36 KiB
Apple
c
iFoo
Securing your iPhone for Travel to a Hostile Environment Hwang & Snowden Protecting a Phone
Applications
MacOS
How to make the Touch Bar slightly more tolerable
Hacks & Tricks MacOS
diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6 to mount an encrypted volume
Add Dashboard Widgets to the Desktop
Apple Security Guides
Creating your own Homebrew Tap and Formula
Disable iPhoto Auto_launch in Yosemite
El Capitan Hardening Guide
macOS Mojave Hardening Guide *Encrypting Your Laptop Like You Mean It Fast User Switching on Yosemite
Fix DNS Resolver Search List (obsolete)
/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool
How to restore privacy
How to Update OpenSSH on Mac OS X
How to stop Firefox from making automatic connections
HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging
Internal Files about User (maybe Mountain Lion)
Mac Config Hacks from Command Line
OS X Yosemite Security and Privacy Guide
OSX Auditor
Safety hacks for Yosemite
Screen Sharing over SSH
Setting up a Macintosh as a Development Environment
Time Machine and Other Info
XServe from Ebay running VMware
Yosemite WiFi hacks
Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go.
Remote Mac Access: Screen Sharing via SSH and VNC without iCloud’s Back to my Mac feature
What Makes a Mac Volume Bootable
sudo scutil --set HostName <new host name> to change Mac hostname
Allow MacOS FileVault Recovery Key
Tools to set up a quick macOS VM in QEMU, accelerated by KVM
*
Applications
Bonjour Browser Emacs for MacOS guide Free OS X Security Tools Karabiner - A powerful and stable keyboard customizer for OS X OSXFUSE is a successor to MacFUSE Snail Mail - envelope printer
Conferences
CoNEXT 2014 IMC 2013 Dagstuhl Critical Infrastructure CHES 2014 Dagstuhl 2104 Secure Routing BGNOG2 Security Sep 2015 OARC Oct 2015 NANOG Oct 2015 IMC October 2015 IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015 CAIDA BGP Hackathon Jan 2016
Food
Kossar's Bialys Zabar's Smoked Fish Russ and Daughters Smoked Fish (needs more lead time) Nabe Mono Basics Artisan Dutch Cheese shop in Amsterdam Swiss Chocolate Shop
Hardware
FPGA Tools
YoSys Open Synthesis Suite - Verilogish MiGen - Python Toolbox for Building Hardware (produces VHDL) MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs Chisel - Hardware Development Embedded in Scala
General Hardware
Four hot-pluggable systems (nodes) in a 2U form factor
SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD
SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box
Seagate 8TB drives
Open source USB stick computer for security applications
Dirty PCBs
Cheat Sheed for MegaRaid Controllers megacli
CWDM Mux/DeMux
Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer
Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems
KVM to USB dongle
Bunnie Huang on Good Documntation for Manufacturing
Bunnie Huang on Design for Manufacturing
Novena
Novena Mail Page Setting up an ARM virtual machine so you can build an SD image
Raspberry PI
Toys
Attiny85-based device to enable and disable write-protection on any SD card Build the SD Locker and Make Your SD Cards More Secure
Linux / Unix
Wiki of non-systemd Unix/Linux systems reptyr: Attach a running process to a new terminal Using Containers in Production: Best Practices VXLAN with plain Linux bridges Linux Kernel Hacking Linux Ate My RAM
Basics
Basics of the Unix Philosophy ntpstick - NTP on a Stick SSH Hardening OSCP Stapling in Apache ejabberd TLS Security Understanding and Using Systemd
Emacs
Magit, A Git Porcelain inside Emacs
Tools
Linux dhcpd Options git move subdirectory of a repo
FreeBSD
FreeBSD install with gmirror portmaster to pkg Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti
Applications / Linux / Unix
WordPress Tutorials Choosing an HTTP Status Code Scan, index, and archive all of your paper paf's Export photos from Apple Photo.App iPhoto Library Manager BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS Command-line based presentation tool Magic Wormhole - get things from one computer to another, safely Upspin: A framework for naming everyone's everything. https://upspin.io
Hacks / Linux
Upgrading grub from 0.97 to grub2
iptables -F sshguard Get sshguard to stop blocking me after I have screwed up.
Mounting a qcow image as a file system Debian Releases
Debian Archives Explained
Upgrade Debian wheezy to jessie
Firewall IPTables for IPv6
A Quick Introduction to Linux Policy Routing
Reset WordPress Password from My SQL
Change default network name (ens33) to old “eth0” on Ubuntu 16.04
Great dump/restore recipies
Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers
How AppArmor works
Tools
BitTorrentsync security & privacy analysis - Hackito Session results
Windows - Five portable antivirus and antimalware tools to carry with you at all times
SSH Based Chat
How To Create an SSH CA to Validate Hosts and Clients
VANE - A Free Fork of WPScan
curated list of awesome malware analysis tools and resources
R Cheat Sheets
Regenerable ed25519 keys for OpenSSH
GUYMAGER a Free Forensic Imager
DropKick Detect and disconnect WiFi cameras
Adding a Signing GPG Key and Hiding the Master
How to Tell if an Image, YouTube, etc. are faked
new openssh key format and bcrypt pbkdf
TLS SNI Test Site: alice.sni.velox.ch
Top 125 Security Tools
ssh keylength cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd
LetsEncrypt client which drops privs
Penetration Testing Cheat Sheet
GOGS - git server in go
Unified Logging Layer
Use Wireshark to inspect SSL
A terminal user-interface for tshark, inspired by Wireshark.
LaTeX, Wrapping text around figures
Advice for writing LaTeX documents
SED Debugger
Unix History Repository
How To Create a Git Pull Request on GitHub
JHead - Exif Jpeg header manipulation tool
NetData, the Linux internal measurement graphing tool from hell
A git Tutorial
GUI and CLI packet generator tool for ethernet
Sysdig is a universal system visibility tool with native support for containers
Certificate Authority Tools
XCA, a Small CA for Macintosh XCA Tutorial EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java TinyCA, debian package, may not be maintained Regenerate Puppet Certificates Safety Tips for iPhone iOS 10 Certificate Transparency Collector
VPNs
ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443 from pfSense terminal console shell to backdoor when firewall locks you out.
SoftEther VPN Project
WireGuard VPN
Languages
SNOBOL4 Awesome Python frameworks, libraries, software and resources
Networking
DNS
DNS Tools
ZoneMaster DNS Zone Checker
NIST DANE Tester
YanDex DNS Servers 77.88.8.1 and 77.88.8.8
AfNIC ZoneMaster Zone checker
DANE SMTP Validatoe
Phil Pennock's SMTP DANE TLS Checker
Flushing Chrome's DNS Cache
RIRs
RIR Stats Files Catenated & Decode for the above NRO Stats Internet Timeline from JPNIC IPv4 Address Space Transfer Report
Routing
Linux iproute2 Cheat Sheet BIRD Cheat Sheet IPv6 route lookup on Linux Linux VRF
Routers
Juniper Routing Engines Cisco IOS ssh key regeneration
Routing Security / RPKI
Tomo's Cache Server and Router Configuration Instructions. Certificates per RIR RIR Statistics from SurfNet NIST Global Prefix/Origin Validation using RPKI Securing BGP Routing with RPKI and ROAs Daniele's ROA quality Page Daniele's Page of Root Nameserver ROA State RPKI Repository Browser Internet Protocol Journal on Securing BGP, Huston and Bush Renew Child Certs Google RPKI Puppet Deployment Effects of RPKI Deployment on BGP Security
Routing Tools
IRR Toolset bgpq3 - bgp filtering automation for Cisco and Juniper routers IPv4 and IPv6 prefix aggregation tool BGP Visualize with Python
Tools
OpenWRT Replacement Lede Guest LAN Set-up Encapsulation overhead calculator Protocol Header Diagram Generator
Outreach
Thailand
Workshops
AIT Bangkok 2012.11.19-22 SANOG/Thimphu 2014.01.13-21 APRICOT 2015 BTNOG2 Thimphu 2015.09.14-17 APRICOT 2016 Security Workshop APRICOT 2017 Security Workshop 2017.02.20-24 Bhutan NOG 2017 Security Workshop
Research / Computer Science
Measurement
Graphite - Scalable Realtime Graphing Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization Traffic Analysis - Anonymization IPv4 Address Transfer Report BETA Emile Country Jedi The Python Graph Gallery
Miscellaneous Research
CAIDA BGP Hackathon List Archive CAIDA BGP Hackathon BLOG CAIDA BGP Hackathon wiki A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS Semantic Scholar Paper Cites and Refs Graph Traversal Algorith Visualizations Guide for students working with JP Aumasson How to Write a Great Research Paper
Security
Cryptography
Crypto Coding Rules CryptLib Toolkit Free, Open Source, Crypto Libraries/Toolkits NaCl Crypto Primitives Hard Truths about the Hard Business of finding Hard Random Numbers Matthew Green on December 2014 Snowden Dump Blog for the cryptography group of the University of Bristol Performance analysis of different cryptographic algorithms implemented in an FPGA How Code Breakers Work Jacobian coordinates for short Weierstrass curves (algs to use) Apple Crypto Libraries Awesome Cryptogtaphy An introductory course on cryptography A Stick Figure Guide to the Advanced Encryption Standard (AES)
General Security
Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush
Real HSM Breaches
OpenTechFund/secure-chat roadmap. More like a planet survey.
Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina
Hardening Your Web Server
Secret Cells, Threats and Assumptions
Mozilla Recommendations for Security/Server Side TLS
SSL Cipher Suite Details of Your Browser
Check out Your Browser's SSL Support
Stop Firefox leaking data about you
Mobile Carrier Super-Cookie Use
Linux workstation security checklist
Efficient Group Key Signing Method
caff, proof of posession of the passphrase of a key sent by the email address associated with that key
OnionShare
Journal of Cybersecurity
We Should All Have Something To Hide, Moxie
A Gentle Introduction to Secure Computation
FTC - Time to rethink mandatory password changes
Camouflage from face detection
FreeBSD - a lesson in poor defaults
FireFox about:config set dom.webnotifications.enabled and dom.push.enabled to false to prevent push notifications]
Cyber Security Reading List
Tech Solidarity Personal Security CheckList Review
Shared thoughts after 6+ years in Pentesting
A Catalog of Exploits
Blockchain Graveyard, Crypto-Currency Disasters
ipcrypt: IP-format-preserving encryption
F-Secure’s Guide to Evil Maid Attacks
Fuzzing JSON Web Services
PEN Tester's Tool List
Awesome Web Security
[Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.](https://www.hrw.org/everyday-encryption)
Privacy Projects
Privacy Software Workshop Series Peer 2 Peer BGP Security Setting Up I2P and Tor Darknets
Securing Open Source
Secure Messaging roadmap from the LEAP project
Tools
ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust Canary Token Generator YubiKey Configuration for GPG, SSH, and U2F collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc. Free Security Tools an End User Should Start Using NOW Securing how folk use ssh
System Administration
Automation
Ansible
http://www.ansibleworks.com/docs/ http://www.ansibleworks.com/docs/faq.html http://jinja.pocoo.org/docs/templates/ NSRC Intro (pdf) append an existing list using set_fact Module Provided Facts for JunOS for NX-OS for IOSxr Bronwyn Tutorial Finding the size of various object in your postgres database Quadrupling Ansible performance with Mitogen
Configuration Tools
LDPush, A cross-vendor network configuration distribution tool CLI tool to push junoscript configs to Juniper network devices Python tool to configure networking interfaces on a Linux machine
Miscellaneous SysAdmin?
Check if Upgrade has Dynmic Lib Dependencies which Need Restart
Telcos & Lesser Forms of Humor
Virtualization
Ganeti
Experimental Ganeti extstorage provider for ZFS volumes
Ganeti using LVM over ZFS (zfsonlinux)
Installing pfSense as VirtIO on Ganeti
Make a Node Multi-Homed
Also how to Make a Node Multi-Homed
Upgrading to 2.12 and Onward
Ganeti Web Manager
NSRC Instructions for Ganeti Web Manager Installation
snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images
Editing Cluster Configuration (/var/lib/ganeti/config.data)
Cluster Key Replacement
Generate/Replace SSL Certificates
lvextend -L+50G -r /dev/mapper/ganeti-var
Ganeti Performance Tuning
Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels
Misc Cloudware
Windows
Ops Tools
Security
Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS
Misc Windows Stuff
Split PowerPoint Animations into PDFs
Misceleanous
Framadate, an open doodle replacement Snowden at IETF, plugs CrypTech at 0:38:00 How to construct a Nature summary paragrah (aka abstract) Web Design: The First 100 Years White Rabbit Express - Buy anything from Japan NetFlix Secret Category Codes Supranational European Bodies Free Open WebRTC Site The Small of the Soup O RLY Cover Generator IIJ Lab Conference Calendar LaTeX hints Big Font Generator Levels of Techie Enlightenment Freelance Achievement Stickers Fast-Track Arrival Options Around the World Teen Vogue on Know Your Rights If You Get Arrested Data, Past, Present, and Future Create a Knitting Pattern Tips for Writing Technical Papers by Jennifer Widom Hong Kong Walled City The Importance of Deep Work Cheap Internet Fax Service ASCIIdoc Cheat Sheet Sockets in bash ITU World Fiber Map Using Apple Pay for Suica More using Apple Pay for Suica Remove Background from an Image How Corning Makes Super-Pure Glass for Fiber-Optic Cable Stephenson on Undersea Cables Regular Expression Visualizer Donald Knuth Lectures Online TCPtrace and xplot Cheat Sheet Candidate First Hiring Differential Privacy Made Simpler Containers from Scratch Let Me Google This For You Custom Knives Jonas Vonada's Engineering Maxms Animated Knots