Security - 🟧Sourceful
Spreadsheet listing all known as well as unidentified ransomwhare plus detection and prevention guides.
Attacking Secondary Contexts in Web Applications
Security considerations when using modern routing technologies for web servers by Sam Curry
Penetrum security analysis of TikTok versions 10.0.8 - 15.2.3
APT Groups and Operations
Cyber security companies and Antivirus vendors use different names for the same threat actors and often refer to the reports and group names of each other. However, it is a difficult task to keep track of the different names and naming schemes. I wanted to create a reference that answers questions like "I read a report about the 'Tsar Team', is there another name for that group?" or "Attackers used 'China Chopper' webshell, which of the APT groups did use that shell too?" or "Did he just say 'NetTraveler'? So, does he talk about Chinese or Russian attackers?"
Digital Communications Protocols
Information about features, functions and other data of all sorts of communication platforms (chat, etc.)