Links
AddNotes about technology, DevOps, programming, and database
Threagile enables teams to execute Agile Threat Modeling as seamless as possible, even highly-integrated into DevSecOps environments.
ASSIGNED (dcbugzillaresponse) in CA Program - CA Certificate Root Program. Last updated 2025-05-27.
A black hole for Internet advertisements. Contribute to pi-hole/pi-hole development by creating an account on GitHub.
macOS and Linux VMs on Apple Silicon to use in CI and other automations - cirruslabs/tart
In this article, you will find a list of open source cybersecurity tools that you'll wish you'd known earlier.
Introduction Netcat is a tool that reads and writes data across network connections, using TCP or UDP protocol. Netcat has been referred to as the TCP/IP / networking swiss army knife. In this article we’ll look at different applications of netcat and how it can be useful in day to day activities of a pentester, security professional, sysadmin etc… If you would like to test out these commands in a lab environment without the need to install them on your own machine have a look at my scenario on CYBERRANGES using the link below.
24/7 Cyberpunk Music Radio. Featuring 320kbps Audio, Live DJs, IRC Chats & Custom Code. Programmed to hack your mind with Dubstep, Synthwave, DnB, EDM, Lo-Fi & Jazz
Open, Multi-Cloud, Multi-Cluster Kubernetes Orchestration - karmada-io/karmada
Ever get miffed reading about a major new Ubuntu release only to learn it doesn't come with the newest Linux kernel? Well, that'll soon be a thing of the
🍏 + 🎯 + 🐍 = Everything you need to query Apple's FindMy network! - malmeloo/FindMy.py
Self-hostable clone of lazydocker for the web. Manage your Docker fleet with ease - will-moss/isaiah
FireHydrant helps you plan, respond, and learn from incidents with AI-enriched automation, retrospectives, and on-call tools—boosting reliability & reducing MTTR.
SSHamble helps security teams validate SSH implementations and test for uncommon but dangerous misconfigurations and software bugs.
Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.