Skip to content

Latest commit

 

History

History
34 lines (34 loc) · 5.38 KB

useful-links.md

File metadata and controls

34 lines (34 loc) · 5.38 KB

useful links

Unorganised list if useful links.

  • CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
  • Simple PKI - A simple OpenSSL PKI tutorial.
  • Damn Vulnerable Web Application (DVWA) - A PHP/MySQL web application that is damn vulnerable.
  • WebGoat - A deliberately insecure Web Application.
  • IO wargame
  • FireEye's Free Security Software
  • VulnHub - A large repository of Boot2Root vulnerable virtual machine images.
  • Scapy - A powerful interactive packet manipulation program.
  • awesome-sec-talks - A curated list of awesome Security talks.
  • International Association for Cryptologic Research - A non-profit scientific organization whose purpose is to further research in cryptology and related fields.
  • Cyber Security Challenge Australia - A ‘hacking’ competition run by an alliance of Australian Government, business and academic professionals who are committed to finding the next generation of Australian cyber security talent
  • Cowrie - A medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.
  • Cybrary - Free and Open Source Cyber Security Learning.
  • Exploiting Embedded Systems - A tutorial focused on extracting file systems, kernels and code from firmware images.
  • @unfo's Path to OSCP: - @unfo's journey of getting their OSCP certification. watch @unfo fail at stuff and explain how you should not repeat my mistakes.
  • Scalable and secure access with SSH - Facebook's scalable SSH solution for network and system administration.
  • The Bowtie Method - A BowTie is a diagram that visualises the risk you are dealing with in just one, easy to understand picture. The diagram is shaped like a bow-tie, creating a clear differentiation between proactive and reactive risk management.
  • PentesterLab - Provides vulnerable systems that can be used to test and understand vulnerabilities.
  • tmux - A terminal multiplexer. It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and reattach them to a different terminal.
  • Divergent Options - Assess national security situations and present multiple options, without recommendations, 1,000 words at a time.
  • @vortex's OSCP Exam – Preparation, Exam Day & Report Day - What worked for @vortex, not only on the day of the exam, but in the time leading up to it, and the day after during the exam report preparation day.
  • circuito.io - online editor for wiring your arduino project.
  • NSA Open Source Software - technologies developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS).
  • Linux Security Tools (Top 100) - Based on reviews and automated analysis. This list is populated with tools that are publicly available.
  • FLARE VM - FLARE VM is a freely available and open sourced Windows-based security distribution designed for reverse engineers, malware analysts, incident responders, forensicators, and penetration testers.
  • Reverse Engineering Malware 101 - Fundamentals, Malware Techniques, RE Tools, Triage Analysis, Static Analysis, & Dynamic Analysis.
  • Hack The Box - An online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests.
  • Practical Pentest Labs - A wide range of vulnerable-by-design hosts that are constantly updated to keep your skills current.
  • Exploit Exercises - provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering, and general cyber security issues.
  • Kali Linux Revealed - he free “Kali Linux Revealed” online course.
  • Kali Linux - A penetration testing platform.
  • HackSys Extreme Vulnerable Driver - intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level.