Links
AddRevolt is the chat app that's truly built with you in mind.
Researchers have found that common food ingredients can interact inside immune cells in ways that significantly enhance each other’s anti-inflammatory effects.
Visual Studio Code. Contribute to microsoft/vscode development by creating an account on GitHub.
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc… If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.
Meet your favorite 2FA app. We are an open-source, community-driven, private and simple solution for Internet's biggest threat - security breaches.
June 15, 2020: This blog is out of date. Please refer here for the updated info: https://aws.amazon.com/blogs/aws/new-enhanced-amazon-macie-now-available/ Amazon Macie is a security service that makes it easy for you to discover, classify, and protect sensitive data in Amazon Simple Storage Service (Amazon S3). Macie collects AWS CloudTrail events and Amazon S3 metadata such as permissions […]
a tiling window manager for macos. Contribute to acsandmann/rift development by creating an account on GitHub.
I am stepping down as GitHub CEO to build my next adventure. GitHub is thriving and has a bright future ahead.
Welcome to HYPERHELL, the first 4-Dimensional DOOM-Like of its kind. - danieldugas/HYPERHELL
For a decade, I have been working with AWS and third-party security teams to resolve bucketsquatting / bucketsniping issues in AWS S3. Finally, I am happy to say AWS now has a solution to the problem, and it changes the way you should name your buckets.
In the first of a new series focusing on DevOps monitoring tools, we review the various types of system observability tools.
On February 3, 2026, the I2P anonymity network was flooded with 700,000 hostile nodes in what became one of the most devastating Sybil attacks an anonymity network has ever experienced. The network normally operates with 15,000 to 20,000 active devices. The attackers overwhelmed it by a factor
Pen-testing tool aims to protect network access points against a host of threats.
Minimum Viable Secure Product (MVSP) is a minimum security baseline for enterprise-ready products and services.
Containerization is a Swift package for running Linux containers on macOS. - apple/containerization
Ever wondered what the ocean floor around Australia's coast looks like? A first-of-its-kind survey has uncovered new information about underwater canyons.
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.