End-to-End Encryption for Mastodon
https://github.com/soatok/mastodon-e2ee-specification
If you are a #GM, check this free #zine out (this one is a #netbook, not a zine, but same in spirit). Even though the authors are basing their works on #ComicBooks it's generic and can be used with any #TabletopRPG and even help with writing #fiction.
What is it with the HTTP servers and toxic authors? :D
NGINX, Cowboy, Caddy...
https://caddy.community/t/unrecognized-directive-header-up/10319/2
I thought the #infosec community and organizations like #defcon were lost forever to centralized surveillance capitalism products like Twitter and Discord.
It made me sad, and really afraid for the future of the internet.
Watching everyone flood over to Mastodon gives me so much joy and hope.
This seemed impossible, but maybe sometimes it takes the emergence of dictators to make people rally for democratic governance.
You are all welcome!
Let's take back control of the internet together.
The only thing you can do while interacting with any money-grabs from #Hasbro is opt-out as dramatically as you can.
Even if you monitor GitHub, you can miss good repositories 🤦 We were wondering about the exploitation of Unix systems when only some binaries are available and then a colleague @gallypette pointed me to https://gtfobins.github.io/. It's a gold mine.
What is GTFOBins?
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
The project collects legitimate functions of Unix binaries that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
It is important to note that this is not a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain binaries available.
Today's #projects (aka #changelog) entry is: going modular with #IcyRPG!
Started a bunch of collections of loosely-categorised cards, which can be used at random for conventional level ups or as more gentle, on demand mechanical progression of a character in a #roleplaying #game.
Please support and mirror amazing #slax #Liunux repository.
A minimum in-memory distro based on #Debian. Perfect for malware sample acquisition because it's very easy to boot it up!
Way easier than spinning an instance of kali. Of course, that assumes that you know how to configure your VM runner in such way that guests don't break out.
If you have even more lightweight methods for contained interactions with malicious sites and programs, do share!
I was like "hey, let's back up cardconjurer, it seemed to be important for the independent #MagicTheGathering community"...
Inb4
λ git clone git@github.com:cognivore/cardconjurer.git
Cloning into 'cardconjurer'...
remote: Enumerating objects: 21510, done.
remote: Counting objects: 100% (898/898), done.
remote: Compressing objects: 100% (525/525), done.
Receiving objects: 16% (3448/21510), 707.96 MiB | 7.86 MiB/s
(Yup, that's 16% at 707 MiB).
If you love #Rally, you should donate to #UAF (Ukrainian Armed Forces).
#Ukraine is a land where many wonderful rallies were held, all of which are stopped due to war.
Take #RallyYalta as an example. It stopped after the initial annexation of Crimea by russians.
Remember: where there is #russia, there is desolation and decline.
https://www.ewrc-results.com/events.php?id=631&t=Yalta-Rally
That https://doma.dev guy
#lean #rust #typescript #react #nix
In my non-existent free time I design and run #TTRPG
If you use tools made by genocide-apologists, you are a genocide-apologist.
#lemmy users aren't welcome here.