Pinboard (websitejk)
https://pinboard.in/u:websitejk/public/
recent bookmarks from websitejkHome - SAFECode2020-07-28T03:40:17+00:00
https://safecode.org/
websitejkjk-volunteer jk-netizen jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:262e8f59a56f/KYK-132020-07-25T08:08:14+00:00
https://cryptomuseum.com/crypto/usa/kyk13/index.htm
websitejkjk-crypto jk-hobby jk-pro jk-infosec jk-historyhttps://pinboard.in/https://pinboard.in/u:websitejk/b:ff40003d6141/Crypto Museum2020-07-25T08:07:06+00:00
https://cryptomuseum.com/index.htm
websitejkjk-crypto jk-hobby jk-pro jk-infosec jk-historyhttps://pinboard.in/https://pinboard.in/u:websitejk/b:bd916fa07e0f/TechNet Microsoft Cybersecurity Reference Architecture2020-07-13T00:26:06+00:00
https://aka.ms/MCRA
websitejkjk-win10 jk-microshaft jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:a4244ac5a799/Ruin My Search History | The anti-google tool - ProPrivacy2020-06-28T10:13:52+00:00
https://proprivacy.com/tools/ruinmysearchhistory
websitejkjk-infosec jk-h4xx0r jk-webtools jk-g00ghttps://pinboard.in/https://pinboard.in/u:websitejk/b:ebe46409cdf5/Learn how to protect your digital privacy and stay safe online - ProPrivacy2020-06-28T09:56:41+00:00
https://proprivacy.com/
websitejkjk-privacy jk-news jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:e3e1610719ff/SANS Penetration Testing | SANS Pen Test Poster: Pivots Payloads Boardgame | SANS Institute2020-06-18T10:33:53+00:00
https://www.sans.org/blog/sans-pen-test-poster-pivots-payloads-boardgame/
websitejkjk-infosec jk-holyshit jk-games jk-training jk-careerhttps://pinboard.in/https://pinboard.in/u:websitejk/b:f2cb8a91ff09/Start in Infosec :: malicious.link — welcome2020-06-12T04:38:05+00:00
https://malicious.link/start/
websitejkjk-career jk-infosec jk-pro jk-examplehttps://pinboard.in/https://pinboard.in/u:websitejk/b:5852f279c2e3/G Suite Security Solutions / Google Apps2020-06-11T04:18:53+00:00
https://spinbackup.com/products/gsuite-security/
websitejkjk-gsuite jk-infosec jk-webtoolshttps://pinboard.in/https://pinboard.in/u:websitejk/b:3a555d999545/Gardening For Beginners: Essential Tools You Need To Get Started2020-06-09T08:42:03+00:00
https://www.forbes.com/sites/forbes-personal-shopper/2020/06/05/gardening-for-beginners-essential-gardening-tools/#11fe12086489
websitejkjk-infosec jk-pro jk-hiring jk-careerhttps://pinboard.in/https://pinboard.in/u:websitejk/b:64499905db8a/Wilders Security Forums2020-06-02T00:43:45+00:00
https://www.wilderssecurity.com/
websitejkjk-forums jk-infosec jk-secfeedhttps://pinboard.in/https://pinboard.in/u:websitejk/b:5236d2a2dde4/URL and website scanner - urlscan.io2020-05-23T23:41:14+00:00
https://urlscan.io/
websitejkjk-soc jk-infosec jk-thruntinghttps://pinboard.in/https://pinboard.in/u:websitejk/b:b89790c79cb2/GitHub - Neo23x0/sigma: Generic Signature Format for SIEM Systems2020-05-18T03:31:19+00:00
https://github.com/Neo23x0/sigma
websitejkjk-siem jk-homenetwork jk-infosec jk-netizenhttps://pinboard.in/https://pinboard.in/u:websitejk/b:fa0088ed589a/Devops Security Checklist2020-04-04T10:31:50+00:00
https://www.sqreen.com/checklists/devops-security-checklist
websitejkjk-devsecops jk-checklist jk-infosec jk-eng jk-blueteamhttps://pinboard.in/https://pinboard.in/u:websitejk/b:de70bda65b57/Move Fast & Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings - The Citizen Lab2020-04-04T08:55:06+00:00
https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/
websitejkjk-zoom jk-crypto jk-infosec jk-video jk-h4xx0r jk-netizenhttps://pinboard.in/https://pinboard.in/u:websitejk/b:9a21494e76e8/Getting started · Wazuh 3.12 documentation2020-03-30T09:28:30+00:00
https://documentation.wazuh.com/3.12/getting-started/index.html
websitejkjk-network jk-h4xx0r jk-opensource jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:920b40d166ae/RESILIA - AXELOS Cyber Resilience Review2020-01-25T22:51:11+00:00
https://pathway.axelos.com/
websitejkjk-tools jk-policy jk-diplo jk-career jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:6233db21ba25/EFF_letterhead22019-11-23T10:22:36+00:00
https://obamawhitehouse.archives.gov/files/documents/cyber/Electronic%20Frontier%20Foundation%20-%20To%20the%20White%20House%20Cyber%20Security%20Review%20Team.pdf
websitejkjk-govt jk-policy jk-infosec jk-pro jk-careerhttps://pinboard.in/https://pinboard.in/u:websitejk/b:b49567a9e694/The Hacks of Mr. Robot: How Elliot & Fsociety Destroyed Evil Corp's Data « Null Byte :: WonderHowTo2019-11-21T12:18:00+00:00
https://null-byte.wonderhowto.com/how-to/hacks-mr-robot-elliot-fsociety-destroyed-evil-corps-data-0164755/
websitejkWelcome back, my nascent hackers! In the conclusion of the Mr. Robot television series, Elliot and fsociety successfully completed their mission of encrypting all of Evil Corp's data with AES-128 encryption and destroying the key.]]>jk-article jk-infosec jk-infographic jk-graphicshttps://pinboard.in/u:websitejk/b:c810354780b4/Security Review of Consumer Home Internet of Things (IoT) Products2019-10-17T07:47:33+00:00
https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8267-draft.pdf
websitejkjk-iot jk-policy jk-docs jk-nist jk-infosec jk-bizdevhttps://pinboard.in/https://pinboard.in/u:websitejk/b:cccb9b0cbd41/- Black Hills Information Security2019-10-14T07:54:54+00:00
https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/
websitejkjk-games jk-infosec jk-qq jk-pentest jk-blueteam jk-redteamhttps://pinboard.in/https://pinboard.in/u:websitejk/b:2c684e96f554/IPv4 Address Converter - Vultr.com2019-10-08T00:45:03+00:00
https://www.vultr.com/resources/ipv4-converter/
websitejkjk-tool4kit jk-network jk-infosec jk-engineerhttps://pinboard.in/https://pinboard.in/u:websitejk/b:b1718d65ba67/Assessment of Pivotal Cloud Foundry against NIST SP 800-53(r4) Controls | NIST Controls and PCF2019-10-05T23:33:24+00:00
https://docs.pivotal.io/nist/index.html
websitejkjk-docs jk-policy jk-nist jk-infosec jk-carehttps://pinboard.in/https://pinboard.in/u:websitejk/b:84f23d2329ff/Whitepapers - DFIR - The Definitive Compendium Project2019-09-26T22:49:04+00:00
https://aboutdfir.com/reading/whitepapers/
websitejkjk-article jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:4000db5f1cfa/Mobile Usage Statistics per second in realtime2019-09-26T22:35:47+00:00
https://www.dealsunny.com/mobile-usage-statistics/
websitejkjk-dashboard jk-metrics jk-stats jk-holyshit jk-privacy jk-infosechttps://pinboard.in/https://pinboard.in/u:websitejk/b:a02c7e2c73b0/The-ISC2-Cybersecurity-Lexicon.ashx2019-09-23T05:32:38+00:00
https://www.isc2.org/-/media/ISC2/Training/The-ISC2-Cybersecurity-Lexicon.ashx?la=en&hash=6CFA8DBE8C09EF4E28602EA38B0001340AC34AA8
websitejkjk-infosec jk-docs jk-prohttps://pinboard.in/u:websitejk/b:dc7bbaa92ac0/Protection From Harvesters « WordPress Codex2019-08-26T00:08:59+00:00
https://codex.wordpress.org/Protection_From_Harvesters
websitejkjk-design jk-privacy jk-mail jk-infosechttps://pinboard.in/u:websitejk/b:42cefce810b7/How to Deploy HTTPS Correctly | Electronic Frontier Foundation2019-08-09T01:21:37+00:00
https://www.eff.org/https-everywhere/deploying-https
websitejkjk-eff jk-encryption jk-policy jk-https jk-infosec jk-blog effhttps://pinboard.in/https://pinboard.in/u:websitejk/b:451b3a58c824/Microsoft Office 365 Security Observations | CISA2019-08-04T12:56:02+00:00
https://www.us-cert.gov/ncas/analysis-reports/AR19-133A
websitejkjk-policy jk-govt jk-infosec jk-cloudedhat jk-microshafthttps://pinboard.in/https://pinboard.in/u:websitejk/b:766942c97747/Best Behavior Bingo2019-07-21T11:42:04+00:00
https://www.wombatsecurity.com/bingo
websitejkjk-infosec jk-training jk-toolkits jk-gameshttps://pinboard.in/https://pinboard.in/u:websitejk/b:ba97f0c173df/GitHub - google/grr: GRR Rapid Response: remote live forensics for incident response2019-07-10T11:30:34+00:00
https://github.com/google/grr
websitejkjk-qq jk-vuln jk-infosec jk-engineer jk-pentest jk-incidenthttps://pinboard.in/https://pinboard.in/u:websitejk/b:2d35add8660e/Active Directory Red Forest Design aka Enhanced Security Administrative Environment (ESAE) - TechNet Articles - United States (English) - TechNet Wiki2019-06-24T14:59:35+00:00
https://social.technet.microsoft.com/wiki/contents/articles/37509.active-directory-red-forest-design-aka-enhanced-security-administrative-environment-esae.aspx
websitejkjk-sysadmin jk-toolkits jk-infosec jk-engineer jk-tools jk-microshafthttps://pinboard.in/https://pinboard.in/u:websitejk/b:362a4905b6ae/Is it down? Check at Down For Everyone Or Just Me2019-06-19T16:27:27+00:00
https://downforeveryoneorjustme.com/
websitejkjk-tools jk-webtools jk-dashboard jk-infosechttps://pinboard.in/u:websitejk/b:c4fd7d52352f/CS527 Software Security - Software Bugs2019-05-08T09:22:07+00:00
https://nebelwelt.net/teaching/18-527-SoftSec/slides/06-software_bugs.pdf
websitejkjk-training jk-infosec jk-self jk-career jk-codinghttps://pinboard.in/u:websitejk/b:55473ba70ef0/A Conspiracy To Kill IE62019-05-02T02:02:58+00:00
http://blog.chriszacharias.com/a-conspiracy-to-kill-ie6
websitejkjk-example jk-infosec jk-bizdevhttps://pinboard.in/u:websitejk/b:442769bffb15/Cybersecurity | NOVA Labs | PBS2019-04-27T11:09:54+00:00
https://www.pbs.org/wgbh/nova/labs/lab/cyber/
websitejkTake cybersecurity into your own hands by thwarting a series of cyber attacks. ]]>jk-training jk-infosec jk-bizdevhttps://pinboard.in/u:websitejk/b:b9f81f6a6850/Cuckoo Sandbox - Automated Malware Analysis2019-04-14T23:41:06+00:00
https://cuckoosandbox.org/
websitejkjk-malwares jk-infosec jk-engineerhttps://pinboard.in/u:websitejk/b:a1d8c9164558/Campaign Archive - Access Now2019-04-13T22:00:41+00:00
https://www.accessnow.org/campaign/
websitejkjk-netizen jk-hacktivist jk-infosec jk-volunteerhttps://pinboard.in/u:websitejk/b:bc10e6d6f599/Share and accept documents securely - SecureDrop2019-04-13T21:52:42+00:00
https://securedrop.org/
websitejkjk-cloudedhat jk-infosec jk-h4xx0r jk-privacy jk-netizenhttps://pinboard.in/u:websitejk/b:664395628b14/National Cybersecurity & Communications Integration Center | Homeland Security2019-04-12T22:25:24+00:00
https://www.dhs.gov/cisa/national-cybersecurity-communications-integration-center
websitejkThe National Cybersecurity & Communications Integration Center (NCCIC) serves as a centralized location where operational elements involved in cybersecurity and communications reliance are coordinated and integrated. NCCIC partners include all federal departments and agencies; state, local, tribal, and territorial governments; the private sector; and international entities.]]>jk-govt jk-policy jk-infosechttps://pinboard.in/u:websitejk/b:6b08dbc55303/The Modern Attack Surface and the Cyber Exposure Gap | Tenable®2019-04-12T04:09:51+00:00
https://www.tenable.com/cyber-exposure
websitejkIf you are flying blind into a widening Cyber Exposure Gap...well, that’s just untenable. Learn more here.]]>jk-infosec jk-brochurehttps://pinboard.in/u:websitejk/b:50479555e70c/A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password Spraying)2019-04-10T18:38:31+00:00
https://delta.navisec.io/osint-for-pentesters-part-3-password-spraying-methodology/
websitejkjk-infosec jk-qq jk-pentest jk-vulnhttps://pinboard.in/u:websitejk/b:701d21c6e657/CUI Program Blog – Blog of the Controlled Unclassified Information Program, Information Security Oversight Office, NARA2019-03-30T19:13:31+00:00
https://isoo.blogs.archives.gov/
websitejkBlog of the Controlled Unclassified Information Program, Information Security Oversight Office, NARA]]>jk-ic jk-policy jk-govt jk-career jk-infosechttps://pinboard.in/u:websitejk/b:c1478ea81a38/Patch_Management_Policy_FINAL.pdf2019-03-24T02:43:57+00:00
https://www.exeter.ac.uk/media/level1/academicserviceswebsite/it/recordsmanagementservice/policydocuments/Patch_Management_Policy_FINAL.pdf
websitejkjk-vuln jk-patching jk-infosec jk-policy jk-b7https://pinboard.in/u:websitejk/b:f0a080417190/NVD - CVSS v3 Calculator2019-03-24T02:22:00+00:00
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
websitejkjk-nist jk-vuln jk-nerdout jk-infosechttps://pinboard.in/u:websitejk/b:3e35fa5526cb/Setup a Non-root User with Sudo Access on Ubuntu - Vultr.com2019-03-20T21:19:34+00:00
https://www.vultr.com/docs/setup-a-non-root-user-with-sudo-access-on-ubuntu
websitejkjk-bestpractice jk-infosec jk-cloudhttps://pinboard.in/u:websitejk/b:15e54562ed7f/Information security incident reporting policy - Tech Pro Research2019-03-20T01:39:35+00:00
http://www.techproresearch.com/downloads/information-security-incident-reporting-policy/
websitejkMake sure your employees know how to spot potential security breaches and how they should respond. This policy describes the signs that might point to]]>jk-policy jk-bizdev jk-infosechttps://pinboard.in/u:websitejk/b:d54be8a0ac62/'Karma': Inside the hack used by the UAE to break into iPhones of foes2019-03-20T01:12:34+00:00
https://www.reuters.com/investigates/special-report/usa-spying-karma/
websitejkjk-infosec jk-ENDsa jk-privacy jk-holyshit jk-expathttps://pinboard.in/u:websitejk/b:d178131d8f62/Trevor Paglen Plumbs the Internet | The New Yorker2019-03-20T01:09:35+00:00
https://www.newyorker.com/tech/annals-of-technology/trevor-paglen-plumbs-the-internet-at-metro-pictures-gallery
websitejkjk-privacy jk-infosec jk-holyshit jk-cryptohttps://pinboard.in/u:websitejk/b:f18cab20a1ef/HTTPS Pledge – Library Freedom Project2019-03-20T00:43:36+00:00
https://libraryfreedomproject.org/https-pledge/
websitejkjk-privacy jk-infosec jk-activismhttps://pinboard.in/u:websitejk/b:7f3a46b5477c/IP and Domain Reputation Center || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence2019-03-15T20:05:54+00:00
https://www.talosintelligence.com/reputation_center
websitejkTalos have world's most comprehensive IP and Domain Reputation Center for real-time threat detection.]]>jk-engineer jk-soc jk-bigdata jk-dashboard jk-holyshit jk-infosechttps://pinboard.in/u:websitejk/b:f37753816a4a/webhint, the hinting engine for web best practices2019-03-15T06:07:58+00:00
https://webhint.io/
websitejkjk-tools jk-cli jk-vuln jk-infosec jk-pentesthttps://pinboard.in/u:websitejk/b:04fd5e10707b/The 42 Best Chrome Extensions for 20192019-03-14T10:04:32+00:00
https://blog.hubspot.com/marketing/best-chrome-extensions#security
websitejkExplore these Google Chrome web browser extensions to make your online experience easier, safer, and more productive.]]>jk-software jk-tools jk-www jk-infosec jk-villahttps://pinboard.in/u:websitejk/b:840a3a1a3dbb/GitHub - jawj/IKEv2-setup: Set up Ubuntu Server 18.04 as an IKEv2 VPN server2019-03-14T04:07:03+00:00
https://github.com/jawj/IKEv2-setup
websitejk sudo ipsec statusall # status, who's connected, etc.
sudo iptables -L -v # how much traffic has been forwarded, dropped, etc.?
sudo tail -f /var/log/syslog # real-time logs of (dis)connections etc.]]>jk-virt jk-cloud jk-infosec jk-cloudedhathttps://pinboard.in/u:websitejk/b:9d39c39b66f4/We oppose DRM. | Defective by Design2019-02-27T09:59:49+00:00
https://www.defectivebydesign.org/
websitejkjk-infosec jk-www jk-blog jk-privacyhttps://pinboard.in/u:websitejk/b:990fa70061e4/The lazy person's guide to cybersecurity: minimum effort for maximum protection - Malwarebytes Labs | Malwarebytes Labs2019-02-22T03:15:26+00:00
https://blog.malwarebytes.com/101/2019/02/the-lazy-persons-guide-to-cybersecurity-minimum-effort-for-maximum-protection/
websitejkjk-training jk-bizdev jk-kevin jk-blog jk-infosechttps://pinboard.in/u:websitejk/b:1981f59c48eb/Labs - InfoSec Resources2019-02-20T10:53:39+00:00
https://resources.infosecinstitute.com/labs/
websitejkjk-infosec jk-soc jk-engineer jk-career jk-kevin jk-bizdevhttps://pinboard.in/u:websitejk/b:5bac1b747764/Building a SOC on a Budget | AlienVault2019-02-20T10:30:25+00:00
https://www.alienvault.com/resource-center/ebook/building-a-soc
websitejkjk-infosec jk-soc jk-engineer jk-career jk-kevin jk-bizdevhttps://pinboard.in/u:websitejk/b:363c77254262/How to Plan Purple Team Exercises2019-02-19T09:25:56+00:00
https://www.slideshare.net/HaydnJohnson/how-to-plan-purple-team-exercises?qid=aa655e79-03aa-4b15-8ce9-d3ba9dc6ecc8&v=&b=&from_search=2
websitejkjk-engineer jk-vuln jk-qq jk-pentest jk-b7 jk-infosec jk-sochttps://pinboard.in/u:websitejk/b:5b5ada9724e9/Threat Actors Use of Cobalt Strike: Why Defense is Offense's Child | Digital Shadows2019-02-16T18:10:41+00:00
https://www.digitalshadows.com/blog-and-research/threat-actors-use-of-cobalt-strike-why-defense-is-offenses-child/
websitejkjk-b7 jk-pentest jk-vuln jk-h4xx0r jk-toolkits jk-infosec jk-engineerhttps://pinboard.in/u:websitejk/b:1d27d53f8f03/Mailvelope2019-02-16T14:07:46+00:00
https://www.mailvelope.com/en
websitejkMailvelope open source project. OpenPGP in your browser.]]>jk-crypto jk-infosec jk-opensource jk-linux jk-homenetworkhttps://pinboard.in/u:websitejk/b:5d27d7c083f5/GitHub - stivalet/TheHiveDocs: Documentation of TheHive2019-02-15T05:35:10+00:00
https://github.com/stivalet/TheHiveDocs
websitejkDocumentation of TheHive. Contribute to stivalet/TheHiveDocs development by creating an account on GitHub.]]>jk-soc jk-infosec jk-engineer jk-holyshit jk-b7 jk-career jk-bizdevhttps://pinboard.in/u:websitejk/b:6cca660c357c/SAMATE - Software Assurance Metrics And Tool Evaluation project main page2019-02-14T16:46:30+00:00
https://samate.nist.gov/Main_Page.html
websitejkjk-nist jk-govt jk-engineer jk-soc jk-infosec jk-vulnhttps://pinboard.in/u:websitejk/b:8d3b81124d3d/Two Factor Auth List2019-02-13T23:33:52+00:00
https://twofactorauth.org/
websitejkList of sites with Two Factor Auth support which includes SMS, email, phone calls, hardware, and software.]]>jk-infosec jk-training jk-bloghttps://pinboard.in/u:websitejk/b:9fbad2159bfe/Security Orchestration and Automation - Automate Your Incident Response and Security Operations with Komand By Rapid72019-02-12T23:25:21+00:00
https://www.komand.com/
websitejkRapid7 Komand is a security orchestration and automation platform that empowers your team to automate security workflows for streamlined security operations. No code required.]]>jk-vuln jk-toolkits jk-tools jk-infosechttps://pinboard.in/u:websitejk/b:b64c7a6ca0e1/IE 10 Has One Year of Support Remaining on Windows Server 2012 -- Redmondmag.com2019-02-11T07:52:40+00:00
https://redmondmag.com/articles/2019/01/29/ie-10-support-windows-server-2012.aspx
websitejkThe fine-print details of Microsoft's IE policy changes can be found in this FAQ document. A footnote in it indicates that IE 10 will be supported on Windows Server 2012 and Windows Embedded 8 Standard until Jan. 31, 2020, with the last security updates arriving on Jan. 14, 2020. After that date, no more security updates from Microsoft will arrive for IE 10. The browser will continue to run, but it will be potentially insecure to use it.]]>jk-infosec jk-windows jk-sysadmin jk-vuln jk-wwwhttps://pinboard.in/u:websitejk/b:e2518da4d877/Cyber Security Utilities: SysInternals - Cybrary2019-02-11T07:50:01+00:00
https://www.cybrary.it/0p3n/cyber-security-utilities-sysinternals/
websitejkjk-infosec jk-training jk-sysadmin jk-windows jk-toolshttps://pinboard.in/u:websitejk/b:db82e72e26ec/RootkitRevealer - Windows Sysinternals | Microsoft Docs2019-02-11T07:35:54+00:00
https://docs.microsoft.com/en-us/sysinternals/downloads/rootkit-revealer
websitejkScan your system for rootkit-based malware.]]>jk-syntax sysinternals jk-software jk-windows jk-infosechttps://pinboard.in/u:websitejk/b:0607e31a8aa8/explainshell.com - ifconfig wlan02019-02-10T11:35:56+00:00
https://explainshell.com/explain?cmd=ifconfig+wlan0
websitejkjk-syntax jk-scripting jk-linux jk-tools jk-dashboard jk-toolkits jk-infosechttps://pinboard.in/u:websitejk/b:71bbeff6d2db/Adversary Simulation | Strategic Cyber LLC2019-02-08T08:49:09+00:00
https://blog.cobaltstrike.com/category/adversary-simulation/
websitejkPosts about Adversary Simulation written by rsmudge]]>jk-b7 jk-infosec jk-h4xx0r jk-pentest jk-vuln jk-homenetworkhttps://pinboard.in/u:websitejk/b:5793fa190bab/