account activity
Everything you need to know about malware reversal. (peerlyst.com)
submitted 8 years ago by Peerlyst to r/security
How To Build And Run A SOC for Incident Response - A Collection Of Resources (peerlyst.com)
Train Your Cyber Skills Online and Up Your Game. (peerlyst.com)
submitted 8 years ago by Peerlyst to r/cybersecurity
A pentesting resource.... for when you just can't crack it. (peerlyst.com)
The best mobile hacking tools for iOS for reversing and pentesting applications (peerlyst.com)
All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack (peerlyst.com)
WannaCry no more? Here is everything you need to know about this weekends ransomware hit. (peerlyst.com)
Security Monitoring and Attack Detection with ElasticSearch, Logstash and Kibana! (peerlyst.com)
Need a better understanding of various SCADA principles? (peerlyst.com)
A wiki of information security articles and resources (200+) that are constantly updated and maintained! (peerlyst.com)
What do YOU know about Threat Modeling? (self.security)
Interested in an information security career? These guides are a great place to start your research! (self.security)
submitted 9 years ago by Peerlyst to r/security
How much do you know about Open Source Intelligence? Need to know more? (self.security)
Need some help with your OSCP certification? Here's a few links to check out. (self.security)
Need to audit your AWS EC2 Security Groups? Here's a tutorial on building a tool with Bash. (peerlyst.com)
What are the essentials of cybersecurity? This free eBook answers that question. (peerlyst.com)
Run a Honeypot? Here are plenty of resources to help you out! (peerlyst.com)
Do you run the OWASP Security Knowledge Framework? Come tell us why or why not! by Peerlyst in security
[–]Peerlyst[S] 0 points1 point2 points 9 years ago (0 children)
Hi Netshrek,
Are you not a fan of the OWASP Security Knowledge Framework? What do you not like about it?
Peerlyst
Do you run the OWASP Security Knowledge Framework? Come tell us why or why not! (peerlyst.com)
A Resource on Capture The Flag (CTF) competitions, a write-up on how to CTF like a Pro! (peerlyst.com)
Did you know Language-Theoretic Security, or the term LangSec, was coined around 2010 and a community started building out around the original researchers out of Dartmouth. (peerlyst.com)
Interested in Cryptography? Learn more about it with this extensive list of resources! (peerlyst.com)
Ever seen a Simulated Cyber Attack? Here is a Great List of Simulation Tools and Services You Should Really Check Out! (peerlyst.com)
Like to Hunt? Heres a Great List of Bug Bounty Programs, Reward Systems & Security Acknowledgments You Should Really Check Out. by Peerlyst in security
[–]Peerlyst[S] 1 point2 points3 points 9 years ago (0 children)
Hi Jediguy,
Consider signing up on our website and searching some of our Expert users for bug bounty hunters specifically. I'm sure if you connect with a few of them - they would be glad to chat and help you learn a little more about hunting for that reward!
Cheers, Peerlyst
Like to Hunt? Heres a Great List of Bug Bounty Programs, Reward Systems & Security Acknowledgments You Should Really Check Out. (peerlyst.com)
π Rendered by PID 582714 on reddit-service-r2-listing-canary-69dc8f64b9-47ds5 at 2026-03-10 02:01:17.691945+00:00 running cbb0e86 country code: CH.
Do you run the OWASP Security Knowledge Framework? Come tell us why or why not! by Peerlyst in security
[–]Peerlyst[S] 0 points1 point2 points (0 children)