Monitor - Prometheus basic
Prometheus basic 主要的特色 kafka with Prometheus Prometheus架构剖析 pull vs push Job/Exporter Telegraf ...
Prometheus basic 主要的特色 kafka with Prometheus Prometheus架构剖析 pull vs push Job/Exporter Telegraf ...
API Gateway background basic 安全性(身份验证和潜在的授权) 开源 APIGateway 单节点 API 网关 Backends for frontends 网关 AWS API Gateway Ali API Gateway ba...
Kafka Kafka Monitoring Kafka Kafka Monitoring Prometheus: A Time Series database Custom JMX exporters Grafana: A Data Visualization application Built in domain...
ELK Setup basic Install ELK Environment specifications Configuration Filebeat Logstash collect data ...
Cloud Security Tools Cloud Infrastructure Entitlement Management (CIEM) Cloud Security Posture Mgmt (CSPM) Cloud Detection and Response (CDR) Cloud Workload Protecti...
OWASP Top 10 and CWE/SANS 25 OWASP Top 10 SANS CWE 25 A1: Injection CWE-78: Improper Neutralization of Special Elements Used in an OS Command (‘...
OWASP Top 10 Parameter overall Top 25 Parameters Cross-Site Scripting (XSS) Parameters Server-Side Request Forgery (SSRF) Parameters Local...
Python Crash String List dictionary Tuple Sorted Functions lambda zip, map filter test except RegularExpression Data ...
Python Package 1 example Python Package main.py mypackage/ __init__.py mymodule.py myothermodule.py …a mymodule.py like this… #!/usr/bin/env python3 # Exp...
Asynchronous Programming 异步编程简介 Python Asynchronous model Mastering Concurrency in Python 01. 并发 Concurrency 并发与顺序 Concurrent vs Sequential ...
Web scraping Code test HTMLParser 解析 html Web scraping Code test Target # python main.py url: xx.com 'APT', 'Beds / Bath...
Meow’s CyberAttack - IP Spoofing [toc] IP Spoofing Each IP packet includes a place to specify the destination and source IP addresses. The validity of the source addres s is never check...
Meow’s CyberAttack - ARP Poisoning ARP spoofing [toc] ARP ARP resolves the IP addresses to MAC address stores the result in an memory, ARP cache. TCP/IP uses IP address to ...
theHarvester [toc] bacis theharvester -h theharvester -d microsoft.com -l 50 -b google -h myresults.html -d : specific the domain/company name. -l : limit result to 50 -b : defines data so...
sslstrip Encrypted messages are problematic when it comes to capturing traffic. Encryption is intended to be end to end, no way to sit in the middle. Any mechanism to sit in the middle defeat...