Cloud Application Security Best Practices - Detailed Checklist

Here are the top cloud computing application security practices & checklist that every organization should follow to secure a cloud environment.

PowerShell Workflows: The Basics | Scripting Blog

Summary: Windows PowerShell MVP Richard Siddaway talks about the basics of Windows PowerShell 3.0 workflows. Microsoft Scripting Guy, Ed Wilson, is here. Today, we are fortunate to have a guest blog post by Windows PowerShell MVP Richard Siddaway. Richard has written a number of guest Hey,


Kubernetes Goat is "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.


Contribute to chompie1337/SIGRed_RCE_PoC development by creating an account on GitHub.

How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks | Praetorian

Methods by which an attacker can induce a victim user into authenticating using the NT Lan Manager (NTLM) Authentication Protocol.

How to Silver Ticket Attack Active directory

Silver ticket attack for domain persistence in active directory network silver ticket is a forged service ticket using service account hash.

Overcoming Issues Using Custom Python Scripts with Burp Suite Professional | JUMPSEC LABS

The Python Scripter Burp Suite extension can be used to modify requests sent through Burp including those generated by tools such as the active scanner.

ADExplorer on Engagements | TrustedSec

TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.

Google’s FLoC Is a Terrible Idea

Update, April 9, 2021 : We've launched Am I FLoCed, a new site that will tell you whether your Chrome browser has been turned into a guinea pig for Federated Learning of Cohorts or FLoC, Google’s latest targeted advertising experiment.

A short but brilliant read. A trolling masterpiece, and a great example of how security companies are not always the most secure.

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective

Microsoft is open sourcing CyberBattleSim Simulator

Microsoft released as open-source the 'CyberBattleSim Python-based toolkit which is an Enterprise Environment Simulator.

Setup Raspberry Pi as a WiFi access point - kalitut

A WiFi Access Point is the transition from a wired to a wireless network. There are several ways to setup a WiFi access point. Bridge,router,Repeater

BetterXencrypt: Powershell runtime crypter designed to evade AVs

BetterXencrypt is a better version of Xencrypt.Xencrypt itself is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not FUD

Show older

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!