2016 at 8:28:33 AM GMT+1 - permalink - archive.org - https://statuscode.ch/2016/02/distribution-packages-considered-insecure/?utm_content=buffer587de&utm_medium=social
    arch docker package rolling security
  • Archived content - Nmap tutorial

    La raison pour laquelle on voit des block en OUPUT de certains type ICMP dans les scripts iptables :

    Scanning for open UDP ports is done with the -sU option. With this scan type, Nmap sends 0-byte UDP packets to each target port on the victim. Receipt of an ICMP Port Unreachable message signifies the port is closed, otherwise it is assumed open.

    One major problem with this technique is that, when a firewall blocks outgoing ICMP Port Unreachable messages, the port will appear open. These false-positives are hard to distinguish from real open ports.

    January 29, 2016 at 2:44:48 PM GMT+1 - permalink - archive.org - https://nmap.org/bennieston-tutorial/
    icmp scan security udp
Links per page: 20 50 100
◄Older
page 1 / 3
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation