Fawkes – Photo Privacy Protection
Photo Privacy Protection
Photo Privacy Protection
How to properly handle file upload situation in your application
adversary-in-the-middle TLS interception
Why your data and privacy matter
Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike.
Cloud environments are bustling with security risks. Attackers might exploit misconfigurations, vulnerabilities, overprivileged identities, plaintext secrets and more
Bash script to download all the repos you have access to and run deepsecrets in order to find any leak
How this technique still works today and how to avoid it
Typosquatting is coming back strong again.
IPED Digital Forensic Tool. It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners
A small trip into Biometric Authentication and how they works
Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research
How to evesedrop on LTE connections