List of unix binaries to bypass local security restrictions if misconfigured.
Wifi analysing and protection system
Reverse engineering tool suite
Helps you not to commit your passwords into your git repositories
Intro, setup and discussion of using NextDNS
Every byte of a TLS connection explained and reproduced
Mit dem Pi-hole, Unbound & Hyperlocal zur größtmöglichen, werbefreien Unabhängigkeit in der DNS-Welt.
Manage your passwords online, on premise, desktop and mobile
Create simple and beautiful locally-trusted development certificates with mkcert without any configuration.
Thread modelling
A deep dive into some of the technical challenges and solutions to securing a microservice architecture. Microservices are great, and they offer us lots of options…