DevSecOps Fundamentals Guidebook: DevSecOps Tools & Activities, March 2021 (Version 2.0), Department of Defense, the USA
The goal of DevSecOps is to improve customer outcomes and mission value through the automation, monitoring, and application of security at every phase of the software lifecycle. Practicing DevSecOps requires an array of purpose-built tools and a wide range of activities that rely on those tools. This document conveys the relationship between each DevSecOps phase, a taxonomy of supporting tools for a given phase, and the set of activities that occur at each phase cross-referenced to the tool(s) that support the specific activity.
#SecDevOps
The goal of DevSecOps is to improve customer outcomes and mission value through the automation, monitoring, and application of security at every phase of the software lifecycle. Practicing DevSecOps requires an array of purpose-built tools and a wide range of activities that rely on those tools. This document conveys the relationship between each DevSecOps phase, a taxonomy of supporting tools for a given phase, and the set of activities that occur at each phase cross-referenced to the tool(s) that support the specific activity.
#SecDevOps
👍4
DevSecOpsTools-Activities_Guide_book_2021.pdf
1009.1 KB
DevSecOps Fundamentals Guidebook: DevSecOps Tools & Activities, March 2021 (Version 2.0), Department of Defense, the USA
👍1
The Linux Command HandBook, Flavio Copes, 2023
This Linux Command Handbook will cover 60 core Bash commands you will need as a developer. Each command includes example code and tips for when to use it.
This Linux Command Handbook follows the 80/20 rule: you'll learn 80% of a topic in around 20% of the time you spend studying it.
Source
#linux #book #newbie
This Linux Command Handbook will cover 60 core Bash commands you will need as a developer. Each command includes example code and tips for when to use it.
This Linux Command Handbook follows the 80/20 rule: you'll learn 80% of a topic in around 20% of the time you spend studying it.
Source
#linux #book #newbie
👍5
Introduction to Doxing, Hadess, 2023
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
👍5
BurpSuite Payload Processing, 2023
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
👍4
👍5
Nmap for pentesters mini guide_1.pdf
2.5 MB
Nmap for pentesters mini guide, 2023
👍6❤1
DNS Security Guide, Antonio López Padilla, 2023
The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.
The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.
CheckList
Short by Varonis
What is DNS security
#useful
The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.
The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.
CheckList
Short by Varonis
What is DNS security
#useful
👍3