wiki:LotsOfLinks

Apple

iFoo

Securing your iPhone for Travel to a Hostile Environment
Hwang & Snowden Protecting a Phone

Applications

MacOS

How to make the Touch Bar slightly more tolerable

Hacks & Tricks MacOS

diskutil coreStorage unlockVolume E35BB45E-585C-4CF7-8A1B-329A45F03ED6 to mount an encrypted volume
Add Dashboard Widgets to the Desktop
Apple Security Guides
Creating your own Homebrew Tap and Formula
Disable iPhoto Auto_launch in Yosemite
El Capitan Hardening Guide
macOS Mojave Hardening Guide Encrypting Your Laptop Like You Mean It Fast User Switching on Yosemite
Fix DNS Resolver Search List (obsolete)
/Applications/VMware\ Fusion.app/Contents/Library/vmrun VMware Fusion Tool
How to restore privacy
How to Update OpenSSH on Mac OS X
How to stop Firefox from making automatic connections
HyperDrive USB Type-C 5-in-1 Hub with Pass Through Charging
Internal Files about User (maybe Mountain Lion)
Mac Config Hacks from Command Line
OS X Yosemite Security and Privacy Guide
OSX Auditor
Safety hacks for Yosemite
Screen Sharing over SSH
Setting up a Macintosh as a Development Environment
Time Machine and Other Info
XServe from Ebay running VMware
Yosemite WiFi hacks
Cmd-Ctrl-Shift-4, then space (cursor turns from cross hairs to a camera), click once on what I want, and paste wherever I want it is the way to go.
Remote Mac Access: Screen Sharing via SSH and VNC without iCloud’s Back to my Mac feature
What Makes a Mac Volume Bootable
sudo scutil --set HostName <new host name> to change Mac hostname
Allow MacOS FileVault Recovery Key
Tools to set up a quick macOS VM in QEMU, accelerated by KVM

Applications

Bonjour Browser
Emacs for MacOS guide
Free OS X Security Tools
Karabiner - A powerful and stable keyboard customizer for OS X
OSXFUSE is a successor to MacFUSE
Snail Mail - envelope printer

Conferences

CoNEXT 2014
IMC 2013
Dagstuhl Critical Infrastructure
CHES 2014
Dagstuhl 2104 Secure Routing
BGNOG2 Security Sep 2015
OARC Oct 2015
NANOG Oct 2015
IMC October 2015
IRTF & ISOC Workshop on Research and Applications of Internet Measurements (RAIM) October 2015
CAIDA BGP Hackathon Jan 2016

Food

Kossar's Bialys
Zabar's Smoked Fish
Russ and Daughters Smoked Fish (needs more lead time)
Nabe Mono Basics
Artisan Dutch Cheese shop in Amsterdam
Swiss Chocolate Shop

Hardware

FPGA Tools

YoSys Open Synthesis Suite - Verilogish
MiGen - Python Toolbox for Building Hardware (produces VHDL)
MyHDL - a python syntax for Verilog - Design Hardware with Python, good docs
Chisel - Hardware Development Embedded in Scala

General Hardware

Four hot-pluggable systems (nodes) in a 2U form factor
SAMSUNG 850 Pro Series MZ-7KE1T0BW 2.5" 1TB SATA III 3-D Vertical SSD
SuperServer 2027TR-HTRF+ - Four servers and lotso 2.5" drives in a box
Seagate 8TB drives
Open source USB stick computer for security applications
Dirty PCBs
Cheat Sheed for MegaRaid Controllers `megacli`
CWDM Mux/DeMux
Solid Optics CWDM-MUX-8CH+UPG+MON Multiplexer
Logs and accounts machine checks (in particular memory, IO, and CPU hardware errors) on modern x86 Linux systems
KVM to USB dongle
Bunnie Huang on Good Documntation for Manufacturing
Bunnie Huang on Design for Manufacturing

Novena

Novena Mail Page
Setting up an ARM virtual machine so you can build an SD image

Raspberry PI

NTP on a Raspberry Pi

Toys

Attiny85-based device to enable and disable write-protection on any SD card
Build the SD Locker and Make Your SD Cards More Secure

Linux / Unix

Wiki of non-systemd Unix/Linux systems
reptyr: Attach a running process to a new terminal
Using Containers in Production: Best Practices
VXLAN with plain Linux bridges
Linux Kernel Hacking
Linux Ate My RAM

Basics

Basics of the Unix Philosophy
ntpstick - NTP on a Stick
SSH Hardening
OSCP Stapling in Apache
ejabberd TLS Security
Understanding and Using Systemd

Emacs

Magit, A Git Porcelain inside Emacs

Tools

Linux dhcpd Options
git move subdirectory of a repo

FreeBSD

FreeBSD install with gmirror
portmaster to pkg
Don't Panic! Upgrading FreeBSD to 11.2 on Ganeti

Applications / Linux / Unix

WordPress Tutorials
Choosing an HTTP Status Code
Scan, index, and archive all of your paper
paf's Export photos from Apple Photo.App
iPhoto Library Manager
BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS
Command-line based presentation tool
Magic Wormhole - get things from one computer to another, safely
Upspin: A framework for naming everyone's everything. https://upspin.io

Hacks / Linux

Upgrading grub from 0.97 to grub2
iptables -F sshguard Get sshguard to stop blocking me after I have screwed up.
Mounting a qcow image as a file system Debian Releases
Debian Archives Explained
Upgrade Debian wheezy to jessie
Firewall IPTables for IPv6
A Quick Introduction to Linux Policy Routing
Reset WordPress Password from My SQL
Change default network name (ens33) to old “eth0” on Ubuntu 16.04
Great dump/restore recipies
Python library to ease the development of encoders and decoders for various protocols and file formats; contains ASN.1 and CSN.1 compilers
How AppArmor works

Tools

BitTorrentsync security & privacy analysis - Hackito Session results
Windows - Five portable antivirus and antimalware tools to carry with you at all times
SSH Based Chat
How To Create an SSH CA to Validate Hosts and Clients
VANE - A Free Fork of WPScan
curated list of awesome malware analysis tools and resources
R Cheat Sheets
Regenerable ed25519 keys for OpenSSH
GUYMAGER a Free Forensic Imager
DropKick Detect and disconnect WiFi cameras
Adding a Signing GPG Key and Hiding the Master
How to Tell if an Image, YouTube, etc. are faked
new openssh key format and bcrypt pbkdf
TLS SNI Test Site: alice.sni.velox.ch
Top 125 Security Tools
ssh keylength cat .ssh/id_rsa.pub | cut -c 9-60 | openssl base64 -d | hd
LetsEncrypt client which drops privs
Penetration Testing Cheat Sheet
GOGS - git server in go
Unified Logging Layer
Use Wireshark to inspect SSL
A terminal user-interface for tshark, inspired by Wireshark.
LaTeX, Wrapping text around figures
Advice for writing LaTeX documents
SED Debugger
Unix History Repository
How To Create a Git Pull Request on GitHub
JHead - Exif Jpeg header manipulation tool
NetData, the Linux internal measurement graphing tool from hell
A git Tutorial
GUI and CLI packet generator tool for ethernet
Sysdig is a universal system visibility tool with native support for containers

Certificate Authority Tools

XCA, a Small CA for Macintosh
XCA Tutorial
EJBCA, a Large Enterprise Scale CA Toolset - LGPL but in java
TinyCA, debian package, may not be maintained
Regenerate Puppet Certificates
Safety Tips for iPhone iOS 10
Certificate Transparency Collector

VPNs

ssh randy@xmpp.rg.net -R 4430:127.0.0.1:443 from pfSense terminal console shell to backdoor when firewall locks you out.
SoftEther VPN Project
WireGuard VPN

Languages

SNOBOL4
Awesome Python frameworks, libraries, software and resources

Networking

DNS

DNS Tools

ZoneMaster DNS Zone Checker
NIST DANE Tester
YanDex DNS Servers 77.88.8.1 and 77.88.8.8
AfNIC ZoneMaster Zone checker
DANE SMTP Validatoe
Phil Pennock's SMTP DANE TLS Checker
Flushing Chrome's DNS Cache

RIRs

RIR Stats Files Catenated & Decode for the above NRO Stats
Internet Timeline from JPNIC
IPv4 Address Space Transfer Report

Routing

Linux iproute2 Cheat Sheet
BIRD Cheat Sheet
IPv6 route lookup on Linux
Linux VRF

Routers

Juniper Routing Engines Cisco IOS ssh key regeneration

Routing Security / RPKI

Tomo's Cache Server and Router Configuration Instructions.
Certificates per RIR
RIR Statistics from SurfNet
NIST Global Prefix/Origin Validation using RPKI
Securing BGP Routing with RPKI and ROAs
Daniele's ROA quality Page
Daniele's Page of Root Nameserver ROA State
RPKI Repository Browser
Internet Protocol Journal on Securing BGP, Huston and Bush
Renew Child Certs
Google RPKI Puppet Deployment
Effects of RPKI Deployment on BGP Security

Routing Tools

IRR Toolset
bgpq3 - bgp filtering automation for Cisco and Juniper routers
IPv4 and IPv6 prefix aggregation tool
BGP Visualize with Python

Tools

OpenWRT Replacement
Lede Guest LAN Set-up
Encapsulation overhead calculator
Protocol Header Diagram Generator

Outreach

Thailand

BKNIX 2014.11.06

Workshops

AIT Bangkok 2012.11.19-22
SANOG/Thimphu 2014.01.13-21
APRICOT 2015
BTNOG2 Thimphu 2015.09.14-17
APRICOT 2016 Security Workshop
APRICOT 2017 Security Workshop 2017.02.20-24
Bhutan NOG 2017 Security Workshop

Research / Computer Science

Measurement

Graphite - Scalable Realtime Graphing
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
Traffic Analysis - Anonymization
IPv4 Address Transfer Report BETA
Emile Country Jedi
The Python Graph Gallery

Miscellaneous Research

CAIDA BGP Hackathon List Archive
CAIDA BGP Hackathon BLOG
CAIDA BGP Hackathon wiki
A full-scale simulation of the Internet based on the Border Gateway Protocol (BGP), built on SpatialOS
Semantic Scholar Paper Cites and Refs
Graph Traversal Algorith Visualizations
Guide for students working with JP Aumasson
How to Write a Great Research Paper

Security

Cryptography

Crypto Coding Rules
CryptLib Toolkit
Free, Open Source, Crypto Libraries/Toolkits
NaCl Crypto Primitives
Hard Truths about the Hard Business of finding Hard Random Numbers
Matthew Green on December 2014 Snowden Dump
Blog for the cryptography group of the University of Bristol
Performance analysis of different cryptographic algorithms implemented in an FPGA
How Code Breakers Work
Jacobian coordinates for short Weierstrass curves (algs to use)
Apple Crypto Libraries
Awesome Cryptogtaphy
An introductory course on cryptography
A Stick Figure Guide to the Advanced Encryption Standard (AES)

General Security

Capirca, utilizes common definitions of networks and services and high-level policy files to facilitate the development and manipulation of network access control filters (ACLs) for various platforms. Use with ldpush
Real HSM Breaches
OpenTechFund/secure-chat roadmap. More like a planet survey.
Security Applications of Formal Language Theory, Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto, Anna Shubina
Hardening Your Web Server
Secret Cells, Threats and Assumptions
Mozilla Recommendations for Security/Server Side TLS
SSL Cipher Suite Details of Your Browser
Check out Your Browser's SSL Support
Stop Firefox leaking data about you
Mobile Carrier Super-Cookie Use
Linux workstation security checklist
Efficient Group Key Signing Method
caff, proof of posession of the passphrase of a key sent by the email address associated with that key
OnionShare
Journal of Cybersecurity
We Should All Have Something To Hide, Moxie
A Gentle Introduction to Secure Computation
FTC - Time to rethink mandatory password changes
Camouflage from face detection
FreeBSD - a lesson in poor defaults
FireFox about:config set dom.webnotifications.enabled and dom.push.enabled to false to prevent push notifications]
Cyber Security Reading List
Tech Solidarity Personal Security CheckList Review
Shared thoughts after 6+ years in Pentesting
A Catalog of Exploits
Blockchain Graveyard, Crypto-Currency Disasters
ipcrypt: IP-format-preserving encryption
F-Secure’s Guide to Evil Maid Attacks
Fuzzing JSON Web Services
PEN Tester's Tool List
Awesome Web Security
Gamified lessons in using encryption in everyday life. Good for you and good for friends and family.\

Privacy Projects

Privacy Software Workshop Series
Peer 2 Peer BGP Security
Setting Up I2P and Tor Darknets

Securing Open Source

Secure Messaging roadmap from the LEAP project

Tools

ROTTEN, small self-hosting Lisp, designed as a vehicle for exploring Ken Thompson's Reflections on Trusting Trust Canary Token Generator
YubiKey Configuration for GPG, SSH, and U2F
collection of awesome lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja Admins
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Free Security Tools an End User Should Start Using NOW
Securing how folk use ssh

System Administration

Automation

Ansible

http://www.ansibleworks.com/docs/
http://www.ansibleworks.com/docs/faq.html
http://jinja.pocoo.org/docs/templates/
NSRC Intro (pdf)
append an existing list using set_fact
Module Provided Facts
for JunOS
for NX-OS
for IOSxr
Bronwyn Tutorial
Finding the size of various object in your postgres database
Quadrupling Ansible performance with Mitogen

Configuration Tools

LDPush, A cross-vendor network configuration distribution tool
CLI tool to push junoscript configs to Juniper network devices
Python tool to configure networking interfaces on a Linux machine

Miscellaneous SysAdmin?

Check if Upgrade has Dynmic Lib Dependencies which Need Restart

Telcos & Lesser Forms of Humor

Prepaid SIMs Global Wiki

Virtualization

Ganeti

Experimental Ganeti extstorage provider for ZFS volumes
Ganeti using LVM over ZFS (zfsonlinux)
Installing pfSense as VirtIO on Ganeti
Make a Node Multi-Homed
Also how to Make a Node Multi-Homed
Upgrading to 2.12 and Onward
Ganeti Web Manager
NSRC Instructions for Ganeti Web Manager Installation
snf-image - allows Ganeti to launch instances from predefined or untrusted custom Images
Editing Cluster Configuration (/var/lib/ganeti/config.data)
Cluster Key Replacement
Generate/Replace SSL Certificates
lvextend -L+50G -r /dev/mapper/ganeti-var
Ganeti Performance Tuning
Using Open vSwitch to allow VMs on two different hosts to communicate over port-based GRE tunnels

Misc Cloudware

OwnCloud

Windows

Ops Tools

Win10 is Horrible SpyWare

Security

Detekt, a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS

Misc Windows Stuff

Split PowerPoint Animations into PDFs

Misceleanous

Framadate, an open doodle replacement
Snowden at IETF, plugs CrypTech at 0:38:00
How to construct a Nature summary paragrah (aka abstract)
Web Design: The First 100 Years
White Rabbit Express - Buy anything from Japan
NetFlix Secret Category Codes
Supranational European Bodies
Free Open WebRTC Site
The Small of the Soup
O RLY Cover Generator
IIJ Lab Conference Calendar
LaTeX hints
Big Font Generator
Levels of Techie Enlightenment
Freelance Achievement Stickers
Fast-Track Arrival Options Around the World
Teen Vogue on Know Your Rights If You Get Arrested
Data, Past, Present, and Future
Create a Knitting Pattern
Tips for Writing Technical Papers by Jennifer Widom
Hong Kong Walled City
The Importance of Deep Work
Cheap Internet Fax Service
ASCIIdoc Cheat Sheet
Sockets in bash
ITU World Fiber Map
Using Apple Pay for Suica
More using Apple Pay for Suica
Remove Background from an Image
How Corning Makes Super-Pure Glass for Fiber-Optic Cable
Stephenson on Undersea Cables
Regular Expression Visualizer
Donald Knuth Lectures Online
TCPtrace and xplot Cheat Sheet
Candidate First Hiring
Differential Privacy Made Simpler
Containers from Scratch
Let Me Google This For You
Custom Knives Jonas
Vonada's Engineering Maxms
Animated Knots

Last modified 7 months ago Last modified on Jun 19, 2019, 5:02:56 PM