Security Resources Part - 1
LIKE ME THERE ARE PLENTY OF FOLKS WHO ARE LOOKING FOR SECURITY RESOURCES AND WE KEEP ON SEARCHING FOR TORRENTS, DRIVE LINKS AND MEGA LINKS WHICH CONSUMES A LOT OF TIME. SO I DECIDED TO CURATE THE LIST OF RESOURCES FREELY AVAILABLE ON THE WEB TO HELP OTHERS GET STARTED IN THE FIELD OF INFOSEC.
THE FOLLOWING LINKS PROVIDED ARE FROM DIFFERENT SOURCES FROM VARIOUS AUTHOR’S TO HELP YOU LEARN. I DO NOT OWN THEM I’VE JUST CURATED THEM TOGEHTER SO THE CREDIT GOES TO THE AUTHOR’S.
I’D LIKE TO THANK ALL THE AUTHOR’S OF THESE TUTORIALS THEIR CONTRIBUTION IT MEANS A LOT.
FEEL FREE TO CONTACT ME AT rootb3r [at] gmail [dot] com TO ADD MORE LINKS TO THIS LIST.
I WILL BE UPDATING THIS LIST IN FUTURE SO STAY TUNED!!
EDIT 1: NOW OTHER LINKS INCLUDED TOO.
EDIT 2: INDEX ADDED.
Table of Contents
-
3.2 OS Dev
3.3 Kernel Dev
3.4 Programming
3.5 Advanced CS
3.6 Very Imp Programming Links…
3.7 Cheatsheet’s
-
4.1 CTF’S & VM’S
4.2 Walkthrough’s
4.3 Courses
4.4 Blogs
4.5 News
4.6 Research Papers
4.7 Bug-Bounties
-
5.2 OSINT
5.5 Cryptography
5.6 App Sec
5.7 DFIR
5.10 Malware Analysis
5.11 Exploit Development
5.12 Fuzzing
5.13 Network Security
5.14 Python-Security Collection
5.15 Pentesting
5.16 Hardware-Security
5.16.1 ARM
5.17 IOT
5.18 SmartPhone-Security
5.19 Cellular-Security
Hardware
-
Embedded/Core
- The PIC Tutorial - Flash Tutorials
- Microcontroller Basics, Types and Applications
- Editorials Archives - Hardware Secrets
- Memory Hardware Secrets
- Storage Hardware Secrets
- embedded-boston/awesome-embedded-systems: A curated list of delightful Embedded Systems libraries, RTOSes, modules, references and more!
- Awesome Electronic and Hardware platform
- HQarroum/awesome-iot: A curated list of awesome Internet of Things projects and resources.
-
Memory Types
-
Must read to keep yourself updated.
Network’s
-
CCNA
- The TCP/IP Guide - Table Of Contents
- Network Switch 101
- How to decode Ethernet Frames? NerdCrunch
Computer Science
-
Operating System’s
-
Linux
-
TLDP
-
Linux-Kernel
- The Linux Kernel documentation — The Linux Kernel documentation
- Index of /doc/Documentation
- Kernel 101 – Let’s write a Kernel - Arjun Sreedharan
- The User-mode Linux Kernel Home Page
- The Linux Kernel - Wikibooks, open books for an open world
- QUICK LINKS for students and advance developers :: Linux Kernel Data-Structures
- linux - Learning Kernel Programming - Stack Overflow
- Kernel index [LWN.net]
- Kernel links
- KernelHacking - Linux Kernel Newbies
-
Linux-Source
-
TAILS
-
UBUNTU
-
Other Useful Linux stuff.
- RHEL7 Free available resources - CertDepot
- Linux Basics « Null Byte :: WonderHowTo
- GNU awk
- Home Linux Journey
- jlevy/the-art-of-command-line: Master the command line, in one page
- Idnan/bash-guide: A guide to learn bash
- k4m4/terminals-are-sexy: 💥 A curated list of Terminal frameworks, plugins & resources for CLI lovers.
- links/external - unixporn
- tmux Tutorial — Split Terminal Windows Easily· Łukasz Wróbel
- Basic Git Command Line Reference for Windows Users John Atten
-
-
Windows
-
OS Dev
-
linux-insides
- The Starman’s Realm
- The little book about OS development
- Expanded Main Page - OSDev Wiki
- Operating System Development Series
- os01 Bootstrap yourself to write an OS from scratch. A book for self-learner.
- OSdev Alex Parker’s Website
- OS Development Tutorials on Bona Fide OS Developer
- cfenollosa/os-tutorial: How to create an OS from scratch
- top scoring links : osdev
-
-
Kernel Dev
-
-
Programming
-
System & Scripting
-
C
-
C++
-
Java
-
Python
-
x86-64
- Programming Tutorials, Articles and Examples
- Scripting « Null Byte :: WonderHowTo
-
-
Web-Dev
- PHP Codecademy
- A Map to Learn to Code and Become a Software Engineer Free Code Camp
- Upskill Essential Web Developer Course Upskill
- Code School - Discover DevTools
- bmorelli25/Become-A-Full-Stack-Web-Developer: Free resources for learning Full Stack Web Development
- bmorelli25/Become-A-Full-Stack-Web-Developer: Free resources for learning Full Stack Web Development
-
Database’s
-
Must read & solve programming stuff
- Programming · isislab/Project-Ideas Wiki
- Michael0x2a/curated-programming-resources
- Here’s a SANITIZED list of 530+ free online programming/CS courses (MOOCs) with feedback(i.e. exams/homeworks/assignments) that you can start this month (December 2016) : learnprogramming
- MEGATHREAD
- Programming Competition,Programming Contest,Online Computer Programming
- Solve Programming Questions HackerRank
-
Core & Advanced CS
- Online CS Courses - Computer Science
- Operating System LeetCode Discuss
- A complete computer science study plan to become a software engineer.
- Path to a free self-taught education in Computer Science!
- MattPD/cpplinks: A categorized list of C++ resources.
- How to be low-level programmer
- List of awesome university courses for learning Computer Science!
- Developer-Y/cs-video-courses: List of Computer Science courses with video lectures.
Virtualization(Images)
Cheatsheets
- OverAPI.com Collecting all the cheat sheets
- List of Algorithms
- HrushikeshK/every-programmer-should-know: A collection of (mostly) technical things every software developer should know
Infosec
-
Books(Check this once in a month for new books…)
- Amazon.in: Last 90 days - Computer Security / Computing, Internet & Digital Media: Books
- Packt Publishing “Community Experience, Distilled”
- Recommended Reading The Homepage of @attrc
- Books DFIR - The Definitive Compendium Project
- 4n6k: Resources
- Security - Topic · GitBook
- Security No Starch Press
- Books Simone Margaritelli
- GitHub - onlurking/awesome-infosec: open-security-books
- GitHub - Hack-with-Github/Free-Security-eBooks: Free Security and Hacking eBooks
- GitHub - sbilly/awesome-security: A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
-
CTF’S & VM’S
-
Machines
- overthewire.org/wargames/
- Under the Wire
- Welcome [Root Me : Hacking and Information Security learning platform]
- Hack The Box :: Online Penetration Testing Platform
- Dashboard
- Pentest Training
- ctf.tf - Easy
- pwnable.tw
- pwnable.kr/play.php
- Penetration test lab “Test lab” Pentestit
- Download - Exploit Exercises
- Backdoor - Security platform
- Ctf Portal
- Web security VM app - Web Hacking / References - 0x00sec
- Vulnerable Web Applications - White Hat Academy
- Vulnerable By Design - Search: web app ~ VulnHub
- bkerler/exploit_me: Very vulnerable ARM application (CTF style exploitation tutorial)
- Embedded Security CTF
- Practice CTF List
- [PentesterLab] Our exercises
- INFOSEC ROCKS!
- Challenges - RingZer0 CTF
- SQL Injection Demo
-
NetSec(Pcap files to play with)
-
PWNtools(Great tool for pentesting)
-
Other Useful resources
- Resources ~ VulnHub
- PENETRATION TESTING PRACTICE LAB - VULNERABLE APPS / SYSTEMS
- Mind Maps-ALL
- 2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions FireEye Inc
- CTF Series : Vulnerable Machines — tech.bitvijays.com
- CTFtime.org / All about CTF (Capture The Flag)
- Introduction · CTF Field Guide
- A curated list of CTF frameworks, libraries, resources and softwares
- Wiki-like CTF write-ups repository, maintained by the community. 2017
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform.
- joe-shenouda/awesome-cyber-skills: A curated list of hacking environments where you can train your cyber skills legally and safely
-
-
Walkthroughs..
-
LABS
-
Conference’s
- Pune Chapter - null Community
- CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada
- PacSec Applied Security Conference: Tokyo, Japan
- InfoCon Collection: Hacking Conference Audio and Video Archive
- Cybersecurity Conferences 2017 Complete List of Cyber Security Events, Information Security Conferences, Seminars in the USA, India and the UK
- GitHub - PaulSec/awesome-sec-talks: A collected list of awesome security talks
-
Courses
-
OSCP
- Offensive Security Bookmarks – EK
- Offensive Security Certified Professional (OSCP) Review - Jim Wilbur’s Blog
- Prep guide for Offsec’s PWK – Tulpa Security
- abatchy’s blog How to prepare for PWK/OSCP, a noob-friendly guide
- OSCP Course & Exam Preparation - Ellingson Mineral
- nairuzabulhul/RoadMap: GitBook: OSCP RoadMap
- ferreirasc/oscp: oscp study
- OSCP · Teck_k2
- H4oK3/OSCP-Survival-Guide: Kali Linux Offensive Security Certified Professional Survival Exam Guide
- OSCP VulnHub Series - YouTube - YouTube
-
Imported (thanks to prasanna for this list…)
- OSCP Prepare – EK
- A Detailed Guide on OSCP Preparation – From Newbie to OSCP » Checkmate
- OSCP / PWK Certification Review /Journey 2017
- OSCP-Prep/README.md at master · burntmybagel/OSCP-Prep · GitHub
- Offensive Security Bookmarks – EK
- - Offensive Security
- OSCP – Useful resources – The IT Geek Chronicles
- OSCP – The IT Geek Chronicles
- Windows Privilege Escalation - a cheatsheet
- TOP–10 ways to boost your privileges in Windows systems – HackMag
- Penetration Testing Methodology - 0DAYsecurity.com
- Creating Metasploit Payloads
- Scripting
- aLFI Scanner - An0th3r LFI sC4Nn3r v1.0
- monkeysm8/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
- Packet Storm
- VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY
- The “SYSTEM” challenge – Decoder’s Blog
- OSCP Game Over !!!!
- OSCP Review - Thor-Sec
- OSCP Cheat Sheet - Thor-Sec
- https://www.exploit-db.com/docs/42329.pdf
- Site5 KnowledgeBase » PuTTY: How to start a SSH session from the command line
- Tunneling sessions via Plink Booches.nl
- Pentesting Cheatsheet – root@Hausec
- pwk-cheatsheet/README.md at master · re-pronin/pwk-cheatsheet · GitHub
- » Blog Archive » Pen test and hack microsoft sql server (mssql)
- Windows Kernel Exploits Penetration Testing Lab
- Gaining a Root shell using MySQL User Defined Functions and SETUID Binaries Infamous SYN
- Linux Privilege Escalation Scripts
- abatchy17/WindowsExploits: Windows exploits, mostly precompiled.
- lucyoa/kernel-exploits
- SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合
- Linux Privilege Escalation Cheatsheet
- Offensive Security’s PWB and OSCP - My Experience - Security SiftSecurity Sift
- OSCP Course & Exam Preparation - Ellingson Mineral
- abatchy’s blog: OSCP Prep
- Offensive Security Training Videos - FAST RELEASE
- Search · oscp
- A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate
- Cracking OSCP!! – Prasanna Kumar
-
OSCE
-
CISE
-
Attacks
- Buffer overflow - Wikipedia, the free encyclopedia
- Church of Wifi WPA-PSK Rainbow Tables - Security - Hak5 Forums
- File inclusion vulnerability - Wikipedia, the free encyclopedia
- Phishing - Wikipedia, the free encyclopedia
- RainbowCrack - Crack Hashes with Rainbow Tables
- SQL injection - Wikipedia, the free encyclopedia
-
Information gathering
-
Networking
- Data center - Wikipedia, the free encyclopedia
- Domain Name System - Wikipedia, the free encyclopedia
- Dynamic Host Configuration Protocol - Wikipedia, the free encyclopedia
- Explanation of the Three-Way Handshake via TCP/IP
- HTTP cookie - Wikipedia, the free encyclopedia
- Internet Control Message Protocol - Wikipedia, the free encyclopedia
- ipconfig
- List of DNS record types - Wikipedia, the free encyclopedia
- List of Internet Relay Chat commands - Wikipedia, the free encyclopedia
- List of TCP and UDP port numbers - Wikipedia, the free encyclopedia
- MAC address - Wikipedia, the free encyclopedia
- Networking hardware - Wikipedia, the free encyclopedia
- OSI model - Wikipedia, the free encyclopedia
- Post Office Protocol - Wikipedia, the free encyclopedia
- Server room - Wikipedia, the free encyclopedia
- Simple Network Management Protocol - Wikipedia, the free encyclopedia
- Tracert Command Details and Examples
- Virtual Network Computing - Wikipedia, the free encyclopedia
- Virtual private server - Wikipedia, the free encyclopedia
-
OS
-
Virus & worms
- Botnet - Wikipedia, the free encyclopedia
- Botnet - Wikipedia, the free encyclopedia
- Computer worm - Wikipedia, the free encyclopedia
- Different types of malware - ABestWeb Affiliate Marketing Forum
- XSS worm - Wikipedia, the free encyclopedia
- Zombie (computer science) - Wikipedia, the free encyclopedia
-
-
Consice
- BlackStorm Security
- awesome-courses#security
- awesome-infosec: massive-online-open-courses
- awesome-infosec: academic-courses
- How to Build a Successful Information Security Career
- index - netsecstudents
- start - netsec
- Streaming Tutorials Cyber Aces Free online cybersecurity courses
- Blogs, Feeds, Guides + Links
- Free Online Ethical Hacking Courses : HowToHack
- CEH - online practice exam
- Bitdownload Index of Learning.2/
- LearningHub
-
-
Blogz & News
-
Blogs
- SANS - Information Security Resources
- SANS Institute: Reading Room
- SANS List of Penetration Testing Links
- Security Blogs
- Categories - 0x00sec
- Articles Corelan Team
- blog ← Primal Security Podcast
- Darknet Archives - Darknet - The Darkside
- Hacking Articles Raj Chandel’s Blog: Kali Linux
- Null Byte How-Tos « Wonder How To
- Penetration Testing Lab Explore the lab…maybe you will find some interesting things…
- myexploit “unusual traffic from your network connection”
- Pentest Blog – Inn for security folks
- CTF Hacker - Spreading the knowledge
- Blogs DFIR - The Definitive Compendium Project
- gynvael.coldwind//vx.log
- j00ru//vx tech blog
- Archive Chris Warrick
- Posts – Purism
- DiabloHorn Attempting to understand security
-
News & updates
- CyberPunk: The Wire
- DeepDotWeb - Surfacing The News From The Deep Web
- Threatpost The first stop for security news
- CSO Security news, features and analysis about prevention, protection and business innovation.
- Packet Storm
- SecurityFocus
- The Hacker News - Cyber Security and Hacking News Community
- Home Page - www.SecurityXploded.com
-
Sites to check for massive breach dumps
-
-
Research Pprs
- Vulnerability analysis, Security Papers, Exploit Tutorials
- netsec: search results - pdf
- Free Haven’s Selected Papers in Anonymity
- Security Research - Computer Science - UC Berkeley EECS
- EECS 588 - Reading List
- EECS 588 - Attack Presentations
- OpenVPN puts packets inside your packets
- Boneh Publications by Topic
- Vivek Ramachandran - Research Publications
- SecurityDocs
-
Bug-Bounties
-
Bugs
-
ZDI
- The unofficial HackerOne disclosure Timeline
- HackerOne: Vulnerability Coordination and Bug Bounty Platform
- Bugcrowd Your Elastic Security Team, better security testing through bug bounties and managed security programs
- FireBounty The Ultimate Bug Bounty List!
- Bug Bounty Guide
- Issues - project-zero - Project Zero - Monorail
- djadmin/awesome-bug-bounty: A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
- ngalongc/bug-bounty-reference: Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
- jhaddix/tbhm: The Bug Hunters Methodology
- Bug Bounty Forum - Getting started - Intro
-
-
Jobs
- Cybersecurity Supply And Demand Heat Map
- Tips for for an Information Security Analyst/Pentester career -Episode 1:General and technical hints by Mattia Campagnano 13 years experience Akron OH - network, windows, how to Peerlyst
- offensiveinterview
- yangshun/tech-interview-handbook: 💯 Algorithms, front end and behavioral content for rocking your coding interview
-
Wiki
-
Whatis
- Security Learning Guides - Reference from WhatIs.com
- Security management Definitions - Glossary from WhatIs.com
- Security Quizzes - Reference from WhatIs.com
- Security Difference Between
- GitHub - sindresorhus/awesome: Curated list of awesome lists
- GitHub - zbetcheckin/Security_list: Great security list for fun and profit
- Top “peerlyst wiki” experts and posts Peerlyst
-
Tutorials
-
Index
- Security references
- Introduction · Security - My notepad
- Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
- misterch0c/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
- vitalysim/Awesome-Hacking-Resources: A collection of hacking / pentetration testing resources to make you better!
- Awesome-Hacking/README.md at master · Hack-with-Github/Awesome-Hacking
- awesome-hacking: awesome-hacking#table-of-contents
- awesome-infosec: related-awesome-lists
- zbetcheckin/Security_list: Great security list for fun and profit
- pe3zx/my-awesome: My curated list of awesome links, resources and tools
- @Jackson_T - Roundup
- Mind Maps
- Home · isislab/Project-Ideas Wiki
- Talks
- [Mega Tutorial Links]A huge Tutorial collection for hackers/Pentesters[updatated] - Page 1
- [TUT] MEGA HACKING TUTORIAL! [BIGGEST ON HF] COVERS EVERYTHING! - Page 1
- 80+ Best Free Hacking Tutorials Resources to Become Pro Hacker FromDev
- Hacking Tutorial Compilation Thread - Page 1
- Netsec Focus - Learning Resources - Google Sheets
- Breaking into InfoSec: A Beginners Curriculum s3ctur
- Collection of helpful links part 1 : Kalilinux
- resources - HowToHack
- The Hacker Ethos - First Edition Free.pdf - Google Drive
- Awesome Checklist Checklist
-
OSINT
-
Privacy & Anonymity
-
DarkWeb
-
TOR
- index - privacy
- Anonymity, Privacy and Security guides links. - Page 1
- INDEX : Divine’s Compilation of Private Investigation Methods and Anonymity - Page 1
- Maintaining Privacy and Security Online - Page 1
- Anonymity & Darknets « Null Byte :: WonderHowTo
- Recon « Null Byte :: WonderHowTo
- Latest Anonyminity topics - 0x00sec
- System Hardening Checklist - Whonix
- Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - PRISM Break
- Privacy Tools - Encryption Against Global Mass Surveillance
- How To Guides Archives - GreyCoder
- Privacy-Conscious Email Services
-
-
Password Cracking
-
Cryptography
- Tutorial Cryptography - Page 1
- Outline of cryptography - Wikipedia
- RETTER: Cryptography & Security moves fast. Keep up!
- List of Cryptographic Algorithms - Hacked
- Understanding Cryptography, A Textbook for Students and Practitioners - with a Foreword by Bart Preneel
- Latest Cryptology topics - 0x00sec
- OpenSSL Cheatsheet
- Ken Shirriff’s blog: bitcoin
- List of Algorithms
- Secure Salted Password Hashing - How to do it Properly
- PRINCE modern password guessing algorithm
- The Cryptopals Crypto Challenges
- id0-rsa
- Cryptology ePrint Archive: Search Results
- Whitepapers With Friends
- Cryptologie Links
- Jameson Lopp :: Bitcoin Resources
- cypherpunk-research
- Introduction to Cryptography by Christof Paar - YouTube
- Cryptography Lectures - YouTube
- NetSecFocus Crypto Basics - YouTube
- Guide to Cryptography - OWASP
- Links / Books - CrypTool Portal
-
App Sec
-
OWASP juice
-
OWASP
- OWASP Cheat Sheet Series - OWASP
- Web Service Security Testing Cheat Sheet - OWASP
- Web Application Security Testing Cheat Sheet - OWASP
- Penetration Testing Tools - OWASP
- OWASP Testing Guide v4 Table of Contents - OWASP
- OWASP Periodic Table of Vulnerabilities - OWASP
- OWASP/OWASP-VWAD: The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
-
SQLi
-
XSS
-
HF(HACKFORUMS)
-
-
Other META’S
- A Gentle Introduction to Application Security (for Programmers) : learnprogramming
- ISSA Kentuckiana Web Pen-Testing Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)
- OWASP WebGoat Web Hacking Simulation Series © YGN Ethical Hacker Group (YEHG), Yangon, Myanmar - http://yehg.net
- Hacking Web Apps « Null Byte :: WonderHowTo
- Application Security
- Web Application Pentest Guide Part-I
- Application Security – Pentest Blog
- Metasploitable 2 Exploitability Guide Rapid7 Community and Blog
- Leveraging web application vulnerabilities to steal NTLM hashes
- Welcome to Security Idiots!!
- Web Application Exploits and Defenses-interactive
- hacksplaining-web-app sec interactive
- vulnerable web application Archives - Darknet - The Darkside
- PortSwigger.net
- The Web Application Security Consortium / Threat Classification Enumeration View
- Web Application Security Testing Resources
- Researcher Resources - Tutorials - Security Research - Bugcrowd Forum
- appsec-resources/training.md at master · cneill/appsec-resources
- GitHub - paragonie/awesome-appsec: A curated list of resources for learning about application security
- infoslack/awesome-web-hacking: A list of web application security
- awesome-web-security
- FallibleInc/security-guide-for-developers: Security Guide for Developers (实用性开发人员安全须知)
- foospidy/payloads: Git All the Payloads! A collection of web attack payloads.
- Hack-with-Github/Powerful-Plugins: Powerful plugins and add-ons for hackers
- Bug Bounty Forum - tools - Index
-
Digital Forensics
- DFIR - The Definitive Compendium Project
- Presentations The Homepage of @attrc
- IR A-Z DFIR - The Definitive Compendium Project
- Forensics « Null Byte :: WonderHowTo
- Forensics Category Archives - Darknet
- Article Series – Pentest Blog
- meirwah/awesome-incident-response: A curated list of tools for incident response
-
Debugging&Internals
-
Win
- User mode and kernel mode Microsoft Docs
- Sysinternals Utilities
- Kernel debugging for newbies Alex Lambert
- Getting Started with the Windows Driver Kit Microsoft Docs
- Debugging Tools for Windows (WinDbg, KD, CDB, NTSD) Microsoft Docs
- Intro to kernel debugging
- Windows Kernel Debugging - archived videos - gynvael.coldwind//vx.log
- Good tutorial for WinDbg? - Stack Overflow
- CodeMachine - Articles
- Post Directory « Nynaeve
- Projects « Nynaeve
- Latest internals topics - 0x00sec - The Home of the Hacker
-
-
Reverse Engg
- All DREDD Resources, Crack-Me’s, and Tutorials - Compilation! - Page 1
- Main Dredd Resources Compilation - Tutorials - Program’s - Tools - Crack-Me’s - More - Page 1
- Latest Reverse Engineering topics - 0x00sec
- qmemcpy - random bits of reverse engineering
- Reverse Engineering-infosecinstitute.com
- An Intro to x86_64 Reverse Engineering Leo Tindall
- FAQ: How to learn reverse-engineering? - gynvael.coldwind//vx.log
- yellowbyte/reverse-engineering-reference-manual: Here is a collage of reverse engineering topics that I find interesting
- linux-re-101
- fdivrp/awesome-reversing: A curated list of awesome reversing resources
- wtsxDev/reverse-engineering: List of awesome reverse engineering resources
- REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware
- Python arsenal for RE
- A modest proposal (Absolutely no babies involved) : ReverseEngineering
- Program Analysis Reading List — Möbius Strip Reverse Engineering
- Resources for Learning Reverse Engineering - @Jackson_T
- RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec
- Welcome to x64dbg’s documentation! — x64dbg documentation
-
Malware Analysis
-
AVEvasion
- Evading AV Software « Null Byte :: WonderHowTo
- Pen Testing Toolkit: Tools & Techniques Used to Evade Antivirus Software
- cobbr/ObfuscatedEmpire: ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it’s functionality.
- nccgroup/Winpayloads: Undetectable Windows Payload Generation
- govolution/avet: AntiVirus Evasion Tool
- EgeBalci/HERCULES: HERCULES is a special payload generator that can bypass antivirus softwares.
-
Crypter
-
Dynamic-ip
- Reversing Malware
- Malware Unicorn by securedorg
- Reference Guide to Reverse Engineering & Malware Analysis Training
- Advanced Malware Analysis Training - SecurityTrainings
- Reversing & Malware Analysis Training - SecurityTrainings
- Practical Malware Analysis Starter Kit – bluesoul [dot] me
- Set up your own malware analysis lab with VirtualBox, INetSim and Burp – Christophe Tafani-Dereeper
- R00TK1TS!! - Pastebin.com
- Malware/Lectures at master · RPISEC/Malware
- Most important considerations with Malware Analysis Cheats And Tools list
- Resource: Malware analysis - learning How To Reverse Malware: A collection of guides and tools by Claus Cramon Houmann - twitter, network, resources Peerlyst
- Latest Malware topics - 0x00sec
- ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure
- ktsaou/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
-
-
Exploit Development
-
MOOC’s/Courses
- Modern Binary Exploitation - Spring 2015
- RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
- CNIT 127: Exploit Development – Sam Bowne
- Introduction · Heap Exploitation
- nnamon/linux-exploitation-course: A Course on Intermediate Level Linux Exploitation
- Sam Bowne - Exploit Development - YouTube - YouTube
- Index · IT Security Catalog
-
0x00Sec
-
NullByte
-
primalsec
-
infosecinstitute
-
Fuzzing
- The Art of Fuzzing – Slides and Demos SEC Consult
- FuzzySecurity Tutorials
- fuzzdb - Project Hosting on Google Code
- Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
- EvolutionaryKernelFuzzing/Evolutionary Kernel Fuzzing-BH2017-rjohnson-FINAL.pdf
- xoreaxeaxeax/sandsifter: The x86 processor fuzzer
-
LINUX
- BASICS-LINUX_EXP
- Search · SLAE
- linux-kernel-exploitation: A bunch of links related to Linux kernel exploitation
- xairy/kernel-exploits: A bunch of proof-of-concept exploits for the Linux kernel
- raminfp/Understanding_Linux_Kernel_Vulnerability: Understanding Linux Kernel Vulnerability
- Category:SELinux - Gentoo Wiki
- Basic Integer Overflows
- Binary Hacking Course - LiveOverflow
- Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.
- Exploit Writing Tutorials Corelan Team - Part 4
- Metasploit exploit development - The series Par… Rapid7 Community and Blog
- Contents - Exploit Development Community
- Smashing the stack in 2010
- Windows Exploit Development - Part 1: The Basics - Security SiftSecurity Sift
- Hardening – Productive C++
- Hack the virtual memory: the stack, registers and assembly code - Holberton-Very BAISC
- FAQ: How to find vulnerabilities? - gynvael.coldwind//vx.log
- Path to exploit developer?
- Ask HN: What’s the prerequisite to become an exploit developer? Hacker News
- Best books, tutorials and courses to learn about exploit development
- List of useful resources on different vulnerabilities
- xerof4ks/pwning: RE / Binary Exploitation Resources
- memory exploitation
- how2heap: A repository for learning various heap exploitation techniques.
- sam-b/windows_kernel_address_leaks: Examples of leaking Kernel Mode information from User Mode on Windows
- sam-b/windows_kernel_resources: Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r/b)ootkits
- awesome-exploit-development: A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
- awesome-windows-exploitation: A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
- Fully undetectable backdooring PE files
- Mimikatz – Active Directory Security
- WindowsExploits/Exploits: Windows Exploits
- lucyoa/kernel-exploits
- hacksysteam/HackSysExtremeVulnerableDriver: HackSys Extreme Vulnerable Windows Driver
- exploit development - YouTube
- Home · zemisolsol/refs Wiki
- Introduction to Binary Exploitation · DavidBrosnan/Blog_articles Wiki
- Binary Hardening Measures (ASLR, NX, etc.) · TechSecCTF/CTF-pwn-tips Wiki
- SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合
-
-
Case-Studies
- WCry/WanaCry Ransomware Technical Analysis Endgame
- CVE-2017-0143 MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption Rapid7
- SMB Exploited: WannaCry Use of “EternalBlue” « Threat Research Blog FireEye Inc
- An Analysis of the WannaCry Ransomware Outbreak McAfee Blogs
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144
- EternalBlue_RiskSense_Analysis-1.2.pdf
- worawit/MS17-010: MS17-010
-
NetSec
- Network Protocols – For anyone who knows a programming language
- Socket Programming in Python
- Network – Page 2 – Pentest Blog
- MitM « Null Byte :: WonderHowTo
- saminiir/level-ip: A hacker’s userspace TCP/IP stack
- Offensive Network Security – Lectures
- Free Haven’s Selected Papers in Anonymity
- Cheatsheets
- awesome-honeypots
- awesome-pcaptools: area to process network traces
- Chan9390/Awesome-MitM: Curated List of MitM frameworks on GitHub
- Network Security Labs
- cea-sec/ivre: Network recon framework.
- Usage — Scapy 2.3.3-dev documentation
- Introduction — Scapy 2.3.3-dev documentation
- A tcpdump Tutorial and Primer with Examples
- How to Decrypt SSL traffic using Wireshark – Haxf4rall
- Intrusion Detection: Snort, Base, MySQL, And Apache2 On Ubuntu 7.10 (Gutsy Gibbon)
- Using Gathering Information Tools Through TOR Network
- Security Onion - YouTube - YouTube
-
Wireless
-
Papers
-
WPS
- The Newest Version of Script HT-WPS Breaker for Offline WPS Attack . - Page 1
- [TOOL] Pixiewps: pixie dust attack tool - Page 1
- [TUT] WPS CRACKING [TUT] - Page 1
- Legion Default WPS Pin Database - Page 1
- Binary/Decimal/Hexadecimal Converter
- WPS Pixie Dust Attack (Offline WPS Attack)
- legion community contribution WPS (Please contribute) - Page 1
- [tut/info]Think_alien’s All-in-One Tut [tut/info] - Page 1
- INDEX: Complete collection of wireless manipulation, attacks, tools & guidance - Page 1
- WIFI section top threads ** Read before posting LQ ** - Page 1
- [Tutorial]Things to know before even starting with wifi hacking [Notorious] - Page 1
- +++++++++ RADIUS Server ++++++++++ - Page 1
- Wireless Security
- 802.11 security. wi-fi protected access and 802.11i :: Networking :: eTutorials.org
- Rootsh3ll Wi-Fi Security and Pentesting series: Preface
- Wi-Fi Hacking « Null Byte :: WonderHowTo
- Cracking Your Hashes & .cap files (WPA/WPA2) ~ TUT to DIY Included - Page 1
- [Walkthrough]Kali 2.0 Subterfuge MITM - Page 1
-
[NEW] Post .CAP & .HCCAP Files Here For Cracking!! HANDSHAKE THREAD V2 - Page 1
-
Tools/Scripts
- edelahozuah/awesome-wifi-security: A collection of awesome resources related to 802.11 security, tools and other things
- 0x90/wifi-arsenal: WiFi arsenal
- Default Password List
- FruityWiFi
- xdavidhu/mitmAP: 📡 A python program to create a fake AP and sniff data.
- WPA2-HalfHandshake-Crack/wifihacking.md at master · dxa4481/WPA2-HalfHandshake-Crack
- dxa4481/WPA2-HalfHandshake-Crack: This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.
- brannondorsey/wifi-cracking: Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat 🖧
- brannondorsey/mitm-router: ☠ Man-in-the-middle wireless access point inside a docker container 🐳
-
-
PYTHON-SEC
- Awesome Python
- dloss/python-pentest-tools: Python tools for penetration testers
- svaksha/pythonidae: Curated decibans of scientific programming resources in Python.
- rasbt/python_reference: Useful functions, tutorials, and other Python-related things
- kirang89/pycrumbs: Bits and bytes of Python from the Internet
-
Pentesting
-
Footprinting/Reconnaissance
- nmap_cheet_sheet_0.6.pdf
- Dashboard PentestCloud
- Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
- Internet Research, Anti-Phishing and PCI Security Services Netcraft
- KLOTH.NET - Online Internet Tools and Services
- Network Tools From MxToolBox
- Online Penetration Testing Tools Free Security Ethical Hacking Tools by Security Audit Systems
- Shodan - Explore the Internet
- Toolbox DNSstuff
- Toolkit Penetration Testing Lab
- Whois Lookup, Domain Availability & IP Search - DomainTools
- HakTip: NMap - The Network Mapper for Gurus - YouTube - YouTube
- HakTip: Netcat - Network Port Scanning, File Transfers, and More! - YouTube - YouTube
-
Reporting vulnerability
-
Methodology
- Penetrating Testing/Assessment Workflow - WorkFlowy
- Penetration Testing Methodology - 0DAYsecurity.com
- Penetration Testing Framework
- The Penetration Testing Execution Standard
- Web Application Security Consortium (WASC)
- awesome-pentest-cheat-sheets
- Cheat Sheets
- Pentesting Cheatsheet – root@Hausec
- Penetration Testing Assessment Workflow · osiriansec/InfoSecUberWik Wiki
-
Metasploit
- Metasploit Postgres Setup - FedoraProject
- Metasploit Rapid7 Community and Blog
- Metasploit Documentation, Help and Support SecurityStreet
- Metasploit Unleashed
- Metasploit Basics « Null Byte :: WonderHowTo
- Metasploitable Search Results « WonderHowTo
- Metasploit - Wikibooks, open books for an open world
- Home · rapid7/metasploit-framework Wiki
- Meterpreter · rapid7/metasploit-framework Wiki
-
Priv Escalation
- Basic Linux Privilege Escalation
- Privilege Escalation Penetration Testing Lab
- Windows Privilege Escalation Methods for Pentesters – Pentest Blog
- FuzzySecurity Windows Privilege Escalation Fundamentals
- Attack and Defend: Linux Privilege Escalation Techniques of 2016
- Encyclopaedia Of Windows Privilege Escalation - Brett Moore - YouTube
-
Other Tools
- Dirk Loss: Online Tools
- Online tools for developersWidgets for websites, blogs, web applications
- SecTools.Org Top Network Security Tools
- Security Tools Penetration Testing and Security Tools
- The Official ROOTCON Blog: Introducing 35 Pentesting Tools Used for Web Vulnerability Assessment
- Tools pentestmonkey
- Tools SOLDIERX.COM
- ToolsWatch.org – The Hackers Arsenal Tools Repository for vFeed and DPE Projects » Tools
- vulnerable web application Archives - Darknet - The Darkside
- Security index [LWN.net]
- GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things
- [BHPEN] Top Learning Resources For Becoming a Pentester - Page 1
- Resource: Pentesting Wiki by Nicole Lamoureux - resources, tools, peerlyst wiki Peerlyst
- Home · woodspeed/Pentest Wiki
-
-
Hardware
-
ARM
- The State of Qualcomm’s Modems - WTR1605 and MDM9x25
- BlackHat_DC_2011_Avraham_ARM Exploitation-wp.2.0.pdf
- iadgov/Maplesyrup: Assesses CPU security of embedded devices. iadgov
- jtagsploitation/Jtagsploitation.pdf at master · syncsrc/jtagsploitation
- DVAR - Damn Vulnerable ARM Router The Exploit Laboratory
-
Azeria-labs
-
Project Zero
- Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)
- Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2)
- Project Zero: Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
- Project Zero: Over The Air - Vol. 2, Pt. 2: Exploiting The Wi-Fi Stack on Apple Devices
- Project Zero: Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices
-
Baseband
- Reverse engineering a Qualcomm baseband processor [pdf] : ReverseEngineering
- Quarkslab’s blog - IDA
- Comsecuris Security Research & Consulting Blog
- Smartphones use a second CPU and second operating system in their baseband modems AndroidAuthority
- firmware · ǝɹ - Free Online Firmware Unpacker, Scanner, Analyser - Firmware Genomics/Genome Project - Firmware Vulnerability and Backdoor Discovery - Firmware Mounting, Modification, Loading and Emulation - Embedded and Internet-of-Things Security
- Search · baseband
-
NFC & RFID
-
-
IOT
-
LoRa
- LoRa Network LoRaWAN Architecture Radio-Electronics.Com
- Security - The Things Network Wiki
- LoRaWAN security vulnerabilities exposed
- Notes on LoRaWAN security – Orne Brocaar – Medium
- Security of LoRaWAN - Network and Routing - The Things Network
- LoRa Security Building a Secure LoRa Solution
- LoRaWAN: Vulnerability Analysis and Practical Exploitation - Google Drive
- LPWAN-Feature-Comparison-Sheet1-7.pdf
- dmahony/Lora-Chat-Device: Using cheap LoRa wireless modules to chat over long distances.
-
payatu
- IoT Security Wiki
- The IoT Wiki - posts about the challenges of securing the IoT by Peerlyst - resource, secure, devices Peerlyst
- nebgnahz/awesome-iot-hacks: A Collection of Hacks in IoT Space so that we can address them (hopefully).
- Introduction · IoT Pentesting Guide
- originalhackingmanual.pdf
- Siliconpr0n
- Hackaday Fresh hacks every day
- index - badBIOS
- Index of /pdf/
- Car Forensics - A Starting Point
- The Bad Thing-Publicly available intel exploits
-
disassembly - Knowledge about CPU hardware - Reverse Engineering Stack Exchange
- Index of /hitbsecconf2016ams/materials
- Publications - Riscure
- [Wiki] Your Complete, Un-budgeted Toolkit - Hardware - 0x00sec - The Home of the Hacker
- Latest Hardware topics - 0x00sec - The Home of the Hacker
- monostable/awesome-electronics: A curated list of awesome resources for electronic engineers and hobbyists
- Hardware security features · inversepath/usbarmory Wiki
- Hardware Hacking Resources · IlliniHackers/start-here Wiki
- jaredthecoder/awesome-vehicle-security: 🚗 A curated list of resources for learning about vehicle security and car hacking
- ufrisk/pcileech: Direct Memory Access (DMA) Attack Software
- eik00d/CANToolz: CANToolz - framework for black-box CAN network analysis
- Cr4sh/s6_pcie_microblaze: PCI Express DIY hacking toolkit for Xilinx SP605
- gjyoung1974/simatalla: A Hardware Security Module Simulator. HSM Simulator Atalla Simulator
- chipsec/chipsec: Platform Security Assessment Framework
- List of Algorithms-Compression
- HQarroum/awesome-iot: A curated list of awesome Internet of Things projects and resources.
- embedded-boston/awesome-embedded-systems: A curated list of delightful Embedded Systems libraries, RTOSes, modules, references and more!
- Awesome Electronic and Hardware platform
- S3 Publications
- BastilleResearch/mousejack: MouseJack device discovery and research tools
-
-
Smartphone
-
Android
-
iOS
-
OWASP
-
Pentesting
-
Whatsapp
- [TUT] Whatsapp Hacking [/TUT] - Page 1
- [TUT] Whatsapp Password and ID Used for Whatsapp API[TUT] - Page 1
- Android Software and Hacking General [Developers Only] - XDA Forums
- Android Pentesting
- InfoSec Institute-Android Architecture and Pen-testing of Android applications
- InfoSec Institute-Penetration Testing Apps for Android Devices
- Installing Kali Linux On Any Android Device[TUT] NEW IMAGES! - Page 1
- Introduction to Android Malware Analysis - Page 1
-
- Mobile Security Wiki
- Wiki droidsec.org
- KitPloit - PenTest Tools for your Security Arsenal!: Android
- tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
-
-
Cellular
-
SDR
-
Tutorials
- Cracking and sniffing GSM with a RTL-SDR Low-cost hardware and free software
- Open Security Research: Getting Started with GNU Radio and RTL-SDR (on Backtrack)
- On HSPA+ and 64QAM support in 3GPP Release 7 - This Just In: HP Veer 4G for AT&T
- QPSK, 16QAM, 64QAM, and HSPA+ - HP Veer 4G Review - Getting Us Excited for Pre 3
- gsm – Going on my way…
- RF Wireless Downloads Page
- rtl-sdr Tutorial
- All - RTLSDR.com RTLSDR.com
- Great Scott Gadgets - Software Defined Radio with HackRF
- Home · mossmann/hackrf Wiki
- Software Defined Radio with HackRF (Michael Ossmann) - YouTube
- Software defined radio (SDR) - YouTube
- Hak5: Intro to Software Defined Radio (SDR) - YouTube
- Adriano Condro - YouTube - YouTube
- Christopher Malau - YouTube - YouTube
- Software Defined Radio - MEGA LIST- YouTube
- NSA ANT catalog - Wikipedia, the free encyclopedia
- CellularPrivacy/Android-IMSI-Catcher-Detector: AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
- Oros42/IMSI-catcher: This program show you IMSI numbers of cellphones around you.
- jopohl/urh: Universal Radio Hacker: investigate wireless protocols like a boss
- Salamandra Spy Microphone Detection Tool
- Home · ComThings/PandwaRF Wiki
-
CCC
- SecurityTube SDR
- Download & Streaming : Moving Image Archive : Internet Archive
- GSM-SECURITY TALKS
- DEFCON SDR
- practical antenna - YouTube
- Overview - Mobile (in)Security - Open Source Mobile Communications
- Rashid Feroze, Author at payatu-SDR
-
IMP TOOLS
-
PAPER’S
-
- Positive Technologies - learn and secure : telecom
- What is a Stingray - How to Protect Your Phone Data
- Search · GSM security
- Search · LTE security
- ernw/ss7MAPer: SS7 MAP (pen-)testing toolkit
- airgap Advanced Cyber-Security Research Lab
- GSM - Overview
- LTE Overview
- Communication Systems/Antennas - Wikibooks, open books for an open world
- Daniel Davidson - DeepSec
- media.ccc.de - YouTube - YouTube
- media.ccc.de - Search for “osmocon”
- media.ccc.de - Security & Hacking
-
-
AI/ML
-
Tools
-
WebProxies
- Aniscartujo Secure Encrypted Web Proxy - Watch videos @ YouTube & MySpace
- Anonymous Internet Proxy Server for Online Anonymization
- Online Anonymizer Proxy
- FREE PROXY servers: download free proxy lists, links, detailed proxy FAQ
- Proxy List Sorted by anonymity type #1
- List of working skype resolvers - Page 1
- Sites to get Proxies Free - Page 1
-
SMS & Emailer’s
-
Web SMS
-
Doxing
- Business Profiles and Company Information ZoomInfo.com
- Complete List of Websites For Doxing - Page 1
- Find People, Lookup Phone Numbers, Run Background Checks, Access Public Records USSearch.com
- Findandtrace.com Trace Mobile number cell phone location, landline, vehicle, std code, pincode
- Free People Search Engine ZabaSearch
- Lullar Com - Profile Search by Email
- Namechk Username & Domain Search
- Network Intelligence Gathering - InfoSec Institute
- Pipl - People Search
- Spokeo People Search White Pages Find People
-
Passwords & Wordlist
-
Wireless
-
Malwares
- Malwares
- RAT’S
- TheFatRat
- Useful Link Collection Page 1
- Ultimate Forensics Resources And Tools - Page 1
- Kali Linux Tools Listing Penetration Testing Tools
- Hack4Net ☠ Security Tools and News
- A curated list of CTF frameworks, libraries, resources and softwares
- Some setup scripts for security research tools.
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
- an awesome list of honeypot resources
- Black Hat Arsenal USA 2017 – Hack with GitHub – Medium
- wide range mass audit toolkit
- The Shadow Brokers “Lost In Translation” leak
- curated list of best applications and tools for Windows.
- m4ll0k/Awesome-Hacking-Tools: Awesome Hacking Tools
-
-
Vulns/CVE
- Google Android : List of security vulnerabilities
- Microsoft Windows 8.1 : List of security vulnerabilities
- Vulnerability distribution of cve security vulnerabilities by types
- Vulnerability Database 🛡
- re-pronin/Awesome-Vulnerability-Research: 🦄 A curated list of the awesome resources about the Vulnerability Research