search
Join or Log In

Resources

Browse 116 cybersecurity tools tagged with "Resources"

Crafting the InfoSec Playbook

Crafting the InfoSec

language

Threat Intelligence Platforms

Crafting the InfoSec Playbook on SecurityListing: A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

4.8(3)
Infosec4tc CISSP® Exam Preparation Training Course

Infosec4tc CISSP® Exam

language

Certifications

Infosec4tc CISSP® Exam Preparation Training Course on SecurityListing: CISSP exam prep training course covering 8 (ISC)2 knowledge domains

4.7(2)
Cybrary

Cybrary

language

Penetration Testing

Cybrary on SecurityListing: Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

4.7(2)
Naked Security and Sophos News

Naked Security and

language

Threat Intelligence Platforms

Naked Security and Sophos News on SecurityListing: Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

4.7(2)
2024 Data Breach Investigations Report

2024 Data Breach

language

Industry Reports

2024 Data Breach Investigations Report on SecurityListing: Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

4.7(2)
gvfs

gvfs

language

Guides

gvfs on SecurityListing: GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.

4.7(2)
BadCyber

BadCyber

language

Blogs and News

BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

4.7(2)
Hacker101

Hacker101

language

Guides

Hacker101 on SecurityListing: Free online class for web security and hacking

4.7(2)
Crypto Drainer Attack

Crypto Drainer Attack

language

Write-ups

Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.

4.5(3)
GreHack 2018 Conference Videos

GreHack 2018 Conference

language

Guides

GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

4.5(3)
Incident Response & Computer Forensics, Third Edition

Incident Response &

language

Guides

Incident Response & Computer Forensics, Third Edition on SecurityListing: A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.

4.5(1)
Infosec4tc CISM Latest Exam Questions

Infosec4tc CISM Latest

language

Certifications

Infosec4tc CISM Latest Exam Questions on SecurityListing: CISM exam prep with 620 practice questions across 4 online simulators

4.5(1)
Beazley Spotlight on Cyber & Technology Risk 2024

Beazley Spotlight on

language

Risk Assessment

Beazley Spotlight on Cyber & Technology Risk 2024 on SecurityListing: Industry report on cyber and technology risks for 2024

4.5(1)
Incident Response with Threat Intelligence

Incident Response with

language

Threat Hunting

Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

4.5(1)
CybersecNews Weekly

CybersecNews Weekly

language

Blogs and News

CybersecNews Weekly on SecurityListing: A weekly newsletter covering computer security news and tutorials

4.5(1)
Incident Response Techniques for Ransomware Attacks

Incident Response Techniques

language

Guides

Incident Response Techniques for Ransomware Attacks on SecurityListing: A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.

4.5(1)
June's Sophisticated npm Attack Attributed to North Korea

June's Sophisticated npm

language

Industry Reports

June's Sophisticated npm Attack Attributed to North Korea on SecurityListing: A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

4.5(1)
Incident Response Flowchart

Incident Response Flowchart

language

Guides

Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.

4.5(1)
Nmap Cheat Sheet v1.0

Nmap Cheat Sheet

language

Penetration Testing

Nmap Cheat Sheet v1.0 on SecurityListing: A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.

4.5(1)
Cybersecurity News

Cybersecurity News

language

Blogs and News

Cybersecurity News on SecurityListing: A cybersecurity news platform providing updates on threats, vulnerabilities, and breaches.

4.5(1)
PyCon.DE 2018

PyCon.DE 2018

language

Guides

PyCon.DE 2018 on SecurityListing: A conference featuring talks and workshops on various Python-related topics.

4.5(1)
Harden the World

Harden the World

language

Guides

Harden the World on SecurityListing: Community project for developing common guidelines and best practices for secure configurations.

4.5(1)
Cyberscoop

Cyberscoop

language

Blogs and News

Cyberscoop on SecurityListing: CyberScoop is a leading media brand providing news and event coverage to top cybersecurity leaders through its website, newsletter, events, radio, and TV.

4.5(1)
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives

Basic Linux Privilege

language

Guides

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives on SecurityListing: A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

4.5(1)
RuCTFE 2020 Conference

RuCTFE 2020 Conference

language

Blogs and News

RuCTFE 2020 Conference on SecurityListing: Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

4.5(1)
Gh0st Networks News Feed

Gh0st Networks News

language

VPN

Gh0st Networks News Feed on SecurityListing: Stay updated on Gh0st Networks lab activities, CTF challenges, and join the slack team for support.

4.5(1)
Majestic Million CSV

Majestic Million CSV

language

Industry Reports

Majestic Million CSV on SecurityListing: A daily updated list of the top 1 million websites in the world, ordered by referring subnets.

4.5(1)
McAfee Blogs

McAfee Blogs

language

Blogs and News

McAfee Blogs on SecurityListing: Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.

4.5(1)
MUlliNER.ORG/NET/DE

MUlliNER.ORG/NET/DE

language

Blogs and News

MUlliNER.ORG/NET/DE on SecurityListing: Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.

4.5(1)
Graham Cluley

Graham Cluley

language

Blogs and News

Graham Cluley on SecurityListing: Graham Cluley offers expert cybersecurity insights and commentary through various media including podcasts and speaking engagements.

4.5(1)
Guide to Ethical Hacking

Guide to Ethical

language

Offensive Security

Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

4.5(1)
Open Security Training

Open Security Training

language

Certifications

Open Security Training on SecurityListing: Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.

4.5(1)
Operator Handbook: Red Team + OSINT + Blue Team Reference

Operator Handbook: Red

language

Guides

Operator Handbook: Red Team + OSINT + Blue Team Reference on SecurityListing: A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.

4.5(1)
Pivoting Cheat Sheet

Pivoting Cheat Sheet

language

Penetration Testing

Pivoting Cheat Sheet on SecurityListing: A pocket reference guide providing various options for navigating and pivoting through different environments and situations.

4.5(1)
CPO Magazine

CPO Magazine

language

Blogs and News

CPO Magazine on SecurityListing: CPO Magazine is a cybersecurity news and information website providing articles, news, and insights on cybersecurity, privacy, and technology.

4.5(1)
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach

Dr. Fu's Security

language

Guides

Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

4.5(1)
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Intelligence-Driven Computer Network

language

Threat Intelligence Platforms

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains on SecurityListing: A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

4.5(1)
Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

language

Digital Forensics and Incident Response

Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

4.5(1)
Google Cloud Incident Response Cheat Sheet

Google Cloud Incident

language

Threat Hunting

Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

4.5(1)
Cybersecurity Ventures

Cybersecurity Ventures

language

Industry Reports

Cybersecurity Ventures on SecurityListing: Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.

4.5(1)
Detection Digest

Detection Digest

language

Blogs and News

Detection Digest on SecurityListing: A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.

4.5(1)
GBHackers

GBHackers

language

Blogs and News

GBHackers on SecurityListing: GBHackers offers up-to-date cybersecurity news and insights, focusing on threats, vulnerabilities, and innovative defense strategies.

4.5(1)
Krebs on Security

Krebs on Security

language

Blogs and News

Krebs on Security on SecurityListing: Brian Krebs is a cybersecurity journalist and blogger, known for his in-depth reporting on cybercrime and cybersecurity issues.

4.3(2)
Metasploit Unleashed

Metasploit Unleashed

language

Penetration Testing

Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

4.3(2)
FreeBuf

FreeBuf

language

Blogs and News

FreeBuf on SecurityListing: Cybersecurity industry portal offering articles, tools, and resources.

4.3(2)
Hardwear.io Conference 2018

Hardwear.io Conference 2018

language

Guides

Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

4.3(2)
Exposing Security Observability Gaps in AWS Native Security Tooling

Exposing Security Observability

language

Write-ups

Exposing Security Observability Gaps in AWS Native Security Tooling on SecurityListing: A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

4.3(2)
APFS File System Format Reference Sheet

APFS File System

language

Cheat Sheets

APFS File System Format Reference Sheet on SecurityListing: APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.

4.3(2)
F-Secure Blog

F-Secure Blog

language

Blogs and News

F-Secure Blog on SecurityListing: F-Secure Blog provides in-depth articles and research on cybersecurity threats and best practices.

4.3(2)
Hardening OpenLDAP on Linux with AppArmor and systemd

Hardening OpenLDAP on

language

Guides

Hardening OpenLDAP on Linux with AppArmor and systemd on SecurityListing: A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.

4.3(2)
InfoRisk Today

InfoRisk Today

language

Blogs and News

InfoRisk Today on SecurityListing: InfoRisk Today is a key resource for news and insights on information risk management and cybersecurity education.

4.3(2)
Google Security Blog

Google Security Blog

language

Blogs and News

Google Security Blog on SecurityListing: Google's Security Blog provides the latest news and insights on security and safety on the Internet.

4.3(2)
ARM Assembly Tutorial Series

ARM Assembly Tutorial

language

Guides

ARM Assembly Tutorial Series on SecurityListing: Comprehensive tutorial series on ARM Assembly covering various topics.

4.2(3)
DistroWatch.com

DistroWatch.com

language

Guides

DistroWatch.com on SecurityListing: A website for information on Linux and BSD distributions.

4.2(3)
PHP: The Right Way

PHP: The Right

language

Guides

PHP: The Right Way on SecurityListing: Comprehensive guide on best practices for PHP development.

4.2(3)
Paul's Security Weekly

Paul's Security Weekly

language

Blogs and News

Paul's Security Weekly on SecurityListing: A leading cybersecurity podcast network offering in-depth discussions on current security trends and insights.

3.9(2)
John the Ripper Cheat Sheet

John the Ripper

language

Cheat Sheets

John the Ripper Cheat Sheet on SecurityListing: A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.

3.9(2)
Emulate Raspberry Pi with QEMU

Emulate Raspberry Pi

language

Guides

Emulate Raspberry Pi with QEMU on SecurityListing: Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.

3.8(1)
Bad Sector Labs Blog - Last Week in Security (LWiS)

Bad Sector Labs

language

Blogs and News

Bad Sector Labs Blog - Last Week in Security (LWiS) on SecurityListing: Weekly summary of cybersecurity news and exploits.

3.8(1)
Advisory Week

Advisory Week

language

Blogs and News

Advisory Week on SecurityListing: Weekly security newsletter with advisories from major software vendors

3.8(1)
CSO Online

CSO Online

language

Blogs and News

CSO Online on SecurityListing: A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.

3.8(1)
PowerShell Cheat Sheet v. 4.0

PowerShell Cheat Sheet

language

Penetration Testing

PowerShell Cheat Sheet v. 4.0 on SecurityListing: A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.

3.8(1)
ENISA Training Resources

ENISA Training Resources

language

Guides

ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.

3.8(1)
Professor Messer IT Certification Training

Professor Messer IT

language

Certifications

Professor Messer IT Certification Training on SecurityListing: IT certification training for CompTIA exams with free resources.

3.8(1)
Enigma

Enigma

language

Guides

Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

3.8(1)
OpenBSD Manual Page Server

OpenBSD Manual Page

language

Guides

OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name

3.8(1)
Intrusion Discovery Cheat Sheet v2.0

Intrusion Discovery Cheat

language

Cheat Sheets

Intrusion Discovery Cheat Sheet v2.0 on SecurityListing: A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.

3.8(1)
HTB Academy

HTB Academy

language

Threat Intelligence Platforms

HTB Academy on SecurityListing: HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

3.8(1)
INE Security

INE Security

language

Threat Hunting

INE Security on SecurityListing: INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

3.8(1)
Linux Detection Engineering -  A primer on persistence mechanisms

Linux Detection Engineering

language

Threat Hunting

Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

3.8(1)
Universal Book Links

Universal Book Links

language

Guides

Universal Book Links on SecurityListing: Find books at your favorite store and stay updated on new features with Universal Book Links.

SANS

SANS

language

Certifications

SANS on SecurityListing: SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs

SSH Tunnelling to

language

Penetration Testing

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs on SecurityListing: A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

Paving The Way to DA - Complete Post (Pt 1,2 & 3)

Paving The Way

language

Offensive Security

Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.

Resmo's Cybersecurity Blog

Resmo's Cybersecurity Blog

language

Blogs and News

Resmo's Cybersecurity Blog on SecurityListing: Resmo's Cybersecurity Blog provides expert insights and tools for securing SaaS applications and cloud documents for IT and security teams.

Reverse Engineering for Beginners

Reverse Engineering for

language

Guides

Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

The Hacker News

The Hacker News

language

Offensive Security

The Hacker News on SecurityListing: The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.

Security Guide Red Hat Enterprise Linux 7

Security Guide Red

language

Guides

Security Guide Red Hat Enterprise Linux 7 on SecurityListing: The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.

Security Affairs

Security Affairs

language

Blogs and News

Security Affairs on SecurityListing: Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.

Security Driven .NET

Security Driven .NET

language

Guides

Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

Securelist by Kaspersky Lab

Securelist by Kaspersky

language

Blogs and News

Securelist by Kaspersky Lab on SecurityListing: Securelist by Kaspersky Lab provides in-depth cybersecurity research and solutions across multiple industries.

Web Application Exploits and Defenses

Web Application Exploits

language

Guides

Web Application Exploits and Defenses on SecurityListing: An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.

SMB Access from Linux Cheat Sheet

SMB Access from

language

Cheat Sheets

SMB Access from Linux Cheat Sheet on SecurityListing: A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.

The Anatomy of a Malicious Package

The Anatomy of

language

Guides

The Anatomy of a Malicious Package on SecurityListing: Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.

Ramblings from Jessie: Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs

Ramblings from Jessie:

language

Container Security

Ramblings from Jessie: Setting the Record Straight: containers vs. Zones vs. Jails vs. VMs on SecurityListing: A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

Teaching Security

Teaching Security

language

Guides

Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

The SOC Academy (VirusTotal)

The SOC Academy

language

Certifications

The SOC Academy (VirusTotal) on SecurityListing: The SOC Academy offers official VirusTotal certification courses to help cybersecurity professionals maximize its functionalities and advance their careers.

The State of Security by Tripwire

The State of

language

Offensive Security

The State of Security by Tripwire on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming activities.

SP 800-82, Guide to Industrial Control Systems (ICS) Security

SP 800-82, Guide

language

Guides

SP 800-82, Guide to Industrial Control Systems (ICS) Security on SecurityListing: A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

The Practice of Network Security Monitoring

The Practice of

language

Threat Intelligence Platforms

The Practice of Network Security Monitoring on SecurityListing: A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

Windows and Linux Terminals & Command Lines

Windows and Linux

language

Cheat Sheets

Windows and Linux Terminals & Command Lines on SecurityListing: A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.

Windows Command Line Cheat Sheet

Windows Command Line

language

Penetration Testing

Windows Command Line Cheat Sheet on SecurityListing: A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.

YouTube

YouTube

language

Guides

YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

Infosec4TC Cyber Security Specialist

Infosec4TC Cyber Security

language

Penetration Testing

Infosec4TC Cyber Security Specialist on SecurityListing: Cybersecurity educational book covering network, web app, cloud, and mobile security

InfoSec4TC Cyber Security Courses

InfoSec4TC Cyber Security

language

Penetration Testing

InfoSec4TC Cyber Security Courses on SecurityListing: Online cybersecurity training platform with 150+ courses and hands-on labs

SQL Injection Cheat Sheet

SQL Injection Cheat

language

Database Security

SQL Injection Cheat Sheet on SecurityListing: A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

Reversing With Lena (Tutorials)

Reversing With Lena

language

Guides

Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.

SteelCon 2018

SteelCon 2018

language

Industry Reports

SteelCon 2018 on SecurityListing: Cybersecurity conference featuring talks on various hacking topics by industry experts.

Mandos Cyber Strategy OS

Mandos Cyber Strategy

language

Guides

Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs

Security Trainings

Security Trainings

language

Guides

Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

Password Storage - OWASP Cheat Sheet Series

Password Storage -

language

Cheat Sheets

Password Storage - OWASP Cheat Sheet Series on SecurityListing: Guidelines and best practices for securely storing passwords.

Mandos Brief

Mandos Brief

language

Threat Intelligence Platforms

Mandos Brief on SecurityListing: Weekly cybersecurity newsletter covering security incidents, AI, and leadership

Coursera Together: Free online learning during COVID-19

Coursera Together: Free

language

Certifications

Coursera Together: Free online learning during COVID-19 on SecurityListing: Coursera offers free online learning resources and courses during the COVID-19 pandemic.

NERC Alerts

NERC Alerts

language

Blogs and News

NERC Alerts on SecurityListing: Receive important notifications and updates related to North American electric grid security.

Securing NFS Red Hat Enterprise Linux 7

Securing NFS Red

language

Guides

Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7

Security Tips - Apache HTTP Server Version 2.4

Security Tips -

language

Guides

Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.

Twitter's Vine Source Code Dump

Twitter's Vine Source

language

Penetration Testing

Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

The Absurdly Underestimated Dangers of CSV Injection

The Absurdly Underestimated

language

Blogs and News

The Absurdly Underestimated Dangers of CSV Injection on SecurityListing: A blog post discussing the often overlooked dangers of CSV injection in applications.

vi Editor Cheat Sheet

vi Editor Cheat

language

Cheat Sheets

vi Editor Cheat Sheet on SecurityListing: A quick reference guide for the VI editor, covering commands and modes.

Windows Commands Abused by Attackers

Windows Commands Abused

language

Guides

Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment

Security Week

Security Week

language

Blogs and News

Security Week on SecurityListing: A general cybersecurity news site providing discussions and news on various cybersecurity topics.

Mandos Cybersecurity Insights

Mandos Cybersecurity Insights

language

Blogs and News

Mandos Cybersecurity Insights on SecurityListing: Blog providing cybersecurity, AI security, and leadership insights for CISOs

Ryan Stillions: On TTPs

Ryan Stillions: On

language

Threat Intelligence Platforms

Ryan Stillions: On TTPs on SecurityListing: In-depth analysis of real-world attacks and threat tactics

SANS Institute

SANS Institute

language

Certifications

SANS Institute on SecurityListing: Leading provider of free cybersecurity training resources

SANS Cyber Aces

SANS Cyber Aces

language

Certifications

SANS Cyber Aces on SecurityListing: Free cyber security training and resources for career development.

Schneier on Security

Schneier on Security

language

Blogs and News

Schneier on Security on SecurityListing: Schneier on Security provides expert analysis and commentary on a wide range of security issues.