trimstray / Technical Whitepapers
Licence: mit
Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.
Stars: ✭ 359
Projects that are alternatives of or similar to Technical Whitepapers
The Book Of Secret Knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
Stars: ✭ 55,582 (+15382.45%)
Mutual labels: bsd, devops, hacking
Maturity models
Maturity models for IT, Agile, DevOps, TOGAF, Six Sigma, P3M3, etc.
Stars: ✭ 115 (-67.97%)
Mutual labels: devops, sysadmin
Launcher
Osquery launcher, autoupdater, and packager
Stars: ✭ 346 (-3.62%)
Mutual labels: devops, sysadmin
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-89.69%)
Mutual labels: devops, hacking
Txeh
Go library and CLI utilty for /etc/hosts management.
Stars: ✭ 181 (-49.58%)
Mutual labels: devops, sysadmin
Netaddr
A network address manipulation library for Python
Stars: ✭ 648 (+80.5%)
Mutual labels: devops, sysadmin
Emagnet
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+91.64%)
Mutual labels: databases, hacking
Sysadmin Reading List
A reading/viewing list for larval stage sysadmins and SREs
Stars: ✭ 240 (-33.15%)
Mutual labels: devops, sysadmin
Walkoff
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+138.16%)
Mutual labels: devops, sysadmin
awesome-systools
Awesome Systools is a collection of sysadmins daily handy tools.
Stars: ✭ 81 (-77.44%)
Mutual labels: sysadmin, bsd
Jsql Injection
jSQL Injection is a Java application for automatic SQL database injection.
Stars: ✭ 891 (+148.19%)
Mutual labels: devops, hacking
Gomplate
A flexible commandline tool for template rendering. Supports lots of local and remote datasources.
Stars: ✭ 1,270 (+253.76%)
Mutual labels: devops, sysadmin
Webhook
webhook is a lightweight incoming webhook server to run shell commands
Stars: ✭ 7,201 (+1905.85%)
Mutual labels: devops, sysadmin
Hardentheworld
Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-55.99%)
Mutual labels: sysadmin, hacking
Effective Shell
Text, samples and website for my 'Effective Shell' series.
Stars: ✭ 204 (-43.18%)
Mutual labels: devops, hacking
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+437.05%)
Mutual labels: databases, hacking
technical whitepapers
For hackers, pentesters, system administrators, programmers, security researchers...
-
base
- only english version (90 books, ~223MB) -
pl
- only polish version (62 books, ~112MB)
Clamav report
----------- SCAN SUMMARY -----------
Known viruses: 6784116
Engine version: 0.100.2
Scanned directories: 201
Scanned files: 508
Infected files: 0
Data scanned: 1240.22 MB
Data read: 605.43 MB (ratio 2.05:1)
Time: 176.584 sec (2 m 56 s)
base
directory
- BPF: Tracing and More (Brendan Gregg, 2017)
- Container Performance Analysis (Brendan Gregg)
- From DTrace To Linux (Brendan Gregg, 2014)
- Linux 4.x Performance Using BPF Superpowers (Brendan Gregg, 2016)
- Linux Instrumentation (Ian Munsie, 2010)
- Linux Performance Tools (Brendan Gregg, 2014)
- Linux Performance Analysis New Tools and Old Secrets (Brendan Gregg)
- Linux Profiling at Netflix (Brendan Gregg, 2015)
- Linux Systems Performance (Brendan Gregg, 2016)
- Open Source Systems Performance (Brendan Gregg, 2013)
- Performance Analysis: The USE Method (Brendan Gregg, 2012)
- Performance Checklists for SREs (Brendan Gregg, 2016)
- Performance Methodologies for Production Systems (Brendan Gregg, 2013)
- System Performance (Brendan Gregg, 2013)
- Linux Performance Tools (Brendan Gregg, 2015)
- Performance Analysis Superpowers with Linux eBPF (Brendan Gregg, 2015)
- xv6: a simple, Unix-like teaching operating system (Russ Cox, Frans Kaashoek, Robert Morris, 2012)
- Writing a Simple Operating System — from Scratch (Nick Blundell, 2010)
- Windows NT Alerts Design Note (David N. Cutler, 1989)
- Windows A Software Engineering Odyssey (Mark Lucovsky)
- Disk Subsystem Performance Analysis for Windows (2014)
- Windows Error Codes (2015)
- Kernel Debugging with WinDbg (2005)
- Windows Kernel Internals Traps, Interrupts, Exceptions (David B. Probert, Ph.D.)
- Windows Kernel Internals — Advance Virtual Memory (David B. Probert, Ph.D.)
- Windows Kernel Internals — Cache Manager (David B. Probert, Ph.D.)
- Windows Kernel Internals — I/O Architecture (David B. Probert, Ph.D.)
- Windows Kernel Internals — Lightweight Procedure Calls (David B. Probert, Ph.D.)
- Windows Kernel Internals — NTFS (David B. Probert, Ph.D.)
- Windows Kernel Internals — NT Registry Implementation (David B. Probert, Ph.D.)
- Windows Kernel Internals — Object Manager (David B. Probert, Ph.D.)
- Windows Kernel Internals — Overview (David B. Probert, Ph.D.)
- Windows Kernel Internals — Synchronization Mechanisms (David B. Probert, Ph.D.)
- WinDbg. From A to Z! (Robert Kuster, 2007)
- Why Threads Are A Bad Idea (for most purposes) (John Ousterhout, 1995)
- When to use splay trees (Eric K. Lee ∗,† and Charles U. Martel, 2007)
- What Happens During a Join - Dissecting CPU and Memory Optimization Effects (Stefan Manegold, Peter Boncz, Martin L. Kersten)
- What Every Programmer Should Know About Memory (Ulrich Drepper, 2007)
- Virtual Threads (Elaine Cheong and Fred Reiss, 2000)
- Vim for humans (Vincent Jousse, 2015)
- Using CUDA in Practice (Klaus Mueller)
- Unreliable Guide To Hacking The Linux Kernel (Paul Rusty Russell, 2000)
- Tracing Privileged Memory Accesses to Discover Software Vulnerabilities (Felix Wilhelm, 2015)
- The UNIX Time-Sharing System (Dennis M. Ritchie and Ken Thompson, 1974)
- The Linux Scheduler: a Decade of Wasted Cores (2016)
- The Linux Kernel Hidden Inside Windows 10 (Ales Ionescu, 2016)
- The AWK Programming Language (Alfred V. Aho, Brian W. Kernighan, Peter J. Weinberg, 1988)
- TCP Fast Open (Sivasankar Radhakrishnan, Yuchung Cheng, Jerry Chu, Arvind Jain, Barath Raghavan)
- Speeding up Networking (Van Jacobson, Bob Felderman, 2006)
- Reverse Engineering for Beginners (Dennis Yurichev, 2013)
- DevOps Toolchain (UpGuard)
- Advanced SQL Injection In SQL Server Applications (Chris Anley, 2002)
- A Unique Examination of the Buffer Overflow Condition (Terry Bruce Gillette, 2002)
- Blindfolded SQL Injection (Ofer Maor, Amichai Shulman)
- Blind SQL Injection (Kevin Spett)
- Buffer overflow vulnerabilities (Peter Buchlovsky, Adam Butcher)
- Decimalisation Table Attacks for PIN Cracking (Mike Bond, Piotr Zieliński)
- Manipulating Microsoft SQL Server Using SQL Injection (Cesar Cerrudo)
- PE File Infection Techniques (Konstantin Rozinov)
- SysAdmin Magazine: Tools & Tips for Security Admins (2016)
- PostgreSQL Portland Performance Practice Project (Mark Wong, 2009)
- Linux Security and the Chromium Sandbox (Pati Gallardo, 2018)
- Linux Security Review (2015)
- Open source firewall tools Iptables and PF (Elvir Kuric)
- Docker and High Security Microservices (Aaron Grattafiori, 2016)
- Linux Hardening (Michael Boelen, 2016)
- LXC, Docker, Security
- Linux Systems Compromised (Michael Boelen, 2016)
- Linux Security for Developers (Michael Boelen, 2016)
- Hardened kernels for everyone (Yves-Alexis Perez, 2015)
- Application Security Verification Standard 3.0.1 (2016)
- OWASP Testing Guide v4 (Matteo Meucci, Andrew Muller)
- A SysAdmin’s Essential Guide to Linux Workstation Security
- Checklist for Penetration Testing (Mateus Felipe Tymburibá Ferreira, 2012)
- SELinux Policy Management Framework for HIS (Luis Franco Marin, 2008)
- The Return of Robin Hood vs Cisco ASA (Cedric Halbronn, 2018)
- DDoS Handbook (2015)
- DDoS Tutorial (Krassimir Tzvetanov)
- Bypassing Same Origin Policy v1.0 (Simon Egli)
- Using TCPDump, TCPTrace, & XPlot to Debug Network Problems (Jason Zurawski, 2013)
- Use "strace" to Understand Your Shell (Harald König, 2015)
- System call tracing overhead (Jörg Zinke, 2009)
- The Linux Kernel Hackers' Guide (Michael K. Johnson, 1995)
- Auditing Web Applications (Robert Morella, 2015)
- Securing & Hardening Linux v1.0 (Charalambous Glafkos, 2007)
- Security Configuration Benchmark For Apache (Ryan Barnett, 2008)
- Introduction to Application Security and OWASP Top 10 Risks (Ralph Durkee)
- Network Security Hardening Guide v1.2 (2017)
- Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance (Martin Jõgi, 2017)
- Total security in a PostgreSQL database (Robert Bernier, 2009)
pl
directory
- Niebezpieczne Google — wyszukiwanie poufnych informacji (Michał Piotrowski)
- Hakowanie aplikacji Rootkity i Ptrace (Stefan Klaas)
- Karty elektroniczne w PKI — znane ataki i sposoby przeciwdziałania im (Adam Augustyn, 2005)
- Metody włamań do systemów komputerowych SQL injection (Bogusław Kluge, Karina Łuksza, Ewa M akosa)
- Ochrona aplikacji i ważnych danych użytkownika poprzez stosowanie technik kodowania defensywnego (Kenny Kerr)
- Obrona przed atakami typu odmowa usługi (DoS) (Marcin Żurakowski, 2004)
- Obrona przed Fingerprinting warstwy aplikacji — tutorial
- Praktyczna aplikacja do analizy Malware (Rubén Santamarta)
- Prywatne wojny w sieci: poddaj się, okop, negocjuj lub stań do walki
- Reverse engineering — analiza dynamiczna kodu wykonywalnego ELF (Marek Janiczek)
- Robaki sieciowe
- Rodzaje wirusów komputerowych (Bartłomiej Rudzki, Piotr Modzelewski)
- Ewolucja Kodów Powłoki (Itzik Kotler)
- Struktury systemów operacyjnych
- Tryb chroniony mikroprocesorów x86 (Andrzej Stasiak)
- Tworzenie polimorficznego szelkodu (Michał Piotrowski)
- Wirusy
- Własny rootkit w GNU/Linuksie (Mariusz Burdach)
- Szperając w nagłówkach, czyli wstęp do reverse engineeringu (Wojciech Warpechowski, 2005)
- Podstawy administracji PostgreSQL. DCL — Data Control Language. Użytkownicy, role, uprawnienia, kopie zapasowe. (Antoni Ligęza, Marcin Szpyrka)
- Gentoo Linux Instrukcja instalacji i konfiguracji systemu
- Aplikacje webowe na celowniku. (Leszek Miś)
- Obowiązkowa kontrola dostępu w systemie Linux (Bartosz Brodecki, Piotr Sasak, 2007)
- Przegląd nowych mechanizmów bezpieczeństwa w RHEL6 (Leszek Miś, 2011)
- SELinux (Robert Jaroszuk, 2011)
- Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2015)
- Bezpieczeństwo aplikacji WWW — Podatności w mechanizmach uploadu (Michał Sajdak, 2016)
- Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2016)
- Bezpieczeństwo aplikacji WWW (Michał Sajdak, 2017)
- IT Security Services (Mateusz Kocielski, 2015)
- Administrowanie sieciami lokalnymi i serwerami (Jacek Kobus, 2016)
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].