JOHLEM.net / ITSEC (Educational Purpose) / MAJ 19-02-2018 //

IT Security & Compliance Consultant based in Luxemburg. // Follow me on Twitter: @johlem

root@penbox:~# msfupdate [*] [*] Attempting to update the Metasploit Framework... [*]

ITSEC NEWS

[an error occurred while processing this directive]
ITSEC NEWS Description from orignal website Twitter
darkreading Dark Reading.com encompasses ten communities, each of which drills deeper into the enterprise security challenge: Attacks & Breaches, Application Security, Cloud Security, Data Leaks & Insider Threats, Endpoint Security & Privacy, Mobile Security, Network & Perimeter Security, Risk Management & Compliance, Security Management & Analytics, and Vulnerabilities and Threats. Each community is led by editors and subject matter experts who collaborate with security researchers, technology specialists, industry analysts and other Dark Reading members to provide timely, accurate and informative articles that lead to spirited discussions. @DarkReading
securityaffairs.co Pierluigi Paganini, the founder, ENISA ETL Group, Cyber G7 Group Italy Summit, Ethical Hacker, Researcher, Security Evangelist, Security Analyst. @securityaffairs
social-engineer.org The Social-Engineer Podcast is a monthly discussion hosted by a panel of security experts that make up the SEORG Crew. We include guests from diverse backgrounds to discuss human behavior and its implications for information security. @humanhacker
fifthdomain.com Fifth Domain fills that role as a central hub for news, information and collaboration, whether you’re a cyber pro or just getting started. @theFifthDomain
securitymagazine.com Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed. @SecurityMag
threatpost.com Threatpost is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide. @threatpost
zataz.com L'actu grand public: #zataz #cybersecurite (french website) @zataz
bbc.com - cybersecurity BBC News provides trusted World and UK news as well as local and regional perspectives @twitter
securityweek.com IT Security News and Information Security News, Cyber Security, Network Security, Enterprise Security Threats, Cybercrime News and more. Information Security Industry Expert insights and analysis from IT security experts around the world. @SecurityWeek
scmagazine.com Breaking news on cybersecurity, cybercrime, industry insight and security product reviews at SC Media. @SCMagaziner
cnbc.com - cybersecurity Latest news on cybersecurity including online standards, hacking awareness, and increasing digital defense. @CNBC
hackingarticles Hacking articles (Blog) / Raj Chandel's Blog @rajchandel
pentestit.com Your source for all things Information Security (India) @pentestit
securityonline.info Security Training Share @the_yellow_fall
blog.sucuri.net Learn about website security, emerging vulnerabilities, and web malware infections from our team of website security researchers. @sucurisecurity
infosectweet.com Tweets itsec @twitter
darknet.org.uk Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing. @THEdarknet
pentestmag.com PenTest Magazine is a monthly downloadable IT security magazine, devoted exclusively to penetration testing. It features articles by penetration testing specialists and enthusiasts, experts in vulnerability assessment and management. We cover all aspects of pen testing, from theory to practice, from methodologies and standards to tools and real-life solutions. Each magazine features a cover focus, and articles from our regular contributors, covering IT security news and up-to-date topics. @PenTestMag

CVE / Security Bulletins / Vulnerabilities :

[an error occurred while processing this directive]

Global search cve database

Security Bulletins / CVE / Vulnerabilities / Bugs Description from orignal website Twitter Mailinglist / RSS API Country
cve.mitre.org CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE Entries are used in numerous cybersecurity products and services from around the world, including the U.S. National Vulnerability Database (NVD). @CVEnew Newsletter none USA
cvedetails.com www.cvedetails.com provides an easy to use web interface to CVE vulnerability data. You can browse for vendors, products and versions and view cve entries, vulnerabilities, related to them. You can view statistics about vendors, products and versions of products. none none none USA
vuldb.com Number 1 vulnerability database worldwide with more than 112000 entries available. Our specialists work with the crowd-based community to document the latest vulnerabilities on a daily basis since 1970. Besides technical details there are additional threat intelligence information like current risk levels and exploit price forecasts provided. @vuldb none yes USA
nvd.nist.gov The Information Technology Laboratory (ITL), one of seven research laboratories within the National Institute of Standards and Technology (NIST), is a measurement and testing laboratory encompassing a wide range of areas of computer science, mathematics, statistics, and systems engineering. ITL collaborates with other NIST laboratories, the Department of Commerce, government agencies, the private sector, standards development organizations, and other national and international stakeholders to develop and implement standards, tests, and metrics. The standards and metrics developed help make information systems more secure, usable, interoperable, and reliable. The resulting measurement and standards infrastructure accelerates innovation in IT and IT-related measurement science, which drive progress across scientific, technology, and commercial applications.. @usnistgov yes none USA
seclists.org Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure mailing lists such as Bugtraq. Here we provide web archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. @nmap yes none USA
oss-security.openwall.org This wiki provides information on a variety of open source security resources and “best practices” information. none none none USA
Launchpad CVE tracker Launchpad’s bug tracker helps software teams to collaborate on bug reports and fixes. none none none USA
Vulnerability & Exploit Database Launchpad’s bug tracker helps software teams to collaborate on bug reports and fixes. @rapid7 none none USA
www.kb.cert.org Vulnerability Notes Database - Advisory and mitigation information about software vulnerabilities. @rapid7 rss none USA
vulnerabilitycenter.com The Vulnerability Canter provides access to the Skybox Vulnerability Database, culling intelligence from 25+ sources, focusing on 1000+ products used in enterprise-scale networks. @skyboxsecurity rss none USA

Middleware

OS

Database

Network Devices

Software

Phone Devices

CMS (Wordpress..)

Virtualisation

Reporting Vulnerability links

Exploit DB

VULN INFOS

Exploit DB

Rootkea

ISO ITSEC

[an error occurred while processing this directive]

Linux Distribution for Pentest

Phone firmwares/Factory Images

OSINT

[an error occurred while processing this directive]

IP location

IP location search online

IP Tools

Social media

job

Websites history and infos

osint software

browser plugins

Pictures and photography tracking

Adress and Phone number

TOOLZ PENTEST

[an error occurred while processing this directive]
Pentester softwares Categories Descriptions Screenshots Tests
Whapa forensic-analysis WhatsApp DataBase Parser Tool *** ***
sshLooter Attack Script To Steal Passwords From SSH *** ***

Scanner infrastructures

WEBSCANNER (vulnerability scanner)

COMPLIANCE / HARDENING

[an error occurred while processing this directive]

Hardware lifecycle management

Compliance Software

Password Management

MONITORING / SUPERVISION

[an error occurred while processing this directive]

FORENSICS

[an error occurred while processing this directive]

Hardware kits for investigations

PHONES and IOT

[an error occurred while processing this directive]

Mobile devices

Protection software - Antivirus / Anti-malwares

[an error occurred while processing this directive]

Antivirus Online website

Antivirus & AntiMalwares

Antivirus

Programmation

[an error occurred while processing this directive]

programmation languages Official websites

Bluetooth and WIFI

[an error occurred while processing this directive]

Bluetooth

Wifi

Search engine - submit url direct link.

[an error occurred while processing this directive]

IRC - clients

[an error occurred while processing this directive]