sharjeelsayed + security   124

Hacker101 is a free class for web security. Whether you're a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
training  pentest  hacking  hacker  hackers  course  courses  github  vulnerabilities  vulnerability  online  security  web 
january 2018 by sharjeelsayed
OverTheWire: Wargames
The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
To find out more about a certain wargame, just visit its page linked from the menu on the left.
wargames  security  hacking  hacks  game  games  linux  war  ctf  vulnerabilities  vulnerable  hack 
september 2016 by sharjeelsayed
PeerBlock – Peerblock Site
PeerBlock lets you control who your computer "talks to" on the Internet. By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries! They can't get in to your computer, and your computer won't try to send them anything either.
security  p2p  software  privacy  windows  opensource  freeware  utilities  block  ip  blocker  peerblock 
august 2010 by sharjeelsayed
The largest security tools list
Classified by operating system
Classified by type of tool
security  tools  list  tool  secure  vulnerability  penetration  testing  test 
may 2009 by sharjeelsayed
Securing Debian Manual
This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribution installation, it also covers some of the common tasks to set up a secure network environment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team.
server  sysadmin  linux  debian  security  manual  administration  howto  os  harden  hardening  securing 
february 2009 by sharjeelsayed
Ophcrack :Windows password cracker
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.
password  windows  security  crack  hacking  tools  software  hack  hacks  recovery  recover 
may 2008 by sharjeelsayed
Built-in Windows commands to determine if a system has been hacked
Microsoft has built numerous tools into Windows so administrators and power users can analyze a machine to determine whether it's been compromised.
windows  security  tools  sysadmin  commands  commandline  command  hack  hacking  hacks  wmi  wmic  management  instrumentation  cmd  compromise  audit  auditing  recon  forensic  forensics  netstat  find  net  openfiles 
may 2008 by sharjeelsayed
« earlier      
per page:    204080120160

related tags

0day  2factor  ac  academy  access  acct  accton  adapter  adblock  address  admin  administration  administrator  ads  adware  aix  allow  alto  amazon  analysis  android  anonymity  anonymous  anti  antikeylogger  antimalware  antispam  antispyware  antivirus  anywhere  apache  api  app  apple  application  applications  apps  appsec  attack  attacks  audit  auditing  authentication  authorized  auto  awesome  aws  background  backup  based  beginner  beginners  benchmark  benchmarks  bestpractices  billing  bind  bios  block  blocker  blocking  book  books  boot  browse  browser  browsers  browsing  brute  bug  bugs  build  bypass  career  ccna  cd  cdn  censorship  centos  cer  certificate  certificates  certification  challenges  cheat  cheats  cheatsheet  cheatsheets  check  checker  checking  checks  cheetsheets  chrome  ci  cis  cisco  CISSP  close  closing  cloud  cmd  code  coding  collection  college  command  commandline  commands  comparison  compromise  computer  computers  config  configuration  connection  convert  converter  country  course  courses  crack  cracking  craker  crash  crypto  cryptography  cs  ctf  curated  curriculum  customs  cyber  cybersecurity  data  database  day  db  db2  dbaas  deals  debian  decoder  decrypt  decrypter  deniability  deny  desktop  detection  dev  developer  development  devops  disable  disabling  disk  distro  diy  dns  docker  ebooks  ecryption  editing  education  email  emulate  emulation  emulator  encrypt  encrypted  encryption  engine  engineering  essential  established  example  examples  exception  exploit  exploits  factor  fake  fakename  fast  file  find  firefox  firewall  firewalls  flight  flights  florida  folder  force  forensic  forensics  free  freeware  frequently  game  games  gatekeeper  generate  generator  github  google  guide  guidelines  guides  hack  hacker  hackers  hacking  hacks  handling  harden  hardening  hardware  hat  have  header  headers  hide  history  home  hose  hosts  howto  howtos  hr  htaccess  html  http  https  human  ibm  id  ide  identity  ie  ie8  iis  im  information  infosec  injection  install  instant  institute  instrumentation  integrity  international  internet  intrusion  ios  ip  iptables  issue  issues  isues  it  key  keylogger  kill  knock  knockd  laas  laptop  lastcomm  learn  learning  lecture  lectures  linux  list  lists  log  logger  logging  login  logs  lsat  mac  macbook  macos  mail  malware  management  manual  map  maps  media  messenger  messengers  metasploit  method  microsoft  mininet  mit  ml  mobile  modsecurity  mongodb  monit  monitor  monitoring  most  mozilla  must  mva  mysql  name  nessus  net  netfilter  netsec  netsend  netstat  network  networking  networks  nikto  nmap  number  offensive  office  online  open  opendns  openfiles  opensource  openssh  openssl  openvas  optimize  oracle  os  osx  owasp  p2p  p7b  paas  package  palo  partition  password  passwords  paths  payment  peerblock  pem  penetration  pentest  people  pf  pfsense  pfx  phone  php  pki  plausible  pmp  port  portable  ports  poster  posters  powershell  privacy  process  processing  profile  programmer  programmers  programming  project  protection  prototype  prototyping  proxy  psacct  psad  puppet  quality  random  rdp  recommendations  recon  recover  recovery  red  reddit  redhat  reference  remote  report  reporting  repos  resource  resources  response  restart  reverse  reversing  rhel  router  routers  rsyslogd  rubber  rule  rules  sa  saas  sans  scan  scanner  scanning  science  script  search  searchengine  secure  securing  security  self  send  server  servers  services  setting  settings  share  sharing  sheet  sheets  shell  sierra  site  smb  sniffer  snmp  social  socialmedia  socket  software  softwares  source  spam  specific  speed  speedup  spyware  sql  ssh  sshd  sshd_config  ssl  start  Steganography  stop  storage  strength  stun  surveillance  suse  sysad  sysadmin  syslog  system  systems  tapping  tcp  tech  technique  techniques  technology  test  tester  testing  tests  tips  tls  token  tomcat  tool  tools  top  trace  track  tracker  tracking  train  training  translation  tricks  tunnel  tunneling  tutorial  tutorials  two  twofactor  university  unix  usb  user  utilities  utility  vagrant  vas  video  videos  virtual  virus  vmware  vnc  vpn  vulnerabilities  vulnerability  vulnerabilties  vulnerabilty  vulnerable  war  wargames  web  web2.0  webapp  webapps  webdev  webrtc  webserver  website  webtools  whiteboard  WHOIS  windows  wiretap  wiretapping  wmi  wmic  world  xss  zero 

Copy this bookmark: