Hero Image

Security

This section contains security articles I find interesting

Article Description Rating
Hotel Hijinks Defcon peopl having fun with bad securit on lock 4.5
secury by design a nice article on how to secure things by design 4
ssh using tpm for attestation interesting article on how to use our tpm chip for ssh things
restoring symbols from stripped binaries nice article on how to do this
VERY interesting article on what happens when we get security wrong a doctor's perspective
network socket programmin nice guide on how to program network code 5
detect noisy neighbours with bpf tells you how to detect noisy neighbours with ebpf filters.
port forwarding visual guide ssh thing on how to port foward etc
howto on root role restriction article that lets you do this without sudo
security engineering III a book on security engineering 4
sast and dast tools mostly a directory of sast and dast tools
why traceroute sucks a REALLY informative slideshow on why traceroute really doesn't work except locall anymore. 5
contextual Interesting platform that does ai contextual analysis of threats.
vulnlookup Vulnerability lookup site supported by the EU ?
Multi Port Socket Use lets you use multiuprocessing on same socket ?
geofeeds increase your network location accuracy with geofeeds 4
ripcalc does network cidr math for ipv4 and ipv6 4
Kata containers containers with native encryption 4
dns api lets you do dns api stuff for 54 providers 4
incident db database of incidents 4
bloodhound lets you query ad / azure 5
gittuf The update framework software assurance for git repos 5
Google's secure by design framework While I don't love them (one of the four horsepeople of the internet apocylapse), google does have some good advice here. 5
data smuggling via emoji Nice article on steganogrophay with emoji characters! 5