A curated list of Awesome Threat Intelligence resources
Updated 2024-05-15 11:15:50 +00:00
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Updated 2024-05-16 13:13:45 +00:00
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Updated 2024-05-18 07:33:46 +00:00
Board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key
Updated 2024-05-20 08:57:00 +00:00
Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
Updated 2024-05-20 11:29:40 +00:00
A practical approach to Privacy and Security
Updated 2024-05-20 23:01:13 +00:00
Monero: the secure, private, untraceable cryptocurrency
Updated 2024-05-21 04:45:36 +00:00
A minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.
Updated 2024-05-21 04:46:11 +00:00