Pinboard (asteroza)
https://pinboard.in/u:asteroza/public/
recent bookmarks from asterozaWargames – UTW2023-02-15T05:26:49+00:00
https://underthewire.tech/wargames
asterozaonline pentesting education learning sandbox tutorial security CTF hackinghttps://pinboard.in/u:asteroza/b:fcade9f0ee67/imran-parray/Mind-Maps: Mind-Maps of Several Things2022-12-27T09:04:31+00:00
https://github.com/imran-parray/Mind-Maps
asterozasecurity mindmap education learninghttps://pinboard.in/u:asteroza/b:c4e151f2134f/Invisibility cloak2022-10-27T09:18:32+00:00
https://www.cs.umd.edu/~tomg/projects/invisible/
asterozaadversarial pattern antisurveillance deep machine learning AI image recognition camouflage security privacy anonymity researchhttps://pinboard.in/u:asteroza/b:74fd7e333bea/Cory Doctorow on Twitter: "Today, I read "ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks," a preprint from an Oxford, Cambridge, Imperial College and University of Edinburgh team including the formidable @rossjander?2022-10-14T07:30:43+00:00
https://twitter.com/doctorow/status/1579870646666153985
asterozasecurity adversarial training data deep machine learning AI compiler programming development computer science researchhttps://pinboard.in/u:asteroza/b:95a845038ea2/[2210.00108] ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks2022-10-14T07:27:20+00:00
https://arxiv.org/abs/2210.00108
asterozasecurity adversarial training data deep machine learning AI compiler programming development computer science researchhttps://pinboard.in/u:asteroza/b:06ced6c94f46/A Guide to Improving Security Through Infrastructure-as-Code – NCC Group Research2022-09-23T06:29:09+00:00
https://research.nccgroup.com/2022/09/19/a-guide-to-improving-security-through-infrastructure-as-code/
asterozasecurity training education learning Infrastructure devops cloudhttps://pinboard.in/u:asteroza/b:82ccef8659aa/OpsecEdu2022-09-07T00:50:45+00:00
https://www.opsecedu.com/
asterozasecurity education learning k12 university IT operationshttps://pinboard.in/u:asteroza/b:b397c48bdf7e/Brigs 💬 on Twitter: "🐙 Need some #DFIR extractions for learning & research purposes? 🥡 Takeout the .@MagnetForensics CTF 2022 images at Digital Corpora. 🥢 Chop & dice #iOS, #Android, #Windows extractions & more. 🫗 Download them 2022-08-17T22:54:50+00:00
https://twitter.com/AlexisBrignoni/status/1558610830110777344
asterozaDFIR security hacking pentesting training education learning memory imagehttps://pinboard.in/u:asteroza/b:7aa1f058fe15/Cloud Security Wiki | Cloud Security Wiki2022-07-28T11:33:15+00:00
https://www.secwiki.cloud/
asterozacloud security reference information education learninghttps://pinboard.in/u:asteroza/b:8f2c34e5e3f6/NIST-PQC Choices Out – Mark Schultz – PhD Student in CS at UCSD2022-07-07T04:00:43+00:00
https://mark-schultz.github.io/nist-standard-out/
asterozaeducation learning NIST post-quantum encryption cryptography Securityhttps://pinboard.in/u:asteroza/b:cb3a8c40d15d/NMAP Guide2022-06-08T05:48:46+00:00
https://nmap.org/misc/hakin9-nmap-ebook-ch1.pdf
asterozasecurity hacking pentesting education learning guide tutorial reference informationhttps://pinboard.in/https://pinboard.in/u:asteroza/b:46f82b2da522/SOC Analyst Study Guide2022-05-25T23:06:00+00:00
https://biggingerhoneypot.notion.site/68fb84422c8b47118569f7585054a7d7?v=570aca319ed34b3da252ffb5a74ae698
asterozasecurity SOC education learning malware analysis sysadmin tips trickshttps://pinboard.in/u:asteroza/b:bf179a1646bc/Dual use of artificial-intelligence-powered drug discovery | Nature Machine Intelligence2022-03-23T05:28:00+00:00
https://www.nature.com/articles/s42256-022-00465-9
asterozaAI drug discovery dual use safety security chemical weapon medicine research computational chemistry ethics machine learning science toxic molecule biochemical design PoChttps://pinboard.in/u:asteroza/b:fb8511358801/Diving into RFID Protocols with Flipper Zero2021-09-30T03:32:26+00:00
https://blog.flipperzero.one/rfid/
asterozaeducation learning RFID NFC HID security sysadmin tips trickshttps://pinboard.in/u:asteroza/b:8588a6f730c7/GitHub - Hamid-K/bookmarks2021-08-10T05:13:15+00:00
https://github.com/Hamid-K/bookmarks
asterozasecurity education learning bookmark list reference informationhttps://pinboard.in/u:asteroza/b:bfca1f4bf90e/bookmarks/Learn-Security-Materials.md at main · Hamid-K/bookmarks · GitHub2021-08-04T04:33:57+00:00
https://github.com/Hamid-K/bookmarks/blob/main/Learn-Security-Materials.md
asterozasecurity education learning bookmark listhttps://pinboard.in/u:asteroza/b:39058bb251e3/Microsoft open-sources Counterfit, an AI security risk assessment tool | VentureBeat2021-05-19T05:44:52+00:00
https://venturebeat.com/2021/05/04/microsoft-open-sources-counterfit-an-ai-security-risk-assessment-tool/
asterozaazure deep machine learning security audit assessment tools utiltiies software microsoft opensourcehttps://pinboard.in/u:asteroza/b:5b6e59c4c204/AI security risk assessment using Counterfit - Microsoft Security2021-05-19T05:44:40+00:00
https://www.microsoft.com/security/blog/2021/05/03/ai-security-risk-assessment-using-counterfit/
asterozaazure deep machine learning security audit assessment tools utiltiies software microsoft opensourcehttps://pinboard.in/u:asteroza/b:942de8040bf3/Azure/counterfit: a CLI that provides a generic automation layer for assessing the security of ML models2021-05-19T05:44:35+00:00
https://github.com/Azure/counterfit/
asterozaazure deep machine learning security audit assessment tools utiltiies software microsoft opensourcehttps://pinboard.in/u:asteroza/b:e1a42b1ad272/Notes/interview-study-notes-for-security-engineering.md at master · gracenolan/Notes · GitHub2021-03-25T03:12:07+00:00
https://github.com/gracenolan/Notes/blob/master/interview-study-notes-for-security-engineering.md
asterozagoogle interview security engineer education learning topics sysadmin reference informationhttps://pinboard.in/u:asteroza/b:9c23df4dd724/OWASP Top 10 for API2021-03-19T04:45:15+00:00
https://application.security/free/owasp-top-10-API
asterozasecurity hacking pentesting education learning visualization OWASP traininghttps://pinboard.in/u:asteroza/b:cadebf30673c/Advanced Persistent Infrastructure Tracking - Censys2020-12-14T02:52:40+00:00
https://censys.io/advanced-persistent-infrastructure-tracking/
asterozaC2 server tracking threat intelligence education learning howto guide tutorial securityhttps://pinboard.in/u:asteroza/b:f809f0f02e50/Joshua Saxe on Twitter: "How to evaluate a cybersecurity vendor's ML claims even if you don't know much about ML (thread). 1) Ask them why they didn't solely rely on rules/signatures in their system -- why is ML necessary? If they don't have a clear ex…2020-11-18T03:44:53+00:00
https://twitter.com/joshua_saxe/status/1328834270723452928
asterozahumor security product evaluation deep machine learning AI snakeoilhttps://pinboard.in/u:asteroza/b:d91fb494036e/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters: A list of resources for those interested in getting started in bug bounties2020-10-23T02:45:06+00:00
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
asterozasecurity training education learninghttps://pinboard.in/u:asteroza/b:6662862bac41/Fawkes2020-10-21T08:34:50+00:00
http://sandlab.cs.uchicago.edu/fawkes/
asterozafacial recognition defense image picture photo face blur research privacy anonymity security adversarial deep machine learning exploit dataset poisoninghttps://pinboard.in/u:asteroza/b:c58837cbbdbf/CySkills – Data-Driven Cybersecurity Training, Education and Exercises2020-09-09T01:53:09+00:00
https://cyskills.com/
asterozasecurity training education learninghttps://pinboard.in/u:asteroza/b:28c5f329857b/IoT-PTv/IoT-PT: A Virtual environment for Pentesting IoT Devices2020-08-24T05:30:20+00:00
https://github.com/IoT-PTv/IoT-PT
asterozaIoT security hacking pentesting training education learninghttps://pinboard.in/u:asteroza/b:ed3ef3b5a1ad/Writing an Interactive Book 📖 over the Threat Hunter Playbook 🏹 with the help of the Jupyter Book Project 💥 | by Roberto Rodriguez | Open Threat Research | Medium2020-08-18T05:23:25+00:00
https://medium.com/threat-hunters-forge/writing-an-interactive-book-over-the-threat-hunter-playbook-with-the-help-of-the-jupyter-book-3ff37a3123c7
asterozaJupyter book notebook publishing python data science opensource software threat hunting blue team defense security education learninghttps://pinboard.in/u:asteroza/b:fd95bc561729/CCDCOE2020-08-04T07:52:23+00:00
https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/
asterozaNATO malware reverse engineering handbook education learning security hacking pentesting programming reference information assembly tutorialhttps://pinboard.in/u:asteroza/b:a699104c2f8a/Certificate Transparency: a bird’s-eye view | Emily M. Stark2020-08-04T07:32:01+00:00
https://emilymstark.com/2020/07/20/certificate-transparency-a-birds-eye-view.html
asterozaSSL TLS security certificate transparency PKI webPKI reference information education learninghttps://pinboard.in/u:asteroza/b:c68db578fae0/binaryai/sdk: BinaryAI Python SDK2020-07-07T02:18:01+00:00
https://github.com/binaryai/sdk
asterozaGNN binary code similarity database reference information python machine deep learning securityhttps://pinboard.in/u:asteroza/b:401184da82e7/Vulnserver Exploit vs Windows Defender Exploit Guard | notes…2020-06-29T03:28:35+00:00
https://chadduffey.com/2020/06/27/VulnServerVSExploitGuard.html
asterozawindows defender exploit guard walkthrough education learning security sysadmin blueteam defensehttps://pinboard.in/u:asteroza/b:1021bfe23099/Technical Project Ideas Towards Learning Cyber Security2020-06-23T04:19:31+00:00
https://mchow01.github.io/education/security/projects/2020/06/19/technical_projects_security.html
asterozainformation security education learninghttps://pinboard.in/u:asteroza/b:56316b03b961/Security Engineering - A Guide to Building Dependable Distributed Systems2020-06-16T01:33:40+00:00
https://www.cl.cam.ac.uk/~rja14/book.html
asterozasecurity engineering book PDF reference information education learning cryptographyhttps://pinboard.in/u:asteroza/b:41beab599db3/FSecureLABS/captcha22: CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.2020-05-21T07:50:45+00:00
https://github.com/FSecureLABS/captcha22
asterozatext CAPTCHA cracking software opensource security hacking pentesting solver deep machine learning neural networkhttps://pinboard.in/u:asteroza/b:9e1f5aedd324/SensePost | Chaining multiple techniques and tools for domain takeover using rbcd2020-04-10T06:52:25+00:00
https://sensepost.com/blog/2020/chaining-multiple-techniques-and-tools-for-domain-takeover-using-rbcd/
asterozasecurity hacking pentesting education learning reference information windows AD active directory RBCDhttps://pinboard.in/u:asteroza/b:58983d0b5104/ACCESS PROHIBITED - The Physical Security Tool Guide to Hacks, Cracks, – Rift Recon2020-04-03T07:47:52+00:00
https://shop.riftrecon.com/collections/free-prize-inside/products/red-team-kit-dossier
asterozaPDF physical access penetration reference information education learning security traininghttps://pinboard.in/u:asteroza/b:0e9f78614245/Lateral Movement2020-03-30T04:42:36+00:00
https://riccardoancarani.github.io/2019-10-04-lateral-movement-megaprimer/
asterozawindows AD active directory lateral movement guide howto tutorial education learning security hacking pentesting reference informationhttps://pinboard.in/u:asteroza/b:886d3c6199d6/SheHacksPurple2020-03-23T06:32:46+00:00
https://www.shehackspurple.dev/
asterozawebapp appsec security education learning platformhttps://pinboard.in/u:asteroza/b:0215130393cb/[1802.08232] The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks2020-03-15T23:57:05+00:00
https://arxiv.org/abs/1802.08232
asterozaprivacy security dep machine learninghttps://pinboard.in/u:asteroza/b:1af2bd0d84b0/bellingcat - Guide To Using Reverse Image Search For Investigations - bellingcat2020-01-06T08:10:28+00:00
https://www.bellingcat.com/resources/how-tos/2019/12/26/guide-to-using-reverse-image-search-for-investigations/
asterozaOSINT reverse image search guide tutorial reference information tips tricks education learning photography security analysishttps://pinboard.in/u:asteroza/b:c6736686fd95/How to Run Kali Linux on All VMware Platforms | vMiss.net2019-12-11T05:39:09+00:00
https://vmiss.net/2019/12/10/kali-linux-vmware/
asterozaVMware kali security hacking pentesting education learning homelabhttps://pinboard.in/u:asteroza/b:93db738713d9/Introduction to Web Application Security - Blackhoodie US 20182019-10-14T07:20:47+00:00
https://www.slideshare.net/nragupathy/introduction-to-web-application-security-blackhoodie-us-2018
asterozaeducation learning webapp securityhttps://pinboard.in/u:asteroza/b:2494f5131dfe/Uncovering The Unknowns - Posts By SpecterOps Team Members2019-10-14T07:04:40+00:00
https://posts.specterops.io/uncovering-the-unknowns-a47c93bb6971
asterozaeducation learning sysmon windows event log ID mapping sysadmin tips tricks securityhttps://pinboard.in/u:asteroza/b:80e98055dd21/jsecurity101/Windows-API-To-Sysmon-Events: A repository that maps API calls to Sysmon Event ID's.2019-10-14T07:04:24+00:00
https://github.com/jsecurity101/Windows-API-To-Sysmon-Events
asterozaeducation learning sysmon windows event log ID mapping sysadmin tips tricks securityhttps://pinboard.in/u:asteroza/b:af38c399bfae/fireeye/stringsifter: A machine learning tool that automatically ranks strings based on their relevance for malware analysis.2019-09-20T05:00:33+00:00
https://github.com/fireeye/stringsifter/
asterozasecurity defense blueteam malicious string ranking machine learning malware analysis sifterhttps://pinboard.in/u:asteroza/b:889b25b30fe3/A Practical Approach to Understanding Kubernetes Authorization - The New Stack2019-08-23T06:27:29+00:00
https://thenewstack.io/a-practical-approach-to-understanding-kubernetes-authorization/
asterozakubernetes devops education learning securityhttps://pinboard.in/u:asteroza/b:a848c6f954ee/Introduction to Cybersecurity Tools & Cyber Attacks - History of Cybersecurity | Coursera2019-08-23T05:43:26+00:00
https://www.coursera.org/lecture/introduction-cybersecurity-cyber-attacks/introduction-to-cybersecurity-tools-cyber-attacks-27Pex
asterozainfosec education learning online securityhttps://pinboard.in/u:asteroza/b:4638504e397a/secrary/DrSemu: Dr.Semu - Malware Detection and Classification Tool Based on Dynamic Behavior2019-08-23T05:22:00+00:00
https://github.com/secrary/DrSemu
asterozamalware automated detection classification deep machine learning analysis security hacking pentestinghttps://pinboard.in/u:asteroza/b:977ca657b14d/The Matasano Crypto Challenges (Pinboard Blog)2019-08-16T05:48:07+00:00
https://blog.pinboard.in/2013/04/the_matasano_crypto_challenges/
asterozaprogramming cryptography security learninghttps://pinboard.in/u:asteroza/b:cc9ae3e88063/blaCCkHatHacEEkr/PENTESTING-BIBLE2019-08-06T07:39:31+00:00
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
asterozasecurity hacking pentesting reference information education learning programminghttps://pinboard.in/u:asteroza/b:2a1227a9465e/Safe.Page2019-06-14T07:01:44+00:00
https://safe.page/
asterozagoogle phishing security guidance education learninghttps://pinboard.in/u:asteroza/b:4d86077b9764/What are Deep Neural Networks Learning About Malware? « What are Deep Neural Networks Learning About Malware? | FireEye Inc2019-05-08T03:58:25+00:00
https://www.fireeye.com/blog/threat-research/2018/12/what-are-deep-neural-networks-learning-about-malware.html
asterozadeep machine learning automated malware classification securityhttps://pinboard.in/u:asteroza/b:eb208cff4ed4/[PentesterLab] Unix Badge2019-01-25T01:26:40+00:00
https://pentesterlab.com/badges/unix
asterozapentesting security hacking education learninghttps://pinboard.in/u:asteroza/b:cc3417537783/amanhardikar.com/mindmaps/Practice.html2018-12-20T00:37:42+00:00
http://www.amanhardikar.com/mindmaps/Practice.html
asterozatraining security hacking pentesting education learning reference informationhttps://pinboard.in/u:asteroza/b:0bd5884e7c7b/[1705.07386] DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution2018-11-14T05:45:42+00:00
https://arxiv.org/abs/1705.07386
asterozabiometric security research deep machine learning GAN masterkey skeletonkey master fingerprinthttps://pinboard.in/u:asteroza/b:4c9abf50e5fd/[1811.01134] A Marauder's Map of Security and Privacy in Machine Learning2018-11-09T07:59:12+00:00
https://arxiv.org/abs/1811.01134
asterozaprivacy security deep machine learning adversarial attack exploithttps://pinboard.in/u:asteroza/b:fc26739a8e7f/OverTheWire: Wargames2018-10-03T07:06:25+00:00
https://overthewire.org/wargames/
asterozaonline pentesting education learning sandbox tutorial security CTF hackinghttps://pinboard.in/u:asteroza/b:40ecace11743/Cybrary - Online Cyber Security Training, Free, Forever2018-09-19T04:14:39+00:00
https://www.cybrary.it/
asterozaonline education learning IT security sysadmin infosec traininghttps://pinboard.in/u:asteroza/b:3722e8bb29a6/da_667 on Twitter: "I'm gonna take a moment and link to a metric assload of training resources I've mentioned in various mentorship/guidance counselor DMs. Most of these, you probably heard of. but if you haven't then maybe they'll be helpful."2018-09-19T04:14:14+00:00
https://twitter.com/da_667/status/1041867361765269505
asterozainformation security education learning referencehttps://pinboard.in/u:asteroza/b:4496af8a2793/RhinoSecurityLabs/cloudgoat: Rhino Security Labs' "Vulnerable by Design" AWS infrastructure setup tool2018-09-05T00:35:59+00:00
https://github.com/RhinoSecurityLabs/cloudgoat
asterozaAWS security training pentesting lab learning education environmenthttps://pinboard.in/u:asteroza/b:f11c8905589b/"Reverse Engineering for Beginners" free book2018-09-03T05:01:34+00:00
https://beginners.re/
asterozareverse engineering software security education learning online assemblyhttps://pinboard.in/u:asteroza/b:b97e7957b298/Manning | Securing DevOps2018-08-31T04:47:29+00:00
https://www.manning.com/books/securing-devops
asterozabook education learning security devops sysadminhttps://pinboard.in/u:asteroza/b:a01c9be56bd4/TryCatchHCF/DumpsterFire: "Security Incidents In A Box!"2018-08-11T08:58:33+00:00
https://github.com/TryCatchHCF/DumpsterFire
asterozadecoy dumpsterfire security incident event framework hacking pentesting learning education timebombhttps://pinboard.in/u:asteroza/b:35f6a1e0aebe/ww9210/Linux_kernel_exploits: I will publish some Linux kernel exploits for various real world kernel vulnerabilities here. the samples are uploaded for education purposes for red and blue teams.2018-08-10T23:44:57+00:00
https://github.com/ww9210/Linux_kernel_exploits
asterozalinux kernel exploit collection traingin education learning security hacking pentestinghttps://pinboard.in/u:asteroza/b:a14a8b6cba79/Building Your Own Kickass Home Lab - Google Slides2018-08-10T02:27:31+00:00
https://docs.google.com/presentation/d/1V-mWiyaJ3I6HhXRxH1M5ityWYRqb5PoNHwvWSZaOr_E/mobilepresent#slide=id.p
asterozahome lab computer PC server network design adivcce education learning tutorial guide security sysadminhttps://pinboard.in/u:asteroza/b:e7cca4e08869/Crackmes2018-07-19T00:30:01+00:00
https://crackmes.one/
asterozareverse engineering training online education learning software securityhttps://pinboard.in/u:asteroza/b:afef1bdf6429/Chronicle Security - Homepage2018-07-13T01:51:50+00:00
https://chronicle.security/
asterozagoogle moonshot security platfform service machine learning immune systemhttps://pinboard.in/u:asteroza/b:31d7aab4db4e/RE for Beginners | Reverse Engineering2018-07-02T04:35:34+00:00
https://www.begin.re/
asterozareverse engineering education learning programming assembly security hacking pentesting reference tutorialhttps://pinboard.in/u:asteroza/b:3941cff6c505/raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt2018-06-12T04:33:32+00:00
https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt
asterozasecurity hacking pentesting reference information education learning infosechttps://pinboard.in/u:asteroza/b:1291de40f998/(3) How to get into PenTesting / InfoSec? | LinkedIn2018-06-11T05:10:16+00:00
https://www.linkedin.com/pulse/how-get-pentesting-infosec-chris-nickerson/
asterozasecurity hacking pentesting education learning reference informationhttps://pinboard.in/u:asteroza/b:54a518ad3112/