• Cloud
  • CyberCrime - advice
  • CyberCrime - incident response
  • CyberCrime - recon & defense
  • Datenschutz
  • DNS / IP
  • Docs
  • FBIT
  • Gesetze
  • Informationssicherheit
  • Karten
  • KI
  • KI - Gesetze
  • Malware
  • Mathe
  • Medien
  • News
  • Normen
  • OWASP
  • Pentesting
  • Privatsphäre
  • Programmierung
  • Shadow Library
  • Sprache
  • Suchen
  • Tools
  • Unknown
Cloud
You Can't Control Your Data in the Cloud
https://karl-voit.at/cloud/
CyberCrime - advice
LKA Niedersachsen - Betrug
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/betrug
LKA Niedersachsen - Erpressung
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/erpressung
LKA Niedersachsen - Fakeshops
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/fakeshops
LKA Niedersachsen - Phishing
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/phishing
LKA Niedersachsen - Sonstige
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/sonstige
CyberCrime - incident response
IR Playbook - Business Email Compromise
https://frsecure.com/business-email-compromise-response-guide/
IR Playbook - Compromised Credentials
https://frsecure.com/compromised-credentials-response-playbook/
IR Playbook - Lost or Stolen Laptop
https://frsecure.com/lost-or-stolen-laptop-response-playbook/
IR Playbook - Malware
https://frsecure.com/malware-incident-response-playbook/
IR Playbook - Ransomware
https://frsecure.com/ransomware-response-playbook/
IR Playbook - Web Application Attack
https://frsecure.com/web-application-attack-response-playbook/
IR Playbooks - GitHub
This repository contains all the Incident Response Playbooks and Workflows of Company SOC.
https://gitlab.com/syntax-ir/playbooks/-/tree/main/
Zimperium IOC Repository
https://github.com/Zimperium/IOC
CyberCrime - recon & defense
CERT-BUND
Aktuelle Sicherheitshinweise
https://wid.cert-bund.de/portal/wid/kurzinformationen
CISA - #StopRansomware
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a
CISA - Cross-Sector Cybersecurity Performance Goals
A common set of protections that all critical infrastructure entities - from large to small - should implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques.
https://www.cisa.gov/cross-sector-cybersecurity-performance-goals
CISA - Cybersecurity Alerts & Advisories
https://www.cisa.gov/news-events/cybersecurity-advisories?f%5B0%5D=advisory_type%3A94
CISA - Known exploited vulnerabilities catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
CISA - vulnerability bulletins
https://www.cisa.gov/news-events/bulletins
Microsoft - threat actors naming
https://learn.microsoft.com/en-us/defender-xdr/microsoft-threat-actor-naming
MITRE attack
A knowledge base of adversary tactics
https://attack.mitre.org/
MITRE attack - Enterprise Matrix
The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, Network, Containers.
https://attack.mitre.org/matrices/enterprise/
MITRE attack - Groups
Groups are activity clusters that are tracked by a common name in the security community
https://attack.mitre.org/groups/
MITRE attack - Mobile Matrix
The Matrices cover techniques involving device access and network-based effects that can be used by adversaries without device access. The Matrix contains information for the following platforms: Android, iOS.
https://attack.mitre.org/matrices/mobile/
MITRE attack - Software
Software is a generic term for custom or commercial code, operating system utilities, open-source software, or other tools used to conduct behavior modeled in ATT&CK
https://attack.mitre.org/software/
MITRE d3fend
A knowledge graph of cybersecurity countermeasures
https://d3fend.mitre.org/
Threat Modeling -
https://www.cisa.gov/resources-tools/resources/risk-and-vulnerability-assessments
Threat Modeling - Computer security
https://en.wikipedia.org/wiki/Computer_security
Threat Modeling - Manifesto
https://www.threatmodelingmanifesto.org/
Threat Modeling - OWASP Threat Modeling Process
https://owasp.org/www-community/Threat_Modeling_Process
Threat Modeling - STRIDE
https://en.wikipedia.org/wiki/STRIDE_model
Datenschutz
BDSG
https://dsgvo-gesetz.de/bdsg/
BDSG - Orig.
https://www.gesetze-im-internet.de/bdsg_2018/
DSGVO
https://dsgvo-gesetz.de/
DSGVO - Checklisten
https://lfd.niedersachsen.de/startseite/infothek/checklisten/checklisten-190892.html
DSGVO - Datenschutzkonferenz (DSK) Kurzpapiere
https://www.datenschutzkonferenz-online.de/kurzpapiere.html
DSGVO - Handlungsempfehlungen und Hinweise
https://lfd.niedersachsen.de/startseite/infothek/handlungsempfehlungen_und_hinweise/
DSGVO - Info- und Merkblätter
https://lfd.niedersachsen.de/startseite/infothek/info_und_merkblatter/info-und-merkblatter-190851.html
DSGVO - Kurzpapiere
https://lfd.niedersachsen.de/startseite/dsgvo/anwendung_dsgvo_kurzpapiere/ds-gvo---kurzpapiere-155196.html
DSGVO - Verordnung (EU) 2016/679.
VERORDNUNG (EU) 2016/679 DES EUROPÄISCHEN PARLAMENTS UND DES RATES
https://eur-lex.europa.eu/legal-content/DE/TXT/?uri=CELEX:32016R0679
NDSG
https://dsgvo-gesetz.de/ndsg/
NDSG - Orig
Das Niedersächsische Datenschutzgesetz - PDF
https://www.lfd.niedersachsen.de/startseite/datenschutzrecht/niedersachsisches_datenschutzgesetz/das-niedersaechsische-datenschutzgesetz-56264.html
DNS / IP
Abuse IPDB
https://www.abuseipdb.com/
bgpview
https://bgpview.io/ip/149.56.244.87
Browser leaks
https://browserleaks.com/
Browser leaks my ip
https://browserleaks.com/ip
DNS dumpster
https://dnsdumpster.com/
DNS forge
https://dnsforge.de/
DNS leak test
https://dnsleaktest.com/
flagfox
https://iplookup.flagfox.net/
freegeoip
https://freegeoip.live/json/149.56.244.87
GeoIPLookup.io
https://geoiplookup.io/
IANA IPv4 Special-Purpose Address Registry
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
into dns
https://intodns.com/megacorpone.com
IP Geolocation API
Easy to integrate, available in JSON, XML, CSV, Newline, PHP
https://ip-api.com/
Netzwerkgeschwindigkeit
https://fast.com/de/
ripe
http://rest.db.ripe.net/search.json?query-string=149.56.244.87
Show my IP
https://www.showmyip.com/
tor metrics
https://metrics.torproject.org/rs.html#search/185.220.101.8
utrace
http://xml.utrace.de/?query=149.56.244.87
Docs
Common Weakness Enumeration TOP 25
2022 CWE Top 25 Most Dangerous Software Weaknesses
https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html
CVE
https://cve.mitre.org/
CVE Details List Of Vendors
https://www.cvedetails.com/vendor.php
CVE Details Microsoft (CVSS score >= 9)
https://www.cvedetails.com/vulnerability-list/vendor_id-26/cvssscoremin-9/cvssscoremax-/Microsoft.html
CVE Details TOP 50
Top 50 Products By Total Number Of "Distinct" Vulnerabilities
https://www.cvedetails.com/top-50-products.php
CVE Details Vulnerabilities By Type
https://www.cvedetails.com/vulnerabilities-by-types.php
CVE download
https://cve.mitre.org/data/downloads/index.html
Electropedia
The World's Online Electrotechnical Vocabulary
https://www.electropedia.org/
ISO Online Browsing Platform
https://www.iso.org/obp
Malware-Traffic-Analysis
https://www.malware-traffic-analysis.net
PowerShell Commands
https://www.pdq.com/powershell/
SANS posters
https://www.sans.org/posters/?focus-area=digital-forensics
SS64
Commandline references
https://ss64.com/
FBIT
boxes
https://content.fb-it-solutions.de/t00ls/boxes.html
browser
https://content.fb-it-solutions.de/t00ls/browser.jsp
docs
https://docs.fb-it-solutions.de
globe
https://content.fb-it-solutions.de/gl0bus/
header
https://content.fb-it-solutions.de/t00ls/header.jsp
hugo
https://hugo.fb-it-solutions.de
ip
https://content.fb-it-solutions.de/t00ls/ip.jsp
ip json
https://mobile.fb-it-solutions.de/ip_json.jsp
TheAuditor
https://auditor.fbit-home.de/
WebUI
https://webui.fbit-ai.de/
Gesetze
Cyber Fahnder
http://www.cyberfahnder.de/
Gesetze im Internet
https://www.gesetze-im-internet.de/
StGB Hackerparagraphen - § 202 Verletzung des Briefgeheimnisses
https://www.gesetze-im-internet.de/stgb/__202.html
StGB Hackerparagraphen - § 202a Ausspähen von Daten
https://www.gesetze-im-internet.de/stgb/__202a.html
StGB Hackerparagraphen - § 202b Abfangen von Daten
https://www.gesetze-im-internet.de/stgb/__202b.html
StGB Hackerparagraphen - § 202c Vorbereiten des Ausspähens und Abfangens von Daten
https://www.gesetze-im-internet.de/stgb/__202c.html
Straftaten im Netz
https://www.polizei-praevention.de/themen-und-tipps/straftaten-im-netz/rechtliche-uebersicht#Paragrafen_mit_direktem_Bezug_zu_Cybercrime
Informationssicherheit
EU - Richtlinie 2022/2555 - NIS2 (Network and Information Security)
https://eur-lex.europa.eu/legal-content/DE/TXT/HTML/?uri=CELEX:32022L2555&from=DE
EU - Richtlinie 2022/2555 - NIS2 (Network and Information Security)
Artikel 21 Risikomanagementmaßnahmen im Bereich der Cybersicherheit
https://eur-lex.europa.eu/legal-content/DE/TXT/HTML/?uri=CELEX:32022L2555&from=DE#d1e3335-80-1
EU - Richtlinie 2022/2557 - CER (Critical Entities Resilience Directive)
https://eur-lex.europa.eu/legal-content/DE/TXT/HTML/?uri=CELEX:32022L2557&from=DE;
KRITIS - BSI-Gesetz
https://www.gesetze-im-internet.de/bsig_2009/
KRITIS - BSI-Gesetz §8a
§ 8a Sicherheit in der Informationstechnik Kritischer Infrastrukturen
https://www.gesetze-im-internet.de/bsig_2009/__8a.html
KRITIS - KritisV
Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz
https://www.gesetze-im-internet.de/bsi-kritisv/
NIS-2 - Anhang 1: Sektoren mit hoher Kritikalität
https://www.bsi.bund.de/dok/nis-2-anhang-1
NIS-2 - Anhang 2: Sonstige kritische Sektoren
https://www.bsi.bund.de/dok/nis-2-anhang-2
NIS-2 - BSI Betroffenheitsprüfung
https://www.bsi.bund.de/dok/nis-2-betroffenheitspruefung
NIS-2 - BSI Entscheidungsbaum der NIS-2-Betroffenheitsprüfung
https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/NIS-2/nis-2-betroffenheit-entscheidungsbaum.html?nn=1116336
NIS-2 - BSI FAQ
https://www.bsi.bund.de/dok/nis-2-faq
NIS-2 - BSI Was tun?
https://www.bsi.bund.de/DE/Themen/Regulierte-Wirtschaft/NIS-2-regulierte-Unternehmen/NIS-2-was-tun/NIS-2-was-tun_node.html
NIS-2 - Gesetzentwurf zur Umsetzung
Entwurf eines Gesetzes zur Umsetzung der NIS-2-Richtlinie und zur Regelung wesentlicher Grundzüge des Informationssicherheitsmanagements in der Bundesverwaltung
https://www.bmi.bund.de/SharedDocs/gesetzgebungsverfahren/DE/CI1/nis2umsucg.html
NIS-2 - KRITIS – auf den zweiten Blick
https://www.openkritis.de/
NIS-2 - Management von Cyberrisiken
https://www.allianz-fuer-cybersicherheit.de/dok/cyberriskmanagement
Österreichischen Informationssicherheitshandbuch
https://sicherheitshandbuch.gv.at/
Karten
geojson io
https://geojson.io/#map=4.59/52.16/8.81
GeoNames
https://www.geonames.org/
graphhopper routing
https://explorer.graphhopper.com/
MapCarta
https://mapcarta.com/de/Hannover
Mapillary
https://www.mapillary.com/
OldMaps online
Historische Karten mit Zeitleiste
https://www.oldmapsonline.org/en/history/battles#position=5/50.29/15.32&year=1813
openstreetmap
https://www.openstreetmap.org/#map=8/52.506/9.646
opentopomap
https://opentopomap.org/#map=6/49.958/8.778
Radinfrastruktur Deutschland
https://tilda-geo.de/regionen/radinfra?map=10.1/52.355/10.651&config=pdqyyt.7h3d.16g9vk&v=2&bg=default&osmNotes=true&f=10|way/28131094|10.344121|52.393647|10.372467|52.420874
submarine cable map
https://www.submarinecablemap.com/
Virtuelles Kartenforum - Historische Karten
https://kartenforum.slub-dresden.de/
KI
ChatGPT
https://chat.openai.com
DeepInfra
https://deepinfra.com/
gpt4free" serves as a PoC (proof of concept), demonstrating the development of an API package with multi-provider requests, with features like timeouts, load balance and flow control.
https://github.com/xtekky/gpt4free
Hugging Face
https://huggingface.co/
leaderboards evalplus
https://evalplus.github.io/leaderboard.html
leaderboards huggingface
https://huggingface.co/spaces/bigcode/bigcode-models-leaderboard
MCP archive
https://mcp-archive.com/
MCP market
https://mcpmarket.com/
MCP servers
https://github.com/modelcontextprotocol/servers
mcp.so
Find Awesome MCP Servers and Clients
https://mcp.so/
MidJourney
https://midjourney.com
Mistral AI
https://chat.mistral.ai/chat
ollama
Get up and running with large language models.
https://ollama.com/
ollama github
https://github.com/ollama/ollama
ollama models
https://ollama.com/search
OpenAI
https://platform.openai.com/
phind
https://www.phind.com/
WhiteRabbitNeo
https://www.whiterabbitneo.com/
KI - Gesetze
BSI - Künstliche Intelligenz
https://www.bsi.bund.de/dok/13394406
EU - Generative KI-Modelle
zur Festlegung harmonisierter Vorschriften für künstliche Intelligenz
https://eur-lex.europa.eu/legal-content/DE/TXT/HTML/?uri=OJ:L_202401689
Malware
Alien Vault
https://otx.alienvault.com
Antivirus Event Analysis Cheat Sheet
https://www.nextron-systems.com/?s=antivirus
Any.run
https://any.run/
BugTraq
BugTraq is a full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities
https://bugtraq.securityfocus.com/
DAS MALWERK
malware samples
https://dasmalwerk.eu/
Exploit Database
https://www.exploit-db.com/
Malpedia
https://malpedia.caad.fkie.fraunhofer.de/
Malshare
https://malshare.com
Malware bazaar
https://bazaar.abuse.ch/
VULDB
the community-driven vulnerability database
https://vuldb.com/
vulnhub
a lot of training vms with different vulnerabilities
https://www.vulnhub.com/
Mathe
GeoGebra
online calculator suite
https://www.geogebra.org/calculator
Medien
unsplash
Kostenlose Photos
https://unsplash.com/
News
BBC
https://www.bbc.co.uk/
BBC reality check
https://www.bbc.com/news/reality_check
Bleeping computer
https://www.bleepingcomputer.com/
Chaos sozial
https://chaos.social/
Correctiv
https://correctiv.org/
Deutsche Welle EN
https://www.dw.com/en/top-stories/s-9097
fefes blog
https://blog.fefe.de/
Golem
https://www.golem.de
Heise Newsticker
https://www.heise.de/newsticker/
Junge Welt
https://www.jungewelt.de/
Le Monde EN
https://www.lemonde.fr/en/
Lobby control
https://www.lobbycontrol.de/
Netzpolitik
https://netzpolitik.org/
Realitatsabzweig - Frank Rieger
https://steadyhq.com/de/realitatsabzweig/posts
Tagesschau
https://www.tagesschau.de/
Tarnkappe
https://tarnkappe.info/
The Conversation
https://theconversation.com/europe
The Guardian
https://www.theguardian.com/international
Übermedien
https://uebermedien.de/
Normen
DIN 5008
Schreib- und Gestaltungsregeln für die Text- und Informationsverarbeitung
https://de.m.wikipedia.org/wiki/DIN_5008
ISO 27k informazion security
https://www.iso27001security.com/index.html
OWASP
OWASP Application Security Verification Standard
https://owasp.org/www-project-application-security-verification-standard/
OWASP Cheat Sheet Series
https://cheatsheetseries.owasp.org/
OWASP Cheat Sheet Series (git)
https://github.com/OWASP/CheatSheetSeries
OWASP Fuzz Vectors
https://owasp.org/www-project-web-security-testing-guide/v41/6-Appendix/C-Fuzz_Vectors
OWASP Fuzzing
https://owasp.org/www-community/Fuzzing
OWASP Open Source Application Security Tools
https://owasp.org/www-community/Free_for_Open_Source_Application_Security_Tools
OWASP Proactive Controls
https://owasp.org/www-project-proactive-controls/
OWASP Top 10 for Large Language Model Applications
https://owasp.org/www-project-top-10-for-large-language-model-applications/
OWASP Top Ten
https://owasp.org/www-project-top-ten/
OWASP Web Security Testing Guide
https://owasp.org/www-project-web-security-testing-guide/
Pentesting
exploit-notes
Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTFs.
https://exploit-notes.hdks.org/
FuzzDB
most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses
https://github.com/fuzzdb-project/fuzzdb
Google Dorking
https://dorksearch.com/
Google Hacking Database
https://www.exploit-db.com/google-hacking-database
Google search - in site
https://www.google.com/search?num=42&hl=en&q=site:theguardian.com pegasus
Google search - in title
https://www.google.com/search?num=42&hl=en&q=intitle:pegasus
Google search - in url
https://www.google.com/search?num=42&hl=en&q=inurl:pegasus
GTFOBins
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
https://gtfobins.github.io/
HackTricks
Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news.
https://book.hacktricks.xyz/
Kali Tools
https://www.kali.org/tools/
LOLBAS
Living Off The Land Binaries, Scripts and Libraries
https://lolbas-project.github.io/
Metasploit Unleashed
Free Online Ethical Hacking Course
https://www.offsec.com/metasploit-unleashed/
Netcraft search dns
https://searchdns.netcraft.com/?restriction=site+contains&host=megacorpone.com
Netcraft site report
https://sitereport.netcraft.com/?url=http://intranet.megacorpone.com
Pentest Standard PTES
http://www.pentest-standard.org
PENTEST-WIKI
https://github.com/nixawk/pentest-wiki
PTES Technical Guidelines
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
SecLists
List types include usernames, passwords, URLs, sensitive data patterns...
https://github.com/danielmiessler/SecLists
Security Headers
https://securityheaders.com/?q=www.megacorpone.com
swisskyrepo
diverse CheatCheets
https://github.com/swisskyrepo
swisskyrepo - Internal All The Things
Active Directory and Internal Pentest Cheatsheets
https://github.com/swisskyrepo/InternalAllTheThings
swisskyrepo - Payloads All The Things
A list of useful payloads and bypasses for Web Application Security.
https://github.com/swisskyrepo/PayloadsAllTheThings
The Pentesters Guide
https://0xffsec.com/handbook/
Vulners Inc
All-in-one vulnerability intelligence
https://vulners.com/
Privatsphäre
Browser Fingerprint
https://amiunique.org/fingerprint/
Browser leaks
https://browserleaks.com/
Cover Your Tracks
See how trackers view your browser
https://coveryourtracks.eff.org/
Digitale Selbstverteidigung
Anleitung zur Selbsthilfe
https://digitalcourage.de/digitale-selbstverteidigung
Europäische Alternativen für digitale Produkte
https://european-alternatives.eu/de
Extreme Privacy
https://inteltechniques.com
Kuketz Empfehlungsecke
https://www.kuketz-blog.de/empfehlungsecke
Linuxfabrik
Open Source Admin-Handbuch
https://docs.linuxfabrik.ch
Open Source Alternativen
https://openalternative.co/categories
Privacy Guides
https://www.privacyguides.org/
Privacy Tools
https://www.privacytools.io/
Privacy-Handbuch
https://www.privacy-handbuch.de/
PrivacyScore
PrivacyScore allows you to test websites and rank them according to their security and privacy features.
https://privacyscore.org/
Webbkoll
Webbkoll monitors privacy-enhancing features on websites
https://webbkoll.dataskydd.net/
Programmierung
Build, compile and install Python from source code
https://www.build-python-from-source.com/
DevDocs
DevDocs combines multiple API documentations in a fast, organized, and searchable interface.
https://devdocs.io/
DevDocs - github
https://github.com/freeCodeCamp/devdocs
Epoche converter
https://www.epochconverter.com/
Quick References
https://quickref.me/
Shadow Library
Anna's Archive
The largest truly open library in human history
https://annas-archive.org/
Sprache
Oxford Dictionary
https://www.oxfordlearnersdictionaries.com
Suchen
Kagi AI Suche
https://kagi.com/
Phind
https://www.phind.com/
Qwant
https://lite.qwant.com/
Startpage
https://www.startpage.com/
You AI Suche
https://you.com/
Tools
Atomzeit
https://uhr.ptb.de/
build with
https://builtwith.com/www.megacorpone.com
built with
Find out what websites are Built With
https://builtwith.com/
CVSS category details
https://content.fb-it-solutions.de/pegasus/CVSS.html
CVSS v3.1 Base Score Calculator
https://chandanbn.github.io/cvss/
CyberChef
https://gchq.github.io/CyberChef/
Guerilla mail
https://www.guerrillamail.com/
Hidden Wiki
https://thehiddenwiki.org/
mozilla observatory
https://observatory.mozilla.org/analyze/www.megacorpone.com
O&O ShutUp10++
Free antispy tool for Windows 10 and 11
https://www.oo-software.com/en/shutup10
Online Scanner
https://hackertarget.com/
Proton mail
https://protonmail.com/
Proton vpn
https://protonvpn.com/
Shodan
https://www.shodan.io/
SSL Labs
https://www.ssllabs.com/ssltest/analyze.html?d=www.megacorpone.com&latest
Sysinternals Suite
https://live.sysinternals.com/
System Informer
System Informer is the official successor to Process Hacker
https://systeminformer.sourceforge.io/
ThreatFox
IOC Database
https://threatfox.abuse.ch/browse/
Time converter
https://www.worldtimebuddy.com/
TLS Certificates
https://crt.sh/?q=megacorpone.com
Twitter
https://twitter.com/
URLhaus Database
https://urlhaus.abuse.ch/verify-ua/
URLScan
https://urlscan.io/
URLScan live
https://urlscan.io/live/
Virustotal
https://www.virustotal.com
wayback machine
https://web.archive.org
Unknown