asteroza + defense   266

Composite Binders for Concretes with Improved Impact Endurance | SpringerLink
Making a somewhat rubbery concrete by replacing 40% of the cement with rice husk cinder, limestone-crushing waste, and silica sand. Makes for a good external concrete layer that can resist impacts.
materials  science  research  technology  impact  resistant  concrete  filler  construction  military  defense  russia 
18 days ago by asteroza
DroneGun MKIII | DroneShield
Someone liked that PsychoPass Dominator design a little too much...
UAV  drone  defense  RF  jammer 
july 2019 by asteroza
Juggalo Makeup Blocks Facial Recognition Technology | Consequence of Sound
Juggalos evade light contrast based facial detection, but they're still boned by depth sensing cameras like FaceID. Better than CVdazzle?
Juggalo  Juggalette  face  makeup  antisurveillance  recongition  defense  camouflage  privacy  anonymity  CVdazzle 
july 2019 by asteroza
BlackSquid Slithers Into Servers and Drives With 8 Notorious Exploits to Drop XMRig Miner - TrendLabs Security Intelligence Blog
Using sandbox usernames and installing VMware tools on a physical computer as a cheap defense method are decent ways to deceive malware too...

The list of usernames is

Avira
COMPUTERNAME
CWSX
Kappa
NMSDBOX
VBOX
WILBERT-SC
XPAMASTC
XXXX-OS
cuckoo
cwsx-
nmsdbox
qemu
sandbox
virtual
wilbert-sc
xpamast-sc
xxxx-ox
malware  deception  defense  fake  windows  username  sandbox  emulation  humor 
june 2019 by asteroza
fireeye/commando-vm: Complete Mandiant Offensive VM (Commando VM)
A new set of build scripts/autodownloaders to build up a windows VM for redteam/blueteam work
fireeye  windows  VM  defense  offensive  research  security  hacking  pentesting 
april 2019 by asteroza
colmmacc/nf_conntrack_tls: A Linux netfilter conntracking module that understands TLS records
crude linux netfilter plugin to drop TLS heartbeat connections, as a temporary shield for Heartbleed
linux  netfilter  module  security  defense  heartbleed  OpenSSL  TLS 
april 2019 by asteroza
Clever Tool Uses Apple’s Videogame Logic Engine to Protect Macs | WIRED
Using built in game logic rule engine to run endpoint security signature rules is pretty neat. But, for a second there, I thought they were doing some kind of deception network thing, or using game AI to go threat hunting...
mac  OSX  security  blueteam  defense  game  logic  rule  engine  signature  endpoint 
march 2019 by asteroza
Ocean Guardian - Powered by Shark Shield Technology
Shark shields run all the time, so now they have a triggerable wand called eSPEAR so you can have longer battery life
shark  shield  wand  defense  protection  hardware  electronics  devices  diving  equipment 
february 2019 by asteroza
Microsoft recommended block rules (Windows 10) | Microsoft Docs
Oh hey, a list of known MS signed binaries that allow for unsigned execution, AKA LOLbins.
windows  defender  application  control  block  list  blocklist  security  hacking  pentesting  defense  blueteam  LOLbin 
january 2019 by asteroza
4964(S) Special groups have been assigned to a new logon. (Windows 10) | Microsoft Docs
Throwing important AD users into a special security audit group will raise security events in the event log to allow easier tracking. Useful for exploring an environment where people have hard coded certain accounts or registered a task/service with an inappropriate account
windows  AD  active  directory  special  user  login  audit  security  group  event  log  hacking  pentesting  defense  WEFFLES 
november 2018 by asteroza
pastebin.com/raw/V7yHxv3p
GPO batch to run autoruns collector, collate into a CSV for later checks
windows  autoruns  collector  batch  script  sysadmin  tips  tricks  security  defense  GPO 
july 2018 by asteroza
Remote Authentication GeoFeasibility Tool - GeoLogonalyzer « Remote Authentication GeoFeasibility Tool - GeoLogonalyzer | FireEye Inc
interesting additional analysis of remote access logs based on GeoIP as well as physical realities (nobody flying commercial supersonic flights so logon locations being too far within a fixed timespan will be suspicious...)
FireEye  geoIP  GeoLocation  location  remote  access  VPN  log  logon  analysis  security  defense 
june 2018 by asteroza
Prints–1
For the middle class villains in your life
home  house  building  security  defense  swimming  pool  moat 
may 2018 by asteroza
endgameinc/RTA
Blue team test framework to check their detection capabilities
attack  threat  simulation  MITRE  framework  software  python  security  hacking  pentesting  defense 
may 2018 by asteroza
Tall Poppy
Some sort of anti-harassment service/tool set?
antiharassment  software  tools  service  defense  privacy 
april 2018 by asteroza
Protective iPhone Cases & Wallets with RFID blocking by Vaultskin
Vaultcard seems to be a RFID transponder based jammer to protect nearby contactless cards. They seem to suggest the jamming is commensurate to reader power (to defend against high power reader attacks), but it isn't a dumb retroreflector.
RFID  shield  defense  security  privacy 
march 2018 by asteroza
Use a demo to see how ASR can help protect your devices | Microsoft Docs
The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks
windows  sercurity  attack  surface  reduction  test  testing  prevention  defense  audit  antiexploit 
december 2017 by asteroza
thinkst/opencanary: Modular and decentralised honeypot
open source version of Thinkst's Canary system of honeypots and honeytokens
opensource  security  canary  honeypot  honeytoken  token  tripwire  software  defense 
december 2017 by asteroza
Ultrahard carbon film from epitaxial two-layer graphene | Nature Nanotechnology
SiC coated with exactly two layers of aligned graphene can turn into diamene, a temporary state that is harder than bulk diamond, when compressed at room temperature. Sorta like those shear thickening liquid armors.
defense  military  armor  shear  thickening  hardening  diamene  graphene  silicon  carbide  materials  science  research  technology  nanotechnology 
december 2017 by asteroza
fr0gger/RocProtect-V1: Emulating Virtual Environment to stay protected against advanced malware
Stuffing virtual machine artifacts into a physical machines as wolfskin defense against attackers
virtual  machine  environment  emulation  security  defense  wolfskin 
november 2017 by asteroza
LiShield is a Smart LED Bulb Prevents Photos by Confusing Cameras
Anti-paparazzi technique, except wouldn't paparazzi have high end cameras with a global shutter, so this only prevents picture taking by the proles?...
antipaparazzi  defense  LED  lightbulb  flicker  rolling  shutter  DRM  photography  antisurveillance  countersurveillance  antisousveillance 
november 2017 by asteroza
illusive networks: The Leader In Deception Technology
Sounds like a mix of deception networks, canary tokens, and honeypots
security  israel  honeypot  canary  token  deception  network  defense 
october 2017 by asteroza
« earlier      
per page:    204080120160

related tags

3D  6lowpan  10KW  50KW  802.15.4  abrasion  absorber  access  accessories  accesspoint  accountability  accuracy  acoustic  acoustics  active  activism  activist  actuator  ACTUV  AD  ADAM  Adaptiv  adaptive  addon  address  ADFS  administrator  adversarial  advice  advocacy  aerial  aerodynamics  aerospace  AeroVironment  aggregator  AHSUM  air  airbag  aircraft  alarm  algorithm  ALON  aluminum  alzheimers  amplification  AmSafe  amyloid  analysis  anchor  Android  annotation  announcement  anonymity  antenna  anti-face-detection  anti-surveillance  antiaircraft  antiantidebug  antiantivirus  antidrone  antiexploit  antiforensic  antiharassment  antikeylogger  antilaser  antimalware  antimicrowave  antimissile  antipaparazzi  antipirate  antiransomware  antisousveillance  antisubmarine  antisurveillance  antitaser  antivirus  AP  apocalypse  app  apparel  application  AppLocker  AR  arc  architecture  archive  area  arm  armchair  armor  armored  arms  ArmStar  array  art  artifact  artificial  assist  asteroid  Astrium  astronomy  astroturfing  ASW  asymmetry  ATA  atmospheric  atomics  attack  attenuation  audio  audit  augmentation  auto  automated  automatic  automation  autonomous  autorun  autoruns  avoidance  awareness  AWS  Azure  backpack  BAe  bainite  bainitic  ball  ballistic  balls  bankruptcy  barefoot  base  batch  baton  battery  beach  bearing  bed  behavioral  beta-amyloid  BHSS  bicycle  bike  biocomposite  biology  biomechanics  biomimetic  biomimicry  biomineral  bitlocker  blast  blaster  BLE  blimp  blitzer  block  blocking  blocklist  blog  blue  blueteam  body  BodyGuard  Boeing  bone  boot  boron  bot  boxfish  breakwater  breathable  broadband  browser  building  bulk  bullet  bulletproof  bumper  bunker  buoy  bypass  C  CA  cable  CAD  Calce  camera  camoflage  camouflage  canary  cancellation  cannon  capacitor  capacity  capture  car  carapace  carbide  carbon  card  cardboard  carrier  carry  case  cat  categorization  CCTV  CCW  cell  cellular  centrifuge  ceramic  certificate  chain  chainmail  change  channel  charge  child  chrome  civil  CIWS  classification  clipboard  cloak  cloaking  cloth  clothing  cloud  club  coastal  coating  cobot  cognitive  cold  collaborative  collector  column  command  communication  community  compartment  compliance  composite  compputer  compression  computer  computing  concealed  concept  conch  concrete  conductive  conference  constellation  construction  consultant  consulting  container  containerized  continuous  contractor  control  converter  cooperative  correlation  couch  counter  counterfeiting  counterforensic  countermeasure  countermeasures  countersurveillance  counterUAV  cover  coverage  crack  CRAM  crawler  credit  cross-lamellar  crosslamellar  crowd  crowdfunding  crowdsourcing  cruise  cryptography  CSRF  cushion  CV  CVdazzle  cyberattack  Cyberdyne  cybersecurity  DAARPA  damage  Dan  DARPA  data  database  dazzle  DDoS  DE-STAR  death  debug  debugger  deception  defence  defender  defense  defensive  deflection  Delicious  denial  deny  deobfuscation  department  depth  design  detection  development  device  devices  DEW  DFIR  DGA  diamene  diamond  digitial  diindolylmethane  DIM  directed  directory  disable  disinformation  disk  distribution  diving  DIY  DLR  docker  DoD  dog  domain  doomsday  door  DREAD  dress  driver  DRM  drone  drum  Ductal  Dyneema  e-tint  early  earplug  earth  earthquake  edged  education  EFF  effect  Einstein3  eject  electric  electrical  electricity  Electrolaser  electromagnetic  electron  electronics  electronis  electrostatic  emergency  EMET  EMF  emission  EMP  emplacement  emulation  enclosed  encryption  Encyclopedia  endpoint  energy  engine  engineered  engineering  environment  equipment  erosion  ESA  EU  europe  evasion  event  Excalibur  exfiltration  EXISTech  exoskeleton  exosuit  exploit  explosive  extended  extender  extension  external  extinguisher  eyeglasses  eyewear  fabber  fabbing  fabric  face  facial  factor  fail  fake  fallout  false  FAQ  fashion  fast  FDE  FEL  fiber  fight  fighting  file  filetype:pdf  filevault  filler  filter  FinFisher  fire  fireeye  firefighting  firefox  firewall  fish  fixed  flame  flamewar  flash  flashlight  flexible  flicker  floater  floating  flood  flooding  fluid  foam  foamed  folder  folding  food  footwear  forced  form  framework  france  free  freefall  frequency  FridgeLocker  FTPE  full  function  furniture  future  gadgets  game  gamma  Gandhicam  gar  gas  gate  gauntlet  gear  general  generator  geoIP  GeoLocation  gift  gifts  glass  glasses  glove  GM  government  GPO  graduate  graphene  group  guide  guided  guideline  gun  gunshot  GZip  GZipbomb  hack  hacking  HackingTeam  HAL  harbor  hardening  hardness  hardware  head  headphone  heagonal  healing  health  hearing  heartbleed  Hecule  helicopter  helmet  herding  hex  hexagon  hibernation  hierarchical  high  highly  hijack  history  Hitachi  hole  hollow  holographic  holster  home  honeydoc  honeydocument  honeypot  honeytoken  house  howto  HTTP  hub  HULC  human  humor  hunt  hunting  hybrid  hypothes.is  identity  idle  image  IME  impact  implant  imura  incident  indexing  induced  Industries  infection  information  infosec  infoviz  infrasound  infrastructure  injection  ink  innovation  input  inspection  integrated  intelligence  intercept  interceptor  interlocking  internet  Interpolique  invisible  io  IoC  IOC  ionic  iOS  IoT  iPad  iPhone  IR  isolation  israel  jacket  jammer  japan  jellyfish  jet  journalism  JPL  Juggalette  Juggalo  Kaminski  kernel  kerr  kevlar  key  keyboard  keylogger  kill  kinetic  kit  knocking  Kranium  KRISS  kurage  lambda  laser  lateral  latitude  launch  law  LaWS  layered  layout  LCD  league  learning  LED  leg  lens  lethality  LGE  liability  life  light  lightbulb  lightweight  LINE-X  liner  linux  lionel  LIPC  liposome  liquid  list  load  loader  location  lock  locker  Lockheed  lockpicking  log  logging  logic  login  logon  LOLbin  long  low  lower  LTA  luminescence  luminescent  mac  machine  magazine  makeup  malicious  malware  management  manipulation  mantis  manufacturing  map  marine  maritime  mark  marker  market  marking  material  materials  matrix  MAV  MBR  measures  mecha  media  media:document  medical  medicine  mesh  metal  metallurgy  metamaterial  microsoft  microstructure  microturbine  microwave  military  mimikatz  misdirection  missile  mission  MIT  mitigation  MITRE  moat  mobile  model  modular  module  monitoirng  monitoring  mount  movement  MPDS  mUAV  munition  museum  mutual  MySQL  nacre  nanoceramic  nanocrystalline  nanofiber  nanoparticle  nanopattern  nanopatterning  nanopowder  nanosphere  nanostructure  nanotechnology  nanotube  NASA  nasal  navy  NEO  NEOshield  netfilter  network  news  Nmap  noise  nonlethal  NSA  nuclear  nullifier  observation  ocean  octocopter  Oerlikon  offense  offensive  office  office365  offshore  online  open  opencv  opensource  OpenSSL  OPSEC  opt-out  optical  optics  optoelectronic  orbit  orbital  organic  organization  origami  OSINT  OSX  OTH  outdoor  overlay  oxygen  oxynitride  package  packet  paintball  pair  panel  paper  particle  particulate  password  patch  pattern  PAXCON  peer  penetration  pentesting  pepper  perch  perching  performance  perimeter  personal  Phalanx  phase  phased  photo  photography  physics  picture  piercing  pillbox  Pirate  pistol  planetary  plasma  plate  PLC  plugin  police  policy  political  polymer  polymerization  polypropylene  pool  PORON  port  portable  portal  positive  power  powered  powershell  prank  prediction  premix  pressure  prevention  printer  printing  privacy  product  production  profile  programming  projectile  proliferation  propaganda  propagation  propulsion  protection  protective  protecto-flexibility  protein  protest  prototype  prowler  psychology  pulse  puncture  purge  python  QRcode  quadcopter  quadrotor  quarterbacking  query  radar  radiation  railgun  railway  RAND  range  ranking  ransomware  RAP  rapid  Rb3d  RBAC  RC  RCS  RDP  reaction  realtime  receive  recerence  recognition  recoil  recongition  recorder  recording  red  RedneckTech  redteam  reduction  reference  refridgerator  reinforcement  remote  report  repository  request  research  resistance  resistant  resonator  response  restriction  retrofit  return  review  revolver  RF  RFID  Rheinmetall  ribbed  ricochet  rifle  rigid  riot  risk  RLIP76  robot  robotic  robotics  rogue  rolling  root  rootkit  ROP  rotary  route  RPG  rule  russia  RynoHide  safe  safety  SAIC  salt  sample  samples  sandbox  Sapphire  satellite  scale  scalemail  scan  scanning  school  science  scifi  scorpion  scratch  screen  script  scute  search  security  self  semiauto  sensor  sentry  SentryGun  sercurity  server  serverless  service  setup  shaped  shark  shear  sheet  shell  shelter  shield  shielding  ship  shipping  shock  shocknife  shockwave  shoe  shotgun  Shrike  shrimp  shutter  sidechannel  SIEM  sifter  sigma  sign  signal  signature  silencer  silicon  silk  silkworm  SIM  simulation  simulator  simultaneous  sintering  siren  Sisma  situational  skin  skull  skunk  sky  SKYBUS  slingatron  small  smartphone  SMG  snake  sniffing  social  soft  softsuit  software  solid  solution  sound  sousveillance  space  spaceguard  spall  special  speed  sphere  spherical  spider  spinel  spray  spraying  spring  SQL  SQN  squid  SSL  standoff  state  statistics  steel  stick  stiff  stiffening  strain  streaming  strength  stretch  string  structural  structure  student  stun  stungun  submachinegun  submarine  submunition  suit  sunglasses  super  supercapacitor  supercavitating  supercavitation  suppression  supression  sureveillance  surface  surveillance  survey  survival  swap  SWB-100  swimming  SYN  syntactic  synthetic  sysadmin  Sysinternals  system  tactical  tactics  tag  TagMeNot  tail  tank  TARIAN  tarpit  taser  taut  TCP  TCUAV  TDI  team  technology  telescope  telescopic  tension  test  testing  textile  textiles  texture  theft  therapy  thermal  thesis  thickening  thinktank  thor  thorshield  threat  tile  tint  tips  TLS  token  tools  torpedo  tower  tracking  traffic  train  training  Transformational  transgenic  transmit  transparent  transportation  treatment  treaty  trends  triage  triangulation  tricks  trigger  tripwire  troll  truck  truckbed  tsunami  tube  turbine  turret  tutorial  twisted  TypeIIIA  UAS  UAV  ubuntu  UGV  UHPC  UK  ultra  umbreklla  umbrella  unbreakable  underpants  undersea  underwater  underwear  unpacked  unusual  upconversion  upconverter  upload  urethane  US  USA  user  username  USSR  USV  utilities  UUV  vaporization  vault  vehicle  vest  video  virtual  virtualization  visible  vision  visor  visualization  VM  VPN  VTOL  vulnerability  walking  wallpaper  wand  war  warfare  warhead  warning  watch  water  watermark  wave  WDATP  weapon  weapons  wearable  web  webdev  WEFFLES  weight  whiteboard  whitelist  wifi  wind  window  windows  wireless  wiretapping  wolfskin  work  wound  X6  XRAIL  XRD  XSMG  yarn  YoNTMA  zigbee  zipbomb  zombie 

Copy this bookmark:



description:


tags: