Created
August 31, 2016 15:43
-
-
Save bryceandress/ca4139de2ed0e2a4b52c19d37e67a57c to your computer and use it in GitHub Desktop.
Archive Link 8/31/16
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1375421247 | So, you want to work in security? – Free Code Camp | https://medium.freecodecamp.com/so-you-want-to-work-in-security-bc6c10157d23?gi=3319f2f9d171 | |
1392467994 | HackedThat: Breaking in to a hardened server via the back door | http://polynome.co/infosec/inversoft/elasticsearch/linode/penetration-testing/2016/08/16/hack-that-inversoft.html | |
1394166342 | So you want to work in security (but are too lazy to read Parisa's excellent essay) | https://lcamtuf.blogspot.ch/2016/08/so-you-want-to-work-in-security-but-are.html?m=1 | |
1386106165 | Reverse Engineering x86 101 | http://howto.hackallthethings.com/2016/08/reverse-engineering-x86-101.html | |
1387765922 | | http://darksim905.com/~sim/reverse-engineering-notes.txt | |
1390056017 | | https://theitgeekchronicles.files.wordpress.com/2012/05/scapyguide1.pdf | |
112767402 | Security News | http://www.morningstarsecurity.com/news | |
1390252630 | "A small summary about the @SpamAndHex @defcon CTF adventure. Man vs. machine in security. https | https://twitter.com/defcon/status/768162736878424064 | |
20194766 | Debugging with GDB | http://www.delorie.com/gnu/docs/gdb/gdb_toc.html#SEC_Contents | |
1274483056 | Campfire Talks – How to get your start in information security part 2 | https://blindseeker.com/blahg/?p=809 | |
1200717299 | Campfire Talks – How to get your start in information security – part 1 | https://blindseeker.com/blahg/?p=692 | |
1385172281 | Organize your brain. | https://workflowy.com/s/s3nGwu0UHV | |
1385362201 | RS_101: Penetration Testing Part 2 | https://rallysecurity.com/rs_101-penetration-testing-part-2/ | |
1385374354 | RS_101: Penetration Testing Part 1 | http://rallysecurity.com/rs_101-penetration-testing-part-1/ | |
1384769121 | How I Hacked an Android App to Get Free Beer | https://breakdev.org/how-i-hacked-an-android-app-to-get-free-beer/ | |
1147041347 | DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015 | https://www.youtube.com/watch?v=-FAjxUOKbdI | |
1381191512 | Gynvael from DragonSector talking about DEF CON CTF and showing off some of the CGC challenges | https://www.reddit.com/r/LiveOverflow/comments/4xfmbk/gynvael_from_dragonsector_talking_about_def_con/ | |
611448412 | Batman: Arkham Asylum & Arkham City Guide | http://www.gamersonlinux.com/forum/threads/batman-arkham-asylum-arkham-city-guide.420/ | |
1382929068 | Curated list of public penetration test reports released by several consulting firms and academic security groups | https://github.com/juliocesarfort/public-pentesting-reports | |
1377243780 | A Defcon 2016 Retrospective — Down to the Wire | https://dttw.tech/posts/r1rHSpdY | |
1348810724 | | https://www.cs.umd.edu/~meesh/cmsc311/lab2_tutorial.txt | |
1381957200 | JetBrains IDE Remote Code Execution and Local File Disclosure | http://blog.saynotolinux.com/blog/2016/08/15/jetbrains-ide-remote-code-execution-and-local-file-disclosure-vulnerability-analysis/ | |
1379336826 | DEF CON 23 - Lock Picking Village - Preston Thomas - Intro to Lockpicking 1 | https://www.youtube.com/watch?v=fU7-r83Nx3Y&index=24&list=PL9fPq3eQfaaCeyIK5I1qRoAU_b-Fep_dC | |
1379336886 | DEF CON 23 - Packet Capture Village - Lokesh Pidawekar - Hackers Practice Ground | https://www.youtube.com/watch?v=W7gSE7msPiU&index=11&list=PL9fPq3eQfaaCeyIK5I1qRoAU_b-Fep_dC | |
1366753584 | Ask HN: What's on your RSS reader? | http://news.ycombinator.com/item?id=12194875 | |
1379348162 | DEF CON 23 - Brent White - Hacking Web Apps | https://www.youtube.com/watch?v=I8AhfDEKUQ4&index=79&list=PL9fPq3eQfaaBuHqVvDzPoWxznYYmyx5UX | |
1367651501 | Screetsec/TheFatRat : Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on a windows host Program to create a C program after it is compiled that will bypass most AV ( Antivirus ) | https://github.com/Screetsec/TheFatRat | |
1216452938 | CCNA Summary | https://haroen.me/ccna/ | |
1378262635 | Council of Nine — DEFCON 24 Badge Challenge | http://co9.io/post/148716614744/defcon-24-badge-challenge | |
1376967863 | [5e] New DM sharing some hopefully useful resources. | https://www.reddit.com/r/DnD/comments/4x22v3/5e_new_dm_sharing_some_hopefully_useful_resources/ | |
843320718 | Cisco CCNA Routing and Switching Training Notes | https://gumroad.com/l/ccnanotes | |
549270114 | CCNA Training Series (200-120 CCNA, 100-101 ICND1, 200-101 ICND2) | http://www.youtube.com/playlist?list=PLmdYg02XJt6QRQfYjyQcMPfS3mrSnFbRC | |
1374632414 | OpenCTF 2016: tyro_rop2 | https://bannsecurity.com/index.php/home/10-ctf-writeups/34-openctf-2016-tyro-rop2 | |
1377378641 | OpenCTF 2016: neophyte_reversing | https://bannsecurity.com/index.php/home/10-ctf-writeups/36-openctf-2016-neophyte-reversing | |
1348600038 | | http://scottgriffy.com/blogs/rat-in-the-shellcode.html | |
1167092 | Shellcoding for Linux and Windows Tutorial | http://www.vividmachines.com/shellcode/shellcode.html | |
1348811725 | | http://uninformed.org/?v=all&a=8&t=txt | |
642084803 | All && Everything | http://mammon.github.io/tales/ | |
44804428 | Web Application Exploits and Defenses | http://google-gruyere.appspot.com/part1#1__using_gruyere | |
1376085006 | Security Research | https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102?utm_campaign=Researcher Marketing&utm_content=38799105&utm_medium=social&utm_source=twitter | |
24042896 | Just Another Hacker | http://www.justanotherhacker.com/ | |
1366606839 | Scrutiny on the bug bounty - Google Slides | https://docs.google.com/presentation/d/1PCnjzCeklOeGMoWiE2IUzlRGOBxNp8K5hLQuvBNzrFY/ | |
1341723014 | Windows 10 x86/wow64 Userland heap | https://www.corelan.be/index.php/2016/07/05/windows-10-x86wow64-userland-heap/ | |
906379901 | Bucket Finder | https://digi.ninja/projects/bucket_finder.php | |
935517045 | Researcher Resources - Tutorials | https://forum.bugcrowd.com/t/researcher-resources-tutorials/370 | |
921709568 | Researcher Resources - Tools | https://forum.bugcrowd.com/t/researcher-resources-tools/167 | |
898056210 | How do you approach a target? | https://forum.bugcrowd.com/t/how-do-you-approach-a-target/293 | |
1369513137 | How To SSH Tunnels and Stuff | https://n0where.net/how-to-ssh-tunnels-and-stuff/ | |
1343419170 | Building A C Compiler Type System - Part 1: The Formidable Declarator | http://blog.robertelder.org/building-a-c-compiler-type-system-the-formidable-declarator/ | |
1368748436 | | https://na-production.s3.amazonaws.com/documents/Bugs-in-the-System-Final.pdf | |
1278947343 | Security Research | https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102 | |
1368344015 | How to steal $2,999.99 in less than 2 minutes with Venmo and Siri | http://www.martinvigo.com/steal-2999-99-minute-venmo-siri/ | |
1321491302 | Bug Bounty 5 years in | https://medium.com/@collingreene/bug-bounty-5-years-in-c95cda604365 | |
1363898226 | it subreddits curated by /u/HydrA- | https://www.reddit.com/user/HydrA-/m/it | |
1365625127 | High frequency security bug hunting: 120 days, 120 bugs | https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/ | |
1367362698 | How To Tcpdump | https://n0where.net/how-to-tcpdump/ | |
1365470240 | Hacking Imgur for Fun and Profit | https://medium.com/@nmalcolm/hacking-imgur-for-fun-and-profit-3b2ec30c9463#.aomqq759a | |
1321458441 | Bruteforce BitCoin Wallet | https://n0where.net/bruteforce-bitcoin-wallet/ | |
1218444917 | Exercises | https://www.hacksplaining.com/exercises | |
1363448710 | How I made LastPass give me all your passwords | https://labs.detectify.com/2016/07/27/how-i-made-lastpass-give-me-all-your-passwords/ | |
1358857712 | Shut up snitch! – reverse engineering and exploiting a critical Little Snitch vulnerability | https://reverse.put.as/2016/07/22/shut-up-snitch-reverse-engineering-and-exploiting-a-critical-little-snitch-vulnerability/ | |
1355084206 | How Netflix gives all its engineers SSH access | https://www.oreilly.com/learning/how-netflix-gives-all-its-engineers-ssh-access | |
1329300468 | Create Your Own Pirate Bay: OpenBay | https://n0where.net/create-your-own-pirate-bay-openbay/ | |
1235322629 | Web Hacking 101 | https://leanpub.com/web-hacking-101 | |
1351557169 | “Give me 15 minutes and I'll change your view of GDB” [video] | https://news.ycombinator.com/item?id=12101347 | |
1359417882 | How we broke PHP, hacked Pornhub and earned $20,000 | https://www.evonide.com/how-we-broke-php-hacked-pornhub-and-earned-20000-dollar/ | |
1359231712 | Learning Exploitation with Offensive Computer Security 2.0 | http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html | |
843762495 | Learning About Digital Forensics | http://cheeky4n6monkey.blogspot.com/2015/02/reversing-monkey.html | |
69405577 | Debugging Fundamentals for Exploit Development | http://resources.infosecinstitute.com/debugging-fundamentals-for-exploit-development/ | |
1214465238 | Reverse engineering LucasArts Outlaws | http://glampert.com/2015/10-10/reverse-engineering-lucasarts-outlaws/ | |
1353252667 | Unbundling Pokémon Go — Applidium | https://applidium.com/en/news/unbundling_pokemon_go/ | |
1354533444 | Vimgifs | https://vimgifs.com/ | |
1351846433 | GynvaelEN | https://www.youtube.com/user/GynvaelEN | |
1348631375 | Ask HN: What's your favorite way to save money? | https://news.ycombinator.com/item?id=12082078 | |
1343334922 | Why we use the Linux kernel's TCP stack | https://blog.cloudflare.com/why-we-use-the-linux-kernels-tcp-stack/ | |
1345182646 | Linux Signals - Internals | http://sklinuxblog.blogspot.com/2015/05/linux-signals-internals.html | |
1348465456 | SYN Flood Mitigation with synsanity | http://githubengineering.com/syn-flood-mitigation-with-synsanity/ | |
1346591544 | How I setup a Raspberry Pi 3 Cluster Using The New Docker Swarm Mode In 29 Minutes | https://medium.com/@bossjones/how-i-setup-a-raspberry-pi-3-cluster-using-the-new-docker-swarm-mode-in-29-minutes-aa0e4f3b1768#.q85p03kl4 | |
1345674271 | Introducing Contemporary Reverse Engineering Techniques to Real World Use · x64dbg | http://x64dbg.com/blog/2016/07/09/introducing-contemporary-reverse-engineering-technique-to-real-world-use.html | |
1352113396 | Bosch Motronic ME7.1 | https://web.archive.org/web/20121226064103/http://www.andywhittaker.com/ECU/BoschMotronicME71.aspx | |
1352462423 | Reversing an ELF from the ground up | http://anee.me/reversing-an-elf/ | |
1344911168 | Linux debugging tools I love | http://jvns.ca/blog/2016/07/03/debugging-tools-i-love/ | |
1347479760 | Allocation on the JVM: Down the rabbit hole | http://jcdav.is/2016/07/11/JVM-allocation-secrets/ | |
1214465138 | Reverse engineering Dungeon Siege | http://glampert.com/2015/09-16/reverse-engineering-dungeon-siege/ | |
1216467733 | Segfaulting Python with afl-fuzz | http://tomforb.es/segfaulting-python-with-afl-fuzz | |
1344597024 | Vulnerabilities I Have Known and Loved #1: Symantec's Bad Week | http://blog.appcanary.com/2016/vikhal-symantec.html | |
1346709233 | How I Got 5000+ Stars on Github · GitHub | https://gist.github.com/eliangcs/464a05ab75ac2a44d2e3dc0ac141cbc6 | |
1349348261 | My First 10 Seconds On A Server | http://jerrygamblin.com/2016/07/13/my-first-10-seconds-on-a-server/ | |
1340276647 | SSD Advisory – Wget Arbitrary Commands Execution | https://blogs.securiteam.com/index.php/archives/2701 | |
1342670052 | Create Your Own Shell in Python : Part II | https://hackercollider.com/articles/2016/07/06/create-your-own-shell-in-python-part-2/ | |
1347477808 | KeeThief – A Case Study in Attacking KeePass Part 2 – harmj0y | http://www.harmj0y.net/blog/redteaming/keethief-a-case-study-in-attacking-keepass-part-2/ | |
1344651231 | The History of the URL: Domain, Protocol, and Port | https://eager.io/blog/the-history-of-the-url-domain-and-protocol/ | |
1336701686 | A Case Study in Attacking KeePass – harmj0y | http://www.harmj0y.net/blog/redteaming/a-case-study-in-attacking-keepass/ | |
1342059543 | Create Your Own Shell in Python : Part I | https://hackercollider.com/articles/2016/07/05/create-your-own-shell-in-python-part-1/ | |
357888875 | Deep Wizardry: Stack Unwinding | http://blog.reverberate.org/2013/05/deep-wizardry-stack-unwinding.html | |
70480251 | Assembly Primer For Hackers (Part 1) System Organization | http://www.securitytube.net/video/208 | |
1323241529 | X86 Shellcode Obfuscation - Part 1 | https://breakdev.org/x86-shellcode-obfuscation-part-1 | |
1313234547 | Writing your own shellcode. | https://paraschetal.in/writing-your-own-shellcode/ | |
1307618464 | An in depth tutorial on how to do binary exploitation | https://github.com/bert88sta/how2exploit_binary | |
1309153177 | 2000 cuts with Binary Ninja | https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/ | |
1258236788 | PoliCTF 2015 - John's Shuffle | http://ctfhacker.com/ctf/pwnable/2015/08/05/polictf-johns-shuffle.html | |
1292305183 | Python 3: An Intro to Encryption | http://www.blog.pythonlibrary.org/2016/05/18/python-3-an-intro-to-encryption/ | |
1306324402 | “Super Mario Brothers” is hard | http://news.mit.edu/2016/mario-brothers-hard-complexity-class-pspace-0601 | |
1302801147 | How (and Why) to Log Your Entire Bash History | https://spin.atomicobject.com/2016/05/28/log-bash-history/ | |
1302698677 | Writing my first shellcode - iptables -P INPUT ACCEPT | https://0day.work/writing-my-first-shellcode-iptables-p-input-accept/ | |
1300794964 | Docker IDA | http://blog.intezer.com/docker-ida/ | |
1298515935 | Defusing a binary bomb with gdb | http://blog.carlosgaldino.com/2016/05/24/defusing-a-binary-bomb-with-gdb-part-7.html | |
1269518071 | I built a personal chat bot | https://medium.com/chat-bots/i-built-a-personal-chat-bot-why-i-love-it-and-youll-love-yours-too-6c2d019f3725#.w1hdlfmnj | |
1287479473 | Hackfu 2016 Writeup – Securifera | https://www.securifera.com/blog/2016/05/13/hackfu-2016-writeup/ | |
1296331654 | An Introduction to Sorting Algorithms | http://classycode.org/2016/05/22/sortingalgorithmsintro/ | |
1297312320 | Memory leak or just calculus? | https://improbable.io/2016/05/23/memory-leak-just-calculus | |
1296766384 | Quals Wrapup | https://blog.legitbs.net/2016/05/quals-wrapup.html | |
1296708567 | DEF CON QUALS 2016 - crippled [Coding Challenges] | https://thegoonies.rocks/def-con-quals-2016-crippled-coding-challenges/ | |
1293151561 | X86 Shellcode Obfuscation - Part 2 | https://breakdev.org/x86-shellcode-obfuscation-part-2/ | |
581207247 | Using Vim as a password manager | https://invert.svbtle.com/using-vim-as-a-password-manager | |
1295301468 | Reverse Engineering A Mysterious UDP Stream in My Hotel | http://wiki.gkbrk.com/Hotel_Music.html | |
376536162 | Reversing Basics Part 1: Understanding the C Code | http://blog.opensecurityresearch.com/2013/06/reversing-basics-part-1-understanding-c.html | |
1293839697 | | http://cybersmash.io/reversing-c-pt-1-function-overloading-and-function-templates/ | |
1278328815 | thejameskyle/the-super-tiny-compiler | https://github.com/thejameskyle/the-super-tiny-compiler/blob/8466b6a67df9d815f1b7a8b5d4eec5abca0aea44/super-tiny-compiler.js?utm_source=ponyfoo+weekly&utm_medium=email | |
1285947879 | X86 Shellcode Obfuscation - Part 1 | https://breakdev.org/x86-shellcode-obfuscation-part-1 | |
1285785294 | In-depth Machine Learning Course w/ Python [x-post /r/machinelearning] | https://www.reddit.com/r/Python/comments/4j0xhf/indepth_machine_learning_course_w_python_xpost/ | |
1286626005 | CTF Writeup: Brain Repl | https://travisf.net/brain-repl-writeup | |
1018010574 | My First DEF CON | http://www.devdungeon.com/content/my-first-def-con | |
1263552374 | | https://www.cs.ucsb.edu/~vigna/publications/2016_SP_angrSoK.pdf | |
673857 | Smashing the Stack for Fun and Profit by Aleph One | http://insecure.org/stf/smashstack.html | |
1210731821 | Vim Configuration From Scratch in 2016 | https://marcgg.com/blog/2016/03/01/vimrc-example | |
1272549740 | GitHub README Analyzer | http://demos.algorithmia.com/github-readme-analyzer/ | |
1268206105 | How to Loop With Indexes in Python | https://treyhunner.com/2016/04/how-to-loop-with-indexes-in-python | |
1274570369 | tetrakai | https://karla.io/2016/04/30/ssh-for-fun-and-profit.html | |
1269490561 | Have Software Developers Given Up? | http://blog.dantup.com/2016/04/have-software-developers-given-up/ | |
1274716336 | Can’t Hack a Hacker: Reverse Engineering a Discovered ATM Skimmer | https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/ | |
1273606271 | Do Experienced Programmers Use Google Frequently? | http://codeahoy.com/2016/04/30/do-experienced-programmers-use-google-frequently/ | |
1216485029 | An Elegant Fizzbuzz | http://www.parsonsmatt.org/2016/02/27/an_elegant_fizzbuzz.html | |
1272263929 | Using RAsm · The Official Radare Blog | http://radare.today/posts/rasm/ | |
1101909295 | Defusing a binary bomb with gdb - Part 1 | http://blog.carlosgaldino.com/2015/11/12/defusing-a-binary-bomb-with-gdb-part-1.html | |
1260563707 | How I Defeated an Obfuscated and Anti-Tamper APK With Some Python and a Home-Made Smali Emulator. | https://www.evilsocket.net/2016/04/18/how-i-defeated-an-obfuscated-and-anti-tamper-apk-with-some-python-and-a-home-made-smali-emulator/ | |
1261684605 | Veil-Evasion Vulnerability Discovered by Cylance | https://blog.cylance.com/veil-evasion-vulnerability-discovered-by-cylance | |
977188992 | NSEarch - Nmap Script Engine Search | http://www.kitploit.com/2015/02/nsearch-nmap-script-engine-search.html | |
1267335200 | Various interview questions I have been asked while applying for security consultant jobs this year | https://www.reddit.com/r/netsecstudents/comments/4g9k93/various_interview_questions_i_have_been_asked/ | |
1260447001 | CTFtime.org / sCTF 2016 Q1 tasks and writeups | https://ctftime.org/event/309/tasks/ | |
1262091528 | Detecting the use of "curl | bash" server side | https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-bash-server-side/ | |
1264029009 | How I Hacked Facebook, and Found Someone's Backdoor Script | http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/ | |
1262412450 | 52-technologies-in-2016/README.md at master · shekhargulati/52-technologies-in-2016 · GitHub | https://github.com/shekhargulati/52-technologies-in-2016/blob/master/16-newspaper/README.md | |
1264391482 | Teaching an old RAT new tricks | https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/ | |
1260842006 | Game Boy Zero Guide Part 1 | http://sudomod.com/game-boy-zero-guide-part-1/ | |
244723365 | Packets, pcaps, Python and Maltego | http://itgeekchronicles.co.uk/ | |
1249366316 | Veil Evasion: Payloads Made Easy | http://hack-ed.net/2016/04/04/veil-evasion-payloads-made-easy/ | |
1259674284 | | http://pastebin.com/raw/0SNSvyjJ | |
1258976996 | Addition_by_subtraction - Google Slides | https://docs.google.com/presentation/d/1-mtBSka1ktdh8RHxo2Ft0oNNlIp7WmDA2z9zzHpon8A/edit#slide=id.p16 | |
361030202 | List of file signatures | http://en.m.wikipedia.org/wiki/List_of_file_signatures | |
1259225523 | sCTF 2016 (incomplete) write-up | http://boredhackerblog.blogspot.com/2016/04/sctf-2016-incomplete-write-up.html | |
1253700174 | Is there a rider on the policy to cover ransomware or "cyber extortion"[38]? | http://blog.talosintel.com/2016/04/ransomware.html#ch2 | |
1260001901 | Phineas Fisher's Account of How He Broke Into Hacking Team Servers | http://news.softpedia.com/news/finfisher-s-account-of-how-he-broke-into-hackingteam-servers-503078.shtml | |
1256253954 | Setting up your first Virtual Environment | http://hack-ed.net/2016/04/13/setting-up-your-first-virtual-environment/ | |
1259241762 | Universal Install Script by XKCD – Combat test | http://www.ocsmag.com/2016/04/16/universal-install-script-by-xkcd-combat-test/ | |
1258072364 | Beginners Guide to OSINT – Chapter 1 | https://itgeekchronicles.co.uk/2016/04/15/beginners-guide-to-osint-chapter-1/ | |
786676128 | | https://ctf-team.vulnhub.com/picoctf-2014-overflow1/ | |
1217494704 | How MAC Address Randomization Works on Windows 10 | http://www.mathyvanhoef.com/2016/03/how-mac-address-randomization-works-on.html | |
960225061 | The Malware Lab : Virtual Network Configuration – VirtualBox | https://blindseeker.com/blahg/?p=375 | |
1256361255 | exploit to solve pwn1 in the sctf challenge · GitHub | https://gist.github.com/charles-l/d4757ee03f4f3e4fd6a84730dc49c004 | |
1248591082 | Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide | https://www.alienvault.com/blogs/security-essentials/building-a-home-lab-to-become-a-malware-hunter-a-beginners-guide | |
1254341889 | Ghost in the Shellcode 2014 - Pwn Adventure 2 writeups | http://balidani.blogspot.com/2014/01/ghost-in-shellcode-2014-pwn-adventure-2.html | |
463529184 | stephenturner/oneliners | https://github.com/stephenturner/oneliners | |
1124001546 | DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub | https://github.com/Leo-G/DevopsWiki/blob/master/README.md | |
1254291562 | Words With Friends Trusts The Clients A Little Too Much | https://littlemaninmyhead.wordpress.com/2016/04/09/words-with-friends-trusts-the-clients-a-little-too-much/ | |
1253968770 | MongoDB Injection - How To Hack MongoDB | http://www.technopy.com/mongodb-injection---how-to-hack-mongodb.html | |
553788030 | | http://nongnu.askapache.com//pgubook/ProgrammingGroundUp-1-0-lettersize.pdf | |
822046665 | ant4g0nist/lisa.py | https://github.com/ant4g0nist/lisa.py | |
1254289489 | epicleet/write-ups-2016 forked from ctfs/write-ups-2016 | https://github.com/epicleet/write-ups-2016/tree/pwn2win-ctf-2016/pwn2win-ctf-2016/reverse/Auswahlen-120 | |
1252984224 | BOX-256 | http://box-256.com | |
1216434794 | Boston Key Party CTF 2016 writeups | https://0day.work/boston-key-party-ctf-2016-writeups/ | |
458701 | What is linux-gate.so.1? | http://www.trilithium.com/johan/2005/08/linux-gate/ | |
1227289934 | Reverse engineering Kirby's Dreamland 2, for Game Boy | http://ecc-comp.blogspot.com/2016/03/reverse-engineering-kirbys-dreamland-2.html?m=1 | |
717062073 | I was just asked to crack a program in a job interview ! | http://erenyagdiran.github.io/I-was-just-asked-to-crack-a-program-Part-1/ | |
1246774019 | SmashTheTux VulnHub Writeup | https://research.g0blin.co.uk/smashthetux-vulnhub-writeup/ | |
625117117 | .:: Basic Integer Overflows ::. | http://www.phrack.org/issues/60/10.html#article | |
1225435091 | Diving Into Other People's Code | http://www.lihaoyi.com/post/DivingIntoOtherPeoplesCode.html | |
256910183 | Top 30 Nmap Command Examples For Sys/Network Admins | http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/ | |
885795659 | Nmap Cheat Sheet ∞ | https://highon.coffee/blog/nmap-cheat-sheet/ | |
1231292829 | PRIMER VulnHub Writeup | https://research.g0blin.co.uk/primer-vulnhub-writeup/ | |
965604627 | Linux (x86) Exploit Development Series | https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ | |
1049375886 | Tools and Resources to Prepare for a Hacker CTF Competition or Challenge | http://resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/ | |
385129465 | 7 Silly Programming Challenges to Do for Fun | http://blog.smartbear.com/programming/7-silly-programming-challenges-to-do-for-fun/ | |
1231982618 | Let's Analyze: Dridex (Part 1) | http://www.malwaretech.com/2016/03/lets-analyze-dridex-part-1.html | |
1214545547 | A Beginner-Friendly Introduction to Containers, VMs and Docker — Free Code Camp — Medium | https://medium.freecodecamp.com/a-beginner-friendly-introduction-to-containers-vms-and-docker-79a9e3e119b?gi=d0fc7519b9ca | |
1177646344 | as painless as possible — Miasm's blog | http://www.miasm.re/blog/2016/01/27/re150.html | |
1247352106 | Rebuilding a cleaned & working binary (Re150 part 2) — Miasm's blog | http://www.miasm.re/blog/2016/03/24/re150_rebuild.html | |
1249716536 | SNES Code Injection -- Flappy Bird in SMW | https://www.youtube.com/watch?v=hB6eY73sLV0 | |
1247113824 | PowerWare or PoshCoder? Comparison and Decryption | https://www.alienvault.com/open-threat-exchange/blog/powerware-or-poshcoder-comparison-and-decryption | |
1163404808 | Artificial truth | https://dustri.org/b/how-to-radare2-a-fake-openssh-exploit.html | |
1247490738 | A Tale of Security Gone Wrong | http://gavinmiller.io/2016/a-tale-of-security-gone-wrong/ | |
1248119158 | CTF Writeup - Nuit du Hack CTF Quals 2016 - Matryoshka (50+100+300+500) | http://vulnerablespace.blogspot.co.uk/2016/04/ctf-writeup-nuit-du-hack-ctf-quals-2016.html?m=1 | |
1248123794 | Nuit du Hack - Secure File Reader | https://0xabe.io/ctf/exploit/2016/04/03/Nuit-du-Hack-pwn-Secure-File-Reader.html | |
531150219 | Ghost in the Shellcode: TI-1337 (Pwnable 100) | https://blog.skullsecurity.org/2014/ghost-in-the-shellcode-ti-1337-pwnable-100 | |
92527451 | Adventures with Radare2 #1: A Simple Shellcode Analysis | http://canthack.org/2011/07/adventures-with-radare-1-a-simple-shellcode-analysis/ | |
1224661973 | Documents with malicious macros deliver fileless malware | http://www.computerworld.com/article/3043570/security/documents-with-malicious-macros-deliver-fileless-malware.html | |
863923539 | Modern Binary Exploitation | http://security.cs.rpi.edu/courses/binexp-spring2015/ | |
1241219243 | zbetcheckin/Security_list | https://github.com/zbetcheckin/Security_list | |
539962725 | theZoo aka Malware DB | http://ytisf.github.io/theZoo | |
1244692585 | I’m a boring programmer (and proud of it) — Signal v. Noise — Medium | https://m.signalvnoise.com/i-m-a-boring-programmer-and-proud-of-it-d4ac3dd2defe?gi=bb136f2dc796 | |
1218976113 | Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan | http://blog.techorganic.com/2016/03/08/radare-2-in-0x1e-minutes/ | |
973740512 | Reverse Engineering With Radare2, Part 1 | https://samsymons.com/blog/reverse-engineering-with-radare2-part-1/ | |
1240263842 | Reverse Engineering Sublime Text’s Fuzzy Match — Dev Curious — Medium | https://blog.forrestthewoods.com/reverse-engineering-sublime-text-s-fuzzy-match-4cffeed33fdb?gi=9cd7f4c39d71 | |
695046174 | 7 Harmless (But Slightly Evil) Back-to-School Pranks for Your Gullible Dorm Mates | http://practical-jokes.wonderhowto.com/how-to/7-harmless-but-slightly-evil-back-school-pranks-for-your-gullible-dorm-mates-0156931/ | |
1245762036 | Post Your Decrypted 3DS Saves Here! (40+ Saves so Far!) | http://www.reddit.com/r/3dshacks/comments/4d842q/post_your_decrypted_3ds_saves_here_40_saves_so_far/ | |
117613166 | Give me that one command you wish you knew years ago. I'll start. | https://www.reddit.com/r/linux/comments/mi80x/give_me_that_one_command_you_wish_you_knew_years/ | |
1234542278 | NPM & left-pad: Have We Forgotten How To Program? | http://www.haneycodes.net/npm-left-pad-have-we-forgotten-how-to-program/ | |
1232603148 | Reflections on Programming | http://sam-koblenski.blogspot.com/2016/03/reflections-on-programming.html | |
1240637060 | The Future is Without Apps | https://medium.com/fwd-thoughts/the-future-is-without-apps-ddf43ec52aab#.y3mnajpn3 | |
1238104924 | Open Source Weekly #05 — open source weekly — Medium | https://medium.com/p/237c0d70585f | |
1236205432 | [Updated Tools] Easy to follow beginner's guide for DeDRMing amazon trial, rental, and purchased ebooks | https://www.reddit.com/r/Piracy/comments/4bvsnz/updated_tools_easy_to_follow_beginners_guide_for/ | |
1003836686 | How to mine Ethereum on a Windows PC? | https://www.cryptocompare.com/mining/guides/how-to-mine-ethereum/ | |
1134631863 | Breaking and evading Linux with a new novel technique | https://www.sentinelone.com/blog/breaking-and-evading/ | |
1239486008 | Developer Mentality — Medium | https://medium.com/@KarlSolgard/developer-mentality-1d266fdc4097 | |
1233623442 | How to not break the internet with this one weird trick | https://medium.com/@Rich_Harris/how-to-not-break-the-internet-with-this-one-weird-trick-e3e2d57fee28#.mwgm03fwd | |
1235486261 | There is no “my” in open source — Medium | https://medium.com/@nayafia/there-is-no-my-in-open-source-c3e5555390fa#.unbp9ug76 | |
1229400859 | Terminal Essentials: Advanced Command Line Tools For Devs and Sysadmins | http://thenewstack.io/terminal-essentials-command-line-tools-devs-sysadmins/ | |
803202482 | NSA has VPNs in Vulcan death grip—no, really, that’s what they call it | http://arstechnica.com/tech-policy/2014/12/nsa-has-vpns-in-vulcan-death-grip-no-really-thats-what-they-call-it/ | |
1240582798 | Home · Plailect/Guide Wiki · GitHub | https://github.com/Plailect/Guide/wiki | |
1239993377 | What do cryptic Github comments mean? — Medium | https://medium.com/p/9c1912bcc0a4 | |
747085484 | Want a security starter pack? | https://ssd.eff.org/en/playlist/want-security-starter-pack#creating-strong-passwords | |
176786836 | Seamlessly Extending IRC to Mobile Devices | http://m.linuxjournal.com/content/seamlessly-extending-irc-mobile-devices | |
1233308607 | Why I switched to Android after 7 years of iOS | https://joreteg.com/blog/why-i-switched-to-android | |
1232375756 | 4 Quick Takeaways From Today’s Apple Keynote — Medium | https://medium.com/@iamtimbaker/4-quick-takeaways-from-today-s-apple-keynote-e10355e987f | |
1232102371 | Extracting image metadata at scale | http://techblog.netflix.com/2016/03/extracting-image-metadata-at-scale.html?m=1 | |
1236702144 | The Chrome Distortion: how Chrome negatively alters our expectations. | https://blog.runspired.com/2016/03/25/the-chrome-distortion-chrome-alters-our-expectations-in-highly-negative-ways/ | |
1237225058 | What is Capture the Flag? — Medium | https://medium.com/@WesternCyberSecurity/what-is-capture-the-flag-f498097f6478 | |
1237386245 | What if the NPM left-pad fiasco had happened on PyPi? | https://www.reddit.com/r/Python/comments/4booff/what_if_the_npm_leftpad_fiasco_had_happened_on/ | |
1235099015 | Timeless Programming Tools | http://www.flyingmachinestudios.com/programming/timeless-tools/ | |
1224860099 | Journey to becoming a better software developer — Part 1 — Medium | https://medium.com/@betkom/journey-to-becoming-a-better-software-developer-part-1-e69cf8dc2571#.91hxqac5x | |
1236702470 | Benchmarking Python vs. C performance with a simple program — Medium | https://medium.com/p/c268677912d3 | |
1222403254 | | http://beginners.re/RE4B-EN.pdf | |
1219384046 | How We Build Code at Netflix | http://techblog.netflix.com/2016/03/how-we-build-code-at-netflix.html | |
1211771583 | Go - Making a program 70% faster, by avoiding common mistakes. | http://blog.fmpwizard.com/blog/go_making_a_program_70_faster_by_avoiding_common_mistakes | |
1235132678 | Why systemd is *Great* for Configuration Management — Treehouse Engineering — Medium | https://medium.com/treehouse-engineering/why-systemd-is-great-for-configuration-management-cb3172e0a1d1#.rwtnty3gx | |
1232587111 | How a TV Sitcom Triggered the Downfall of Western Civilization | https://medium.com/@thatdavidhopkins/how-a-tv-sitcom-triggered-the-downfall-of-western-civilization-336e8ccf7dd0 | |
1233727848 | d’Oh My Zsh | https://medium.com/@robbyrussell/d-oh-my-zsh-af99ca54212c | |
1233028571 | Command Line Magic on Twitter : " : %s/wlan0/eth3/gc # In vim this will search all lines (%s) for wlan0 and replace all the instances per line (g) with eth3 and confirm (c)" | https://twitter.com/climagic/status/712287216668696578 | |
1219885117 | Geek’s Guide to Feels | https://www.facebook.com/notes/kent-beck/geeks-guide-to-feels/1118073741558822/ | |
1233950291 | npm's single point of failure | https://resir014.github.io/blog/2016/03/23/npms-single-point-of-failure/ | |
1218553990 | Defensive programming in Python | http://tutorials.pluralsight.com/review/defensive-programming-in-python | |
1219586217 | 5 ways to upgrade your Terminal — Medium | https://medium.com/@sahanarajasekar/5-ways-to-upgrade-your-terminal-2fb8ab447949 | |
1216867595 | Who Needs GitHub? Run GitLab on a USB Stick with Docker : Elton Stoneman | https://blog.sixeyed.com/run-gitlab-on-a-usb-stick-with-docker/ | |
1227813611 | Best Python Libraries | https://www.caktusgroup.com/blog/2016/03/17/best-python-libraries/ | |
1227482210 | tcpdump is amazing | http://jvns.ca/blog/2016/03/16/tcpdump-is-amazing/ | |
1222352376 | A millennial and a baby boomer trade places: ‘I can’t help but feel a stab of envy’ | http://www.theguardian.com/world/2016/mar/12/millennial-baby-boomer-trade-places-stab-envy | |
1226812537 | Scipy Lecture Notes - One document to learn numerics, science, and data with Python | https://www.reddit.com/r/Python/comments/4ao6nn/rafs_redditasfilestorage/ | |
1231056581 | How the demonization of emulation devalues gaming’s heritage | http://arstechnica.com/gaming/2016/03/how-the-demonization-of-emulation-devalues-gamings-heritage/ | |
1218333969 | Ungit: The Easiest Way to Use Git | http://blog.goguardian.com/nerds/ungit-the-easiest-way-to-use-git | |
1218408753 | Rise of The Docker Pattern | http://redmonk.com/jgovernor/2016/03/08/rise-of-the-docker-pattern/ | |
99640904 | What every computer science major should know | http://matt.might.net/articles/what-cs-majors-should-know/ | |
1202952956 | The Difference Between Excellent, Good and Bad JavaScript Developers | http://thefullstack.xyz/excellent-javascript-developer/ | |
1220473293 | | http://wesbos.com/git-hot-tips/ | |
1214583941 | Things I Wish Someone Had Told Me When I Was Learning How to Code — Free Code Camp — Medium | https://medium.freecodecamp.com/things-i-wish-someone-had-told-me-when-i-was-learning-how-to-code-565fc9dcb329?gi=72e41ad08d7a | |
1204566093 | How Can I Get Better at Programming? | https://medium.com/life-learning/how-can-i-get-better-at-programming-dab9644a3b9f#.ks9lg8x82 | |
1164722462 | Hot Potato – Windows Privilege Escalation | https://foxglovesecurity.com/2016/01/16/hot-potato/ | |
1211011267 | How to Level up as a Developer — Medium | https://medium.com/@willh/how-to-level-up-as-a-developer-87344584777c | |
1211118199 | How to Deploy Software | https://zachholman.com/posts/deploying-software |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment