Menu

Latest articles

Social Engineering: How to Scam Your Way into Anything
TEDx talk by Brian Bushwood. http://tedxsanantonio.com/2011-speakers/brian-brushwood/
Discover Scripts
Scripts for use with Kali Linux that automate network reconnaissance and other tasks. https://github.com/leebaird/discover
YARA
Tool for developing and matching on malware signatures. http://virustotal.github.io/yara/
McAfee Threat Landscape Dashboard
Information on recent threat and vulnerability activity. http://tld.mcafee.com/index.html
Binary Ninja
Tool for software reverse engineering. https://binary.ninja/
SEI CERT Coding Standards
Secure coding standards for C, C++, Java, Perl, and Android.  Developed by the Software Engineering Institute of Carnegie Mellon University. [...]
Have I been pwned?
Searchable database of online accounts that have been compromised. https://haveibeenpwned.com/
Zdziarski’s Blog of Things
Author Jonathan Zdziarski’s blog on security and other topics. http://www.zdziarski.com/blog/
Python Security Project
Hardened version of Python developed by OWASP. http://www.pythonsecurity.org/
Social-Engineer
Resources and blog on social engineering. http://www.social-engineer.org/
Netcraft
Research and statistics on Internet websites. http://www.netcraft.com/
HackerOne
Bug bounty platform. https://hackerone.com
Snort
Open source network intrusion detection system. https://www.snort.org/
OSSEC
Open source host intrusion detection system. http://ossec.github.io/
ehacking.net
Cybersecurity blog and news site. http://www.ehacking.net/
This is what happens when you respond to spam email
TED talk by James Veitch http://www.ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email  
DataBreaches
Blog and news site for recent commercial and government data breaches. http://www.databreaches.net/
Ponemon Institute
Conducts independent research on privacy, data protection and information security policy. http://www.ponemon.org/?mobile=false
GovInfoSecurity
Cybersecurity news and training geared towards the government sector. http://www.govinfosecurity.com/
Security Week
Cybersecurity news and analysis. http://www.securityweek.com/
HackRead
Cybersecurity news and blog. https://www.hackread.com/
SecurityTube
Catalog of cybersecurity related videos. http://www.securitytube.net/
NashSec
Informal gathering of security professionals in the Nashville, Tennessee area. http://nashsec.org/
ColaSec
Informal gathering of security professionals in the Columbia, South Carolina area. http://www.colasec.org/
Snare
Tool for analyzing system event logs. https://www.intersectalliance.com/
CloudShark
Web based packet capture analysis. https://www.cloudshark.org/
Regshot
Tool for snapshotting and comparing the Windows registry. http://sourceforge.net/projects/regshot/
Inlite Barcode Reader
Tool for decoding a variety of barcodes. http://online-barcode-reader.inliteresearch.com/default.aspx
OWASP Risk Rating Methodology
https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
Grand Theft Data
Report on data exfiltration statistics. http://www.mcafee.com/us/resources/reports/rp-data-exfiltration.pdf