Explore >> Select a destination


You are here

svrooij.io
| | aadinternals.com
17.5 parsecs away

Travel
| | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers
| | o365blog.com
15.3 parsecs away

Travel
| | The toolkit for Azure AD hackers, bounty hunters, red/blue teamers
| | eprint.iacr.org
16.4 parsecs away

Travel
| | OpenPubkey makes a client-side modification to OpenID Connect so that an ID Token issued by an OpenID Provider commits to a user held public key. This transforms an ID Token into a certificate that cryptographically binds an OpenID Connect identity to a public key. We call such an ID Token, a PK Token. The user can then sign messages with their signing key and these signatures can be authenticated and attributed to the user's OpenID Connect identity. This allows OpenPubkey to upgrade OpenID Connect from ...
| | www.openedr.com
98.4 parsecs away

Travel
| EDR technology helps to monitor your devices to detect and respond to cyber threats. And it helps to find suspicious activity to eliminate threats rapidly.