Codebook
  • web
  • programming languages
  • security
  • management
  • games
  • book
  • algorithms
  • visualization
  • graphics
  • story
  • web
  • bug bounties
  • cyphers
  • two factor authentication
  • ethics
  • privacy
  • mongodb
  • ssl encryption
  • hardware
EXFiLTRATED
security penetration testing facebook bug bounties remote code execution ethics
It's Still the Data, Stupid!
security mongodb publicly available authentication access control misconfiguration
Schwab password policies and two factor authentication: a comedy of errors « Jeremy Tunnell
security password authentication two factor authentication
How a bug in Visual Studio 2015 exposed my source code on GitHub and cost me $6,500 in a few hours
security software bug hackers aws
Let's Encrypt is Trusted - Let's Encrypt - Free SSL/TLS Certificates
security ssl encryption https tls free certificates ssl certificates
I was just asked to crack a program in a job interview !
security software hacking cracking guide
This is the code Comcast is injecting into its users web traffic. · GitHub
security ethics malware isp network
Detectify Labs
security web extensions privacy
Inside the precision hack | Music Machinery
security voting hack
Creative usernames and Spotify account hijacking | Labs
security web unicode text canonicalization
Sprites mods - Hard disk hacking - Intro
security hardware hard drive root exploit
A Stick Figure Guide to the Advanced Encryption Standard (AES)
security visualization symmetric encryption cyphers block ciphers aes
How I Hacked Your Facebook Photos - Deleting any photo albums | 7xter
security bug bounties api oauth
4 HTTP Security headers you should always be using | ibuildings
security web headers
sr-captcha/index.md at gh-pages · mieko/sr-captcha · GitHub
security captcha silk road automation
How Google Authenticator Works
security web two factor authentication google authenticator
When Random Isn't Random Enough: Lessons from an Online Poker Exploit - Laura Diane Hamilton
security random poker
How Chinese Tinder clone screws you • Larry Salibra
security privacy tinder china
A (relatively easy to understand) primer on elliptic curve cryptography | Ars Technica
security cyphers cryptography elliptic curve cryptography
  • (CC BY 4.0)