Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save ezzeldinadel/676f99d0106cfa16ed4b119213b68c38 to your computer and use it in GitHub Desktop.
Save ezzeldinadel/676f99d0106cfa16ed4b119213b68c38 to your computer and use it in GitHub Desktop.
Internet health:
ISC: http://www.isc.org
NetCraft: http://news.netcraft.com/
US-CERT: http://www.US-Cert.gov
General technology and security trends:
Schneier on Security Blog: http://www.schneier.com/
Krebs on Security: http://krebsonsecurity.com/
Security Dark Reading: http://www.darkreading.com/
Slashdot: http://slashdot.org
Engadget: http://www.engadget.net
Securosis: https://securosis.com/blogThreat intelligence:
Microsoft Security Intelligence Report: http://www.microsoft.com/security/sir/default.aspx
Team Cymru (also has subscription service): www.team-cymru.org
FBI Cybercrime information: http://www.fbi.gov/about-us/investigate/cyber/cyberMalware and threats:
Threat Expert: http://threatexpert.com
Microsoft Malware Protection Center: http://www.microsoft.com/security/portal/default.aspx
SANS Internet Storm Center: http://Isc.sans.edu
Symantec Threat Explorer: http://www.symantec.com/norton/security_response/threatexplorer/index.jsp
Symantec Internet Threat Report: http://www.symantec.com/business/theme.jsp?themeid=threatreport
McAfee Threat Center: http://www.mcafee.com/us/threat_center/
Metasploit Blog: https://community.rapid7.com/community/metasploit?view=blog
Security Focus: http://www.securityfocus.com/
Dshield: http://www.dshield.org/
Offensive Security’s Exploit Database: http://www.exploit-db.com/
Worldwide Observatory of Malicious Behaviors and Attack Threats (WOMBAT): http://wombat-project.eu/
Symantec’s Worldwide Intelligence Network Environment (WINE): http://www.symantec.com/about/profile/universityresearch/sharing.jsp
Mandiant M-Trends: https://www.mandiant.com/resources/mandiant-reports/Bad domains, IP addresses, and other indicators:
Malware Domain Blocklist: http://www.malwaredomains.com/
Malware Domain List: http://www.malwaredomainlist.com/
Unspam Technologies Project Honeypot: http://www.projecthoneypot.org/index.php
EXPOSURE (Exposing Malicious Domains): http://exposure.iseclab.org/
Shadowserver Foundation: http://www.shadowserver.org/wiki/
Automatic threat analyzers:
Anubis (Analyzing Unknown Binaries): http://anubis.iseclab.org/
Virustotal: http://www.virustotal.com/
Metascan online: http://www.metascan-online.com/Threats with signatures:
IBM ISS X-Force: http://xforce.iss.net
BotHunter Internet Distribution Page: http://www.bothunter.net/
Latest Snort publicly available Snort rules (most recent rules require subscription): http://www.snort.org/snort-rules/
Emerging Threats signature list: http://www.emergingthreats.net/
Latest Tenable Nessus plugins (requires subscription): http://www.nessus.org/plugins/
Patches and vulnerabilities:
MITRE’s CVE: http://cve.mitre.org
NIST’s National Vulnerability Database: http://nvd.nist.gov/
US-CERT Technical Cyber Security Alerts: http://www.us-cert.gov/cas/techalerts
Microsoft Security TechCenter: http://technet.microsoft.com/en-us/security/default.aspx
Whatever other vendor software is commonly used within the constituency.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment