<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>Infosec tools and resources</title>
    <link rel="self" type="application/atom+xml" href="https://gleipne.volse.net/guest/lists/6/feed"/>
    <updated>2026-05-23T08:38:33+00:00</updated>
    <id>https://gleipne.volse.net/guest/lists/6/feed</id>
            <entry>
            <id>https://gleipne.volse.net/links/195</id>
            <title type="text"><![CDATA[HardBreak - a Hardware Hacking Wiki | HardBreak]]></title>
            <link rel="alternate" href="https://www.hardbreak.wiki/" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/195"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-01-14T10:57:52+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/183</id>
            <title type="text"><![CDATA[GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.]]></title>
            <link rel="alternate" href="https://github.com/LordNoteworthy/al-khaser" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/183"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.  - GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.]]>
            </summary>
            <updated>2024-09-14T10:58:09+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/180</id>
            <title type="text"><![CDATA[Dark Visitors - Track and Control Artificial Agents Crawling Your Website]]></title>
            <link rel="alternate" href="https://darkvisitors.com/" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/180"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[API and WordPress plugin to generate a robot.txt file to block AI scrapers and other bots. Also provides an API to get analytics of bot traffic.]]>
            </summary>
            <updated>2024-08-07T09:48:15+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/167</id>
            <title type="text"><![CDATA[Temporary Phone Numbers | Receive SMS online]]></title>
            <link rel="alternate" href="https://sms24.me/en" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/167"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[No Registration. Receive SMS online for FREE using our disposable / temporary numbers from  USA, Canada, UK, Russia, Ukraine, Israel and other countries. Receive anonymous verification code from all the countries and for Instagram, Telegram, Google, Facebook, Linked and more]]>
            </summary>
            <updated>2024-06-10T12:13:21+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/166</id>
            <title type="text"><![CDATA[Temporary phone numbers]]></title>
            <link rel="alternate" href="https://temporary-phone-number.com/" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/166"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Temporary phone numbers in many countries for receiving sms confirmation codes and similar. Useful for exploring phishing and other malware campaigns, but don't use for sensitive/personal data!]]>
            </summary>
            <updated>2024-06-10T12:10:30+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/156</id>
            <title type="text"><![CDATA[I figured out how DMARC works, and it almost broke me | Simon Andrews]]></title>
            <link rel="alternate" href="https://simonandrews.ca/articles/how-to-set-up-spf-dkim-dmarc" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/156"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[How to prevent email spoofing on your domain, using an unholy combination of silly standards.]]>
            </summary>
            <updated>2024-03-16T11:52:34+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/139</id>
            <title type="text"><![CDATA[Frida scripts to directly MitM all HTTPS traffic from a target mobile application]]></title>
            <link rel="alternate" href="https://github.com/httptoolkit/frida-interception-and-unpinning" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/139"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[This set of scripts can be used all together, to handle interception, manage certificate trust & disabling certificate pinning & transparency checks, for MitM interception of HTTP(S) traffic on Android.]]>
            </summary>
            <updated>2023-10-24T21:12:36+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/125</id>
            <title type="text"><![CDATA[GitHub - AssoEchap/stalkerware-indicators: Indicators of stalkerware apps]]></title>
            <link rel="alternate" href="https://github.com/AssoEchap/stalkerware-indicators" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/125"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Indicators of compromise (IOC) for Stalkerware and Watchware applications for Android and iOS.]]>
            </summary>
            <updated>2023-08-02T17:14:32+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/123</id>
            <title type="text"><![CDATA[Honeytoken - Wikipedia]]></title>
            <link rel="alternate" href="https://en.wikipedia.org/wiki/Honeytoken" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/123"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2023-07-26T17:34:42+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/122</id>
            <title type="text"><![CDATA[What Are Honey Tokens?]]></title>
            <link rel="alternate" href="https://www.fortinet.com/resources/cyberglossary/honey-tokens" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/122"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Honey tokens have data made and monitored to catch digital thieves. They contain a marker, which is fake data that looks like a valuable asset to a thief but has no real value for the organization.]]>
            </summary>
            <updated>2023-07-26T17:32:38+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/120</id>
            <title type="text"><![CDATA[PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF]]></title>
            <link rel="alternate" href="https://github.com/swisskyrepo/PayloadsAllTheThings" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/120"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[A list of useful payloads and bypass for Web Application Security and Pentest/CTF]]>
            </summary>
            <updated>2023-06-08T09:01:09+00:00</updated>
        </entry>
            <entry>
            <id>https://gleipne.volse.net/links/119</id>
            <title type="text"><![CDATA[nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL.]]></title>
            <link rel="alternate" href="https://github.com/projectdiscovery/nuclei" />
            <link rel="via" type="application/atom+xml" href="https://gleipne.volse.net/links/119"/>
            <author>
                <name> <![CDATA[Harald Eilertsen]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.]]>
            </summary>
            <updated>2023-06-07T18:43:28+00:00</updated>
        </entry>
    </feed>
