4337 links
  • Arnaud's links
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
    Type 1 or more characters for results.
    Links per page: 20 50 100
    ◄Older
    page 1 / 3
    56 results tagged security x
    • thumbnail
      GitHub - kubescape/kubescape: Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
      April 26, 2023 at 8:08:13 PM GMT+2 - permalink - archive.org - https://github.com/kubescape/kubescape
      k8s security tools
    • thumbnail
      safety · PyPI
      March 9, 2023 at 4:30:56 PM GMT+1 - permalink - archive.org - https://pypi.org/project/safety/
      python scan security
    • thumbnail
      Flipper Zero — Portable Multi-tool Device for Geeks
      August 31, 2022 at 9:49:03 AM GMT+2 - permalink - archive.org - https://flipperzero.one/
      device hack secu security
    • thumbnail
      GitHub - armosec/kubescape: Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
      March 7, 2022 at 3:48:55 PM GMT+1 - permalink - archive.org - https://github.com/armosec/kubescape
      k8s security
    • thumbnail
      GitHub - jazzband/django-axes: Keep track of failed login attempts in Django-powered sites.
      November 30, 2020 at 3:08:15 PM GMT+1 - permalink - archive.org - https://github.com/jazzband/django-axes
      django security
    • thumbnail
      Introducing BusKill: A Kill Cord for your Laptop - Michael Altfield's Tech Blog

      Nice!

      January 6, 2020 at 11:51:49 AM GMT+1 - permalink - archive.org - https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
      security
    • thumbnail
      CPDoS: Cache Poisoned Denial of Service
      October 23, 2019 at 5:50:53 PM GMT+2 - permalink - archive.org - https://cpdos.org/
      security
    • Conférence sur l’analyse de malwares – Korben

      interessant, ça a l'air sympa comme job!

      TIL : strings command

      March 23, 2018 at 11:38:49 AM GMT+1 - permalink - archive.org - https://korben.info/conference-sur-lanalyse-de-malwares.html
      conf ovh security
    • thumbnail
      buildkite/sockguard: A proxy for docker.sock that enforces access control and isolated privileges
      December 13, 2017 at 9:02:14 AM GMT+1 - permalink - archive.org - https://github.com/buildkite/sockguard
      docket security socket
    • How can I see which sites have set the HSTS flag in my browser? - Information Security Stack Exchange

      Un peu une saloperie ce HSTS tout de même

      Chrome:

      Open Chrome
      Type chrome://net-internals/#hsts in the address bar of chrome
      Query domain: if it appears as a result, it is HSTS enabled

      Firefox:

      Open file explorer
      Copy paste %APPDATA%\Mozilla\Firefox\Profiles\ in the address bar of file explorer (for Linux it is ~/.mozilla/firefox)
      Double click the folder you see (if you have multiple FF profiles, there will be multiple folders)
      Open SiteSecurityServiceState.txt. This textfile contains sites that have enabled HSTS.
      October 20, 2016 at 12:21:27 PM GMT+2 - permalink - archive.org - http://security.stackexchange.com/questions/92954/how-can-i-see-which-sites-have-set-the-hsts-flag-in-my-browser
      browser hsts https security ssl
    • How to Automatically Tag Amazon EC2 Resources in Response to API Events - AWS Security Blog

      Intéressant comme workflow, l'objectif est de laisser les users/soft créer des EC2 comme ils veulent et avoir les droits seulement sur les EC2 qu'ils ont créé.

      Comment ça marche ? auto tagging des EC2 avec l'userid à la création couplé avec une policy qui autorise les action seulement si le tag avec l'userid est présent.

      pacon

      Dans le meme genre sans l'auto tagging :
      http://blogs.aws.amazon.com/security/post/Tx29HCT3ABL7LP3/Resource-level-Permissions-for-EC2-Controlling-Management-Access-on-Specific-Ins

      October 10, 2016 at 3:09:55 PM GMT+2 - permalink - archive.org - https://blogs.aws.amazon.com/security/post/Tx150Z810KS4ZEC/How-to-Automatically-Tag-Amazon-EC2-Resources-in-Response-to-API-Events
      aws security
    • NVD - FAQ

      What is the difference between the NVD and the Common Vulnerabilities and Exposures (CVE) standard vulnerability dictionary?
      The NVD is the CVE dictionary augmented with additional analysis, a database, and a fine-grained search engine. The NVD is a superset of CVE. The NVD is synchronized with CVE such that any updates to CVE appear immediately on the NVD.

      August 10, 2016 at 3:55:35 PM GMT+2 - permalink - archive.org - https://nvd.nist.gov/faq#d18d52fd-d1c7-44a5-b417-f2210724d433
      security
    • My First 10 Minutes On a Server - Primer for Securing Ubuntu
      June 19, 2016 at 8:01:56 PM GMT+2 - permalink - archive.org - http://www.codelitt.com/blog/my-first-10-minutes-on-a-server-primer-for-securing-ubuntu/
      security
    • How to Safely Store Your Users' Passwords in 2016 - Paragon Initiative Enterprises Blog
      June 16, 2016 at 3:05:04 PM GMT+2 - permalink - archive.org - https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016
      password security
    • Cross-origin resource sharing - Wikipedia, the free encyclopedia

      Petite piqûre de rappel, ça ne fait pas de mal

      May 19, 2016 at 3:34:59 PM GMT+2 - permalink - archive.org - https://en.wikipedia.org/wiki/Cross-origin_resource_sharing
      ajax cors origin request security web
    • Detecting the use of "curl | bash" server side | Application Security

      :o

      April 22, 2016 at 2:18:49 PM GMT+2 - permalink - archive.org - https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/
      bash curl security
    • GitHub - future-architect/vuls: Vulnerability scanner for Linux, agentless, written in golang.

      via doo

      April 19, 2016 at 2:51:03 PM GMT+2 - permalink - archive.org - https://github.com/future-architect/vuls/
      security
    • DROWN Attack
      March 1, 2016 at 2:30:48 PM GMT+1 - permalink - archive.org - https://www.drownattack.com/
      openssl security
    • Distribution packages considered insecure

      Via twitter

      February 15, 2016 at 8:28:33 AM GMT+1 - permalink - archive.org - https://statuscode.ch/2016/02/distribution-packages-considered-insecure/?utm_content=buffer587de&utm_medium=social
      arch docker package rolling security
    • Archived content - Nmap tutorial

      La raison pour laquelle on voit des block en OUPUT de certains type ICMP dans les scripts iptables :

      Scanning for open UDP ports is done with the -sU option. With this scan type, Nmap sends 0-byte UDP packets to each target port on the victim. Receipt of an ICMP Port Unreachable message signifies the port is closed, otherwise it is assumed open.

      One major problem with this technique is that, when a firewall blocks outgoing ICMP Port Unreachable messages, the port will appear open. These false-positives are hard to distinguish from real open ports.

      January 29, 2016 at 2:44:48 PM GMT+1 - permalink - archive.org - https://nmap.org/bennieston-tutorial/
      icmp scan security udp
    Links per page: 20 50 100
    ◄Older
    page 1 / 3
    Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation