The SaaS CTO Security Checklist : This is a basic checklist that all SaaS CTOs (and anyone else) can use to harden their security. Security shouldn’t feel like a chore. Select your sta...
2016 Guide to User Data Security : This guide is for the software developer, architect or system administrator who doesn't want to spend a lifetime wading through cryptographic algorith...
How to systematically secure anything : Security engineering is the discipline of building secure systems.
Its lessons are not just applicable to computer security. In fact this repo aims to...
textfiles.com : What this site offers is a glimpse into the history of writers and artists bound by the 128 characters that the American Standard Code for Information...
Exploit database separated by exploit type (local, remote, DoS, Poc, etc.)