41 KiB
Lots of Miscellaneous Links
Academia
CS PhD --help - the greatest hits
Apple
iFoo
Securing your iPhone for Travel to a Hostile Environment
Hwang & Snowden Protecting a Phone
Applications
MacOS
How to make the Touch Bar slightly more tolerable
Dual Boot with Ubuntu>gr>
State of Linux on the MacBook Pro 2016 & 2017
MacOSX File Syatem Layout
Hacks & Tricks MacOS
diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6 to mount an encrypted volume
Add Dashboard Widgets to the Desktop
Apple Security Guides
Creating your own Homebrew Tap and Formula
Disable iPhoto Auto_launch in Yosemite
El Capitan Hardening Guide
macOS Mojave Hardening Guide//
Encrypting Your Laptop Like You Mean It
Fast User Switching on Yosemite
[wiki:MacSearchList Fix DNS Resolver Search List (obsolete)]
/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool
How to restore privacy
How to Update OpenSSH on Mac OS X
How to stop Firefox from making automatic connections
HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging
Internal Files about User (maybe Mountain Lion)
Mac Config Hacks from Command Line
OS X Yosemite Security and Privacy Guide
OSX Auditor
Safety hacks for Yosemite
Screen Sharing over SSH
Setting up a Macintosh as a Development Environment
Time Machine and Other Info
XServe from Ebay running VMware
Yosemite WiFi hacks
Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go.
Remote Mac Access: Screen Sharing via SSH and VNC without iCloud’s Back to my Mac feature
What Makes a Mac Volume Bootable
sudo scutil --set HostName <new host name> to change Mac hostname
Allow MacOS FileVault Recovery Key
Tools to set up a quick macOS VM in QEMU, accelerated by KVM
GitHub CLI
Applications
Bonjour Browser
Emacs for MacOS guide
Free OS X Security Tools
Karabiner - A powerful and stable keyboard customizer for OS X
OSXFUSE is a successor to MacFUSE
Snail Mail - envelope printer
Security
Soft U2F
Secure Enclave for SSH Authentication
Multi-Platform KeyPass Fork
How Mobile Device Users Can Limit Their Location Data Exposure
Conferences
CoNEXT 2014
IMC 2013
Dagstuhl Critical Infrastructure
CHES 2014
Dagstuhl 2104 Secure Routing
BGNOG2 Security Sep 2015
OARC Oct 2015
NANOG Oct 2015
IMC October 2015
IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015
CAIDA BGP Hackathon Jan 2016
Food
Kossar's Bialys
Zabar's Smoked Fish
Russ and Daughters Smoked Fish (needs more lead time)
Nabe Mono Basics
Artisan Dutch Cheese shop in Amsterdam
Swiss Chocolate Shop
Hardware
FPGA Tools
YoSys Open Synthesis Suite - Verilogish
MiGen - Python Toolbox for Building Hardware (produces VHDL)
MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs
Chisel - Hardware Development Embedded in Scala
General Hardware
Four hot-pluggable systems (nodes) in a 2U form factor
SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD
SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box
Seagate 8TB drives
Open source USB stick computer for security applications
Dirty PCBs
Cheat Sheed for MegaRaid Controllers megacli
CWDM Mux/DeMux
Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer
Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems
KVM to USB dongle
Bunnie Huang on Good Documntation for Manufacturing
Bunnie Huang on Design for Manufacturing
Explaining 4K 60Hz Video Through USB-C Hub
Novena
Novena Mail Page
Setting up an ARM virtual machine so you can build an SD image
Raspberry PI
Toys
Attiny85-based device to enable and disable write-protection on any SD card
Build the SD Locker and Make Your SD Cards More Secure
Linux / Unix
Wiki of non-systemd Unix/Linux systems
reptyr: Attach a running process to a new terminal
Using Containers in Production: Best Practices
VXLAN with plain Linux bridges
Linux Kernel Hacking
Linux Ate My RAM
Linux unnumbered interface source IP behavior
Linux Performance Tools
Understanding systemd’s predictable network device names
\
Basics
Basics of the Unix Philosophy
ntpstick - NTP on a Stick
SSH Hardening
OSCP Stapling in Apache
ejabberd TLS Security
Understanding and Using Systemd
Further adventures in EFI booting
Top 20 OpenSSH Server Best Security Practices>br>
Emacs
Magit, A Git Porcelain inside Emacs
Tools
Linux dhcpd Options
git move subdirectory of a repo
Pro Git, the book
FreeBSD
FreeBSD install with gmirror
portmaster to pkg
Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti
FreeBSD UEFI Secure Boot
Applications / Linux / Unix
WordPress Tutorials
Choosing an HTTP Status Code
Scan, index, and archive all of your paper
paf's Export photos from Apple Photo.App
iPhoto Library Manager
BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS
Command-line based presentation tool
Magic Wormhole - get things from one computer to another, safely
Upspin: A framework for naming everyone's everything. https://upspin.io
Hacks / Linux
Upgrading grub from 0.97 to grub2
iptables -F sshguard Get sshguard to stop blocking me after I have screwed up.
Mounting a qcow image as a file system
Debian Releases
Debian Archives Explained
Upgrade Debian wheezy to jessie
Firewall IPTables for IPv6
A Quick Introduction to Linux Policy Routing
Reset WordPress Password from My SQL
Change default network name (ens33) to old “eth0” on Ubuntu 16.04
Great dump/restore recipies
Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers
How AppArmor works
Tools
BitTorrentsync security & privacy analysis - Hackito Session results
Windows - Five portable antivirus and antimalware tools to carry with you at all times
SSH Based Chat
How To Create an SSH CA to Validate Hosts and Clients
VANE - A Free Fork of WPScan
curated list of awesome malware analysis tools and resources
R Cheat Sheets
Regenerable ed25519 keys for OpenSSH
GUYMAGER a Free Forensic Imager
DropKick Detect and disconnect WiFi cameras
Adding a Signing GPG Key and Hiding the Master
How to Tell if an Image, YouTube, etc. are faked
new openssh key format and bcrypt pbkdf
TLS SNI Test Site: alice.sni.velox.ch
Top 125 Security Tools
ssh keylength cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd
LetsEncrypt client which drops privs
Penetration Testing Cheat Sheet
GOGS - git server in go
Unified Logging Layer
Use Wireshark to inspect SSL
A terminal user-interface for tshark, inspired by Wireshark.
LaTeX, Wrapping text around figures
Advice for writing LaTeX documents
SED Debugger
Unix History Repository
How To Create a Git Pull Request on GitHub
JHead - Exif Jpeg header manipulation tool
NetData, the Linux internal measurement graphing tool from hell
A git Tutorial
GUI and CLI packet generator tool for ethernet
Sysdig is a universal system visibility tool with native support for containers
Certificate Authority Tools
XCA, a Small CA for Macintosh
XCA Tutorial
EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java
TinyCA, debian package, may not be maintained
Regenerate Puppet Certificates
Safety Tips for iPhone iOS 10
Certificate Transparency Collector
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
VPNs
ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443 from pfSense terminal console shell to backdoor when firewall locks you out.
SoftEther VPN Project
WireGuard VPN
Languages
SNOBOL4
Awesome Python frameworks, libraries, software and resources
Networking
DNS
DNS Tools
ZoneMaster DNS Zone Checker
NIST DANE Tester
!YanDex DNS Servers 77.88.8.1 and 77.88.8.8
AfNIC ZoneMaster Zone checker
DANE SMTP Validatoe
Phil Pennock's SMTP DANE TLS Checker
Flushing Chrome's DNS Cache
Dnsmasq-based DNS blocking
RIRs
RIR Stats Files Catenated & [wiki:NROstatsDecode Decode for the above NRO Stats]
Internet Timeline from JPNIC
IPv4 Address Space Transfer Report
Routing
Linux iproute2 Cheat Sheet
BIRD Cheat Sheet
IPv6 route lookup on Linux
Linux VRF
Models for Distributed Routing Protocols
Routers
Juniper Routing Engines
Cisco IOS ssh key regeneration
Routing Security / RPKI
Tomo's Cache Server and Router Configuration Instructions.
Certificates per RIR
RIR Statistics from SurfNet
NIST Global Prefix/Origin Validation using RPKI
Securing BGP Routing with RPKI and ROAs
Daniele's ROA quality Page
Daniele's Page of Root Nameserver ROA State
RPKI Repository Browser
Internet Protocol Journal on Securing BGP, Huston and Bush
Renew Child Certs
Google RPKI Puppet Deployment
Effects of RPKI Deployment on BGP Security
Implementation of RPKI Origin Validation in route-map
Job's RPKI Console
Routing Tools
IRR Toolset
bgpq3 - bgp filtering automation for Cisco and Juniper routers
IPv4 and IPv6 prefix aggregation tool
BGP Visualize with Python
Tools
OpenWRT Replacement
Lede Guest LAN Set-up
Encapsulation overhead calculator
Protocol Header Diagram Generator
Outreach
Thailand
Workshops
AIT Bangkok 2012.11.19-22
SANOG/Thimphu 2014.01.13-21
APRICOT 2015
BTNOG2 Thimphu 2015.09.14-17
APRICOT 2016 Security Workshop
APRICOT 2017 Security Workshop 2017.02.20-24
Bhutan NOG 2017 Security Workshop
Research / Computer Science
Measurement
Graphite - Scalable Realtime Graphing
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
Traffic Analysis - Anonymization
IPv4 Address Transfer Report BETA
Emile Country Jedi
The Python Graph Gallery
Miscellaneous Research
CAIDA BGP Hackathon List Archive
CAIDA BGP Hackathon BLOG
CAIDA BGP Hackathon wiki
A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS
Semantic Scholar Paper Cites and Refs
Graph Traversal Algorith Visualizations
Guide for students working with JP Aumasson
How to Write a Great Research Paper
Security
Cryptography
Crypto Coding Rules
CryptLib Toolkit
Free, Open Source, Crypto Libraries/Toolkits
NaCl Crypto Primitives
Hard Truths about the Hard Business of finding Hard Random Numbers
Matthew Green on December 2014 Snowden Dump
Blog for the cryptography group of the University of Bristol
Performance analysis of different cryptographic algorithms implemented in an FPGA
How Code Breakers Work
Jacobian coordinates for short Weierstrass curves (algs to use)
Apple Crypto Libraries
Awesome Cryptogtaphy
An introductory course on cryptography
A Stick Figure Guide to the Advanced Encryption Standard (AES)
Mutually Authenticated TLS from a Go client
General Security
Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush
Real HSM Breaches
OpenTechFund/secure-chat roadmap. More like a planet survey.
Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina
Hardening Your Web Server
Secret Cells, Threats and Assumptions
Mozilla Recommendations for Security/Server Side TLS
SSL Cipher Suite Details of Your Browser
Check out Your Browser's SSL Support
Stop Firefox leaking data about you
Mobile Carrier Super-Cookie Use
Linux workstation security checklist
Efficient Group Key Signing Method
caff, proof of posession of the passphrase of a key sent by the email address associated with that key
OnionShare
Journal of Cybersecurity
We Should All Have Something To Hide, Moxie
A Gentle Introduction to Secure Computation
FTC - Time to rethink mandatory password changes
Camouflage from face detection
FreeBSD - a lesson in poor defaults
!FireFox about:config set dom.webnotifications.enabled and dom.push.enabled
to false to prevent push notifications]
Cyber Security Reading List
Tech Solidarity Personal Security CheckList Review
Shared thoughts after 6+ years in Pentesting
A Catalog of Exploits
Blockchain Graveyard, Crypto-Currency Disasters
ipcrypt: IP-format-preserving encryption
F-Secure’s Guide to Evil Maid Attacks
Fuzzing JSON Web Services
PEN Tester's Tool List
Awesome Web Security
[Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.](https://www.hrw.org/everyday-encryption)
Excellent piece on vulnerability disclosure
An SSL/TLS and PKI Timeline
Privacy Projects
Privacy Software Workshop Series
Peer 2 Peer BGP Security
Setting Up I2P and Tor Darknets
Securing Open Source
Secure Messaging roadmap from the LEAP project
Tools
ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust
Canary Token Generator
YubiKey Configuration for GPG, SSH, and U2F
collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Free Security Tools an End User Should Start Using NOW
Securing how folk use ssh
Clean Poisoned Keys on your GPG Keyring
OSINT Resources for 2019
System Administration
Automation
Ansible
[http://www.ansibleworks.com/docs/faq.html
[https://nsrc.org/workshops/2013/nsrc-ubuntunet-trainers/raw-attachment/wiki/Agenda/intro-ansible.pdf NSRC Intro (pdf)
append an existing list using set_fact
Module Provided Facts
for JunOS
for NX-OS
for IOSxr
Bronwyn Tutorial
Finding the size of various object in your postgres database
Quadrupling Ansible performance with Mitogen
Configuration Tools
LDPush, A cross-vendor network configuration distribution tool
CLI tool to push junoscript configs to Juniper network devices
Python tool to configure networking interfaces on a Linux machine
Miscellaneous SysAdmin
Check if Upgrade has Dynmic Lib Dependencies which Need Restart
Telcos & Lesser Forms of Humor
Virtualization
Ganeti
Experimental Ganeti extstorage provider for ZFS volumes
Ganeti using LVM over ZFS (zfsonlinux)
Installing pfSense as VirtIO on Ganeti
Make a Node Multi-Homed
Also how to Make a Node Multi-Homed
Upgrading to 2.12 and Onward
Ganeti Web Manager
NSRC Instructions for Ganeti Web Manager Installation
snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images
Editing Cluster Configuration (/var/lib/ganeti/config.data)
Cluster Key Replacement
Generate/Replace SSL Certificates
lvextend -L+50G -r /dev/mapper/ganeti-var
Ganeti Performance Tuning
Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels
Misc Cloudware
Windows
Ops Tools
Security
Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS
Misc Windows Stuff
Split PowerPoint Animations into PDFs
Misceleanous
Framadate, an open doodle replacement
Snowden at IETF, plugs CrypTech at 0:38:00
How to construct a Nature summary paragrah (aka abstract)
Web Design: The First 100 Years
White Rabbit Express - Buy anything from Japan
NetFlix Secret Category Codes
Supranational European Bodies
Free Open WebRTC Site
The Small of the Soup
O RLY Cover Generator
IIJ Lab Conference Calendar
LaTeX hints
Big Font Generator
Levels of Techie Enlightenment
Freelance Achievement Stickers
Fast-Track Arrival Options Around the World
Teen Vogue on Know Your Rights If You Get Arrested
Data, Past, Present, and Future
Create a Knitting Pattern
Tips for Writing Technical Papers by Jennifer Widom
Hong Kong Walled City
The Importance of Deep Work
Cheap Internet Fax Service
ASCIIdoc Cheat Sheet
Sockets in bash
ITU World Fiber Map
Using Apple Pay for Suica
More using Apple Pay for Suica
Remove Background from an Image
How Corning Makes Super-Pure Glass for Fiber-Optic Cable
Stephenson on Undersea Cables
Deep Sea Diving: The State of Submarine Cable Technology -- Geoff Huston
Regular Expression Visualizer
Donald Knuth Lectures Online
TCPtrace and xplot Cheat Sheet
Candidate First Hiring
Differential Privacy Made Simpler
Containers from Scratch
Let Me Google This For You
Custom Knives Jonas
Vonada's Engineering Maxms
Animated Knots
Why Smart Individuals Make Dumb Group Decisions
PGP 32-bit PGP KeyID Delenda Est!
Japanese Cooking 101 by Maki Itoh
When Silence Spells Trouble at Work
A Guide for Session Chairs
USB-C Explained, or Why USB Type C is Bad Design
Singapore Recommendations
Safer BASH Scripts
(A few) Ops Lessons We All Learn The Hard Way
The On-Line Encyclopedia of Integer Sequences
Cat HTTP Error Codes
Programming Sucks
The Real In-Flight PSA
NFL Ref Memes About Arguing on the Internet
Street Views of 1940s New York
Ghibli Backgrounds
Casual Creators: designing tools for casual creativity>br>
CoCreate - Shared Scribble over Net
Richard Hamming - A Stroke of Genius: Striving for Greatness in All You Do
Super Hipster Linen from South Africa
2021.01.11