Cloud Application Security Best Practices - Detailed Checklist

Here are the top cloud computing application security practices & checklist that every organization should follow to secure a cloud environment.

rishabhsoft.com/blog/cloud-app

PowerShell Workflows: The Basics | Scripting Blog

Summary: Windows PowerShell MVP Richard Siddaway talks about the basics of Windows PowerShell 3.0 workflows. Microsoft Scripting Guy, Ed Wilson, is here. Today, we are fortunate to have a guest blog post by Windows PowerShell MVP Richard Siddaway. Richard has written a number of guest Hey,

devblogs.microsoft.com/scripti

madhuakula/kubernetes-goat

Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.

github.com/madhuakula/kubernet

chompie1337/SIGRed_RCE_PoC

Contribute to chompie1337/SIGRed_RCE_PoC development by creating an account on GitHub.

github.com/chompie1337/SIGRed_

How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks | Praetorian

Methods by which an attacker can induce a victim user into authenticating using the NT Lan Manager (NTLM) Authentication Protocol.

praetorian.com/blog/how-to-exp

How to Silver Ticket Attack Active directory

Silver ticket attack for domain persistence in active directory network silver ticket is a forged service ticket using service account hash.

sheerazali.com/how-to-silver-t

Overcoming Issues Using Custom Python Scripts with Burp Suite Professional | JUMPSEC LABS

The Python Scripter Burp Suite extension can be used to modify requests sent through Burp including those generated by tools such as the active scanner.

labs.jumpsec.com/burp-suite-py

ADExplorer on Engagements | TrustedSec

TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.

trustedsec.com/blog/adexplorer

Google’s FLoC Is a Terrible Idea

Update, April 9, 2021 : We've launched Am I FLoCed, a new site that will tell you whether your Chrome browser has been turned into a guinea pig for Federated Learning of Cohorts or FLoC, Google’s latest targeted advertising experiment.

eff.org/deeplinks/2021/03/goog

A short but brilliant read. A trolling masterpiece, and a great example of how security companies are not always the most secure.

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective

signal.org/blog/cellebrite-vul

Microsoft is open sourcing CyberBattleSim Simulator

Microsoft released as open-source the 'CyberBattleSim Python-based toolkit which is an Enterprise Environment Simulator.

securityaffairs.co/wordpress/1?

Setup Raspberry Pi as a WiFi access point - kalitut

A WiFi Access Point is the transition from a wired to a wireless network. There are several ways to setup a WiFi access point. Bridge,router,Repeater

kalitut.com/set-up-raspberry-p

BetterXencrypt: Powershell runtime crypter designed to evade AVs

BetterXencrypt is a better version of Xencrypt.Xencrypt itself is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not FUD

securityonline.info/betterxenc

Show older
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!