This section contains security articles I find interesting
| Article | Description | Rating |
|---|---|---|
| Hotel Hijinks | Defcon peopl having fun with bad securit on lock | 4.5 |
| secury by design | a nice article on how to secure things by design | 4 |
| ssh using tpm for attestation | interesting article on how to use our tpm chip for ssh things | |
| restoring symbols from stripped binaries | nice article on how to do this | |
| VERY interesting article on what happens when we get security wrong | a doctor's perspective | |
| network socket programmin | nice guide on how to program network code | 5 |
| detect noisy neighbours with bpf | tells you how to detect noisy neighbours with ebpf filters. | |
| port forwarding visual guide | ssh thing on how to port foward etc | |
| howto on root role restriction | article that lets you do this without sudo | |
| security engineering III | a book on security engineering | 4 |
| sast and dast tools | mostly a directory of sast and dast tools | |
| why traceroute sucks | a REALLY informative slideshow on why traceroute really doesn't work except locall anymore. | 5 |
| contextual | Interesting platform that does ai contextual analysis of threats. | |
| vulnlookup | Vulnerability lookup site supported by the EU | ? |
| Multi Port Socket Use | lets you use multiuprocessing on same socket | ? |
| geofeeds | increase your network location accuracy with geofeeds | 4 |
| ripcalc | does network cidr math for ipv4 and ipv6 | 4 |
| Kata containers | containers with native encryption | 4 |
| dns api | lets you do dns api stuff for 54 providers | 4 |
| incident db | database of incidents | 4 |
| bloodhound | lets you query ad / azure | 5 |
| gittuf | The update framework software assurance for git repos | 5 |
| Google's secure by design framework | While I don't love them (one of the four horsepeople of the internet apocylapse), google does have some good advice here. | 5 |
| data smuggling via emoji | Nice article on steganogrophay with emoji characters! | 5 |