All Projects → trimstray → Technical Whitepapers

trimstray / Technical Whitepapers

Licence: mit
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.

Projects that are alternatives of or similar to Technical Whitepapers

The Book Of Secret Knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+15382.45%)
Mutual labels:  bsd, devops, hacking
Sshmon
Manage and monitor SSH connections.
Stars: ✭ 152 (-57.66%)
Mutual labels:  devops, sysadmin
Maturity models
Maturity models for IT, Agile, DevOps, TOGAF, Six Sigma, P3M3, etc.
Stars: ✭ 115 (-67.97%)
Mutual labels:  devops, sysadmin
Apicheck
The DevSecOps toolset for REST APIs
Stars: ✭ 184 (-48.75%)
Mutual labels:  devops, hacking
Launcher
Osquery launcher, autoupdater, and packager
Stars: ✭ 346 (-3.62%)
Mutual labels:  devops, sysadmin
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-89.69%)
Mutual labels:  devops, hacking
Txeh
Go library and CLI utilty for /etc/hosts management.
Stars: ✭ 181 (-49.58%)
Mutual labels:  devops, sysadmin
Netaddr
A network address manipulation library for Python
Stars: ✭ 648 (+80.5%)
Mutual labels:  devops, sysadmin
Emagnet
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+91.64%)
Mutual labels:  databases, hacking
Sysadmin Reading List
A reading/viewing list for larval stage sysadmins and SREs
Stars: ✭ 240 (-33.15%)
Mutual labels:  devops, sysadmin
Walkoff
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+138.16%)
Mutual labels:  devops, sysadmin
awesome-systools
Awesome Systools is a collection of sysadmins daily handy tools.
Stars: ✭ 81 (-77.44%)
Mutual labels:  sysadmin, bsd
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+148.19%)
Mutual labels:  devops, hacking
Gomplate
A flexible commandline tool for template rendering. Supports lots of local and remote datasources.
Stars: ✭ 1,270 (+253.76%)
Mutual labels:  devops, sysadmin
Webhook
webhook is a lightweight incoming webhook server to run shell commands
Stars: ✭ 7,201 (+1905.85%)
Mutual labels:  devops, sysadmin
Kitten
Tiny multi-server automation tool
Stars: ✭ 171 (-52.37%)
Mutual labels:  devops, sysadmin
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-55.99%)
Mutual labels:  sysadmin, hacking
Effective Shell
Text, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-43.18%)
Mutual labels:  devops, hacking
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+437.05%)
Mutual labels:  databases, hacking
Vps
个人笔记汇总
Stars: ✭ 276 (-23.12%)
Mutual labels:  devops, hacking

technical whitepapers

For hackers, pentesters, system administrators, programmers, security researchers...

  • base - only english version (90 books, ~223MB)
  • pl - only polish version (62 books, ~112MB)

Clamav report

----------- SCAN SUMMARY -----------
Known viruses: 6784116
Engine version: 0.100.2
Scanned directories: 201
Scanned files: 508
Infected files: 0
Data scanned: 1240.22 MB
Data read: 605.43 MB (ratio 2.05:1)
Time: 176.584 sec (2 m 56 s)

base directory

  • BPF: Tracing and More (Brendan Gregg, 2017)
  • Container Performance Analysis (Brendan Gregg)
  • From DTrace To Linux (Brendan Gregg, 2014)
  • Linux 4.x Performance Using BPF Superpowers (Brendan Gregg, 2016)
  • Linux Instrumentation (Ian Munsie, 2010)
  • Linux Performance Tools (Brendan Gregg, 2014)
  • Linux Performance Analysis New Tools and Old Secrets (Brendan Gregg)
  • Linux Profiling at Netflix (Brendan Gregg, 2015)
  • Linux Systems Performance (Brendan Gregg, 2016)
  • Open Source Systems Performance (Brendan Gregg, 2013)
  • Performance Analysis: The USE Method (Brendan Gregg, 2012)
  • Performance Checklists for SREs (Brendan Gregg, 2016)
  • Performance Methodologies for Production Systems (Brendan Gregg, 2013)
  • System Performance (Brendan Gregg, 2013)
  • Linux Performance Tools (Brendan Gregg, 2015)
  • Performance Analysis Superpowers with Linux eBPF (Brendan Gregg, 2015)
  • xv6: a simple, Unix-like teaching operating system (Russ Cox, Frans Kaashoek, Robert Morris, 2012)
  • Writing a Simple Operating System — from Scratch (Nick Blundell, 2010)
  • Windows NT Alerts Design Note (David N. Cutler, 1989)
  • Windows A Software Engineering Odyssey (Mark Lucovsky)
  • Disk Subsystem Performance Analysis for Windows (2014)
  • Windows Error Codes (2015)
  • Kernel Debugging with WinDbg (2005)
  • Windows Kernel Internals Traps, Interrupts, Exceptions (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Advance Virtual Memory (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Cache Manager (David B. Probert, Ph.D.)
  • Windows Kernel Internals — I/O Architecture (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Lightweight Procedure Calls (David B. Probert, Ph.D.)
  • Windows Kernel Internals — NTFS (David B. Probert, Ph.D.)
  • Windows Kernel Internals — NT Registry Implementation (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Object Manager (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Overview (David B. Probert, Ph.D.)
  • Windows Kernel Internals — Synchronization Mechanisms (David B. Probert, Ph.D.)
  • WinDbg. From A to Z! (Robert Kuster, 2007)
  • Why Threads Are A Bad Idea (for most purposes) (John Ousterhout, 1995)
  • When to use splay trees (Eric K. Lee ∗,† and Charles U. Martel, 2007)
  • What Happens During a Join - Dissecting CPU and Memory Optimization Effects (Stefan Manegold, Peter Boncz, Martin L. Kersten)
  • What Every Programmer Should Know About Memory (Ulrich Drepper, 2007)
  • Virtual Threads (Elaine Cheong and Fred Reiss, 2000)
  • Vim for humans (Vincent Jousse, 2015)
  • Using CUDA in Practice (Klaus Mueller)
  • Unreliable Guide To Hacking The Linux Kernel (Paul Rusty Russell, 2000)
  • Tracing Privileged Memory Accesses to Discover Software Vulnerabilities (Felix Wilhelm, 2015)
  • The UNIX Time-Sharing System (Dennis M. Ritchie and Ken Thompson, 1974)
  • The Linux Scheduler: a Decade of Wasted Cores (2016)
  • The Linux Kernel Hidden Inside Windows 10 (Ales Ionescu, 2016)
  • The AWK Programming Language (Alfred V. Aho, Brian W. Kernighan, Peter J. Weinberg, 1988)
  • TCP Fast Open (Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, Barath Raghavan)
  • Speeding up Networking (Van Jacobson, Bob Felderman, 2006)
  • Reverse Engineering for Beginners (Dennis Yurichev, 2013)
  • DevOps Toolchain (UpGuard)
  • Advanced SQL Injection In SQL Server Applications (Chris Anley, 2002)
  • A Unique Examination of the Buffer Overflow Condition (Terry Bruce Gillette, 2002)
  • Blindfolded SQL Injection (Ofer Maor, Amichai Shulman)
  • Blind SQL Injection (Kevin Spett)
  • Buffer overflow vulnerabilities (Peter Buchlovsky, Adam Butcher)
  • Decimalisation Table Attacks for PIN Cracking (Mike Bond, Piotr Zieliński)
  • Manipulating Microsoft SQL Server Using SQL Injection (Cesar Cerrudo)
  • PE File Infection Techniques (Konstantin Rozinov)
  • SysAdmin Magazine: Tools & Tips for Security Admins (2016)
  • PostgreSQL Portland Performance Practice Project (Mark Wong, 2009)
  • Linux Security and the Chromium Sandbox (Pati Gallardo, 2018)
  • Linux Security Review (2015)
  • Open source firewall tools Iptables and PF (Elvir Kuric)
  • Docker and High Security Microservices (Aaron Grattafiori, 2016)
  • Linux Hardening (Michael Boelen, 2016)
  • LXC, Docker, Security
  • Linux Systems Compromised (Michael Boelen, 2016)
  • Linux Security for Developers (Michael Boelen, 2016)
  • Hardened kernels for everyone (Yves-Alexis Perez, 2015)
  • Application Security Verification Standard 3.0.1 (2016)
  • OWASP Testing Guide v4 (Matteo Meucci, Andrew Muller)
  • A SysAdmin’s Essential Guide to Linux Workstation Security
  • Checklist for Penetration Testing (Mateus Felipe Tymburibá Ferreira, 2012)
  • SELinux Policy Management Framework for HIS (Luis Franco Marin, 2008)
  • The Return of Robin Hood vs Cisco ASA (Cedric Halbronn, 2018)
  • DDoS Handbook (2015)
  • DDoS Tutorial (Krassimir Tzvetanov)
  • Bypassing Same Origin Policy v1.0 (Simon Egli)
  • Using TCPDump, TCPTrace, & XPlot to Debug Network Problems (Jason Zurawski, 2013)
  • Use "strace" to Understand Your Shell (Harald König, 2015)
  • System call tracing overhead (Jörg Zinke, 2009)
  • The Linux Kernel Hackers' Guide (Michael K. Johnson, 1995)
  • Auditing Web Applications (Robert Morella, 2015)
  • Securing & Hardening Linux v1.0 (Charalambous Glafkos, 2007)
  • Security Configuration Benchmark For Apache (Ryan Barnett, 2008)
  • Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee)
  • Network Security Hardening Guide v1.2 (2017)
  • Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance (Martin Jõgi, 2017)
  • Total security in a PostgreSQL database (Robert Bernier, 2009)

pl directory

  • Niebezpieczne Google — wyszukiwanie poufnych informacji (Michał Piotrowski)
  • Hakowanie aplikacji Rootkity i Ptrace (Stefan Klaas)
  • Karty elektroniczne w PKI — znane ataki i sposoby przeciwdziałania im (Adam Augustyn, 2005)
  • Metody włamań do systemów komputerowych SQL injection (Bogusław Kluge, Karina Łuksza, Ewa M akosa)
  • Ochrona aplikacji i ważnych danych użytkownika poprzez stosowanie technik kodowania defensywnego (Kenny Kerr)
  • Obrona przed atakami typu odmowa usługi (DoS) (Marcin Żurakowski, 2004)
  • Obrona przed Fingerprinting warstwy aplikacji — tutorial
  • Praktyczna aplikacja do analizy Malware (Rubén Santamarta)
  • Prywatne wojny w sieci: poddaj się, okop, negocjuj lub stań do walki
  • Reverse engineering — analiza dynamiczna kodu wykonywalnego ELF (Marek Janiczek)
  • Robaki sieciowe
  • Rodzaje wirusów komputerowych (Bartłomiej Rudzki, Piotr Modzelewski)
  • Ewolucja Kodów Powłoki (Itzik Kotler)
  • Struktury systemów operacyjnych
  • Tryb chroniony mikroprocesorów x86 (Andrzej Stasiak)
  • Tworzenie polimorficznego szelkodu (Michał Piotrowski)
  • Wirusy
  • Własny rootkit w GNU/Linuksie (Mariusz Burdach)
  • Szperając w nagłówkach, czyli wstęp do reverse engineeringu (Wojciech Warpechowski, 2005)
  • Podstawy administracji PostgreSQL. DCL — Data Control Language. Użytkownicy, role, uprawnienia, kopie zapasowe. (Antoni Ligęza, Marcin Szpyrka)
  • Gentoo Linux Instrukcja instalacji i konfiguracji systemu
  • Aplikacje webowe na celowniku. (Leszek Miś)
  • Obowiązkowa kontrola dostępu w systemie Linux (Bartosz Brodecki, Piotr Sasak, 2007)
  • Przegląd nowych mechanizmów bezpieczeństwa w RHEL6 (Leszek Miś, 2011)
  • SELinux (Robert Jaroszuk, 2011)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2015)
  • Bezpieczeństwo aplikacji WWW — Podatności w mechanizmach uploadu (Michał Sajdak, 2016)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2016)
  • Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2017)
  • IT Security Services (Mateusz Kocielski, 2015)
  • Administrowanie sieciami lokalnymi i serwerami (Jacek Kobus, 2016)
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].