Security Monkey memantau akun AWS dan GCP Anda untuk perubahan kebijakan dan peringatan tentang konfigurasi yang tidak aman. Dukungan tersedia untuk awan publik dan pribadi OpenStack. Security Monkey juga dapat mengawasi dan memantau organisasi, tim, dan repositori GitHub Anda.
Ini menyediakan satu UI untuk menelusuri dan mencari melalui semua akun, wilayah, dan layanan cloud Anda. Security Monkey ingat keadaan sebelumnya dan dapat menunjukkan dengan tepat apa yang berubah, dan kapan.
more info : https://github.com/Netflix/security_monkey
No More Yukinoshita 47. I'm Done
If You Found Every Social Media Platform Using "Yukinoshita 47" Name That's The Other Guy.
Copyright ©
Yukinoshita 47 | Published By Gooyaabi Templates
| Powered By Blogger
Design by WebSuccessAgency | Blogger Theme by NewBloggerThemes.com | BTheme.net
Design by WebSuccessAgency | Blogger Theme by NewBloggerThemes.com | BTheme.net
My Motivation
Blog Archive
-
►
2020
(27)
- ► Desember 2020 (2)
- ► November 2020 (2)
- ► September 2020 (9)
- ► Agustus 2020 (3)
- ► April 2020 (5)
-
►
2019
(111)
- ► September 2019 (1)
- ► Agustus 2019 (11)
- ► April 2019 (48)
- ► Maret 2019 (1)
- ► Februari 2019 (2)
-
▼
2018
(150)
- ► Desember 2018 (20)
- ► November 2018 (7)
- ► Agustus 2018 (30)
-
▼
Juli 2018
(47)
- otseca - Other Security Awareness
- DumpsterDiver - Tool to search secrets in various ...
- PhpSploit: Furtive post-exploitation framework
- AutoSQLi - the new way script-kiddies hack websites
- WhatWaf - Detect and bypass web application firewa...
- The Rogue Toolkit
- Seeker - Find GeoLocation with High Accuracy
- CMSeeK - CMS (Content Management Systems) Detectio...
- Security Monkey
- AWS Lambda - IAM Access Key Disabler
- Hindsight - Internet history forensics for Google ...
- Camelishing - Social Engineering Tool
- NETworkManager - A powerful tool for managing netw...
- Google CTF : Beginner Quest - Floppy [Write Up]
- Google CTF : Beginner Quest - OCR Is Cool [Write Up]
- Google CTF : Beginner Quest - Letter [Write Up]
- Cybertalents Practice : Digital Forensic - G&P Lis...
- WTHack : Basecption Cryptography [Write Up]
- Grok-backdoor - Simple python backdoor with Ngrok ...
- tinfoleak - The most complete open-source tool for...
- Massive NSE (Nmap Scripting Engine) AutoSploit and...
- Infection Monkey - An automated pentest tool
- Ares - Python botnet and backdoor
- Car Backdoor Maker
- Steganography Toolkit - Collection of steganograph...
- Fuxi-Scanner - Network Security Vulnerability Scanner
- CookieCatcher - Session Hijacker Tools
- EagleEye - Find their Instagram, FB and Twitter Pr...
- Guasap Forensic - WhatsApp Forensic Tool
- Windows Hacking Pack
- injectify - Perform advanced MiTM attacks on websi...
- ph0neutria malware crawler
- pureblood - A Penetration Testing Framework create...
- LogonTracer - Investigate malicious Windows logon ...
- Memoro: A Detailed Heap Profiler
- WebKiller - Tool Information Gathering Write With ...
- Black Owl - a simple tool to gather information, b...
- TAMU CTF : Breadsticks2 Challenge
- TAMU CTF : Web Challenge
- Cybertalents Practice : Malware Reverse Engineerin...
- WTHack : Cryptography - Communicating with numeral...
- WTHack : The Secret Message [Write Up]
- CTFLearn : Cryptography - Kill the Killer [Write Up]
- Kali Linux : Membuat Webserver Sederhana Dengan Si...
- Kali Linux : Solusi Masalah Metasploit Failed To L...
- Cybertalents Practice - Malware Reverse Engineerin...
- Cybertalents Practice : Digital Forensic - Hidden ...
-
►
2017
(131)
- ► November 2017 (7)
- ► Oktober 2017 (32)
- ► September 2017 (31)
- ► Agustus 2017 (44)
- ► Maret 2017 (2)
- ► Februari 2017 (2)
- ► Januari 2017 (5)
-
►
2016
(11)
- ► Desember 2016 (11)
Categories
- Agama (1)
- Andrax (1)
- Android (36)
- Antivirus (5)
- Backup And Restore (2)
- Bad USB (2)
- Binary Exploitation (1)
- Blog (9)
- Botnet (1)
- Bug Hunting (7)
- Corporate Management (1)
- Cryptocurrency (2)
- Cryptography (8)
- CTF (27)
- Ddos (2)
- Deface (4)
- Digital Forensic (6)
- Digital Forensic Tools (13)
- Distro Linux (1)
- Ebook (6)
- Encryption Tools (6)
- Exploit - Poc Cheatsheet (5)
- Facebook Hacking Art (1)
- Getting Money (3)
- Hacking (76)
- Hacking Lab (4)
- Hacking Tools (154)
- Hardware (4)
- Hardware Tools (6)
- Hijacking (1)
- HTML CSS (3)
- Hukum (1)
- Indonesian Government & Law Enforcement (7)
- Information Gathering (13)
- IOS (1)
- Java (2)
- Javascript (1)
- Kali Linux Tutorial (30)
- Legalitas (1)
- Linux (32)
- Malware Analysis (1)
- Malware Tools (14)
- Messaging (1)
- Modul Pelajaran Kejuruan IT (2)
- Multiboot (1)
- National Security Agency (NSA) (15)
- Nethunter (2)
- Networking (2)
- Networking Tools (2)
- OSINT (2)
- Other (1)
- Parrot Linux (21)
- Password (4)
- Pemrograman Aplikasi (9)
- Pemrograman Web (13)
- PHP (3)
- Portal Belajar Otodidak (7)
- Produktivitas (2)
- Python (1)
- Report (3)
- Reverse Engineering (9)
- Reverse Engineering Tools (3)
- RFID (2)
- Risk Management (3)
- Sandbox (1)
- Security (19)
- Security Audit (4)
- Security Tools (21)
- Shell (1)
- Sistem Informasi (1)
- Sniffing (1)
- Social Engineering (1)
- Spotify (1)
- Termux (6)
- Tips and Trik (18)
- Tools (30)
- Troubleshooting (12)
- Tutorial (17)
- USB Rubber Ducky (2)
- VM (1)
- Vulnerability Analysis (10)
- Vulnerability Disclosure (3)
- Webserver (6)
- Wi-Fi (1)
- Windows (13)
- Windows Subsystem Linux (6)