Tag Archive: Framework


Web interface for the Volatility Memory Forensics Framework https://github.com/volatilityfoundation/volatility Works with any Volatility module that provides a SQLite render method (some don’t) Automatically detects plugins – If volatility sees the plugin, so will eVOLve All results stored in a single SQLite db stored beside the RAM dump Web interface is fully AJAX using jQuery & …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/09/16/evolve/

Framework for Improving Critical Infrastructure Cybersecurity

The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

Permanent link to this article: http://www.darknessgate.com/2016/09/04/framework-for-improving-critical-infrastructure-cybersecurity/

BackBox Linux

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/17/backbox-linux/


Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing for common SSL certificate verification issues, HTTPS and TLS/SSL library bugs, SSL and STARTTLS stripping issues, cleartext issues, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/11/07/nogotofail/

Spring 2014 Lectures & Videos – Offensives computer security course

This page contains all the lecture Lecture Slides and youtube videos for the Spring 2014 semester of this course. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

Permanent link to this article: http://www.darknessgate.com/2014/11/02/spring-2014-lectures-videos-offensives-computer-security-course/

Cryptography and Cryptanalysis

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Permanent link to this article: http://www.darknessgate.com/2014/10/12/cryptography-cryptanalysis/


This class teaches the theory, foundations and applications of modern cryptography. In particular, we treat cryptography from a complexity-theoretic viewpoint. In recent years, researchers have found many practical applications for these theoretical results, and so we will also discuss their impact along the way and how one may use the theory to design secure systems. …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/30/cryptography/

Introduction to UNIX

These lecture notes and exercises are designed to support an intensive introductory course on UNIX or to act as a reference to users who are new to UNIX. This course was designed particularly for use with the Linux operating system but much of it applies to other UNIX systems as well. These notes are also …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/28/introduction-unix/

CS 290G: Secure Computation (Spring 2014)

Course Description With the growing demand for security and privacy, the field of cryptography has expanded rapidly in the past three decades. Beyond the original goal of ensuring secure communication, innovative and powerful concepts and primitives have emerged that enable new secure paradigm of computing. In this course, we will survey some of the exciting …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/15/cs-290g-secure-computation-spring-2014/

Security and Cryptography (CSS 322)

This course aims to introduce you to the principles and techniques of securing computers and computer networks, with focus on Internet security. The course is effectively split into two parts: first introducing the theory of cryptography, including how many classical and popular algorithms work (e.g. DES, RSA, digital signatures); and second providing details of real …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/04/security-cryptography-css-322/

Theory and Practice of Cryptography Mini-Course

This mini-course was taught in 2007 at Google. It is intended to be a brief survey for a general technical audience. Video Lectures Classical to Modern Cryptography Using Cryptography in Practice Security Definitions and Proofs of Security Verifying Elections with Cryptography. Guest Lecturer: Ben Adida. Crypto Strikes Back! by Nate Lawson, with blog post and …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2014/09/02/theory-practice-cryptography-mini-course/

Page 1 of 3123