Skip to content

Latest commit

 

History

History
1368 lines (1152 loc) · 82.1 KB

security.md

File metadata and controls

1368 lines (1152 loc) · 82.1 KB

Bookmarks tagged [security]

https://hasanuddin-muhamad15.medium.com/create-ipsec-tunnel-between-google-cloud-platform-and-mikrot...

connect


https://snyk.io/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/

The following article provides production-grade guidelines for building optimized and secure Node.js Docker images. You’ll find it helpful regardless of the Node.js application you aim to build. This ...


https://threatdragon.org/

Threat Dragon is a free, open-source threat modeling tool from OWASP. It can be used as a standalone desktop app for Windows and MacOS (Linux coming soon) or as a web application. The desktop app is g...


https://falco.org/

Falco, the cloud-native runtime security project, is the de facto Kubernetes threat detection engine


https://gchq.github.io/CyberChef/

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis


https://beefproject.com/

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.


https://owasp.org/www-project-api-security/

API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).


https://thecodebarbarian.wordpress.com/2014/09/04/defending-against-query-selector-injection-attacks...

This article shows two simple ways to protect against the attacks described in Hacking NodeJS and MongoDB. One of the them is by...


https://cwe.mitre.org/index.html

CWE™ is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigat...


https://www.zaproxy.org/

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find s...


https://github.com/dropbox/zxcvbn

zxcvbn is a password strength estimator inspired by password crackers. Through pattern matching and conservative estimation, it recognizes and weighs 30k common passwords, common names and surnames ...


https://auth0.com/blog/what-is-and-how-does-single-sign-on-work/

In this post, we will study how SSO authentication is implemented for the web.


https://www.ssl.com/faqs/what-is-an-x-509-certificate/

X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations.

Firs...


https://www.ssl.com/guide/pem-der-crt-and-cer-x-509-encodings-and-conversions/

This guide points out the major differences between PEM and DER files and common filename extensions associated with them. It also provides visual examples of each encoding, and illustrates some commo...


https://en.wikipedia.org/wiki/Eavesdropping

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.


https://www.sciencedirect.com/topics/computer-science/entropy

Entropy, in cyber security, is a measure of the randomness or diversity of a data-generating function. Data with full entropy is completely random and no meaningful patterns can be found. Low entr...


https://mitmproxy.org/

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.


https://www.youtube.com/watch?v=g_aVPdwBTfw

In this talk you'll learn about the latest developments with the OAuth​ and OIDC​ specs directly from the standards group. The latest additions to the specs enable richer experiences and better secu...


https://www.softwaresecured.com/what-do-sast-dast-iast-and-rasp-mean-to-developers/

It’s estimated that 90 percent of security incidents result from attackers exploiting known software bugs. Needless to say, squashing those bugs in the development phase of software could reduce the i...


https://owasp.org/www-community/attacks/csrf

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. With a little help of social engineeri...


https://www.globalsign.com/en/blog/what-is-hsts-and-how-do-i-use-it

HTTP Strict Transport Security (HSTS) is a web server directive that informs user agents and web browsers how to handle its connection through a response header sent at the very beginning and back to ...


https://www.microsoft.com/en-us/securityengineering/sdl

The Microsoft SDL introduces security and privacy considerations throughout all phases of the development process, helping developers build highly secure software, address security compliance requirem...


https://owasp.org/www-project-dependency-check/

Dependency-Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project’s dependencies. It does this by determining if ther...


https://web.dev/same-origin-policy/

The same-origin policy is a browser security feature that restricts how documents and scripts on one origin can interact with resources on another origin.


https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy

The same-origin policy is a critical security mechanism that restricts how a document or script loaded from one origin can interact with a resource from another origin. It helps isolate potentially ma...


https://nodesource.com/blog/nine-security-tips-to-keep-express-from-getting-pwned

Security is really hard to get right. There are so many different factors to consider, countless different ways to break an application.

This is just as true with Express applications as it is with a...


https://helmetjs.github.io/

Helmet helps you secure your Express apps by setting various HTTP headers. It’s not a silver bullet, but it can help!


https://github.com/vasanthk/web-security-basics

Web security concepts. Contribute to vasanthk/web-security-basics development by creating an account on GitHub.


https://www.pingidentity.com/en/company/blog/posts/2019/jwt-security-nobody-talks-about.html

In spite of the popularity of JWTs, their security properties are often misunderstood. To ensure the security of the app, you must fully consider asymmetric signatures, validation beyond signatures, c...


https://haacked.com/archive/2009/04/02/anatomy-of-csrf-attack.aspx/

A Cross-site request forgery attack, also known as CSRF or XSRF (pronounced sea-surf) is the less well known, but equally dangerous, cousin of the Cross Site Scripting (XSS) attack. Yeah, they come fr...


https://blog.atomist.com/security-of-docker-kubernetes/

While not an exhaustive list of suggestions for hardening your Docker containers & Kubernetes clusters, it's a starting point to ensure tighten security.


https://auth0.com/blog/react-tutorial-building-and-securing-your-first-app/

Introduction to React and its components and routers. Tutorial of how to build a simple Q&A React app - secure backend API with Node.js and Express.


https://secure.wphackedhelp.com/blog/wordpress-malware-redirect-hack-cleanup/

Detect and Clean Malicious Redirects Your site is redirecting due to the presence of infected codes added by hackers. To remove these spam redirects, one has to find malicious codes or malware and rem...


https://sysdig.com/blog/kubernetes-security-guide/

RBAC, TLS, Security policy, Network policy, etc.


http://scotch.io/tutorials/google-cloud-platform-iii-handling-sensitive-data-in-a-docker-application...

Dealing with sensitive data such as tokens, API keys and passwords In A Docker Application with Kubernetes Secrets


http://linoxide.com/containers/create-use-kubernetes-secrets/

In this article we cover how to create, delete and use secrets in kubernetes. We have included secrets usability as in volumes and environment variables


https://dev.to/petermbenjamin/kubernetes-security-best-practices-hlk

Exploring security best practices around Kubernetes


https://testdriven.io/running-vault-and-consul-on-kubernetes

In the following tutorial we’ll walk you through how to use Minikube to run Kubernetes locally and then we'll run Hashicorp's Vault and Consul on K8s.


http://blog.aquasec.com/topic/kubernetes

Kubernetes Security | The Container and serverless security blog: container security, Kubernetes Security, Docker Security, DevOps Tools, DevSecOps, image scanning, Continuous integration, Runtime pro...


https://github.com/heptio/authenticator

A tool for using AWS IAM credentials to authenticate to a Kubernetes cluster


[Calico Network Policy (from Tigera)](from Tigera)

from Tigera

Widely adopted open source implementation unifying Kubernetes Network Policy and Istio Application Policy.


https://github.com/coreos/dex

OpenID and OAuth for Kubernetes


https://github.com/appscode/guard

Authenticaton webhook server with support for Github, Gitlab, Google, Azure and LDAP (AD) as identity providers.


https://github.com/uswitch/kiam

Allows cluster users to associate AWS IAM roles to Pods.


https://github.com/aquasecurity/kube-bench

The Kubernetes Bench for Security is a Go application that checks whether Kubernetes is deployed according to security best practices.


https://github.com/aquasecurity/kube-hunter

Hunt for security weaknesses in Kubernetes clusters.


https://github.com/sysdiglabs/kube-psp-advisor

Help building an adaptive and fine-grained pod security policy.


https://github.com/jtblin/kube2iam

Provides different AWS IAM roles for pods running on Kubernetes


http://kubesec.io/

kubesec.io


http://www.pomerium.io/

a zero-trust identity-aware access proxy inspired by BeyondCorp.


https://github.com/corneliusweig/rakkess

Kubectl plugin to show an access matrix for all available resources.


http://www.sysdig.org/falco/

Have visibility into the behavior of your containers & applications with Falco, container native runtime security.


http://www.sysdig.com/product/secure

Container Security that brings together image scanning, run-time protection, and deep forensics to identify vulnerabilities, block threats, enforce compliance, and audit activity across your microserv...


https://www.tigera.io/tigera-secure-ce/


https://www.tigera.io/tigera-secure-ee/


http://github.com/aporeto-inc/trireme-kubernetes

Aporeto integration with Kubernetes Network Policies - aporeto-inc/trireme-kubernetes


http://www.twistlock.com/

Twistlock is the first comprehensive cloud native cybersecurity platform for hosts, containers, and serverless setups across the DevSecOps lifecycle.


https://github.com/hlandau/acme

ACME (Let's Encrypt) client tool with automatic renewal.


https://github.com/cossacklabs/acra

Network encryption proxy to protect database-based applications from data leaks: strong selective encryption, SQL injections prevention, intrusion detection system.


https://github.com/raja/argon2pw

Argon2 password hash generation with constant-time password comparison.


https://godoc.org/golang.org/x/crypto/acme/autocert

Auto provision Let's Encrypt certificates and start a TLS server.


https://github.com/jaredfolkins/badactor

In-memory, application-driven jailer built in the spirit of fail2ban.


https://github.com/Ullaakut/cameradar

Tool and library to remotely hack RTSP streams from surveillance cameras.


https://github.com/mvmaasakkers/certificates

An opinionated tool for generating tls certificates.


https://github.com/hillu/go-yara

Go Bindings for YARA, the "pattern matching swiss knife for malware researchers (and everyone else)".


https://github.com/dwin/goArgonPass

Argon2 password hash and verification designed to be compatible with existing Python and PHP implementations.


https://github.com/dwin/goSecretBoxPassword

A probably paranoid package for securely hashing and encrypting passwords.


https://bitbucket.org/vahidi/interpol

Rule-based data generator for fuzzing and penetration testing.


https://github.com/khezen/jwc

JSON Web Cryptography library.


https://github.com/xenolf/lego

Pure Go ACME client library and CLI tool (for use with Let's Encrypt).


https://github.com/awnumar/memguard

A pure Go library for handling sensitive values in memory.


https://github.com/kevinburke/nacl

Go implementation of the NaCL set of API's.


https://github.com/hlandau/passlib

Futureproof password hashing library.


https://github.com/unrolled/secure

HTTP middleware for Go that facilitates some quick security wins.


https://github.com/elithrar/simple-scrypt

Scrypt package with a simple, obvious API and automatic cost calibration built-in.


https://github.com/ssh-vault/ssh-vault

encrypt/decrypt using ssh keys.


https://github.com/adrianosela/sslmgr

SSL certificates made easy with a high level wrapper around acme/autocert.


http://beefproject.com

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.


https://github.com/rubysec/bundler-audit

Patch-level security verification for Bundler.


https://github.com/michenriksen/gitrob

Reconnaissance tool for GitHub organizations.


https://github.com/rapid7/metasploit-framework

World's most used penetration testing software.


https://github.com/kickstarter/rack-attack

Rack middleware for blocking & throttling abusive requests.


https://github.com/sinatra/rack-protection

Rack middleware for protecting against typical Web attacks.


https://github.com/twitter/secureheaders

Automatically apply several headers that are related to security, including: Content Security Policy (CSP), HTTP Strict Transport Security (HSTS), X-Frame-Options (XFO), X-XSS-Protection, X-Content-Ty...


https://github.com/cure53/DOMPurify

A DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG.


https://github.com/leizongmin/js-xss

Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist.


https://github.com/yahoo/xss-filters

Secure XSS Filters by Yahoo


https://github.com/Snyk/snyk

CLI and build-time tool to find & fix vulnerable npm dependencies.


https://github.com/simonepri/upash

Unified API for all password hashing algorithms.


https://github.com/apps/guardrails

GitHub app that provides security feedback in pull requests.


https://shiro.apache.org

Performs authentication, authorization, cryptography and session management.


https://www.bouncycastle.org/java.html

All-purpose cryptographic library and JCA provider offering a wide range of functions, from basic helpers to PGP/SMIME operations.


https://cryptomator.org

Multiplatform, transparent, client-side encryption of files in the cloud.


https://github.com/hdiv/hdiv

Runtime application that repels application security risks included in the OWASP Top 10, including SQL injection, cross-site scripting, cross-site request forgery, data tampering, and brute force atta...


https://github.com/jwtk/jjwt

JSON web token for Java and Android.


https://github.com/auth0/jwks-rsa-java

JSON Web Key Set parser.


https://github.com/abstractj/kalium

Binding for the Networking and Cryptography (NaCl) library.


https://keycloak.jboss.org

Integrated SSO and IDM for browser apps and RESTful web services.


https://github.com/google/keyczar

Easy-to-use, safe encryption framework with key versioning.


https://github.com/square/keywhiz

System for distributing and managing secrets.


https://github.com/GoSimpleLLC/nbvcxz

Advanced password strength estimation.


http://oaccframework.org

Provides permission-based authorization services.


https://github.com/pac4j/pac4j

Security engine.


http://picketlink.org

Umbrella project for security and identity management.


https://github.com/tersesystems/securitybuilder

Fluent Builder API for JCA and JSSE classes and especially X.509 certificates.


https://github.com/cossacklabs/themis

Multi-platform high-level cryptographic library provides easy-to-use encryption for protecting sensitive data: secure messaging with forward secrecy, secure data storage (AES256GCM); suits for buildin...


http://github.com/google/tink

Provides a simple and misuse-proof API for common cryptographic tasks.


https://www.vaultproject.io

Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, user...


https://github.com/paragonie/awesome-appsec#readme

A curated list of resources for learning about application security - paragonie/awesome-appsec


https://github.com/sbilly/awesome-security#readme

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security. - sbilly/awesome-security


https://github.com/apsdehal/awesome-ctf#readme

A curated list of CTF frameworks, libraries, resources and softwares - apsdehal/awesome-ctf


https://github.com/rshipp/awesome-malware-analysis#readme

A curated list of awesome malware analysis tools and resources. - rshipp/awesome-malware-analysis


https://github.com/ashishb/android-security-awesome#readme

A collection of android security related resources - ashishb/android-security-awesome


https://github.com/carpedm20/awesome-hacking#readme

A curated list of awesome Hacking tutorials, tools and resources - carpedm20/awesome-hacking


https://github.com/paralax/awesome-honeypots#readme

an awesome list of honeypot resources. Contribute to paralax/awesome-honeypots development by creating an account on GitHub.


https://github.com/meirwah/awesome-incident-response#readme

A curated list of tools for incident response. Contribute to meirwah/awesome-incident-response development by creating an account on GitHub.


https://github.com/jaredthecoder/awesome-vehicle-security#readme

🚗 A curated list of resources for learning about vehicle security and car hacking. - jaredthecoder/awesome-vehicle-security


https://github.com/qazbnm456/awesome-web-security#readme

🐶 A curated list of Web Security materials and resources. - qazbnm456/awesome-web-security


https://github.com/meitar/awesome-lockpicking#readme

🔓😎 A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys. - meitar/awesome-lockpicking


https://github.com/meitar/awesome-cybersecurity-blueteam#readme

💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams. - meitar/awesome-cybersecurity-blueteam


https://www.infoq.com/articles/istio-security-mtls-jwt

Istio attempts to solve some particularly difficult challenges when running applications in a cloud platform. This article explores the security features of Istio: mTLS and authorization.

Key Tak...


https://www.youtube.com/watch?v=996OiexHze0

Developer Advocate Nate Barbettini breaks down OpenID and OAuth 2.0 in Plain English Find Nate's slides here: [https://speakerdeck.com/nbarbettini/oauth-and-openid-connect-in-plain-english](https://sp...


https://github.com/docker/docker-bench-security

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. - docker/docker-bench-security


https://github.com/lirantal/awesome-nodejs-security#readme

Awesome Node.js Security resources. Contribute to lirantal/awesome-nodejs-security development by creating an account on GitHub.


https://www.youtube.com/watch?v=tj03NRM6SP8

Nice introduction (just introduction) to oauth, openid-connect, possible use for securing microservices...


https://nordicapis.com/why-api-keys-are-not-enough/

Youtube video

API Keys are not security. By design they lack granular control, and there are many vulnerabilities at stake: applications that contain ke...


https://owasp.org/www-project-top-ten/

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a va...


https://en.wikipedia.org/wiki/Public_key_fingerprint

In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public k...


https://www.amazon.com/dp/1119523265/ref=cm_sw_r_cp_apa_EobmBbVYKBPT0


https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen

What happens if a JSON Web Token is stolen or compromised? What are the security considerations you need to understand? In this post, we'll look at what JWTs are, and what happens when they're stolen ...


https://tools.ietf.org/html/rfc5280

This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet.


http://www.crypto-it.net/eng/index.html

All you need to know about cryptography. Master ciphers and IT security with Crypto-IT website.


https://arxiv.org/pdf/1705.09404.pdf

Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information diss...


https://blog.securitycompass.com/publish-subscribe-threat-modeling-11add54f1d07

The decoupled multicast nature of many-to-many communications in the Publish-Subscribe pattern introduces the system components to threats such as unwanted traffic flooding, node compromise attacks, d...


http://niels.nu/blog/2016/java-rsa.html

Shows with Java examples the following:


https://developer.mozilla.org/en-US/docs/Web/Security

The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.


https://www.comparitech.com/blog/information-security/common-phishing-scams-how-to-avoid/

Phishing for data continues to be a problem, but it's no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

  • 📆 published on: 2018-04-28
  • tags: security

https://www.youtube.com/watch?v=LPxeYtMDxl0&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7&index=4

What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?

In this video, I will talk about two trust models: Hierarchical Trust Model and dist...


https://www.youtube.com/watch?v=sEkw8ZcxtFk&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7&index=5

What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used...


https://www.youtube.com/watch?v=TmA2QWSLSPg&list=PLSNNzog5eydtwsdT__t5WtRgvpfMzpTc7

A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial tran...


https://stackoverflow.com/questions/18257185/how-does-a-public-key-verify-a-signature/39210591#39210...

Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)

https://hashids.org/

Generate short unique ids from integers. Use in url shortening or as unique ids.


https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-secur...

Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving securi...


https://www.agileit.com/news/data-encryption-methods-secure-cloud/

The cloud enables you to retrieve your files from anywhere with Internet access. Discover modern data encryption methods and more data security tips.


https://blog.cloudsecurityalliance.org/

Cloud Security Alliance Industry Blog


http://www.passportjs.org/

Simple, unobtrusive authentication for Node.js


https://en.wikipedia.org/wiki/Role-based_access_control

In computer systems security, role-based access control (RBAC is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employee...


https://www.splunk.com/pdfs/ebooks/the-essential-guide-to-machine-data.pdf

Whatever you call it, machine data is one of the most underused and undervalued assets of any organization. And, unfortunately, it’s usually kept for some minimum amount of time before being tossed ou...


https://www.sans.org/reading-room/whitepapers/cloud/introduction-securing-cloud-environment-34052

While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. As more data moves from centrally located server storage to the Cloud,...


https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Best_Practices.pdf

This whitepaper is intended for existing and potential customers who are designing the security infrastructure and configuration for applications running in Amazon Web Services (AWS). It provides secu...


https://en.wikipedia.org/wiki/Recovery_point_objective

A recovery point objective (RPO) is defined by business continuity planning. It is the maximum targeted period in which data might be lost from an IT service due to a major incident. The RPO gives...


https://en.wikipedia.org/wiki/Recovery_time_objective

The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unaccepta...


http://travistidwell.com/jsencrypt/demo/

Online RSA key generation utility


https://hash.online-convert.com/sha256-generator

Calculate a SHA-256 hash with this free online converter. Additionally create a checksum of your file.


https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

Digital signatures, a type of eSignature based on PKI standards, allow users to sign documents in compliance with country/industry-specific regulations.


https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of you...


https://msdn.microsoft.com/en-us/library/ee823878(v=cs.20).aspx

Nice explanation of the STRIDE model.


https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.


https://en.wikipedia.org/wiki/STRIDE_(security)

STRIDE is a threat classification model developed by Microsoft for thinking about computer security threats.[1] It provides a mnemonic for security threats in six categories.

The threat categories ar...


https://en.wikipedia.org/wiki/Ransomware

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may l...


https://en.wikipedia.org/wiki/Spoofing_attack

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.


https://www.youtube.com/watch?v=wXB-V_Keiu8

RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation and time complexity.


https://en.wikipedia.org/wiki/Virtual_LAN

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). VLANs work by applying tags to network packets and handling th...


https://www.youtube.com/watch?v=AQDCe585Lnc

How does public-key cryptography work? What is a private key and a public key? Why is asymmetric encryption different from symmetric encryption? I'll explain this in plain English... Nice explanation


https://haacked.com/archive/2009/06/25/json-hijacking.aspx/

A while back I wrote about a subtle JSON vulnerability which could result in the disclosure of sensitive information. That particular exploit involved overriding the JavaScript Array constructor to di...


https://www.agwa.name/projects/git-crypt/

git-crypt enables transparent encryption and decryption of files in a git repository. Files which you choose to protect are encrypted when committed, and decrypted when checked out. git-crypt lets...


https://nemethgergely.com/building-secure-javascript-applications/

Tips and best practices on how to build secure JavaScript applications


https://github.com/sbilly/awesome-security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.


https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web applicati...


http://git-secret.io/

A bash-tool to store your private data inside a git repository.


https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet

This article provides a simple positive model for preventing XSS using output escaping/encoding properly. While there are a huge number of...


https://nemethgergely.com/nodejs-security-overview/

A look at where we are with Node.js security, and what you can do to keep your customer's data safe


https://medium.com/@ryanchenkie_40935/angular-authentication-using-the-http-client-and-http-intercep...

Let’s take a look at how to use Angular’s HttpInterceptor interface to make authenticated HTTP requests. It also suggest how to react in case the token expired.


https://auth0.com/blog/5-steps-to-add-modern-authentication-to-legacy-apps-using-jwts/

Conventional authentication is challenging for today's web applications. Learn about the reasons and how to use JSON Web Tokens (JWT) for modern authentication.


https://blog.angular-university.io/angular-jwt/

A Step-by-Step Guide for learning JSON Web Tokens, including signatures, single page web application User Authentication and Session Management.


https://nodejs.org/api/crypto.html

The crypto module provides cryptographic functionality that includes a set of wrappers for OpenSSL's hash, HMAC, cipher, decipher, sign and verify functions.


http://www.xorbin.com/tools/sha256-hash-calculator

Easily calculate SHA-256 hash online with free Xorbin.com online SHA-256 generator! SHA-256 is used used for mining Bitcoin.


https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide

The Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the devel...


[Journey into cryptography | Computer science | Computing |

Khan Academy](https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt) https://www.khanacademy.org/computing/computer-science/cryptography#modern-crypt

Modern cryptography

A new problem emerges in the 20th century. What happens if Alice and Bob can never meet to share a key in the first place?


https://www.owasp.org/index.php/OWASP_Secure_Headers_Project

OWASP Secure Headers Project involves setting headers from the server is easy and often doesn't require any code changes. Once set, they can restrict modern browsers from running into easily preventab...


http://librebooks.org/security-in-a-box/


http://librebooks.org/physical-hacking-techniques/


http://librebooks.org/secure-wireless-networks-for-home-users/


http://fussy.web.fc2.com/algo/algo9-1.htm

Fussy (2), (3), (4)


http://www.ipa.go.jp/files/000017316.pdf

独立行政法人 情報処理推進機構(IPA) (PDF)


http://www.ipa.go.jp/files/000017320.pdf

独立行政法人 情報処理推進機構(IPA) (PDF)


http://www.mew.org/~kazu/doc/rsa.html

山本和彦


http://x68000.q-e-d.net/~68user/net/

68user


http://www.ipa.go.jp/security/awareness/vendor/programmingv2/index.html

独立行政法人情報処理推進機構(IPA)


http://www.cybersyndrome.net/rsa/

CyberSyndrome


http://www.ipa.go.jp/files/000017319.pdf

独立行政法人 情報処理推進機構(IPA) (PDF)


http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html


https://www.feistyduck.com/library/openssl-cookbook/


http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf

(PDF)


https://github.com/MHM5000/pass


http://cacr.uwaterloo.ca/hac/index.html


https://unglue.it/work/141611/


https://www.crypto101.io


http://toc.cryptobook.us


https://wiki.ubuntu.com/UncomplicatedFirewall

The Uncomplicated Firewall (ufw) is a frontend for iptables and is particularly well-suited for host-based firewalls. ufw provides a framework for managing netfilter, as well as a command-line...


https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security

HTTP Strict Transport Security (HSTS) is a web security policy mechanism which helps to protect websites against protocol downgrade attacks and cookie hijacking. It allows web servers to declare t...


https://cipherli.st/

These examples are meant for sysadmins who have done this before (and sysadmins are forced to support Windows XP with IE < 9, therefore des3cbc), as an easily copy-pastable example, not for newbies wh...


https://www.linode.com/docs/security/firewalls/configure-firewall-with-ufw

UFW, or uncomplicated firewall, is a frontend for managing firewall rules Arch Linux, Debian or Ubuntu. UFW is used through the command line (although it has GUIs available), and aims to make firewall...


https://docs.mongodb.com/manual/administration/security-checklist/

This documents provides a list of security measures that you should implement to protect your MongoDB installation.


http://idroot.net/tutorials/how-to-change-ssh-port-in-ubuntu/

The Secure Shell (SSH) Protocol by default uses port 22. Accepting this value does not make your system insecure, nor will changing the port provide a significant variance in security. However, changi...


https://youtu.be/SJJmoDZ3il8