LIKE ME THERE ARE PLENTY OF FOLKS WHO ARE LOOKING FOR SECURITY RESOURCES AND WE KEEP ON SEARCHING FOR TORRENTS, DRIVE LINKS AND MEGA LINKS WHICH CONSUMES A LOT OF BANDWIDTH SO I DECIDED TO CURATE THE LIST OF RESOURCES FREELY AVAILABLE ON THE WEB TO HELP OTHERS GET STARTED IN THE FIELD OF INFOSEC.
THE FOLLOWING LINKS PROVIDED ARE FROM DIFFERENT SOURCES FROM VARIOUS AUTHOR'S TO HELP YOU LEARN I DO NOT OWN THEM I'VE JUST CURATED THEM TOGEHTER SO THE CREDIT GOES TO THE AUTHOR'S.
I'D LIKE TO THANK ALL THE AUTHOR'S OF THESE TUTORIALS THEIR CONTRIBUTION IT MEANS A LOT.
FEEL FREE TO CONTACT ME AT rootb3r [at] gmail [dot] com TO ADD MORE LINKS TO THIS LIST.
I WILL BE UPDATING THIS LIST IN FUTURE SO STAY TUNED!!
EDIT 1: NOW OTHER LINKS INCLUDED TOO.
-
- The PIC Tutorial - Flash Tutorials
- Microcontroller Basics, Types and Applications
- Editorials Archives - Hardware Secrets
- Memory | Hardware Secrets
- Storage | Hardware Secrets
- HQarroum/awesome-iot: A curated list of awesome Internet of Things projects and resources.
- embedded-boston/awesome-embedded-systems: A curated list of delightful Embedded Systems libraries, RTOSes, modules, references and more!
- Awesome Electronic and Hardware platform
-
-
-
- The Linux Kernel documentation — The Linux Kernel documentation
- Index of /doc/Documentation
- Kernel 101 – Let’s write a Kernel - Arjun Sreedharan
- The User-mode Linux Kernel Home Page
- The Linux Kernel - Wikibooks, open books for an open world
- QUICK LINKS for students and advance developers :: Linux Kernel Data-Structures
- linux - Learning Kernel Programming - Stack Overflow
- Kernel index [LWN.net]
- Kernel links
- KernelHacking - Linux Kernel Newbies
-
- RHEL7 Free available resources - CertDepot
- Linux Basics « Null Byte :: WonderHowTo
- GNU awk
- Home | Linux Journey
- jlevy/the-art-of-command-line: Master the command line, in one page
- Idnan/bash-guide: A guide to learn bash
- k4m4/terminals-are-sexy: 💥 A curated list of Terminal frameworks, plugins & resources for CLI lovers.
- links/external - unixporn
- tmux Tutorial — Split Terminal Windows Easily· Łukasz Wróbel
- Basic Git Command Line Reference for Windows Users | John Atten
-
- The Starman's Realm
- The little book about OS development
- Expanded Main Page - OSDev Wiki
- Operating System Development Series
- os01 | Bootstrap yourself to write an OS from scratch. A book for self-learner.
- OSdev | Alex Parker's Website
- OS Development Tutorials on Bona Fide OS Developer
- cfenollosa/os-tutorial: How to create an OS from scratch
- top scoring links : osdev
-
-
-
- PHP | Codecademy
- A Map to Learn to Code and Become a Software Engineer | Free Code Camp
- Upskill | Essential Web Developer Course | Upskill
- Code School - Discover DevTools
- bmorelli25/Become-A-Full-Stack-Web-Developer: Free resources for learning Full Stack Web Development
- bmorelli25/Become-A-Full-Stack-Web-Developer: Free resources for learning Full Stack Web Development
-
- Programming · isislab/Project-Ideas Wiki
- Michael0x2a/curated-programming-resources
- Here's a SANITIZED list of 530+ free online programming/CS courses (MOOCs) with feedback(i.e. exams/homeworks/assignments) that you can start this month (December 2016) : learnprogramming
- MEGATHREAD
- Programming Competition,Programming Contest,Online Computer Programming
- Solve Programming Questions | HackerRank
- Online CS Courses - Computer Science
- Operating System | LeetCode Discuss
- A complete computer science study plan to become a software engineer.
- Path to a free self-taught education in Computer Science!
- MattPD/cpplinks: A categorized list of C++ resources.
- How to be low-level programmer
- List of awesome university courses for learning Computer Science!
- Developer-Y/cs-video-courses: List of Computer Science courses with video lectures.
- OverAPI.com | Collecting all the cheat sheets
- List of Algorithms
- HrushikeshK/every-programmer-should-know: A collection of (mostly) technical things every software developer should know
-
- Amazon.in: Last 90 days - Computer Security / Computing, Internet & Digital Media: Books
- Packt Publishing | "Community Experience, Distilled"
- Recommended Reading | The Homepage of @attrc
- Books | DFIR - The Definitive Compendium Project
- 4n6k: Resources
- Security - Topic · GitBook
- Security | No Starch Press
- Books | Simone Margaritelli
- GitHub - onlurking/awesome-infosec: open-security-books
- GitHub - Hack-with-Github/Free-Security-eBooks: Free Security and Hacking eBooks
- GitHub - sbilly/awesome-security: A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
-
-
- overthewire.org/wargames/
- Under the Wire
- Welcome [Root Me : Hacking and Information Security learning platform]
- Hack The Box :: Online Penetration Testing Platform
- Dashboard
- Pentest Training
- ctf.tf - Easy
- pwnable.tw
- pwnable.kr/play.php
- Penetration test lab "Test lab" | Pentestit
- Download - Exploit Exercises
- Backdoor - Security platform
- Ctf Portal
- Web security VM app - Web Hacking / References - 0x00sec
- Vulnerable Web Applications - White Hat Academy
- Vulnerable By Design - Search: web app ~ VulnHub
- bkerler/exploit_me: Very vulnerable ARM application (CTF style exploitation tutorial)
- Embedded Security CTF
- Practice CTF List
- [PentesterLab] Our exercises
- INFOSEC ROCKS!
- Challenges - RingZer0 CTF
- SQL Injection Demo
-
- Resources ~ VulnHub
- PENETRATION TESTING PRACTICE LAB - VULNERABLE APPS / SYSTEMS
- Mind Maps-ALL
- 2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions | FireEye Inc
- CTF Series : Vulnerable Machines — tech.bitvijays.com
- CTFtime.org / All about CTF (Capture The Flag)
- Introduction · CTF Field Guide
- A curated list of CTF frameworks, libraries, resources and softwares
- Wiki-like CTF write-ups repository, maintained by the community. 2017
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform.
- joe-shenouda/awesome-cyber-skills: A curated list of hacking environments where you can train your cyber skills legally and safely
-
-
-
- Pune Chapter - null Community
- CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada
- PacSec Applied Security Conference: Tokyo, Japan
- InfoCon Collection: Hacking Conference Audio and Video Archive
- Cybersecurity Conferences 2017 | Complete List of Cyber Security Events, Information Security Conferences, Seminars in the USA, India and the UK
- GitHub - PaulSec/awesome-sec-talks: A collected list of awesome security talks
-
-
- Offensive Security Bookmarks – EK
- Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog
- Prep guide for Offsec’s PWK – Tulpa Security
- abatchy's blog | How to prepare for PWK/OSCP, a noob-friendly guide
- OSCP Course & Exam Preparation - Ellingson Mineral
- nairuzabulhul/RoadMap: GitBook: OSCP RoadMap
- ferreirasc/oscp: oscp study
- OSCP · Teck_k2
- H4oK3/OSCP-Survival-Guide: Kali Linux Offensive Security Certified Professional Survival Exam Guide
- OSCP VulnHub Series - YouTube - YouTube
-
- OSCP Prepare – EK
- A Detailed Guide on OSCP Preparation – From Newbie to OSCP » Checkmate
- OSCP / PWK Certification Review /Journey 2017
- OSCP-Prep/README.md at master · burntmybagel/OSCP-Prep · GitHub
- Offensive Security Bookmarks – EK
- - Offensive Security
- OSCP – Useful resources – The IT Geek Chronicles
- OSCP – The IT Geek Chronicles
- Windows Privilege Escalation - a cheatsheet
- TOP–10 ways to boost your privileges in Windows systems – HackMag
- Penetration Testing Methodology - 0DAYsecurity.com
- Creating Metasploit Payloads
- Scripting
- aLFI Scanner - An0th3r LFI sC4Nn3r v1.0
- monkeysm8/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
- Packet Storm
- VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY
- | Local Linux Enumeration & Privilege Escalation Cheatsheet
- VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY
- The “SYSTEM” challenge – Decoder's Blog
- OSCP Game Over !!!!
- OSCP Review - Thor-Sec
- OSCP Cheat Sheet - Thor-Sec
- https://www.exploit-db.com/docs/42329.pdf
- Site5 KnowledgeBase » PuTTY: How to start a SSH session from the command line
- Tunneling sessions via Plink | Booches.nl
- Pentesting Cheatsheet – root@Hausec
- pwk-cheatsheet/README.md at master · re-pronin/pwk-cheatsheet · GitHub
- » Blog Archive » Pen test and hack microsoft sql server (mssql)
- Windows Kernel Exploits | Penetration Testing Lab
- Gaining a Root shell using MySQL User Defined Functions and SETUID Binaries | Infamous SYN
- Linux Privilege Escalation Scripts
- abatchy17/WindowsExploits: Windows exploits, mostly precompiled.
- lucyoa/kernel-exploits
- SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合
- Linux Privilege Escalation Cheatsheet
- Offensive Security's PWB and OSCP - My Experience - Security SiftSecurity Sift
- OSCP Course & Exam Preparation - Ellingson Mineral
- abatchy's blog: OSCP Prep
- Offensive Security Training Videos - FAST RELEASE
- Search · oscp
- A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate
- Cracking OSCP!! – Prasanna Kumar
-
- Buffer overflow - Wikipedia, the free encyclopedia
- Church of Wifi WPA-PSK Rainbow Tables - Security - Hak5 Forums
- File inclusion vulnerability - Wikipedia, the free encyclopedia
- Phishing - Wikipedia, the free encyclopedia
- RainbowCrack - Crack Hashes with Rainbow Tables
- SQL injection - Wikipedia, the free encyclopedia
-
- Data center - Wikipedia, the free encyclopedia
- Domain Name System - Wikipedia, the free encyclopedia
- Dynamic Host Configuration Protocol - Wikipedia, the free encyclopedia
- Explanation of the Three-Way Handshake via TCP/IP
- HTTP cookie - Wikipedia, the free encyclopedia
- Internet Control Message Protocol - Wikipedia, the free encyclopedia
- ipconfig
- List of DNS record types - Wikipedia, the free encyclopedia
- List of Internet Relay Chat commands - Wikipedia, the free encyclopedia
- List of TCP and UDP port numbers - Wikipedia, the free encyclopedia
- MAC address - Wikipedia, the free encyclopedia
- Networking hardware - Wikipedia, the free encyclopedia
- OSI model - Wikipedia, the free encyclopedia
- Post Office Protocol - Wikipedia, the free encyclopedia
- Server room - Wikipedia, the free encyclopedia
- Simple Network Management Protocol - Wikipedia, the free encyclopedia
- Tracert Command Details and Examples
- Virtual Network Computing - Wikipedia, the free encyclopedia
- Virtual private server - Wikipedia, the free encyclopedia
-
- Botnet - Wikipedia, the free encyclopedia
- Botnet - Wikipedia, the free encyclopedia
- Computer worm - Wikipedia, the free encyclopedia
- Different types of malware - ABestWeb Affiliate Marketing Forum
- XSS worm - Wikipedia, the free encyclopedia
- Zombie (computer science) - Wikipedia, the free encyclopedia
-
Streaming Tutorials | Cyber Aces | Free online cybersecurity courses
-
-
-
Penetration Testing Lab | Explore the lab…maybe you will find some interesting things…
-
- CyberPunk: The Wire
- DeepDotWeb - Surfacing The News From The Deep Web
- Threatpost | The first stop for security news
- CSO | Security news, features and analysis about prevention, protection and business innovation.
- Packet Storm
- SecurityFocus
- The Hacker News - Cyber Security and Hacking News Community
- Home Page - www.SecurityXploded.com
-
-
-
HackerOne: Vulnerability Coordination and Bug Bounty Platform
-
- Cybersecurity Supply And Demand Heat Map
- Tips for for an Information Security Analyst/Pentester career -Episode 1:General and technical hints by Mattia Campagnano 13 years experience Akron OH - network, windows, how to | Peerlyst
- offensiveinterview
- yangshun/tech-interview-handbook: 💯 Algorithms, front end and behavioral content for rocking your coding interview
-
-
- Security Learning Guides - Reference from WhatIs.com
- Security management Definitions - Glossary from WhatIs.com
- Security Quizzes - Reference from WhatIs.com
- Security | Difference Between
- GitHub - sindresorhus/awesome: Curated list of awesome lists
- GitHub - zbetcheckin/Security_list: Great security list for fun and profit
- Top "peerlyst wiki" experts and posts | Peerlyst
-
-
-
- Security references
- Introduction · Security - My notepad
- Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
- misterch0c/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
- vitalysim/Awesome-Hacking-Resources: A collection of hacking / pentetration testing resources to make you better!
- Awesome-Hacking/README.md at master · Hack-with-Github/Awesome-Hacking
- awesome-hacking: awesome-hacking#table-of-contents
- awesome-infosec: related-awesome-lists
- zbetcheckin/Security_list: Great security list for fun and profit
- pe3zx/my-awesome: My curated list of awesome links, resources and tools
- @Jackson_T - Roundup
- Mind Maps
- Home · isislab/Project-Ideas Wiki
- Talks
- [Mega Tutorial Links]A huge Tutorial collection for hackers/Pentesters[updatated] - Page 1
- [TUT] MEGA HACKING TUTORIAL! [BIGGEST ON HF] COVERS EVERYTHING! - Page 1
- 80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker | FromDev
- Hacking Tutorial Compilation Thread - Page 1
- Netsec Focus - Learning Resources - Google Sheets
- Breaking into InfoSec: A Beginners Curriculum | s3ctur
- Collection of helpful links part 1 : Kalilinux
- resources - HowToHack
- The Hacker Ethos - First Edition Free.pdf - Google Drive
- Awesome Checklist Checklist
-
-
-
INDEX : Divine's Compilation of Private Investigation Methods and Anonymity - Page 1
-
- Tutorial Cryptography - Page 1
- Outline of cryptography - Wikipedia
- RETTER: Cryptography & Security moves fast. Keep up!
- List of Cryptographic Algorithms - Hacked
- Understanding Cryptography, A Textbook for Students and Practitioners - with a Foreword by Bart Preneel
- Latest Cryptology topics - 0x00sec
- OpenSSL Cheatsheet
- Ken Shirriff's blog: bitcoin
- List of Algorithms
- ───────────HASHING/CHALLENGES
- Secure Salted Password Hashing - How to do it Properly
- PRINCE modern password guessing algorithm
- The Cryptopals Crypto Challenges
- id0-rsa
- ───────────PAPER's
- Cryptology ePrint Archive: Search Results
- Whitepapers With Friends
- Cryptologie | Links
- Jameson Lopp :: Bitcoin Resources
- cypherpunk-research
- Introduction to Cryptography by Christof Paar - YouTube
- Cryptography Lectures - YouTube
- NetSecFocus Crypto Basics - YouTube
- Guide to Cryptography - OWASP
- Links / Books - CrypTool Portal
-
A Gentle Introduction to Application Security (for Programmers) : learnprogramming
-
ISSA Kentuckiana Web Pen-Testing Workshop (Hacking Illustrated Series InfoSec Tutorial Videos)
-
Metasploitable 2 Exploitability Guide | Rapid7 Community and Blog
-
Leveraging web application vulnerabilities to steal NTLM hashes
-
vulnerable web application Archives - Darknet - The Darkside
-
The Web Application Security Consortium / Threat Classification Enumeration View
-
Researcher Resources - Tutorials - Security Research - Bugcrowd Forum
-
appsec-resources/training.md at master · cneill/appsec-resources
-
infoslack/awesome-web-hacking: A list of web application security
-
FallibleInc/security-guide-for-developers: Security Guide for Developers (实用性开发人员安全须知)
-
foospidy/payloads: Git All the Payloads! A collection of web attack payloads.
-
Hack-with-Github/Powerful-Plugins: Powerful plugins and add-ons for hackers
-
- DFIR - The Definitive Compendium Project
- Presentations | The Homepage of @attrc
- IR A-Z | DFIR - The Definitive Compendium Project
- Forensics « Null Byte :: WonderHowTo
- Forensics Category Archives - Darknet
- Article Series – Pentest Blog
- meirwah/awesome-incident-response: A curated list of tools for incident response
-
-
- User mode and kernel mode | Microsoft Docs
- Sysinternals Utilities
- Kernel debugging for newbies | Alex Lambert
- Getting Started with the Windows Driver Kit | Microsoft Docs
- Debugging Tools for Windows (WinDbg, KD, CDB, NTSD) | Microsoft Docs
- Intro to kernel debugging
- Windows Kernel Debugging - archived videos - gynvael.coldwind//vx.log
- Good tutorial for WinDbg? - Stack Overflow
- CodeMachine - Articles
- Post Directory « Nynaeve
- Projects « Nynaeve
- Latest internals topics - 0x00sec - The Home of the Hacker
-
-
- All DREDD Resources, Crack-Me's, and Tutorials - Compilation! - Page 1
- Main Dredd Resources Compilation - Tutorials - Program's - Tools - Crack-Me's - More - Page 1
- Latest Reverse Engineering topics - 0x00sec
- qmemcpy - random bits of reverse engineering
- Reverse Engineering-infosecinstitute.com
- An Intro to x86_64 Reverse Engineering | Leo Tindall
- FAQ: How to learn reverse-engineering? - gynvael.coldwind//vx.log
- yellowbyte/reverse-engineering-reference-manual: Here is a collage of reverse engineering topics that I find interesting
- linux-re-101
- fdivrp/awesome-reversing: A curated list of awesome reversing resources
- wtsxDev/reverse-engineering: List of awesome reverse engineering resources
- REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware
- Python arsenal for RE
- A modest proposal (Absolutely no babies involved) : ReverseEngineering
- Program Analysis Reading List — Möbius Strip Reverse Engineering
- Resources for Learning Reverse Engineering - @Jackson_T
- RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec
- Welcome to x64dbg’s documentation! — x64dbg documentation
-
-
- Evading AV Software « Null Byte :: WonderHowTo
- Pen Testing Toolkit: Tools & Techniques Used to Evade Antivirus Software
- cobbr/ObfuscatedEmpire: ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.
- nccgroup/Winpayloads: Undetectable Windows Payload Generation
- govolution/avet: AntiVirus Evasion Tool
- EgeBalci/HERCULES: HERCULES is a special payload generator that can bypass antivirus softwares.
-
Reference Guide to Reverse Engineering & Malware Analysis Training
-
Set up your own malware analysis lab with VirtualBox, INetSim and Burp – Christophe Tafani-Dereeper
-
Most important considerations with Malware Analysis Cheats And Tools list
-
ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure
-
ktsaou/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
-
-
-
- Modern Binary Exploitation - Spring 2015
- RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
- CNIT 127: Exploit Development -- Sam Bowne
- Introduction · Heap Exploitation
- nnamon/linux-exploitation-course: A Course on Intermediate Level Linux Exploitation
- Sam Bowne - Exploit Development - YouTube - YouTube
- Index · IT Security Catalog
-
- The Art of Fuzzing – Slides and Demos | SEC Consult
- FuzzySecurity | Tutorials
- fuzzdb - Project Hosting on Google Code
- Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
- EvolutionaryKernelFuzzing/Evolutionary Kernel Fuzzing-BH2017-rjohnson-FINAL.pdf
- xoreaxeaxeax/sandsifter: The x86 processor fuzzer
-
- BASICS-LINUX_EXP
- Search · SLAE
- linux-kernel-exploitation: A bunch of links related to Linux kernel exploitation
- xairy/kernel-exploits: A bunch of proof-of-concept exploits for the Linux kernel
- raminfp/Understanding_Linux_Kernel_Vulnerability: Understanding Linux Kernel Vulnerability
- Category:SELinux - Gentoo Wiki
-
Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.
-
Metasploit exploit development - The series Par... | Rapid7 Community and Blog
-
Windows Exploit Development - Part 1: The Basics - Security SiftSecurity Sift
-
Hack the virtual memory: the stack, registers and assembly code - Holberton-Very BAISC
-
FAQ: How to find vulnerabilities? - gynvael.coldwind//vx.log
-
Ask HN: What's the prerequisite to become an exploit developer? | Hacker News
-
Best books, tutorials and courses to learn about exploit development
-
how2heap: A repository for learning various heap exploitation techniques.
-
- WCry/WanaCry Ransomware Technical Analysis | Endgame
- CVE-2017-0143 MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption | Rapid7
- SMB Exploited: WannaCry Use of "EternalBlue" « Threat Research Blog | FireEye Inc
- An Analysis of the WannaCry Ransomware Outbreak | McAfee Blogs
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0144
- EternalBlue_RiskSense_Analysis-1.2.pdf
- worawit/MS17-010: MS17-010
-
hacksysteam/HackSysExtremeVulnerableDriver: HackSys Extreme Vulnerable Windows Driver
-
Introduction to Binary Exploitation · DavidBrosnan/Blog_articles Wiki
-
Binary Hardening Measures (ASLR, NX, etc.) · TechSecCTF/CTF-pwn-tips Wiki
-
SecWiki/windows-kernel-exploits: windows-kernel-exploits Windows平台提权漏洞集合
-
-
- Network Protocols – For anyone who knows a programming language
- Socket Programming in Python
- Network – Page 2 – Pentest Blog
- MitM « Null Byte :: WonderHowTo
- saminiir/level-ip: A hacker's userspace TCP/IP stack
- Offensive Network Security -- Lectures
- Free Haven's Selected Papers in Anonymity
- ───────────TOOLS/TUTS
- Cheatsheets
- awesome-honeypots
- awesome-pcaptools: area to process network traces
- Chan9390/Awesome-MitM: Curated List of MitM frameworks on GitHub
- Network Security Labs
- cea-sec/ivre: Network recon framework.
- Usage — Scapy 2.3.3-dev documentation
- Introduction — Scapy 2.3.3-dev documentation
- A tcpdump Tutorial and Primer with Examples
- How to Decrypt SSL traffic using Wireshark – Haxf4rall
- Intrusion Detection: Snort, Base, MySQL, And Apache2 On Ubuntu 7.10 (Gutsy Gibbon)
- Using Gathering Information Tools Through TOR Network
- Security Onion - YouTube - YouTube
-
-
- The Newest Version of Script HT-WPS Breaker for Offline WPS Attack . - Page 1
- [TOOL] Pixiewps: pixie dust attack tool - Page 1
- [TUT] WPS CRACKING [TUT] - Page 1
- Legion| Default WPS Pin Database - Page 1
- Binary/Decimal/Hexadecimal Converter
- WPS Pixie Dust Attack (Offline WPS Attack)
- legion| community contribution WPS (Please contribute) - Page 1
-
INDEX: Complete collection of wireless manipulation, attacks, tools & guidance - Page 1
-
WIFI section top threads ** Read before posting LQ ** - Page 1
-
[Tutorial]Things to know before even starting with wifi hacking [Notorious] - Page 1
-
802.11 security. wi-fi protected access and 802.11i :: Networking :: eTutorials.org
-
Cracking Your Hashes & .cap files (WPA/WPA2) ~ TUT to DIY Included - Page 1
-
[NEW] Post .CAP & .HCCAP Files Here For Cracking!! HANDSHAKE THREAD V2 - Page 1
-
- edelahozuah/awesome-wifi-security: A collection of awesome resources related to 802.11 security, tools and other things
- 0x90/wifi-arsenal: WiFi arsenal
- Default Password List
- FruityWiFi
- xdavidhu/mitmAP: 📡 A python program to create a fake AP and sniff data.
- WPA2-HalfHandshake-Crack/wifihacking.md at master · dxa4481/WPA2-HalfHandshake-Crack
- dxa4481/WPA2-HalfHandshake-Crack: This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.
- brannondorsey/wifi-cracking: Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat 🖧
- brannondorsey/mitm-router: ☠ Man-in-the-middle wireless access point inside a docker container 🐳
-
- Awesome Python
- dloss/python-pentest-tools: Python tools for penetration testers
- svaksha/pythonidae: Curated decibans of scientific programming resources in Python.
- rasbt/python_reference: Useful functions, tutorials, and other Python-related things
- kirang89/pycrumbs: Bits and bytes of Python from the Internet
-
-
-
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
-
Internet Research, Anti-Phishing and PCI Security Services | Netcraft
-
Online Penetration Testing Tools | Free Security Ethical Hacking Tools by Security Audit Systems
-
HakTip: NMap - The Network Mapper for Gurus - YouTube - YouTube
-
HakTip: Netcat - Network Port Scanning, File Transfers, and More! - YouTube - YouTube
-
- Metasploit Postgres Setup - FedoraProject
- Metasploit | Rapid7 Community and Blog
- Metasploit Documentation, Help and Support | SecurityStreet
- Metasploit Unleashed
- Metasploit Basics « Null Byte :: WonderHowTo
- Metasploitable Search Results « WonderHowTo
- Metasploit - Wikibooks, open books for an open world
- Home · rapid7/metasploit-framework Wiki
- Meterpreter · rapid7/metasploit-framework Wiki
-
- Basic Linux Privilege Escalation
- Privilege Escalation | Penetration Testing Lab
- Windows Privilege Escalation Methods for Pentesters – Pentest Blog
- FuzzySecurity | Windows Privilege Escalation Fundamentals
- Attack and Defend: Linux Privilege Escalation Techniques of 2016
- Encyclopaedia Of Windows Privilege Escalation - Brett Moore - YouTube
-
- Dirk Loss: Online Tools
- Online tools for developersWidgets for websites, blogs, web applications
- SecTools.Org Top Network Security Tools
- Security Tools | Penetration Testing and Security Tools
- The Official ROOTCON Blog: Introducing 35 Pentesting Tools Used for Web Vulnerability Assessment
- Tools | pentestmonkey
- Tools | SOLDIERX.COM
- ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects » Tools
- vulnerable web application Archives - Darknet - The Darkside
-
[BHPEN] Top Learning Resources For Becoming a Pentester - Page 1
-
Resource: Pentesting Wiki by Nicole Lamoureux - resources, tools, peerlyst wiki | Peerlyst
-
-
-
- The State of Qualcomm's Modems - WTR1605 and MDM9x25
- BlackHat_DC_2011_Avraham_ARM Exploitation-wp.2.0.pdf
- iadgov/Maplesyrup: Assesses CPU security of embedded devices. iadgov
- jtagsploitation/Jtagsploitation.pdf at master · syncsrc/jtagsploitation
- DVAR - Damn Vulnerable ARM Router | The Exploit Laboratory
-
- Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 1)
- Project Zero: Over The Air: Exploiting Broadcom’s Wi-Fi Stack (Part 2)
- Project Zero: Over The Air - Vol. 2, Pt. 1: Exploiting The Wi-Fi Stack on Apple Devices
- Project Zero: Over The Air - Vol. 2, Pt. 2: Exploiting The Wi-Fi Stack on Apple Devices
- Project Zero: Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices
-
- LoRa Network | LoRaWAN Architecture | Radio-Electronics.Com
- Security - The Things Network Wiki
- LoRaWAN security vulnerabilities exposed
- Notes on LoRaWAN security – Orne Brocaar – Medium
- Security of LoRaWAN - Network and Routing - The Things Network
- LoRa Security Building a Secure LoRa Solution
- LoRaWAN: Vulnerability Analysis and Practical Exploitation - Google Drive
- LPWAN-Feature-Comparison-Sheet1-7.pdf
- dmahony/Lora-Chat-Device: Using cheap LoRa wireless modules to chat over long distances.
-
disassembly - Knowledge about CPU hardware - Reverse Engineering Stack Exchange
-
[Wiki] Your Complete, Un-budgeted Toolkit - Hardware - 0x00sec - The Home of the Hacker
-
eik00d/CANToolz: CANToolz - framework for black-box CAN network analysis
-
Cr4sh/s6_pcie_microblaze: PCI Express DIY hacking toolkit for Xilinx SP605
-
gjyoung1974/simatalla: A Hardware Security Module Simulator. HSM Simulator Atalla Simulator
-
HQarroum/awesome-iot: A curated list of awesome Internet of Things projects and resources.
-
BastilleResearch/mousejack: MouseJack device discovery and research tools
-
-
-
KitPloit - PenTest Tools for your Security Arsenal!: Android
-
-
- Cracking and sniffing GSM with a RTL-SDR | Low-cost hardware and free software
- Open Security Research: Getting Started with GNU Radio and RTL-SDR (on Backtrack)
- On HSPA+ and 64QAM support in 3GPP Release 7 - This Just In: HP Veer 4G for AT&T
- QPSK, 16QAM, 64QAM, and HSPA+ - HP Veer 4G Review - Getting Us Excited for Pre 3
- gsm – Going on my way…
- RF Wireless Downloads Page
- rtl-sdr Tutorial
- All - RTLSDR.com | RTLSDR.com
- Great Scott Gadgets - Software Defined Radio with HackRF
- Home · mossmann/hackrf Wiki
- Software Defined Radio with HackRF (Michael Ossmann) - YouTube
- Software defined radio (SDR) - YouTube
- Hak5: Intro to Software Defined Radio (SDR) - YouTube
- Adriano Condro - YouTube - YouTube
- Christopher Malau - YouTube - YouTube
- Software Defined Radio - MEGA LIST- YouTube
- ─────────── repos
- NSA ANT catalog - Wikipedia, the free encyclopedia
- CellularPrivacy/Android-IMSI-Catcher-Detector: AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!
- Oros42/IMSI-catcher: This program show you IMSI numbers of cellphones around you.
- jopohl/urh: Universal Radio Hacker: investigate wireless protocols like a boss
- Salamandra Spy Microphone Detection Tool
- Home · ComThings/PandwaRF Wiki
-
Download & Streaming : Moving Image Archive : Internet Archive
-
Overview - Mobile (in)Security - Open Source Mobile Communications
-
* [Positive Technologies - learn and secure : telecom](http://blog.ptsecurity.com/search/label/telecom)
* [What is a Stingray - How to Protect Your Phone Data](http://imsicatcher.org/what-is-a-stingray/)
* [Search · GSM security](https://github.com/search?o=desc&q=GSM+security&s=stars&type=Repositories&utf8=%E2%9C%93)
* [Search · LTE security](https://github.com/search?utf8=%E2%9C%93&q=LTE+security&type=)
* [ernw/ss7MAPer: SS7 MAP (pen-)testing toolkit](https://github.com/ernw/ss7MAPer#ss7maper)
* [airgap | Advanced Cyber-Security Research Lab](http://cyber.bgu.ac.il/advanced-cyber/airgap)
* [GSM - Overview](https://www.tutorialspoint.com/gsm/gsm_overview.htm)
* [LTE Overview](https://www.tutorialspoint.com/lte/lte_overview.htm)
* [Communication Systems/Antennas - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/Communication_Systems/Antennas#Antennas)
* [Daniel Davidson - DeepSec](https://www.youtube.com/user/xXRedD3athXx/playlists)
* [media.ccc.de - YouTube - YouTube](https://www.youtube.com/user/mediacccde/playlists)
* [media.ccc.de - Search for "osmocon"](https://media.ccc.de/search/?q=osmocon)
* [media.ccc.de - Security & Hacking](https://media.ccc.de/tags/Security%20&%20Hacking)
-
-
- Aniscartujo Secure Encrypted Web Proxy - Watch videos @ YouTube & MySpace
- Anonymous Internet Proxy Server for Online Anonymization
- Online Anonymizer Proxy
- FREE PROXY servers: download free proxy lists, links, detailed proxy FAQ
- Proxy List | Sorted by anonymity type #1
- List of working skype resolvers - Page 1
- Sites to get Proxies Free - Page 1
-
- Receive SMS Online for FREE and with NO Registration
- Receive SMS Online | Free SMS | SMS Online
- Receive SMS Online
- Receive SMS Online | Send SMS Online | SMS to Email - SELLAITE
- Receive SMS Online for FREE - UK,Romania,USA,Spain,France,Germany,Russia
- SMS Receive Free | Temporary SMS and Disposable Numbers
-
- Business Profiles and Company Information | ZoomInfo.com
- Complete List of Websites For Doxing - Page 1
- Find People, Lookup Phone Numbers, Run Background Checks, Access Public Records | USSearch.com
- Findandtrace.com | Trace Mobile number cell phone location, landline, vehicle, std code, pincode
- Free People Search Engine | ZabaSearch
- Lullar Com - Profile Search by Email
- Namechk | Username & Domain Search
- Network Intelligence Gathering - InfoSec Institute
- Pipl - People Search
- Spokeo People Search | White Pages | Find People
-
A curated list of CTF frameworks, libraries, resources and softwares
-
- Google Android : List of security vulnerabilities
- Microsoft Windows 8.1 : List of security vulnerabilities
- Vulnerability distribution of cve security vulnerabilities by types
- Vulnerability Database 🛡
- re-pronin/Awesome-Vulnerability-Research: 🦄 A curated list of the awesome resources about the Vulnerability Research