188 private links
Sploitus is а convenient central place for identifying the newest exploits and finding attacks that exploit known vulnerabilities.
Find out what any acronym, abbreviation, or initialism stands for
With more than 1,000,000 human-edited definitions, Acronym Finder is the world's largest and most comprehensive dictionary of acronyms, abbreviations, and initialisms. Combined with the Acronym Attic, Acronym Finder contains more than 5 million acronyms and abbreviations. You can also search for more than 850,000 US and Canadian postal codes.
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis. STIX and TAXII.
Write down a command-line to see the help text that matches each argument
Les logiciels libres ont aujourd'hui un rôle important dans le monde de la recherche scientifique. Dans le monde de l'entreprise et des administrations, ils tiennent une place de plus en plus importante. Cependant, leur diffusion sous des licences d'origine américaine comme la GNU GPL pose certaines questions de droit, engendrant des incertitudes qui peuvent dissuader des entreprises ou des organisations d'utiliser ou d'apporter leurs contributions aux logiciels libres.
Le CEA, le CNRS et Inria ont ainsi élaboré CeCILL, la première licence qui définit dans ce cadre les principes d'utilisation et de diffusion des logiciels libres tout en restant dans l'esprit de la GNU GPL.
The methodology used to create the SOC-CMM is a scientific research approach called Design Science Research. This type of research has a focus on bridging the gap between theory and practice and works well for areas that have not been extensively (scientifically) studied and clearly defined, as is the case for SOC capability and maturity. The goal of Design Research is the creation of a tangible result of the research effort. In this case, two artefacts were created: the SOC-CMM model, which is an abstract representation of SOCs and the self-assessment tool based on that model to evaluate capability maturity in a SOC.
Ransomware Overview
We're the first company in Hackers & Founders startup accelerator and we love solving cross-browser testing problems!
glogg is a multi-platform GUI application to browse and search through long or complex log files. It is designed with programmers and system administrators in mind. glogg can be seen as a graphical, interactive combination of grep and less.
Hey there!
If you have been searching for a place to get started with
Reverse Engineering and get your hands dirty - you are in the right place :)
This is a file share allowing access to all Sysinternals utilities. We have developed this to test an alternate distribution mechanism for our utilities. This will allow you to run these tools from any computer connected to the Internet without having to navigate to a webpage, download and extract the zip file. If you are unfamiliar with Microsoft Windows Sysinternals, it is highly recommended that you visit the website at http://technet.microsoft.com/sysinternals before using these tools. If you have any questions or comments on this file share, please email syssite@microsoft.com
Windows forensic and other free tools by Forensics, Programming, X-Ways. Certified SANS instructor.
MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.
Note: A MITRE Partnership Network (MPN) account is not required to view and use the ATT&CK site.
Machine learning has seen a remarkable rate of adoption in recent years across a broad spectrum of industries and applications. Many applications of machine learning techniques are adversarial in nature, insofar as the goal is to distinguish instances which are bad'' from those which aregood''. Indeed, adversarial use goes well beyond this simple classification example: forensic analysis of malware which incorporates clustering, anomaly detection, and even vision systems in autonomous vehicles could all potentially be subject to attacks. In response to these concerns, there is an emerging literature on adversarial machine learning, which spans both the analysis of vulnerabilities in machine learning algorithms, and algorithmic techniques which yield more robust learning.
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux, and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed analysis reports. This website gives you access to the Community Edition of Joe Sandbox Cloud. It allows you to run a maximum of 30 analyses / month, 3 analyses / day on Windows, Linux and Android with limited analysis output.
Robtex uses various sources to gather public information about IP numbers, domain names, host names, Autonomous systems, routes etc. It then indexes the data in a big database and provide free access to the data.
We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet.
Our database now contains billions of documents of internet data collected over more than a decade.
Nous partageons les données qui révèlent comment les règles et les actions des autorités administratives et des entreprises affectent la confidentialité, la sécurité et l'accès aux informations.
A Search Engine for Threats
Moteur de recherche des thèses de doctorat françaises, le site theses.fr a pour objet de donner sur le web un point d’entrée :
à toutes les thèses de doctorat en cours de préparation en France
à toutes les thèses de doctorat soutenues en France, quel que soit le support matériel de la thèse (document papier, numérique, édition commerciale…)
aux personnes et organismes en lien avec ces thèses.What are wheels?
Wheels are the new standard of Python distribution and are intended to replace eggs. Support is offered in pip >= 1.4 and setuptools >= 0.8.
Advantages of wheels
Faster installation for pure Python and native C extension packages.
Avoids arbitrary code execution for installation. (Avoids setup.py)
Installation of a C extension does not require a compiler on Windows or macOS.
Allows better caching for testing and continuous integration.
Creates .pyc files as part of installation to ensure they match the Python interpreter used.
More consistent installs across platforms and machines