dornea.nu

Matplotlib dashboard 0

Unfancy dashboard using matplotlib

I was recently playing around with D3 and discovered its dashboard posibilities. dashboarddude.com has a nice compilation of really fancy dashboards (I was mainly interested in D3 but voila… there are also other ways to do it). 

0

Links of the Week #27

When Random Isn’t Random Enough: Lessons from an Online Poker Exploit Technical Details Behind a 400Gbps NTP Amplification DDoS Attack Absolute Computatrace revisited Burp Co2 Porting Applications to 64bit ARM Price and Feature Comparison of Web Application Scanners GoLismero 2.0 Beta 3 vulnhub.com faces.io

0

Links of the Week #26

Bitcoins the hard way: Using the raw Bitcoin protocol Modern Processors – A 90min guide The GSM security model Analyzing DarkComet in Memory Cryptography Breakthrough Could Make Software Unhackable Git tips from the trenches I Spent Two Hours Talking With the NSA’s Bigwigs. Here’s What Has Them Mad PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS Web server for Linux written in amd64 assembly.

0

Links of the Week #25

How I lost my $50,000 Twitter username NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE Step-by-Step Guide To Decompiling Android Apps Untraceable Blog Continuously jam all wifi clients and access points within range How to Decrypt OpenSSL Sessions using Wireshark and SSL Session Identifiers eduroam WiFi security audit or why it is broken by design Workstation Popcorn: How To Become Uber Productive While Working For Yourself Java-based malware...

0

Links of the Week #24

Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM Oldboot: the first bootkit on Android For the Love of Money Automated penetration testing in the Microsoft stack with OWASP ZAP TCP backdoor 32764 or how we could patch the Internet (or part of it ;)) 2013 Cyber Attacks Statistics (Summary) “Decebal” Point-of-Sale Malware – 400 lines of VBScript code from Romania, Researchers warns about evolution of threats and interests to modern...

0

Links of the Week #23

InkTag: Secure Applications on an Untrusted Operating System Unicode Security Guide Hunting Botnets with ZMap EncFS Security Audit Hacking Tools Repository The Hacker Who Cracked the Code in Iron Man and The Social Network Operating System Tutorials The Jobless Ph.D. Generation ‘The Holy Book of Password’ by Aram Bartholl Reconstructing the Cryptanalytic Attack behind the Flame Malware ChewBacca – a new episode of Tor-based Malware Exclusive: Secret contract tied NSA...

0

Links of the Week #22

Remote Code Execution exploit in WordPress 3.5.1 Dissection of Android malware MouaBad.P Linux: Keep An Eye On Your System With Glances Monitor A Forensic Overview of a Linux perlbot DNA seen through the eyes of a coder Infection of biological DNA with digital Computer Code Reversing and Exploiting ARM Binaries: rwthCTF Trafman OpenBSD Exploit mitigation techniques RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis  

0

Links of the Week #21

Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit How We Decoded Some Nasty Multi-Level Encoded Malware LAYER 7 DDOS ATTACKS: DETECTION & MITIGATION  Bypassing Internet Explorer’s Anti-Cross Site Scripting Filter  On the 1st of January, 1998, Bjarne Stroustrup gave an interview to the IEEE’s ‘Computer’ magazine.  AnalyzePDF – Bringing the Dirt Up to the Surface  The Difference Between Encoding, Encryption, and Hashing

0

Links of the Week #20

Android Root Detection Techniques Shmoocon 2013 Playlist INSECURE Mag 40 A society of phone Zombies Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications The UNIX system family tree: Research and BSD Found: Hacker server storing two million pilfered passwords Burp/Zap plugin: generator script

0

Convert IP ranges to list

If you got IP ranges in this layout: x.x.x.1-255, y.y.y.42-120 etc., you could easily use this code to generate full IP adresses without any ranges: