= IT-Security https://www.virustotal.com/ “Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community” https://canarytokens.org/nest/ Create a canary credit card to get information about illegimite credit card bookings https://media.ccc.de/v/38c3-fake-shops-von-der-stange-bogusbazaar#t=3560 59:20 Spam botnets: • Rustock • Waledac • Cutwail botnet software: • https://en.wikipedia.org/wiki/Mirai_(malware) • https://en.wikipedia.org/wiki/BrickerBot • https://en.wikipedia.org/wiki/BASHLITE • https://en.wikipedia.org/wiki/Linux.Darlloz • https://en.wikipedia.org/wiki/Remaiten • https://en.wikipedia.org/wiki/Linux.Wifatch • https://en.wikipedia.org/wiki/Hajime_(malware) Vulnerability websites: • https://en.wikipedia.org/wiki/Dark0de • https://en.wikipedia.org/wiki/RaidForums • https://www.zone-h.org/ (website defacement) • https://en.wikipedia.org/wiki/WabiSabiLabi (online marketplace) “Fast passive subdomain enumeration tool” • https://github.com/projectdiscovery/subfinder web vulnerability scanners: • https://en.wikipedia.org/wiki/Nikto_(vulnerability_scanner) • https://en.wikipedia.org/wiki/Gobuster port scanner: • https://github.com/projectdiscovery/naabu