/ ITSEC (Educational Purpose) / MAJ 107-05-2018 //

IT Security & Compliance Consultant based in Luxemburg. // Follow me on Twitter: @johlem

root@penbox:~# msfupdate [*] [*] Attempting to update the Metasploit Framework... [*]


ITSEC NEWS Description from orignal website Twitter
darkreading Dark encompasses ten communities, each of which drills deeper into the enterprise security challenge: Attacks & Breaches, Application Security, Cloud Security, Data Leaks & Insider Threats, Endpoint Security & Privacy, Mobile Security, Network & Perimeter Security, Risk Management & Compliance, Security Management & Analytics, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions. @DarkReading Pierluigi Paganini, the founder, ENISA ETL Group, Cyber G7 Group Italy Summit, Ethical Hacker, Researcher, Security Evangelist, Security Analyst. @securityaffairs The Social-Engineer Podcast is a monthly discussion hosted by a panel of security experts that make up the SEORG Crew. We include guests from diverse backgrounds to discuss human behavior and its implications for information security. @humanhacker Fifth Domain fills that role as a central hub for news, information and collaboration, whether you’re a cyber pro or just getting started. @theFifthDomain Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed. @SecurityMag Threatpost is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide. @threatpost L'actu grand public: #zataz #cybersecurite (french website) @zataz - cybersecurity BBC News provides trusted World and UK news as well as local and regional perspectives @twitter IT Security News and Information Security News, Cyber Security, Network Security, Enterprise Security Threats, Cybercrime News and more. Information Security Industry Expert insights and analysis from IT security experts around the world. @SecurityWeek Breaking news on cybersecurity, cybercrime, industry insight and security product reviews at SC Media. @SCMagaziner - cybersecurity Latest news on cybersecurity including online standards, hacking awareness, and increasing digital defense. @CNBC
hackingarticles Hacking articles (Blog) / Raj Chandel's Blog @rajchandel Your source for all things Information Security (India) @pentestit Security Training Share @the_yellow_fall Learn about website security, emerging vulnerabilities, and web malware infections from our team of website security researchers. @sucurisecurity Tweets itsec @twitter Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing. @THEdarknet PenTest Magazine is a monthly downloadable IT security magazine, devoted exclusively to penetration testing. It features articles by penetration testing specialists and enthusiasts, experts in vulnerability assessment and management. We cover all aspects of pen testing, from theory to practice, from methodologies and standards to tools and real-life solutions. Each magazine features a cover focus, and articles from our regular contributors, covering IT security news and up-to-date topics. @PenTestMag

CVE / Security Bulletins / Vulnerabilities :

Global search cve database

Security Bulletins / CVE / Vulnerabilities / Bugs Description from orignal website Twitter Mailinglist / RSS API Country CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE Entries are used in numerous cybersecurity products and services from around the world, including the U.S. National Vulnerability Database (NVD). @CVEnew Newsletter none USA provides an easy to use web interface to CVE vulnerability data. You can browse for vendors, products and versions and view cve entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products. none none none USA Number 1 vulnerability database worldwide with more than 112000 entries available. Our specialists work with the crowd-based community to document the latest vulnerabilities on a daily basis since 1970. Besides technical details there are additional threat intelligence information like current risk levels and exploit price forecasts provided. @vuldb none yes USA The Information Technology Laboratory (ITL), one of seven research laboratories within the National Institute of Standards and Technology (NIST), is a measurement and testing laboratory encompassing a wide range of areas of computer science, mathematics, statistics, and systems engineering. ITL collaborates with other NIST laboratories, the Department of Commerce, government agencies, the private sector, standards development organizations, and other national and international stakeholders to develop and implement standards, tests, and metrics. The standards and metrics developed help make information systems more secure, usable, interoperable, and reliable. The resulting measurement and standards infrastructure accelerates innovation in IT and IT-related measurement science, which drive progress across scientific, technology, and commercial applications.. @usnistgov yes none USA Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure mailing lists such as Bugtraq. Here we provide web archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. @nmap yes none USA This wiki provides information on a variety of open source security resources and “best practices” information. none none none USA
Launchpad CVE tracker Launchpad’s bug tracker helps software teams to collaborate on bug reports and fixes. none none none USA
Vulnerability & Exploit Database Launchpad’s bug tracker helps software teams to collaborate on bug reports and fixes. @rapid7 none none USA Vulnerability Notes Database - Advisory and mitigation information about software vulnerabilities. @rapid7 rss none USA The Vulnerability Canter provides access to the Skybox Vulnerability Database, culling intelligence from 25+ sources, focusing on 1000+ products used in enterprise-scale networks. @skyboxsecurity rss none USA




Network Devices


Phone Devices

CMS (Wordpress..)


Reporting Vulnerability links

Exploit DB


Exploit DB



Linux Distribution for Pentest

Phone firmwares/Factory Images


IP location

IP location search online

IP Tools

Social media


Websites history and infos

osint software

browser plugins

Pictures and photography tracking

Adress and Phone number


Pentester softwares Categories Descriptions Screenshots Tests
Whapa forensic-analysis WhatsApp DataBase Parser Tool *** ***
sshLooter Attack Script To Steal Passwords From SSH *** ***

Scanner infrastructures

WEBSCANNER (vulnerability scanner)


Hardware lifecycle management

Compliance Software

Password Management



Hardware kits for investigations


Mobile devices

Protection software - Antivirus / Anti-malwares

Antivirus Online website

Antivirus & AntiMalwares



programmation languages Official websites

Bluetooth and WIFI



Search engine - submit url direct link.

IRC - clients