Martian Defense NoteBook
CtrlK
  • Martian Defense Notebook
  • Training and Career
    • Keeping it Real for Beginners
    • Cybersecurity Domains
    • Reading and Repos
    • Media
    • Guides
      • Cybersecurity Roadmaps
      • Cybersecurity Training Topics
      • AppSec Training Pathway
      • Resume and Interview Guide
      • Systems Exploitation & Malware Development
    • Platforms
      • General
      • Offensive Security
      • Defensive Security
      • CTF Sites
      • Live Vulnerable Sites
  • Technical Resources
    • Application Security
    • Recon + OSINT
      • Internal Active Recon
    • Offensive-Cybersecurity
      • General
      • Infrastructure Pentesting
      • Cloud Pentesting
      • Wordlists
      • Social Engineering
      • Mobile Pentesting
      • Container Security
      • Blockchain
    • Defensive-Cybersecurity
    • General Cybersecurity
      • Cybersecurity Operating Systems
    • Coding/Programming
    • Reverse Engineering
    • AI for cybersecurity
  • Notes
    • Product Security Engineering
      • DevSecOps
        • Docker
          • How to Dockerize Applications with Docker Compose (Using SQLite and Flask)
      • SAST/SCA
        • How to setup a GitHub Action for Code Security analysis
        • JavaScript Security Analysis
        • Java Security 101
        • Tools
        • CodeQL for Beginners
      • Product Security Hardening
      • Threat Modeling
      • PHP Security
      • Product Security Governance
        • Controversial Subjects
          • Redis License Compliance in 2025
    • AppSec Testing
      • Checklists
        • WEB APP PENTESTING CHECKLIST
        • API Testing Checklist
        • Android Pentesting Checklist
        • IoS Pentesting Checklist
        • Thick Client Pentesting Checklist
        • Secure Code Review Checklist
      • Targeted Test Cases
        • Part 1
        • Part 2
      • Common Web Attack and Prevention List
      • Ports and associated Vectors
      • DNS
      • Web Tools
      • Command Injection Testing
      • JWTs and JSON
    • Security Research
      • Publishing CVEs
      • Shodan Dork Cheatsheet
      • Github Dorks
      • Bug Bounty
        • Bug Bounty Programs
      • CVE Hunting Python Repos with VulnHunter
    • Coding/Programming
      • Secure Coding Practices Checklist
      • JavaScript
      • Python
        • Quick Notes
        • Python Basics for Pentesters
        • Python Snippets
        • XML Basics with Python
      • Golang
        • Theory
        • Security
        • Modules
        • Entry Points
        • File Forensics
        • Cryptography and Encoding
        • Golang Snippets
      • PHP
        • Setup
        • Syntax
        • Variables and Data Types
        • Control Structures
        • Arrays
        • Functions
        • OOP Concepts
        • Database Integration
        • Handling HTTP Methods
        • Session Management
        • File Uploads
        • Email Function
        • Error Handling
        • Advanced Topics and Best Practices
      • Packaging and Automation of Docker Linux Apps
    • Network Security
      • Domain Trust Enumeration
      • Bleeding Edge Vulnerabilities
      • Post-Exploitation
      • Access Control Lists and Entries (ACL & ACE)
      • Credentialed Enumeration
      • Password Attacks
        • Internal Password Spraying
        • Remote Password Attacks
        • Linux Local Password Attacks
        • Windows Local Password Attacks
        • Windows Lateral Movement
      • PowerView
      • Pivoting, Tunneling and Forwarding
        • Advanced Tunneling Methods
        • Dynamic Port Forwarding (SSH + Socks)
        • Port Forwarding Tools
        • SoCat
      • Linux Privilege Escalation
      • Windows Privesc
        • OS Attacks
        • Windows User Privileges
        • Windows Group Privileges
        • Manual Enumeration
        • Credential Theft
      • Kerberos Attacks
        • Kerberos Quick Reference Sheet
      • Pentesting JumpCloud vs Active Directory (AD) vs Azure ADDS
    • Cloud Security Testing
    • Offensive Security
      • Red Team Infrastructure
      • Red Team OPSEC Playbook
    • Defensive Security
      • Splunk
        • Basic Queries
        • Dashboards
      • Forensics
        • Volatility
      • WireShark filters
    • Governance, Risk, Compliance
      • Vulnerability Management Lifecycle
    • Capture-the-Flag Training
      • Vulnerable Machine Checklist
      • Reverse Engineering Checklist
      • Mobile Checklist
      • Forensics Checklist
      • Binary Exploitation
      • Cryptography Checklist
    • Reporting
    • Common System Task Info
      • IT Tasks
      • Linux Basics
      • PowerShell
  • Digital Privacy
    • Personal Information Removal Services
    • Privacy-Focused DNS Configuration Guides
      • Private and Secure DNS with Pi-hole and Unbound
        • DNS Leak Prevention and Firewall Configuration
      • Configuring DoT with Unbound and Pi-hole on OPNsense
      • Forwarding Mode Explained: Forward Queries to Upstream DNS Server (Optionally with DNS-over-TLS)
    • Public DNS Services
    • Privacy and Opsec Resources
      • Martian's Stack
      • De-Googling Android
    • Self-Hosting
      • Proxmox VE
        • Proxmox Update Setup Guide
        • Enable and test Wake-on-LAN (WOL)
        • Remotely Unlocking LUKS-Encrypted Proxmox with Dropbear SSH at Boot
        • Idle Proxmox Auto-Shutdown
      • Secure Remote Access with TailScale + Hardened SSH
        • Expose the Web UI over Tailnet
      • Remote Unlock of LUKS-Encrypted Root Disk via SSH
      • Git
        • Hosting Gitea & Forgejo with Docker, Nginx, and Cloudflare Proxy
      • Two-VPS Private Proxy Architecture: Nginx Reverse Proxy Over Wireguard VPN
    • Monero Mining Guide
    • Android OSes
  • Cyber Entreprenuership
    • Entrepreneurship Roadmaps
      • Consulting
      • Starting a Business
    • Open Source Business & SaaS Tools
Powered by GitBook
On this page
  1. Notes
  2. Product Security Engineering
  3. Product Security Governance

Controversial Subjects

Redis License Compliance in 2025
PreviousProduct Security GovernanceNextRedis License Compliance in 2025