opexxx
Follow
56.6K views | +6 today
Scooped by alexander knorr
onto opexxx
Scoop.it!

The TrueCrypt Audit

The TrueCrypt Audit | opexxx | Scoop.it
People, businesses, and governments all over the world use TrueCrypt to protect their privacy. We need help making it better and more secure.
more...
No comment yet.
opexxx
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

Top 15 IT Certifications For 2014

Top 15 IT Certifications For 2014 | opexxx | Scoop.it
IT industry is quite competitive today. As a result, an IT professional has to be on his toes and should be on the lookout to acquire as many relevant IT certifications as possible.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Sucuri CloudProxy Website Firewall (WAF) - Protection for your site!

Sucuri CloudProxy Website Firewall (WAF) - Protection for your site! | opexxx | Scoop.it
Sucuri CloudProxy Website Firewall (WAF) - Protection for your site!
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Security Override - Hacking Challenges, Security Forum, Article Database

Security Override - Hacking Challenges, Security Forum, Article Database | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Capstone - The ultimate disassembly framework

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

youtube-dl

alexander knorr's insight:

youtube-dl is a small command-line program to download videos from YouTube.com and a few more sites

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

:: hiddenillusion ::: Customizing cuckoo to fit your needs

:: hiddenillusion ::: Customizing cuckoo to fit your needs | opexxx | Scoop.it
more...
No comment yet.
Rescooped by alexander knorr from ZeroTrustNet
Scoop.it!

How to watch hacking, and cyberwarfare between the USA and China, in real time | ExtremeTech

How to watch hacking, and cyberwarfare between the USA and China, in real time | ExtremeTech | opexxx | Scoop.it
You've probably read dozens of paragraphs on how the next great theater of war will be online rather than offline, and how China and the US are already battling each other for cyber supremacy. The truth is, though, unless you've actually been hacked, it's hard to appreciate just how real the prospect of cyberwar actually is. Now, though, a security company has produced a fascinating geographic map that shows you hacking attempts in real-time -- and sure enough, you really can see China waging cyberwar against the US.

Via 0 тrυѕт neт
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

INetSim: Internet Services Simulation Suite - Features

INetSim features. INetSim is a software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
more...
No comment yet.
Rescooped by alexander knorr from Linux and Open Source
Scoop.it!

How to set up two-factor authentication for SSH login on Linux - Linux FAQ

How to set up two-factor authentication for SSH login on Linux - Linux FAQ | opexxx | Scoop.it
With many high-profile password leaks nowadays, there is a lot of buzz in the industry on "multi-factor" authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have "physical" access to (e.g., one-time passcode generated by their mobile phone). …Continue reading...

Via Linuxaria
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

TOGAF® 9.1

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Tips for Public Speaking – speaking.io

Public Speaking things
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

PowerUp v1.1 - Beyond Service Abuse

I wanted to expand the script to move beyond just vulnerable service abuse, and include several other Windows privilege escalation vectors.


Via Danen Raas
more...
No comment yet.
Rescooped by alexander knorr from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Configuring the ModSecurity Firewall with OWASP Rules - InfoSec Institute

Configuring the ModSecurity Firewall with OWASP Rules - InfoSec Institute | opexxx | Scoop.it
In today's world, over 70% of all attacks carried out over are done so at the web application level, so we need to implement security at multiple levels, a

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

vhf/free-programming-books

vhf/free-programming-books | opexxx | Scoop.it
Contribute to free-programming-books development by creating an account on GitHub.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Conscan

Conscan | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

SOLDIERX.COM | Nobody Can Stop Information Insemination

SOLDIERX.COM | Nobody Can Stop Information Insemination | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

The FLARE On Challenge

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

:: hiddenillusion ::: NoMoreXOR

:: hiddenillusion ::: NoMoreXOR | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Open Security Research: Setting Up NTR with Cuckoo

Open Security Research: Setting Up NTR with Cuckoo | opexxx | Scoop.it
more...
No comment yet.
Rescooped by alexander knorr from ZeroTrustNet
Scoop.it!

Digital Attack Map

Digital Attack Map | opexxx | Scoop.it
A live data visualization of DDoS attacks around the globe

Via 0 тrυѕт neт
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Capture-BAT Download Page | The Honeynet Project

Capture-BAT Download Page | The Honeynet Project | opexxx | Scoop.it
more...
No comment yet.
Rescooped by alexander knorr from Docker
Scoop.it!

Introduction to Docker

Ship it with Docker!

Via Docker
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

Bypassing Antivirus with Crypter and CFF Explorer

Bypassing Antivirus with Crypter and CFF Explorer | opexxx | Scoop.it

Bypassing Antivirus by extracting resources in a PE with CFF Explorer, encrypting them with crypter.exe, and saving the changes in the original PE.


Via Danen Raas
more...
No comment yet.
Rescooped by alexander knorr from d@n3n
Scoop.it!

Kippo2ElasticSearch + Kibana update

Kippo2ElasticSearch + Kibana update | opexxx | Scoop.it

The Kippo2ElasticSearch script has been updated and now creates proper entries with all attributes needed for each SSH login attempt.


Via Danen Raas
more...
No comment yet.
Rescooped by alexander knorr from Best
Scoop.it!

Python: 50 modules for all needs

Python: 50 modules for all needs | opexxx | Scoop.it

One thing very special with the Python programming language is its incredible extensibility. Here’s a list of 50 awesome modules for Python, covering almost all needs: Databases, GUIs, Images, Sound, OS interaction, Web, and more.


Via Dr. Stefan Gruenwald
more...
No comment yet.
Rescooped by alexander knorr from Cyber Security & Digital Forensics
Scoop.it!

How to use Wireshark tshark Command for Custom Ports and Text Files

How to use Wireshark tshark Command for Custom Ports and Text Files | opexxx | Scoop.it
Wireshark is an open-source packet analyser used for network analysis. It can capture, dissect, and decode various protocols. In this tutorial we will

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.