Auf dieser Seite notiere ich Links von Tools, die für meine tägliche Arbeit eine wertvolle Hilfe darstellen.

Schnell und unkompliziert verschiedenste Diagramme erstellen: https://app.diagrams.net/

Testing TLS/SSL encryption: https://testssl.sh/

MTA-STS validator: https://aykevl.nl/apps/mta-sts/

Nginx Proxy Manager: https://nginxproxymanager.com/guide/

Fix the Docker and UFW security flaw: https://github.com/chaifeng/ufw-docker#ufw-docker-util

The Restore Point Simulator: http://tdewin.github.io/rps/

Mapping OpenSSL cipher suite names to IANA names: https://testssl.sh/openssl-iana.mapping.html

Save your 2FA secrets, then use this to scan them again: https://stefansundin.github.io/2fa-qr/

This calculator evaluates the number of hosts in a Hyper-V cluster for the given legacy server workload and host specification: https://wintelguy.com/vmcalc2.pl

This tool calculates the number of hosts in a vSphere ESXi cluster based on the planned VM workload and host configuration: https://wintelguy.com/vmcalc.pl

Use the Claims X-ray service to debug and troubleshoot problems with claims issuance. The service interacts with your AD FS deployment and helps you issue the claims that you need for your applications: https://adfshelp.microsoft.com/ClaimsXray/TokenRequest

Dieses Tool generiert einen PTRv6 Eintrag für DNS-Server (z.B. BIND): http://rdns6.com/hostRecord

The DNS Check in Pingdom Tools will check your DNS health and help you find errors, and verify that you domain name has been set up correctly: https://dnscheck.pingdom.com/

Diese Wiki-Seite listet die Exchange Server-Versionen und Update Rollups mit jeweiligen Veröffentlichungsdaten und KB auf: https://buildnumbers.wordpress.com/exchange/

Regex Storm ist ein kostenloses Tool zum Erstellen und Testen von regulären Ausdrücken: http://www.regexstorm.net/

Verzeichnisschutz online mit Htaccess und Htpasswd: https://www.htaccessredirect.net/

Hardenize is developed by a small team who are passionate about improving the security of the Internet. Adapting the William Gibson quote, we believe that the future of security is already here, but it’s not evenly distributed yet. We made it our mission to help organizations and individuals gain visibility into the security of systems they care about: https://www.hardenize.com/

When you click Run Test, //email/test To: („TestReceiver“) performs all the steps that Internet email systems go through to send email. It records every command and byte of data it sends and every answer and byte of data that the other email system sends. TestReceiver never actually sends an email, it just gets as close as possible, learning as much about the remote system as it can: https://www.checktls.com/TestReceiver

In dieser Tabelle werden die Produktnamen und die zugehörigen Knowledgebase-Artikel mit den Build-Nummern und Versionen aufgeführt: https://kb.vmware.com/s/article/1014508

Diese inoffizielle Build Tabelle enthält alle bekannten Service Packs (SP), kumulativen Updates (CU), Patches, Hotfixes und andere Versionen von MS SQL Server, die freigegeben wurden: https://sqlserverbuilds.blogspot.com/

Den aktuellen Stand für das jeweilige VMware-Produkt zum Nachlesen: https://kb.vmware.com/s/article/1014508

Das Verschieben von Systemdatenbanken kann in den verschiedenen Situationen (z.B. Datenträgerwartung) nützlich sein: https://docs.microsoft.com/de-de/sql/relational-databases/databases/move-system-databases?view=sql-server-2017

LGPO.exe is a new command-line utility to automate the management of local group policy. It replaces the no-longer-maintained LocalGPO tool that shipped with the Security Compliance Manager (SCM), and the Apply_LGPO_Delta and ImportRegPol tools: https://docs.microsoft.com/de-de/archive/blogs/secguide/lgpo-exe-local-group-policy-object-utility-v1-0

RBL-CHECK.org ist ein kostenloses Tool für all jene, die wissen müssen, ob IP-Adressen auf einer RBL gelistet sind. Stündlich erfolgt ein Test, ob man auf einer RBL gelistet ist: https://rbl-check.org/rbl-e-mail-monitoring/

DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process: https://dnsdumpster.com/

This form is used to submit domains for inclusion in Chrome’s HTTP Strict Transport Security (HSTS) preload list. This is a list of sites that are hardcoded into Chrome as being HTTPS only: https://hstspreload.org/

This tries to parse a set of given logfile lines with a given grok regular expression (based on Oniguruma regular expressions ) and prints the matches for named patterns for each log line: https://grokconstructor.appspot.com/do/match#result

This tries to parse a set of given logfile lines with a given grok regular expression (based on Oniguruma regular expressions ) and prints the matches for named patterns for each log line: http://grokdebug.herokuapp.com/