📓
Everything I Know
  • index
  • #
    • 3D Printing
  • A
    • Abandoned Spaces
    • ADHD
    • Aging
    • Algorithms & Data Structures
      • Array
      • Constraint Satisfaction Problem
      • Dynamic Programming
      • Graph
      • Hash Table
      • Heap
      • Linked List
      • Queue
      • Recursion
      • Set
      • Stack
      • Tree
      • Trie
      • Union Find
    • Amazon Web Services
    • Android
    • Anime, Comics & Manga
    • APIs
    • Artificial Intelligence
    • Assembly
      • ARM
      • MIPS
      • x86
    • Audio / Video Editing
    • Awesome
    • Azure
  • B
    • Board Games
    • Books
  • C
    • C (programming language)
    • C++
    • Cars
    • Cascading Style Sheets
    • Chess
    • Comedy
    • Command Line
      • Autotools
      • Awk
      • Bash scripting
      • Grep
      • Lsof
      • Sed
      • SSH
    • Competitive Programming
    • Compilers
    • Computer Graphics
      • OpenGL
      • Vulkan
      • WebGPU
    • Computer Networks
    • Computer Science
    • Concurrency
    • Continuous Integration / Delivery
    • Cooking
    • Cryptography
    • Cryptocurriencies
    • Curriculum Vitae
  • D
    • Databases
      • PostgreSQL
      • SQL
      • SQLite
    • Design Patterns
    • Digital Minimalism
    • Distributed Systems
    • Docker
    • Documentaries
    • Documentation
    • Domain Name System
    • Dopamine
    • Drawing
  • E
    • eCommerce
    • Electronics
      • Repairs
    • Engineering
    • Entrepreneurship
    • Events
  • F
    • Fashion
    • Fitness
      • Exercise
      • Nutrition
      • Weight Loss
    • Focus
    • Football
  • G
    • Game Development
      • Godot
      • LibGDX
      • Unity
      • Unreal Engine
    • Git
    • Goals
    • Guitar
  • H
    • Habits
    • Happiness
    • House
      • Tradespeople
      • Buying
      • Renting
  • I
    • Interviews
      • Behavioural Interviews
      • Coding Interviews
      • System Design Interviews
  • J
    • Java
    • JavaScript
      • Astro
      • Bun
      • Electron
      • Jest
      • Node.js
      • Nue.js
      • React.js
      • Redux
      • Vue.js
    • Journaling
  • K
    • Karting
    • Knots
    • Knowledge Bases
    • Kotlin
    • Kubernetes
  • L
    • LaTeX
    • Learning
      • Drawing
      • Languages
        • Certificate of Proficiency in English
        • Japanese
      • Piano
    • Legacy Code
    • LEGO
    • Lifestyle
    • Life Hacks
    • Linux
    • LISP
  • M
    • Machine Learning
      • Deep Learning
    • MacOS
    • Maths
    • Meditation
    • Movies
    • Music
      • Music Production
      • Music Theory
  • N
    • Negotiation
    • News
  • O
    • Operating Systems
      • Linux
  • P
    • Parenting
    • Personal Finance
      • ISAs
      • Pensions
    • PHP
    • Physics
    • Podcasts
    • Procrastination
    • Productivity
    • Programming
      • Functional Programming
      • Performance
    • Prometheus
    • Psychology
    • Public Speaking
    • Purpose
    • Puzzles
    • Python
      • Django
      • Pandas
  • Q
    • Quantum Computing
    • Quotes
  • R
    • Regular Expressions
    • Relationships
    • Reverse Engineering
    • Rust
      • Cargo
  • S
    • Security
      • Android
      • Binary Exploitation
      • CompTIA Security+ SYO-701
      • CTFs
      • Forensics
      • Linux
      • Web
      • Windows
    • Self Improvement
    • Shaving
    • Sitting
    • Sleep
    • Social Skills
    • Spring (framework)
    • Stoicism
    • Strength Training
      • Deadlifts
      • Push Ups
    • Success
    • System Design
      • Site Reliability Engineering
  • T
    • Table Tennis
    • Testing
    • Thinking
    • Touch Typing
    • Travel
      • Japan
        • Fukuoka
        • Hiroshima
        • Kyoto
        • Okinawa
        • Osaka
        • Tokyo
      • London
      • Rome
    • TV Series & Programmes
    • Twitch
    • TypeScript
    • Typography
  • V
    • Virtual Tours
    • Vim
    • Video Games
      • Emulation
      • Mods
      • Music
      • Speedrunning
      • Warzone
  • W
    • Web Apps
    • Web Cams
    • Web Development
      • Selenium
      • Web Assembly
    • Windows
      • Windows Development
    • Work
      • Freelancing
      • GitHub Profile
      • Interesting Companies
      • Job Boards
      • Remote Work
      • Startup
    • Writing
Powered by GitBook
On this page
  • Articles
  • Awesome
  • Blogs
  • Bug Bounty Programs
  • Certifications
  • Conferences
  • Databases
  • Discords
  • Frameworks
  • GitHub Repositories
  • Images
  • Linux Distributions
  • Meetups
  • Podcasts
  • Subreddits
  • Tools
  • Videos
  • Websites
  • YouTube Channels
  • YouTube Playlists

Was this helpful?

  1. S

Security

PreviousCargoNextAndroid

Last updated 1 month ago

Was this helpful?

Articles

  • - Positive Security

  • - g0tm1k

  • - Alex Birsan

  • - RafaÅ‚ CieÅ›lak

  • - Mike Malone

  • - CISA

  • - Ellie Gillard

  • - Day[0]

  • - Day[0]

  • - Day[0]

  • - PentestBlog

  • - Eric Steven Raymond

  • - Omar Santos

  • - Code Arcana

  • - Heino Sass Hallik

  • - FalconSpy

  • - HighOn.Coffee

  • - Offensive Security

  • - DEFCON

  • - HighOn.Coffee

  • - Pentest Monkey

  • - Sami Alaoui Kendil

  • - Aleph One

    • - Travis Finkenauer

    • - avicoder

  • - TCM Security

  • Starting an InfoSec Career - Lesley Carhart, tisiphone.net

  • -

Awesome

Blogs

Bug Bounty Programs

Certifications

Conferences

Databases

Discords

Frameworks

GitHub Repositories

Images

Linux Distributions

Meetups

Podcasts

Subreddits

Tools

Videos

Websites

YouTube Channels

YouTube Playlists

- Daniel Miessler

- OffSec

- Giuseppe Lettieri, Università di Pisa

- RedefiningReality

- file formats

- posters, drawings

- ALL IN ONE Hacking Tool For Hackers

- Veeral Patel

- Julio Cesar Fort

- OffSec

- Parrot Security

()

- Privilege Escalation Project

- Reporting and collaboration tool

- Data exfiltration over DNS request covert channel

- comprehensive suite for man in the middle attacks

- curated list of Unix binaries that can be used to bypass local security restrictions

- declarative binary format parsing language

- Credentials recovery project

- Scripted Local Linux Enumeration & Privilege Escalation Checks

- Vulnerability Assessment

- C2 and post-exploitation framework

()

pwntools (, )

- Modular C# framework to exfiltrate loot over secure and trusted channels

- Portable operating system that protects against surveillance and censorship

- Password Bypass Tool

- LiveOverflow

- David Brumley

- Caleb Stewart and John Hammond

- The Cyber Mentor

- Interactive Online Malware Sandbox

- Certificate Search

- Online Cyber Security Blue Team Training

- A Pwning Campaign by RET2 Systems

()

- Security Training for Developers

- Check if your email has been compromised in a data breach

- Mastering the Pentest Distribution

- A Cybersecurity Game

- Open Worldwide Application Security Project

- DevSecOps Maturity Model

- UK Cybersecurity Courses & Training

- Paul Jerimy

()

- Omar Santos

- #1 Trusted Cybersecurity News Platform

- Wireshark training

- The Cyber Mentor

A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals
Allow arbitrary URLs, expect arbitrary code execution
Basic Linux Privilege Escalation
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
Dynamic linker tricks: Using LD_PRELOAD to cheat, inject features and investigate programs
Everything Public Key Infrastructure
Free Cybersecurity Services and Tools
Free TryHackMe Training: The Ultimate Guide for Beginners
From CTFs to The Real-World: Overview (Part 1)
From CTFs to Real-Vulnerabilities (Part 2)
From CTFs to Real-Exploitation (Part 3)
Hack The Box (HTB) OSCP-Like machines List 2022
How To Become A Hacker
Introduction to Ethical Hacking Live Training Guide
Introduction to format string exploits
Linux Privilege Escalation Using Capabilities
Unofficial OSCP Approved Tools
Penetration Testing Cheat Sheet
Privilege Escalation
Required Reading for the Discerning Technophile
Reverse Shell Cheat Sheet
Reverse Shell Cheat Sheet
Reversing for dummies - x86 assembly and C code
Smashing The Stack For Fun And Profit
Smashing the Stack For Fun and Profit (Today)
Smashing the Stack for Fun & Profit: Revived
So You Want to Be a Hacker: 2022 Edition
Chapters 1-3
Chapters 4-5
Chapter 6
Chapter 7
Upgrading Simple Shells to Fully Interactive TTYs
Windows Privilege Escalation Fundamentals
2
Awesome Bug Bounty
Awesome Hacking
Awesome Security Gists
Awesome Windows Domain Hardening
Corelan Cybersecurity Research
Embee Research
Filippo Valsorda
harmj0y
Krebs on Security
SkullSecurity
HackerOne
List of Bug Bounty Programs, Reward Systems & Security Acknowledgments
Zero Day Initiative
Certified Ethical Hacker
CompTIA PenTest+
CompTIA Security+
Offensive Security Certified Professional
A Guide to Information Security Certifications (2020 Update)
RomHack
Metasploit Unleashed
Systems and Network Hacking
Common Vulnerability Scoring System
CVE Mitre
CVEdetails.com
Exploit Database
National Vulnerability Database
Hack The Box
InfoSec Prep
Offensive Security
Try Hack Me
Vulnhub
MITRE ATT&CK
NIST Cybersecurity Framework
The Unified Kill Chain
100 Red Team Projects for Pentesters and Network Managers
Awesome AppSec
Awesome Cyber Security
Awesome Cyber Skills
Awesome OSINT
Awesome Penetration Testing
Awesome Resources For Learning Ethical Hacking & Pentesting
Awesome Social Engineering
Awesome Wordlists
Cheatsheets
Companies hiring remote
corkami/formats
corkami/pics
Crypton
Cybersecurity Career Path
Cybersecurity Educational Resources
Ethical Hacking Tools
FuzzDB
Hacking Books
hackingtool
How To Secure Anything
Offensive Reverse Shell (Cheat Sheet)
OSCP Survival Guide
PayloadsAllTheThings
Public Pentesting Reports
pwncat
sec-tools
SecLists
Security Engineer Interview Questions
statistically-likely-usernames
Windows / Linux Local Privilege Escalation Workshop
Kali Linux
Kali WSL
Win-KeX
Parrot OS
Pentoo
BSides London
DEF CON Groups
OWASP Local Chapters
Darknet Diaries
Darknet Diaries
r/hacking
wiki
r/HowToHack
r/websec
BeRoot
Dradis
DNSExfiltrator
Ettercap
GTFOBins
Kaitai Struct
LaZagne
LinEnum
Linux Exploit Suggester 2
Linux Privilege Escalation Check Script
Metasploit
Metasploit Documentation
Nessus
Pupy
pwncat
GitHub
docs
GitHub
Security Tools
SharpExfiltrate
ShellPop
Tails
Unshackle
File Path Race Condition & How To Prevent It
How the Best Hackers Learn Their Craft
Introducing Pwncat: Automating Linux Red Team Operations
Network Penetration Testing for Beginners (2019)
ANY.RUN
Blue Team Labs Online
Compiler Explorer
crt.sh
CSO Online
Cyber Security Challenge UK
CyberDefenders
Cybersecurity
Cybrary
CySec Careers
Dark Reading
Deus x64
Google Security Operations Learning Portal
Guided Hacking
H4CK1NG G00GL3
Writeup by Davide Guerri
HackMyVM
Hack The Box
HackerSploit - Red Team Security Series
Hacksplaining
HackThisSite
HackTricks
HackMyVM
Have I Been Pwned
John Hammond
Jotti's malware scan
Kali Training
KC7
OffSec Proving Grounds
OpenSecurityTraining2
OverTheWire Wargames
OWASP
DSOMM
OWASP Testing Guide
Privacy Tools
pwn.college
Pwnable.kr
Red Team Development and Operations
Red Team Notes
Reversing.kr
SANS
Security Certification Roadmap
Security List
GitHub
SmashThe Stack Wargaming Network
The Art of Hacking
The Cryptopals Crypto Challenges
The Cyber Pulse Video Library
The Hacker News
The Hacker Recipes
The Hacker Tools
TryHackMe
US Cyber Challenge
VulnHub
WeChall
0xdf
Abricto Security
Chris Greer
Cyber Saiyan
Cyberkraft
David Bombal
HackerSploit
Hacksplained
Infosec
InsiderPhD
IppSec
John Hammond
LiveOverflow
Network Chuck
Null Byte
stacksmashing
The Cyber Mentor
Buffer Overflows Made Easy
Hacking Google