自建 Stirling PDF | 一个 PDF 工具集Stirling PDF是一个开源的PDF文件处理工具,支持合并、拆分、旋转、裁剪、添加水印、解锁、转换格式和OCR识别等功能。它具有开源免费、支持多种操作系统、功能丰富、易于使用和方便搭建等优点。搭建Stirling PDF的步骤包括安装Docker和运行Stirling PDF,以及开放网站并安装Caddy。详细的搭建步骤可以在文档中找到。
ChatGPTNextWeb/ChatGPT-Next-Web: A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。ChatGPT Next Web is a cross-platform ChatGPT/Gemini UI that allows users to deploy a well-designed ChatGPT web UI with support for GPT3, GPT4, and Gemini Pro models. It offers features such as one-click deployment, compact client for Linux/Windows/MacOS, compatibility with self-deployed LLMs, privacy-first data storage, markdown support, responsive design, and support for multiple languages. The roadmap includes features like system prompts, user prompts, prompt templates, image sharing, desktop app with Tauri, self-hosted models, and plugins. The project provides documentation, FAQs, and instructions for development and deployment.
AC-Hunter™ Community Edition - Active CountermeasuresAC-Hunter™ Community Edition is a free version of AC-Hunter that provides threat hunting functionality with some limitations. It offers the same powerful threat hunting analytics and network insights as the paid Enterprise Edition. Users can choose between an install script or a VMWare virtual image based on their specific use case. AC-Hunter Enterprise and AC-Hunter Community Edition are compared in a chart, and users are also directed to other threat hunting tools.
Use Azure Automation and PowerShell to Create a Daily Microsoft Entra Risk Report | Practical365This article explains how to use Azure Automation and PowerShell to create a daily Microsoft Entra risk report. By automating the process, administrators can monitor risk events, gather data, format it into an HTML report, and send it via email. The report includes information on risk detections, risky users, and risky service principals, providing visibility into identity-based attacks and allowing for timely action. The article provides step-by-step instructions on setting up the Azure Automation account, assigning necessary permissions, installing required Microsoft Graph PowerShell SDK modules, adding the code, reviewing the report, and scheduling the script to run daily.
10 cybersecurity frameworks you need to know about - Help Net SecurityThis article highlights 10 essential cybersecurity frameworks that organizations should be aware of and implement to protect their digital assets. These frameworks include the NIST Cybersecurity Framework, ISO/IEC 27001, CIS Critical Security Controls, COBIT, CSA Cloud Controls Matrix, HITRUST CSF, Katakri, PCI DSS, SOGP, and Secure Controls Framework. Each framework offers a structured and strategic approach to managing cybersecurity risks and enhancing an organization's cybersecurity posture.
PNETLab : Lab is SimpleTo use PNETLab, download the .ova file and deploy it on virtualization platforms like VirtualBox or VMWare. Make sure to enable virtualization in your BIOS. After deployment, register and login to access the PNETLab box through your browser. You can choose between online and offline mode, with offline mode not requiring registration. In the PNETLab box, you can go to the store to download free labs and practice them. The labs come with lab files, workbooks, and instructions on how to use the console.
How to Run Program without Admin Privileges and Bypass UAC Prompt | Windows OS HubThis article provides various methods to run a program without admin privileges and bypass the UAC prompt in Windows OS. It covers topics such as configuring permissions for non-admin users, allowing standard users to run programs that require admin privileges, bypassing UAC with the RunAsInvoker option in CMD, enabling the RunAsInvoker mode in the EXE file manifest, and creating a shortcut to run a program with a saved administrator password. Each method is explained in detail with step-by-step instructions.
Defender Control v2.1Defender Control v2.1 is a portable freeware that allows users to disable Microsoft Defender in Windows 10 completely. It provides different blocking methods and can be useful for users experiencing conflicts between Defender and their antivirus application or those who want to disable Defender permanently. The program's interface displays the status of Microsoft Defender and allows users to enable or disable it with one click. It supports multiple languages and operating systems.