You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Proof of Concept - Elastic Detection: VIP / Executive impersonation in subject (untrusted)
This detection rule is designed to identify emails where the sender's subject contains the display name of a VIP or executive from a predefined list (org_vips), and the sender has never been seen before. This rule is particularly useful for detecting Business Email Compromise (BEC) or fraud attempts targeting high-profile individuals within an organization.
Pre-requisites
org_vips List: A list of display names of VIPs or executives that must be manually connected to a VIP group of your upstream provider (Google Workspace).
Volatility-Based Trading Signal Algorithm: This algorithm leverages multiple technical indicators to evaluate market conditions and generate a consolidated trading signal ranging from -3 to +3. Each indicator contributes to the overall score based on its specific criteria, helping traders to identify optimal entry and exit points.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
How to Build and Install a Monero Node on a Debian-based System
Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above).
This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.
Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.
Bash script that blocks web server scanner IP Addresses after they scan once.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Grade Terraform Code Based on AWS Conformance Pack Criteria
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Authenticated AWS RDS Vulnerability Scanning for NMAP (NOT DONE)
The Nmap NSE script "Authenticated AWS RDS Vulnerability Scanning" is a comprehensive security tool designed for conducting in-depth, authenticated vulnerability assessments on Amazon Web Services (AWS) Relational Database Service (RDS) instances. This script is an integral part of a security professional's toolkit, enabling the identification and evaluation of security vulnerabilities within AWS RDS databases, including popular engines like PostgreSQL and MySQL.
TO-DO
Ensure the openssl library or any other cryptographic library you plan to use is accessible within the NSE environment. NSE does not natively support openssl, so you might need to adapt or find alternatives.
External Script Integration: If NSE cannot directly execute the necessary cryptographic functions, consider implementing these in an external script (e.g., Python) and call it from the NSE script.
Complete Signature Implementation: The functions provided for AWS Signature Version 4 are conceptual. Ensure each step correctly imple