bpytop A nice, beautiful alternative to htop, for monitoring your system. bpytop is the same popular top++ but rewritten in python, from the original author.
Anthias Anthias is a free and open source digital signage management software. Distributed as a Raspberry Pi image. And it will turn any TV into a powerful digital sign.
Fireball Firejail is a sandbox program for isolated execution of graphical, console and server applications, which minimizes the risk of compromising the main system when running untrustworthy or potentially vulnerable programs.
Extrapolate Extrapolate is an application that allows you to see how you age by transforming your face with the help of artificial intelligence. Freely and confidentially.
? S.E. Note. Mind Maps for every taste. • A collection of various MindMaps for Pentesters, Information Security specialists and Bug Bounty Hunters. The cards will help in learning new material or when performing certain work / tasks. Add to bookmarks:
?️♂️ OSINT. Useful resources from cyb_detective. • There are a lot of significant specialists and enthusiasts in the field of #OSINT, one of them is @cyb_detective, which maintains and constantly keeps up-to-date various lists with useful tools, resources and other necessary information for everyone interested in the OSINT topic.
Social Engineering: registration for a hundred bucks. • A fan of the TV series "Breaking Bad" created 20 phishing darknet marketplaces and charged gullible "hackers" 100 bucks for registration.
??? Awesome Memory Forensics. The main task in digital forensics is to collect information, namely, to obtain images of hard drives, RAM and network connection dumps.
? The Privacy, Security, & OSINT Magazine. • This month, the fifth issue of the magazine "UNREDACTED Magazine", authored by Michael Bazzell, appeared online.
? Social Engineering. MFA-fatigue (MFA Fatigue). • MFA Fatigue is one of the social engineering methods used by attackers to bypass multi—factor authentication, causing an endless stream of push requests sent to the account owner's mobile device. If the victim accepts the request, the attacker will successfully complete the authorization.