Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Crypto-OpSec-SelfGuard-RoadMap
Гайд по безопасности для стартапов
https://tvoygit.ru/mirror/Crypto-OpSec-SelfGuard-RoadMap
- Portuguese-Brazilian
- French
- AnonPlanet
- My Blog on Mirror
- My Blog on Medium
- my blog!
- Follow AnonPlanet!
- Security Tips & Devices for Digital Nomads
- The Only Safe Way to Store Crypto
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- Trail of Bits Minimum Viable Plans (MVPs) for Security
- On Operational Security in Web3
- AnonPlanet
- opsecprofessionals.org
- Crypto Security Best Practices Checklist
- Check out this tool!
- Wholeaked Tool
- Symbiote Tool
- Watch More
- Read More on Email Encryption with Proton
- Meta Secret Tool
- Croc Tool
- Richard Stallman: How I Do My Computing
- Choosing a Reliable VPN Provider for Life & Work
- The Only Safe Way to Store Crypto
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- Trail of Bits Minimum Viable Plans (MVPs) for Security
- Check out this awesome Privacy-focused toolkit!
- Create your own vpn server
- Create your own vpn server No.2
- Setup OpenVPN server on Ubuntu
- Watch more
- Wireguard VS OpenVPN
- Brave Browser Privacy Issues
- How to Disappear from the Internet!
- How to hide your email
- Anti-detection system
- Taming a Wildhorse CEX App
- «Back office» and «front office»
- Steganography tool
- The State of Crypto Security
- Blockchain dark forest selfguard handbook
- Store SSH keys in the Secure Enclave!
- Blockchain dark forest selfguard handbook
- A tool that allows user to create time bound backups for various cryptocurrencies
- Fing App
- How to detect if someone is attempting to crack your wi-fi
- Use a Raspberry Pi To Catch Hackers with OpenCanary
- canarytokens.org
- Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
- MacOS + IOS + Crypto + OpSec = ?
- Awesome wifi security
- bbox.rocks
- IT security lecture
- Unredacter Tool
- forensicdots.de
- meta-secret App
- Portable-secret App
- This article tells that when using BitWarden one have to audit server side cryptography primitives by himself and monitor for changes!
- Secant
- Awesome csirt
- teachingprivacy.org
- securityinabox.org
- SecureYourselfNow
- ssd.eff.org
- Wasted
- bbox.rocks
- Read More
- NIST 800-63b Password Guidelines and Best Practices
- OpSec tips
- How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
- Web3 Cybersecurity Academy
- Enhancing user asset security
- Rare Web2 phreaker style attacks: Note
- OpSec Going Smart
- OpSec Going Smarter
- OpSec Going Smarter: Secure Smartphones
- Choosing a Reliable VPN Provider for Life & Work
- How to use an ipad as a secure calling and messaging device
- Read More
- Intro to Web3 Security
- Privacy and Scaling Explorations
- A collection of practical security-focused guides and checklists for smart contract development
- Tips from TrailOfBits
- Read More
- CryptoCustody Blog
- A DIY Guide to High-Security Cryptography
- Securing OT Systems: A Practical Guide
- ECDSA: Handle with Care
- solidity-security
- A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life
- Checklist for Developers for securing APIs
- List of Hardware Wallet Hacks
- Another List
- walletcompare.xyz/
- walletscrutiny.com
- Security Tips & Devices for Digital Nomads
- The Only Safe Way to Store Crypto
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- Read More
- Read More
- ShiftCrypto
- Rogue Key Attack in BLS Signature and Harmony Security
- Lattice
- Opinion on Trezor
- airgapcomputer.com
- Coldcardwallet
- Cypherockwallet
- Sparrowwallet.com
- BitBox
- Bitlox
- Alphawallet
- Airgap_it
- rainbow.me
- Frame.sh
- Walletscrutiny.com
- Grid-lattice1
- Atomicwallet.io
- Alternatives to Metamask
- myetherwallet.com
- Forked MetaMask
- Audio Steganography : The art of hiding secrets
- Audio Steganography Technique for Communication Security
- Learn OpSec basics in 15 mins
- OpSec Going Smart
- OpSec Going Smarter
- Portable Secret - cloak)
- Read More
- How to Store Seed Phrase Backups
- Awesome Security Hardening Guides
- Authenticator app for storing your 2FA secrets
- iOS Forensics References
- Android Forensics References
- Digital Communications Protocols
- OTR versus OMEMO
- ChatSecure
- Encrypted Instant Messaging on Mac OS X with Adium and Off The Record
- axolotl, OMEMO vs OpenPGP
- The most significant milestones in the development of communications
- Telegram & Discord Security Best Practices
- Jolly Roger’s Security Thread for Beginners
- A curated list of privacy & security-focused software and services
- Complete Expert Opsec Setup
- Pidgin
- The Hitchhiker’s Guide to Online Anonymity
- element.io - Matrix client
- jitsi.org - for video calls
- Open source virtual / remote desktop infrastructure for everyone!
- The Invisible Internet Project
- Get Bridges for Tor
- YouTubeDrive
- youbit
- aperisolve.com
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- openvpn-install
- Juice jacking: Why you should avoid public phone charging stations
- Throwingstar...
- How I turned a mini-PC into an Ethereum node to run at home
- Spin up your own Ethereum node
- Check out this resource!
- Improve Fast Reaction: Techniques to Enhance Your Reflexes
- Guide to securing and improving privacy on macOS
- Set of utilities to manage BIP44-compatible Ethereum HD wallet
- The Last Laptop You'll Ever Need For Crypto
- Nano-Painting: Encryption With Colours
- Hacking a Windows Machine by Hiding a RAT Inside an Image
- The Importance of Self-Custody Password Managers: A Deep Dive
- Read this article!
- MacOS Secure Profiles
- MacOS Security
- Free, open-source tools to protect your Mac
- Mac Monitor
- Security checklist app for your Mac
- Manual
- Manual
- Manual
- Forum
- Manual
- Manual
- Read
- Comparing VeraCrypt and TrueCrypt with an unexpected result
- Awesome Security Hardening Guides
- Endian
- sandboxie-plus.com
- Digital Communications Protocols
- spideroak.com
- rsync.net
- nextdns.io
- app.any.run
- Malware - File Analysis
- Island
- Vanilla OS
- safing.io
- shadowsocks
- mac.getutm.app
- souin
- geti2p.net
- anon-service
- privacy.sexy
- Learn Cryptography!
- Catch the Man-in-the-Middle
- CamWings
- ScreenWings
- rethink-app
- kleopatra
- DPI tunnel
- Teletun
- GoodbyeDPI
- algoVPN
- usbraptor
- Network Bandwidth Analyzer - Bandwidth Monitor
- Network and IT infrastructure monitoring for small & medium environments
- Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game
- Dangerous RCE Vulnerability in GTA Online Fixed
- What We Know About the Vulnerabilities Keeping ‘Dark Souls’ Offline
- Details about the ‘Dark Souls’ hacking exploit have been published
- SiM Swap Attacks Rising in Web3
- Steganography and You: When What You See Isn’t All You Get
- Discord Security
- Stop Auto-Download on Telegram: Working Methods for Desktop, iPhone, Android!
- Death Note Anonymity
- Instant Workstation: Virtual Machines
- DefaultCreds CheatSheet
- Physical crypto attacks
- About If you want know, who use your computer when you are not nearby - PC Mouse Tracker
- Read More
- Torn
- Anon Swaps
- sideshift.ai
- agoradesk.com
- Aztecnetwork
- Aztec-2 Dune Privacy Dashboard
- RailGun
- Monero
- Physical Security: Escapology
- Threat modeling for smart contracts step-by-step guide
- How to Defend Your Castle | Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
- Read More
- Read More
- Drive NFC Hack
- Web3.0 API Security for TestNet and MainNet Environment for Authorization Attack Prevention Implementation Using Python
- Ethereum nodes security
- How To Secure Your Crypto Wallet On A Virtual Machine And Stop Front-Running
- The Evolving Landscape of Privacy in Web3
- Wi-Fi Security when holding Crypto assets!
- Read More
- Read More
- SS7 Attacks
- More SS7 Attacks
- How to detect IMSI catchers
- Check out
- Wardriving
- CreepDetector
- AntiCensorship Messaging
- Discord e2e encryption
- On Operational Security in Web3
- Network Security Myths Busted
- 5 Ways to Find Hidden Cameras Using Your Mobile Phone
- 9 Places Where Secret Cameras Are Most Likely to Be Hidden
- Discussion about how to find hidden cameras.
- Perform a Self-doxxing!
- Watch More
- Awesome InfoSec
- Dear Security, be a part of the solution
- Staying Safe in Web3: OTC Scams
- HoneyPots against Hackers
- Randomness Concept
- CIA Triad
- Detect Personal Information Leakage With OSINT Attack Surface Management
- Leveraging Open-Source Intelligence (OSINT) for Enhancing Efficiency in Business Administration: A Comprehensive Examination
- The Wiretap: How The FBI Digs Up Deleted WhatsApp Messages
- anonymousplanet.org
- Android keyboard for secure E2EE communication through the signal protocol in any messenger
- Steganography
- this tool
- Check out this awesome Privacy-focused toolkit!
- Watch More
- stylesuxx.github.io
- stegonline.georgeom.net
- Read More
- AnonPlanet
- censorship.no
- detect.expert
- WhatBreach
- Building a Transaction By Hand
- Generating a Seed Phrase using a Calculator
- Instruments on the radio waves🛠
- No Internet, No Problem: How to Send Bitcoin by Amateur Radio
- The Cypherpunks Tapping Bitcoin via Ham Radio
- The Only Safe Way to Store Crypto: Ultimate OpSec
- Better privacy without special software
- Can forensic science still recover data from a hard drive after a seven-pass wipe?
- Gentoo
- TailsOS
- Awesome Memory Forensics
- WhonixOS
- ParrotOS
- LUKS!
- File carving
- Read More
- Choose Veracrypt (better) or FileVault!
- Citation from this resource:
- Read More
- Tips from TrailOfBits
- CryptoCustody Blog
- 6 Reasons to Avoid Cloud Services and Keep Your Feet on the Ground
- How Crypto Stealth Addresses Keep Your Transactions Private
- How to Hide Your MAC Address and Why You Should
- 5 Ways to Hide Apps on Your iPhone
- Create a ‘Panic’ Alarm With Aqara Hub & Siri Shortcuts
- How to use the 'In Case of Emergency' iPhone shortcut to get quick help from rescue services or a contact
- Automated Panic Button: Details in Comments
- Event Triggers - Siri
- Using Siri Shortcuts as a Panic Button on Apple Watch - Discussion
- Panic Button App example
- Read More
- Ultimate Guide to Safely Self Custody your Crypto
- Setting up a VM for crypto operations
- Read More
- SIEM
- DLP
- IDS
- How to Generate Your Own GnuPG Key
- 5 Reasons Installing Fewer Apps Helps You Stay Safe
- Telegram & Discord Security Best Practices
- Read More
- Read More
- Check out: Littlesnitch tool
- Read More on Incident Response Plans
- Read More
- Violent Attack Vectors in Web3: A Detailed Review
- Here's a List of 29 Different Types of USB Attacks
- Bluetooth Attacks and Security Tips – Awareness Results in Better Protection
- Bluetooth Security: 5 Ways to prevent Bluetooth attacks with Build38
- This is a macOS hardening to read or set security configuration
- A collection of awesome security hardening guides, tools and other resources
- Guide to securing and improving privacy on macOS
- Watch More
- Read More
- scan.tylabs.com
- any.run
- dangerzone.rocks
- Malwoverview
- urlscan.io
- Watch More
- Watch More
- Read more
- How To Detect Hidden Cameras
- How to find hidden cameras - 2.0
- 4 Ways of Detecting Hidden Cameras in Your Airbnb
- Cybersecurity expert explains how to find hidden cameras in an Airbnb or hotel room
- How to Find Hidden Spy Cameras in your Airbnb with Wireshark
- Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room
- Lumos: IoT device detection system
- Researchers reveal how hotel key cards can be hacked - what you need to know
- How Does a Drive-By NFC Hack Work?
- Key Card Entry System Security: What is the Difference Between NFC and RFID?
- Your hotel card may be copied through this item
- logic bomb
- Duress - Emergency Password
- Contracts for a wallet that is recoverable via backup keys
- Better privacy, without special software
- digi cloak
- hackna
- html vault
- Great PC for work
- Another great PC for work
- More Info
- Trail of Bits Minimum Viable Plans (MVPs) for Security
- OpSec101
- OpSec Going Smarter: Secure Smartphones
- Read More
- Telegram & Discord Security Best Practices
- darknetdiaries: Encrypted Phones
- A nice OpSec feature
- iPhones Vulnerable to Attack Even When Turned Off
- Malicious profiles – one of the most serious threats to iPhones
- Why Configuration Profiles Can Be As Dangerous As Malware on iPhones and iPads
- Kyocera phones
- iCloud
- BlackBerry Device - Let's [respect](https://www.itworldcanada.com/slideshow/blackberry-through-the-years) the true [Pioneers](https://arstechnica.com/gadgets/2013/02/a-look-at-blackberrys-devices-through-the-ages/) in this industry!
- ThinkPhone
- What is Island in Android?
- Read more
- walletcompare.xyz
- walletscrutiny.com
- TryEthernal.com
- Defillama.com
- Rotki
- Find wallet
- Read More
- Read More
- Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
- On Operational Security in Web3
- Violent Attack Vectors in Web3: A Detailed Review
- Do not confuse it with allowance approve scam!
- How to protect your assets
- SideShift
- How to fund an undoxxed Ethereum wallet off-chain
- changenow.io
- tradeogre
- atomic swap - this one released via a bridge!
- Aztecnetwork - 2)
- Spook
- RPC-proxy
- Zmok
- Helios
- The Only Safe Way to Store Crypto
- Read More
- Read More
- How to protect your assets
- On Operational Security in Web3
- Physical Attacks
- Physical Security Tips
- 3FA
- Counter-OSINT Techniques
- Read More
- Read More
- OpSec Going Smart
- OpSec Going Smarter
- OpSec Going Smarter: Secure Smartphones
- Choosing a Reliable VPN Provider for Life & Work
- Innovative Trio in Smart Contract Security: Monitoring, Prevention, Defense
- The Only Safe Way to Store Crypto
- How Cross-Chain Bridges are Hacked?
- What you should do if you think someone has stolen your crypto-assets
- What to do when your Web3 project Discord server is hacked & how security audit may prevent it from happening
- Violent Attack Vectors in Web3: A Detailed Review
- What is ARP spoofing and how to protect against it?
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- QR Code: An Underestimated Danger
- The most significant milestones in the development of communications
- Someone overheard me! Why it's important to think about all attack vectors, even if they seem unlikely to happen?
- Laplace's Demon Speaks: Is there a life in blockchain?
- MacOS + IOS + Crypto + OpSec = ?
- How to win the war, trick the KGB and protect your crypto-assets from theft by Steganography
- Master of OpSec Masters: A View Through the Prism of Time
- OpSec in Crypto: Thoughts
- Attacks via a Representative Sample : Myths and Reality
- How can you become a one-man-army OSINT specialist?
- Key principles of storing cryptocurrency securely
- On Operational Security in Web3
- Taming a Wildhorse CEX App
- Telegram & Discord Security Best Practices
- AnonPlanet
- Anon Guide - v1YC1w?both)
- anonymousplanet.org
- My Works
- How to use an ipad as a secure calling and messaging device
- Stylometric fingerprinting redux
- privacyguides.org
- DeepWeb OpSec
- privacytools.io
- Start.me RabbitHole
- Trail of Bits Minimum Viable Plans (MVPs) for Security
- OpSec101
- Awesome Security Hardening Guides
- How to protect your crypto assets
- Crypto OpSec
- Security best practices
- MyCrypto’s Security Guide For Dummies And Smart People Too
- Check out this awesome Privacy-focused toolkit!
- The Ten Commandments of crypto security
- Privacytests.org
- Privacy.sexy Repo
- Privacy.sexy Website
- Intro to Web3 Security
- Privacy and Scaling Explorations
- A collection of practical security-focused guides and checklists for smart contract development
- opsecprofessionals.org
- My Blog on Mirror
- My Blog on Medium
- 0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A - search?search=officercia.eth)
- 17Ydx9m7vrhnx4XjZPuGPMqrhw3sDviNTU - BTC
- Mirror articles NFTs
Programming Languages
Keywords
security
13
privacy
8
awesome
5
awesome-list
5
macos
5
ethereum
4
cybersecurity
4
osint
3
encryption
3
smart-contracts
3
malware-analysis
3
security-tools
3
infosec
2
solidity
2
blockchain
2
curated-list
2
defi
2
malware
2
security-hardening
2
python
2
apple
2
dnscrypt-proxy
2
bash
2
end-to-end-encryption
2
anonymity
2
dns
2
dnscrypt
2
wireguard
2
android
2
file-sharing
2
privacy-tools
2
wifi
2
censorship-circumvention
2
cryptography
2
knowledge-base
2
traefik-plugin
1
traefik
1
souin-instance
1
skipper
1
middleware
1
labstack-echo
1
http-cache
1
gin-middleware
1
localxpose
1
gin-gonic
1
echo-framework
1
caddyserver
1
caddy-server
1
caddy-plugin
1
caddy-module
1