URLz
URLz
Tag Cloud
Bildwand
Täglich
RSS Feed
Einloggen
Löschen
Set public
Set private
Erinnere dich an mich
Bildwand - 167 Bilder
A Pentester’s Guide to WebSocket Pentesting | Cobalt
SVG Repo - Free SVG Vectors and Icons
Cooked - Your Smart Cookbook
uBlock Origin: Effiziente Benutzung mit Dynamic Filtering und Skript-Blockierung - Tutorials - Kuketz IT-Security Forum ⋆ IT-Sicherheit | Datenschutz
Elliptic Curve Cryptography Explained – Fang-Pen's coding note
What Are Elliptic Curve Pairings? | Zellic — Research
GitHub - freelabz/secator: Secator - the pentester's swiss knife
Stecker-Solar-Simulator | HTW Berlin
sudo without a setuid binary or SSH over a UNIX socket - Siosm’s blog
Build a Hangman Game With Python and PySimpleGUI – Real Python
Moderne Kommandozeilewerkzeuge - HedgeDoc
https://sportaerztezeitung.com/rubriken/training/1050/covid-19-und-return-to-play/
Die IT-Nachrichtenarchive der Anstalt 1999-2022 - fm4.ORF.at
Snack Prompt | Discover The Best ChatGPT Prompts
Fireflies.ai | AI notetaker to transcribe, summarize, analyze meetings
Tome | Polished & Professional AI Presentations
GPT4 | ora.ai
Chat-with-GPT4 - a Hugging Face Space by ysharma
OALABS Research
https://melaeckenfels.notion.site/10a0696a0d5e422a94bb9f901168ab18
GitHub - jesseduffield/lazygit: simple terminal UI for git commands
GitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
GitHub - alexandreborges/malwoverview: Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Virtuelles Hausverbot: DSGVO erlaubt dauerhafte Datenspeicherung | de lege data
Accessibility | MDN
a11y
PGP signatures on PyPI: worse than useless
The (opinionated) Mastodon list
#FediBuzz: Trends in the Fediverse
Audon
New variant could cause major covid wave, experts warn White House - The Washington Post
Introducing MPT-7B: A New Standard for Open-Source, Commercially Usable LLMs
GitHub - sts10/rust-command-line-utilities: A curated list of command-line utilities written in Rust
COVID-19/SARS-CoV-2 Studies - Google Tabellen
2023 State Privacy Law Tracker | Husch Blackwell
Doublespeak.chat
Zoom: Speicherung von Daten in Europa statt in den USA – Steiger Legal
ChatGPT Cheat Sheet & Quick Reference
https://github.com/wabarc/wayback
GitHub - cavi-au/Consent-O-Matic: Browser extension that automatically fills out cookie popups based on your preferences
https://bbradar.io/
How to Enable a Pre-Boot BitLocker PIN on Windows
Transfer.sh - Easy File Sharing from Linux Commandline
GitHub - metlo-labs/metlo: Metlo is an open-source API security platform.
https://isc.sans.edu/diary/Simple+Shellcode+Dissection/29642
MS 365 und DS - Zeitlicher Ablauf
How to Google Dork a Specific Website for Hacking
Introduction - Textual
Use a YubiKey as a MFA device to replace Google Authenticator | HackerNoon
5 tips to improve productivity with zsh | Opensource.com
Wireless Penetration Tips. A list for all things wireless that you… | by Adam Toscher | Medium
GDPR developer's guide | CNIL
Rewritten in Rust: Modern Alternatives of Command-Line Tools
Pentesting Web checklist - Pentest Book
A half-hour to learn Rust
How to open a file in Emacs - Murilo Pereira
HackTricks - HackTricks
Breath of the Wild Walkthrough – Great Plateau
GitHub - codedust/awesome-egov-de: A curated list of resources on egovernment in Germany
All of the Best Links and Resources on Cyber Security. - s0cm0nkey's Security Reference Guide
Mastodon Threads. A step-by-step walkthrough of threads… | by Odin Halvorson | Dec, 2022 | Medium
Sepia Search
GitHub - hodgesmr/mastodon_digest: A Python script that aggregates recent popular tweets from your Mastodon timeline
BibBot – Mit Bibliothekszugang durch die Paywall
Zoom veröffentlicht Checkliste zu Datenschutzkonferenz-Empfehlungen - Zoom Blog
The SSD Edition: 2022 Drive Stats Mid-year Review
98 wichtige Statistiken zu Datenschutzverletzungen [2022]
Neue Standardvertragsklauseln – der Countdown läuft!
GitHub - TalEliyahu/awesome-security-newsletters: Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
CryptoHack – A fun, free platform for learning cryptography
Make Your Site Available Over Tor: Guide To EOTK, The Enterprise Onion Toolkit
Threat Intelligence - Pulsedive
Home - SOCRadar® Extended Threat Intelligence
IVRE — Network recon framework
FullHunt | Expose Your Attack Surface
Attack Surface Management and Data Solutions | Censys
Shodan Search Engine
Microsoft 365 Security | Everything about Microsoft Security
Start | Fair Finance Guide Deutschland
UOMF: How to Start With Emacs Org Mode
GitHub - die-net/http-tarpit: Golang-based HTTP Tarpit
Frontiers | COVID-19 Post-acute Sequelae Among Adults: 12 Month Mortality Risk | Medicine
GitHub - JumpCrypto/crypto-reading-list
GitHub - mikeroyal/Open-Source-Security-Guide: Open Source Security Guide
GitHub - leedrake5/Russia-Ukraine: Equipment Loss Tracking
OWASP WrongSecrets | OWASP Foundation
IMQ Minded Security Blog: A practical guide to testing the security of Amazon Web Services (Part 1: AWS S3)
GitHub - denysdovhan/wtfjs: 🤪 A list of funny and tricky JavaScript examples
Bundesservice Telekommunikation — enttarnt: Dieser Geheimdienst steckt dahinter - @LilithWittmann | Medium
How to Detect and Compromise Azure Blobs and Storage Accounts
GitHub - humanetech-community/awesome-humane-tech: Promoting Solutions that Improve Wellbeing, Freedom and Society
HackTricks - HackTricks
Cloud Security Breaches and Vulnerabilities: 2021 in Review
Wegweiser digitale Tools - vereint.digital
BlueTeam CheatSheet * Log4Shell* | Last updated: 2021-12-12 1411 UTC · GitHub
GitHub - a13xp0p0v/linux-kernel-defence-map: Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
Threema: Three Strikes, You’re Out - Dhole Moments
Speeding up Linux disk encryption
Useful Tmux Configuration Examples - DEV Community
The Ultimate Collection of Emacs Resources - (think)
12ft Ladder
Ab dem 01.12.2021 in Kraft: das TTDSG und die "neuen" Cookie-Regeln
GitHub - drduh/YubiKey-Guide: Guide to using YubiKey for GPG and SSH
5 Ways To Exploit A Domain Takeover Vulnerability - RedHunt Labs
A Beginner's Guide to Social Media Verification - bellingcat
Strategielose Cybersicherheit für Deutschland - AG KRITIS
Neue Datenschutzbedingungen: Google Analytics, Ads, Facebook, Amazon & Co - Was Sie jetzt beachten müssen - Der Datenschutz-Generator.de, das Original ohne Abopflicht
Phie / CarnetDocumentation · GitLab
Wireshark Tutorial: Wireshark Workshop Videos Now Available
GitHub - sh-dv/hat.sh: Encrypt and Decrypt files securely in your browser.
Sysadmin job levels: What you need to know for each
Ransomware - Stiftung Wissenschaft und Politik
Klimawandelrisiken in Deutschland | VISLAB.io
UptimeRobot: Free Website Monitoring Service
(All) DNS Resource Records
GitHub - timb-machine/linux-malware: Tracking interesting Linux (and UNIX) malware. Send PRs
The Red Team Vade Mecum - The Red Team Vade Mecum
GitHub - veorq/oee: One-end encryption, stronger than end-to-end
Enigma machine / Tom MacWright / Observable
Top 25 der Sicherheitslücken: Buffer Overflows als größte Gefahrenquelle | heise online
GitHub - kdeldycke/awesome-falsehood: 😱 Falsehoods Programmers Believe in
Borreliose - es ist ein Zeckenjahr - schwesterfraudoktors Webseite!
GitHub - ibraheemdev/modern-unix: A collection of modern/faster/saner alternatives to common unix commands.
Web Security Academy: Free Online Training from PortSwigger
Homeoffice: Was Sie alles beachten sollten | heise online
See the latest update on the urgent race to develop each #COVID19vaccine at covid-19vaccinetracker.org. #covid19vaccinetracker #vaccinetracker @MilkenInstitute @FirstPersonSF
More Than 2.09 Billion Shots Given: Covid-19 Vaccine Tracker
How to Think: The Skill You've Never Been Taught
GitHub - alecmuffett/real-world-onion-sites: This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.
Limit the impact of a security intrusion with systemd directives
Mastering systemd: Securing and sandboxing applications and services
madaidan / Arch Hardening Script · GitLab
COVID-19 Sledilnik
GitHub - savetz/tiara: The Internet Archive Research Assistant - Daily search Internet Archive for new items matching your keywords
GitHub - pluja/awesome-privacy: Awesome Privacy - A curated list of services and alternatives that respect your privacy because PRIVACY MATTERS.
Precursor - Evaluating Our Hardware Security | Crowd Supply
Incident Postmortem Template - DEV Community
WireGuard Gives Linux a Faster, More Secure VPN | WIRED
GitHub - alecmuffett/eotk: Enterprise Onion Toolkit
How to recover from a security breach
Verzeichnis von Verarbeitungstätigkeiten (VVT) sinnvoll und praktisch erstellen und einsetzen
DSGVO-Praxisleitfaden: In acht Schritten zur Compliance | UPLOAD Magazin
de lege data | Update zu Fanpages: Facebook stellt erforderliche Vereinbarung zur Verfügung
The Motherboard Guide to Not Getting Hacked
GDPR Today
Offboarding-Prozess: Was ist zu tun, wenn ein Mitarbeiter geht?
GitHub - Ph055a/OSINT_Collection: Maintained collection of OSINT related resources. (All Free & Actionable)
Which of the OWASP Top 10 Caused the World’s Biggest Data Breaches? | Snyk
Errichtet China eine Big-Data-Diktatur? Nein. – Republik
Videoüberwachung – Was ist erlaubt und wo sind die Grenzen?
Ryuk in 5 Hours - The DFIR Report
"Mueller Report illustriert": Donald Trumps Treiben im Weißen Haus | WEB.DE
Koch-Wiki
Ungarisches Geheimdienstarchiv geöffnet | Telepolis
GitHub - trimstray/test-your-sysadmin-skills: A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
An Ansible Tutorial | Servers for Hackers
Webcam Hacking - Technical Walkthrough | Ryan Pickren
Attention to Details : Finding Hidden IDORs | by Aseem Shrey (@aseemshrey) | Medium
A tcpdump Tutorial with Examples — 50 Ways to Isolate Traffic | Daniel Miessler
Wireless Penetration Tips. A list for all things wireless that you… | by Adam Toscher | Medium
de lege data | AG Mannheim: Gemeinsame Verantwortlichkeit von Wohnungseigentümern und Verwalter – Anforderungen an die Art. 26-Vereinbarung
TikTok — Using OSINT to Discover New Leads | by AccessOSINT | Medium
10 Best OSINT Tools for Penetration Testing (Updated)
Pentesting tools | theyknow
Wolf / Schmudo2Go · GitLab
Sudoku Solver by Andrew Stuart
How to start RE/malware analysis? | hasherezade's 1001 nights
Ablegen
Alles ablegen
Erweitern
Alles erweitern
Bist du sicher das du diesen Link löschen möchtest?
Are you sure you want to delete this tag?
Der persönliche, minimalistische, superschnelle, datenbankfreie Lesezeichenservice von der Shaarli Community