Sourceful

Discover the best public
Google docs

Find docs created by community members like you. Give feedback, collaborate and create your own.
  1. Home
  2. /
  3. Security
Best documents
Hot documents
New documents
Hall of fame

Security - 🟧Sourceful

Penetrum_TikTok_Security_Analysis_whitepaper

TikTok, software, security, audit, mobile

Penetrum security analysis of TikTok versions 10.0.8 - 15.2.3

Ransomware Overview

ransomware, security, software, data

Spreadsheet listing all known as well as unidentified ransomwhare plus detection and prevention guides.

Attacking Secondary Contexts in Web Applications

security, software, web applications, JavaScript

Security considerations when using modern routing technologies for web servers by Sam Curry

Digital Communications Protocols

chat, security, list, privacy

Information about features, functions and other data of all sorts of communication platforms (chat, etc.)

APT Groups and Operations

security, programming, cybersecurity, vulnerability, hacking

Cyber security companies and Antivirus vendors use different names for the same threat actors and often refer to the reports and group names of each other. However, it is a difficult task to keep track of the different names and naming schemes. I wanted to create a reference that answers questions like "I read a report about the 'Tsar Team', is there another name for that group?" or "Attackers used 'China Chopper' webshell, which of the APT groups did use that shell too?" or "Did he just say 'NetTraveler'? So, does he talk about Chinese or Russian attackers?"

Web Application Penetration Testing Course URLs

security, software, web development

Course in web security for your application/website