{"id":57474,"url":"https://github.com/mykings/security-study-tutorial","name":"security-study-tutorial","description":"Summary of online learning materials","projects_count":237,"last_synced_at":"2026-04-18T09:00:27.074Z","repository":{"id":215885587,"uuid":"171778902","full_name":"MyKings/security-study-tutorial","owner":"MyKings","description":"Summary of online learning materials","archived":false,"fork":false,"pushed_at":"2019-11-29T07:58:24.000Z","size":521,"stargazers_count":91,"open_issues_count":1,"forks_count":33,"subscribers_count":7,"default_branch":"master","last_synced_at":"2026-04-03T12:46:21.919Z","etag":null,"topics":["apt","awesome-list","checklist","fuzzing","pager","pentesting","security-tutorial","web-security-research"],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/MyKings.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2019-02-21T01:36:14.000Z","updated_at":"2026-02-17T18:01:52.000Z","dependencies_parsed_at":null,"dependency_job_id":"c55fc4fe-458a-4714-b4d0-d6f2c7a3dc9f","html_url":"https://github.com/MyKings/security-study-tutorial","commit_stats":null,"previous_names":["mykings/security-study-tutorial"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/MyKings/security-study-tutorial","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MyKings%2Fsecurity-study-tutorial","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MyKings%2Fsecurity-study-tutorial/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MyKings%2Fsecurity-study-tutorial/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MyKings%2Fsecurity-study-tutorial/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/MyKings","download_url":"https://codeload.github.com/MyKings/security-study-tutorial/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/MyKings%2Fsecurity-study-tutorial/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31962889,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-18T00:39:45.007Z","status":"online","status_checked_at":"2026-04-18T02:00:07.018Z","response_time":103,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"readme":"# security-study-tutorial\nSummary of online learning materials\n\n## Awesome\n\n* https://github.com/vinta/awesome-python\n* https://github.com/Hack-with-Github/Awesome-Hacking\n* https://github.com/hslatman/awesome-threat-intelligence\n* https://github.com/bayandin/awesome-awesomeness\n* https://github.com/enaqx/awesome-pentest\n* https://github.com/carpedm20/awesome-hacking\n* https://github.com/sbilly/awesome-security\n* https://github.com/ashishb/android-security-awesome\n* https://github.com/paragonie/awesome-appsec\n* https://github.com/PaulSec/awesome-sec-talks\n* https://github.com/meirwah/awesome-incident-response\n* https://github.com/secfigo/Awesome-Fuzzing\n* https://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n* https://github.com/s0md3v/AwesomeXSS\n* https://github.com/qazbnm456/awesome-cve-poc\n* https://github.com/djadmin/awesome-bug-bounty\n* https://github.com/toniblyx/my-arsenal-of-aws-security-tools\n* https://github.com/jaredthecoder/awesome-vehicle-security\n* https://github.com/joe-shenouda/awesome-cyber-skills\n* https://github.com/nebgnahz/awesome-iot-hacks\n* https://github.com/jonathandion/awesome-emails\n* https://github.com/FabioBaroni/awesome-exploit-development\n* https://github.com/Escapingbug/awesome-browser-exploit\n* https://github.com/snoopysecurity/awesome-burp-extensions\n* https://github.com/Hack-with-Github/Awesome-Security-Gists\n* https://github.com/InQuest/awesome-yara\n* https://github.com/dhaval17/awsome-security-write-ups-and-POCs\n\n## Checklist\n\n* https://github.com/b-mueller/android_app_security_checklist\n* https://github.com/shieldfy/API-Security-Checklist\n* https://github.com/SecarmaLabs/IoTChecklist\n* https://github.com/netbiosX/Checklists\n* https://github.com/brunofacca/zen-rails-security-checklist\n* https://github.com/privacyradius/gdpr-checklist\n\n\n## Developer\n\n* [Security Guide for Developers](https://github.com/FallibleInc/security-guide-for-developers)\n* https://github.com/ExpLife0011/awesome-windows-kernel-security-development\n* https://github.com/jaywcjlove/awesome-mac\n* [分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴](https://github.com/ym2011/SecurityManagement)\n* https://github.com/riusksk/secbook\n* https://github.com/bayandin/awesome-awesomeness\n* [常用服务器、数据库、中间件安全配置基线](https://github.com/re4lity/Benchmarks)\n* [https://github.com/NB-STAR/Security-Operation](https://github.com/NB-STAR/Security-Operation)\n* https://github.com/EbookFoundation/free-programming-books\n* [Machine Learning Crash Course](https://developers.google.com/machine-learning/crash-course/)\n* https://github.com/yosriady/api-development-tools\n\n\n## Pentest\n\n* [Payloads All The Things](https://github.com/swisskyrepo/PayloadsAllTheThings)\n* [1 – INTRODUCTION TO CYBER SECURITY](https://www.prismacsi.com/en/1-introduction-to-cyber-security/)\n* [2 – PASSIVE INFORMATION GATHERING(OSINT)](https://www.prismacsi.com/en/2-passive-information-gathering-osint/)\n* [3 – ACTIVE INFORMATION GATHERING](https://www.prismacsi.com/en/3-active-information-gathering/)\n* [4 – VULNERABILITY DETECTION](https://www.prismacsi.com/en/4-vulnerability-detection/)\n* [5 – EXPLOITATION](https://www.prismacsi.com/en/5-exploitation/)\n* https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project\n* [OSINT Resources for 2019](https://medium.com/@micallst/osint-resources-for-2019-b15d55187c3f)\n* [CheatSheetSeries](https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets)\n* [Whitepaper: HTTP Security Headers and How They Work](https://www.netsparker.com/whitepaper-http-security-headers/)\n* [webkit-bugmap](https://bugmap.gitlab.io/webkit/)\n* [Webkit Exploitation Tutorial](https://www.auxy.xyz/tutorial/Webkit-Exp-Tutorial/)\n* [A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more.](https://github.com/trimstray/the-book-of-secret-knowledge)\n* https://github.com/danielmiessler/SecLists\n* [CVE Details](https://www.cvedetails.com/)\n* [A collected list of awesome security talks](https://github.com/PaulSec/awesome-sec-talks)\n* [Curated list of public penetration test reports released by several consulting firms and academic security groups](https://github.com/juliocesarfort/public-pentesting-reports)\n* [Web-Security-Learning](https://github.com/CHYbeta/Web-Security-Learning)\n* [PENTEST-WIKI is a free online security knowledge library for pentesters / researchers](https://github.com/nixawk/pentest-wiki)\n* [Official Black Hat Arsenal Security Tools Repository ](https://github.com/toolswatch/blackhat-arsenal-tools/tree/master/code_assessment)\n* [Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet](https://github.com/OlivierLaflamme/Cheatsheet-God)\n* [Proof-of-concept codes created as part of security research done by Google Security Team.](https://github.com/google/security-research-pocs)\n* [Security Research from the Microsoft Security Response Center (MSRC)](https://github.com/Microsoft/MSRC-Security-Research)\n* [ Collection of IT whitepapers, presentations, pdfs; hacking, web app security, db, reverse engineering and more; EN/PL.](https://github.com/trimstray/technical-whitepapers)\n* https://github.com/Micropoor/Micro8\n* [RedTeam资料收集整理](https://github.com/jeansgit/RedTeam)\n* [Great security list for fun and profit](https://github.com/zbetcheckin/Security_list)\n* https://github.com/ztgrace/red_team_telemetry\n* [Penetration tests cases, resources and guidelines.](https://github.com/Voorivex/pentest-guide)\n* [Attack and defend active directory using modern post exploitation adversary tradecraft activity](https://github.com/infosecn1nja/AD-Attack-Defense)\n* https://github.com/tiancode/learn-hacking\n* https://github.com/rewardone/OSCPRepo\n* https://github.com/redcanaryco/atomic-red-team\n* [HTA encryption tool for RedTeams](https://github.com/nccgroup/demiguise)\n* https://github.com/infosecn1nja/Red-Teaming-Toolkit\n* [Red Team Field Manual](https://github.com/Agahlot/RTFM)\n* [The Shadow Brokers \"Lost In Translation\" leak](https://github.com/misterch0c/shadowbroker)\n* [Decrypted content of eqgrp-auction-file.tar.xz](https://github.com/x0rz/EQGRP)\n* https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki\n* [The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.](https://github.com/RhinoSecurityLabs/pacu)\n* https://github.com/Ridter/Intranet_Penetration_Tips\n* [渗透测试、红队攻击、网络安全资源大集合](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE)\n* [Awesome Cybersecurity Blue Team - 蓝队防御相关的工具、文章资料收集](https://github.com/meitar/awesome-cybersecurity-blueteam)\n\n## Mobile Application Security\n\n* https://gbhackers.com/mobile-application-penetration-testing/\n* [安卓内核提权漏洞分析](https://github.com/tangsilian/android-vuln)\n\n## Malware\n\n* [Bypass EDR’s memory protection, introduction to hooking](https://movaxbx.ru/2019/02/19/bypass-edrs-memory-protection-introduction-to-hooking/)\n* [Analyzing the Windows LNK file attack method](https://dexters-lab.net/2019/02/16/analyzing-the-windows-lnk-file-attack-method/)\n* [委内瑞拉关于人道主义援助运动的伪造域名钓鱼活动分析](https://securelist.com/dns-manipulation-in-venezuela/89592/)\n* [对 Lazarus 下载者的简要分析](https://medium.com/emptyregisters/lazarus-downloader-brief-analy-17875f342d96)\n* [Various public documents, whitepapers and articles about APT campaigns](https://github.com/kbandla/APTnotes)\n* [Personal compilation of APT malware from whitepaper releases, documents and own research](https://github.com/sapphirex00/Threat-Hunting)\n* [Malware Capture Facility Project](https://www.stratosphereips.org/datasets-malware)\n* https://github.com/rootm0s/Injectors\n* https://github.com/rshipp/awesome-malware-analysis\n* [对 Chrome 恶意扩展应用的研究](https://posts.specterops.io/no-place-like-chrome-122e500e421f)\n* [ 分析 Gootkit 银行木马]( http://www.certego.net/en/news/malware-tales-gootkit/)\n* [ 二进制分析研究会议 BAR 2019 资源发布]( https://ruoyuwang.me/bar2019/)\n* [GLOBAL ATM MALWARE WALL](http://atm.cybercrime-tracker.net/index.php)\n* [Feed RSS with the latest samples:](http://atm.cybercrime-tracker.net/wget.php)\n* https://maskop9.tech/index.php/2019/01/30/analysis-of-netwiredrc-trojan/\n* [Slackor - Go 语言写的一个 C\u0026C 服务器，基于 Slack](https://github.com/Coalfire-Research/Slackor)\n* [卡巴斯基对影响全球多个地区的 Riltok 手机银行木马的分析](https://securelist.com/mobile-banker-riltok/91374/)\n* [Metamorfo 银行木马利用 Avast 反病毒软件的可执行文件隐藏自己](https://blog.ensilo.com/metamorfo-avast-abuser)\n* [列举了近些年知名的 APT 组织名单](https://www.freebuf.com/articles/network/208449.html)\n* [腾讯安全御见发布《APT 2019年上半年研究报告》](https://s.tencent.com/research/report/762.html)\n* [LNK 快捷方式文件在恶意代码攻击方面的应用](https://bitofhex.com/2019/07/15/deriving-intelligence-from-lnk-files)\n* [针对以色列某未知 APT 恶意样本的分析报告](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Israel/APT/Unknown/26-08-19/Malware%20analysis%2026-08-19.md)\n* [此文作者分析恶意软件Malware过程系列](https://poxyran.github.io/poxyblog/src/pages/22-10-2019-unpacking-malware-series-maze-ransomware.html)\n* [NSA 发了一份对俄罗斯 Turla APT 组织的分析文档(https://media.defense.gov/2019/Oct/18/2002197242/-1/-1/0/NSA_CSA_TURLA_20191021%20VER%203%20-%20COPY.PDF)\n\n\n## Fuzzing\n\n* [(Guided-)fuzzing for JavaScript engines](https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf)\n* [What the Fuzz](https://labs.mwrinfosecurity.com/blog/what-the-fuzz/)\n* [OSS-Fuzz - continuous fuzzing of open source software](https://github.com/google/oss-fuzz)\n* [Scalable fuzzing infrastructure.](https://github.com/google/clusterfuzz)\n* [DOM fuzzer](https://github.com/googleprojectzero/domato)\n* https://github.com/wmliang/pe-afl\n* [Web application fuzzer](https://github.com/xmendez/wfuzz)\n* https://github.com/fuzzdb-project/fuzzdb\n* [NSA finest tool](https://github.com/fuzzbunch/fuzzbunch)\n* https://github.com/bin2415/fuzzing_paper\n* [Potentially dangerous files](https://github.com/Bo0oM/fuzz.txt)\n* [Fuzzing Browsers](https://github.com/RootUp/BFuzz)\n* [This module provides a Python wrapper for interacting with fuzzers, such as AFL](https://github.com/angr/phuzzer)\n* [从零开始用honggfuzz fuzz VLC的全过程分享](https://www.pentestpartners.com/security-blog/double-free-rce-in-vlc-a-honggfuzz-how-to/)\n* [Fuzzing] [PDF] https://www.dimva2019.org/wp-content/uploads/sites/31/2019/06/190620-DIMVA-keynote-FP.pdf: \n* [RetroWrite: 让闭源binary支持AFL和ASAN的Binary rewriting 工具](https://github.com/HexHive/retrowrite/blob/master/docker)\n* [MOPT：对fuzzer变异策略的选择分布进行优化的工作，paper发表在Usenix Security‘19](https://nesa.zju.edu.cn/download/MOPT_Optimize%20Mutation%20Scheduling%20for%20Fuzzers.pdf)\n* [用AFL-Unicorn来fuzz内核，集合了afl的覆盖率和unicorn的局部模拟执行](https://github.com/fgsect/unicorefuzz)\n* [JANUS：将AFL和Syzkaller结合在一起fuzz文件系统的工作](https://r3xnation.wordpress.com/2019/07/06/fuzzing-file-systems-via-two-dimensional-input-space-exploration-summary/)\n* [Mozilla的浏览器fuzz框架，类似于Google的clusterfuzz](https://blog.mozilla.org/security/2019/07/10/grizzly/)\n* [利用 AFL Fuzz statzone DNS Zone Parsers](https://www.cambus.net/fuzzing-dns-zone-parsers/)\n* [基于AFL对Linux内核模糊测试的过程详述](https://blog.cloudflare.com/a-gentle-introduction-to-linux-kernel-fuzzing/)\n* [作者发现CVE-2019-13504, CVE-2019-13503的过程，同时强调了在软件开发周期集成libFuzzer对API进行fuzz的重要性](https://fuzzit.dev/2019/07/11/discovering-cve-2019-13504-cve-2019-13503-and-the-importance-of-api-fuzzing/)\n* [FUDGE:一个自动化生成Fuzz Driver的工作，核心思路是通过分析lib在软件中的正常调用情况来生成Fuzz Driver，部分Fuzz Driver已经加入到OSS-Fuzz项目中](https://ai.google/research/pubs/pub48314)\n* [Adobe Font Development Kit for OpenType 套件相关的漏洞分析](https://github.com/xinali/AfdkoFuzz/)\n* [复旦白泽战队对《Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations》 Paper 的解读](https://zhuanlan.zhihu.com/p/74947208)\n* [Linux 内核 Fuzz 的入门教程](https://buff.ly/2LKEIpO)\n* [现有USB Fuzzing技术的总结 ](https://davejingtian.org/2019/07/17/usb-fuzzing-a-usb-perspective/)\n* [从源码层面对 Google honggfuzz Fuzz 原理的分析](https://www.anquanke.com/post/id/181936)\n* [lain - 微软这两天开源了一个 Rust 语言写的 Fuzz 框架](https://github.com/microsoft/lain)\n* [Fuzz闭源PDF阅读器时如何判断文件渲染结束以便关闭软件以及如何精简种子文件的一些方法](https://hubs.ly/H0k0Rt60)\n* [之前推过AFL-Unicorn项目可以让AFL fuzz能用Unicorn模拟的闭源binary，这个uniFuzzer项目很类似，是要把libfuzzer应用在闭源binary上](https://github.com/rk700/uniFuzzer/)\n* [用AFL Fuzz OP-TEE的系统调用 ](https://github.com/Riscure/optee_fuzzer)\n* [平安科技银河安全实验室基于Unicorn和LibFuzzer实现了一个针对闭源可执行文件的fuzzer。借助Unicorn在x86架构上模拟执行arm指令，并通过Unicorn能hook基本块的功能获取代码覆盖率，从而反馈给libfuzzer实现对目标函数的fuzz。优势在于可以借助Unicorn在x86架构上fuzz闭源的可执行文件。缺点在于要针对目标架构和系统进行各种外部库、系统调用的适配，因此不太适合大型的目标。根据文章看来，其思路也是针对iot设备上的可执行文件进行fuzz。文章最后还开源概念验证代码。](https://galaxylab.com.cn/%e5%9f%ba%e4%ba%8eunicorn%e5%92%8clibfuzzer%e7%9a%84%e6%a8%a1%e6%8b%9f%e6%89%a7%e8%a1%8cfuzzing/)\n* [nccgroup团队基于Sulley构造的一个对网络协议进行模糊测试的工具。](https://github.com/nccgroup/fuzzowski)\n* [使用苹果自带的LLDB Script fuzz macOS系统内核 – R3dF09](https://i.blackhat.com/USA-19/Thursday/us-19-Lilang-Debug-For-Bug-Crack-And-Hack-Apple-Core-By-Itself-Fun-And-Profit-To-Debug-And-Fuzz-Apple-Kernel-By-LLDB-Script.pdf)\n* [波鸿鲁尔大学关于如何在二进制程序中对抗 Fuzz 自动化发现漏洞的研究](https://github.com/RUB-SysSec/antifuzz)\n* [Fortinet 如何利用 Fuzz 的方法发现 Office Embedded Open Type (EOT) 的漏洞 ](https://www.fortinet.com/blog/threat-research/a-14-day-journey-through-embedded-open-type-font-fuzzing.html)\n* [湾区一个关于Fuzzing的workshop的分享内容，三个议题涵盖了c/c++，web应用等不同目标的Fuzzing技巧 ](https://github.com/MotherFuzzers/meetups/blob/master/README.md)\n* [用WinAFL Fuzz Windows Binary的实践分享，新颖之处是作者利用了内存访问的热图来精简输入种子大小 ](https://sec-consult.com/en/blog/2017/09/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/)\n* [Google 建了一个 Fuzzing Repo，用来放 Fuzzing 相关的文档、教程等资源 ](https://github.com/google/fuzzing)\n* [lokihardt 在 jsc 编译器中 fuzz 出来的新漏洞](https://bugs.chromium.org/p/project-zero/issues/detail?id=1876)\n* [伦敦帝国学院研究团队通过 Fuzzing 方式对编译器 Bug 的研究报告](https://srg.doc.ic.ac.uk/projects/compiler-bugs)\n* [针对 Java 语言的基于覆盖率的 Fuzz 框架 ](https://github.com/rohanpadhye/jqf)\n* [Fragscapy - 通过协议 Fuzz 的方法探测 IDS/防火墙检测规则的漏洞](https://blog.amossys.fr/fragscapy-fuzzing-protocols-to-evade-firewalls.html)\n* [gramfuzz - 通过定义语法规则生成 Fuzz 测试样本数据的工具](https://github.com/d0c-s4vage/gramfuzz)\n* [Fuzz中一个常见问题是Checksum或者Magic Value，以前的方法大多是通过符号执行的方法去求解约束，但这样的方法比较复杂。Red­queen这篇文章提出了一种更为简单的思路，即基于VMI来获取比较指令或者函数调用指令的参数，用这个参数来指导变异。具体实现依赖Intel PT。](https://github.com/RUB-SysSec/redqueen)\n* [Jsfuzz: coverage-guided fuzz testing for Javascript ](https://github.com/fuzzitdev/jsfuzz)\n* [Dhiraj Mishra 在 PHDays9 会议 AFL Fuzz Workshop 的 PPT](https://github.com/RootUp/PHDays9)\n* [Fuzz 方向的几篇 Paper 的解读 ](https://github.com/bsauce/Some-Papers-About-Fuzzing)\n* [基于 Frida 实现的 In-Memory Android API Fuzzer](https://github.com/andreafioraldi/frida-qbdi-fuzzer)\n\n\n## Browser\n \n * [An updated collection of resources targeting browser-exploitation.](https://github.com/m1ghtym0/browser-pwn)\n * [A collection of JavaScript engine CVEs with PoCs](https://github.com/tunz/js-vuln-db)\n * [JavaScript engine fundamentals: the good, the bad, and the ugly](https://slidr.io/bmeurer/javascript-engine-fundamentals-the-good-the-bad-and-the-ugly#1) \n * [Bypassing Chrome’s CSP with Link Preloading](https://ioactive.com/bypassing-chromes-csp-with-link-preloading/)\n * [Triaging the exploitability of IE/EDGE crashes](https://movaxbx.ru/2019/02/20/triaging-the-exploitability-of-ie-edge-crashes/)\n * [Firefox 发布 68 版本，修复 21 个漏洞](https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-9811)\n* [Chrome 更新 76.0.3809.87 版本，修复 43 个安全漏洞](https://chromereleases.googleblog.com/2019/07/stable-channel-update-for-desktop_30.html)\n* [一个 Edge UXSS 漏洞分析](https://leucosite.com/Microsoft-Edge-uXSS/?q)\n\n## Deep Net\n\n* [All You Need to Know About Deep Learning - A kick-starter](https://github.com/machinelearningmindset/deep-learning-ocean)\n* [OnionScan is a free and open source tool for investigating the Dark Web.](https://github.com/s-rah/onionscan)\n\n## Operating System\n\n* https://github.com/drduh/macOS-Security-and-Privacy-Guide\n* [How-To-Secure-A-Linux-Server](https://github.com/imthenachoman/How-To-Secure-A-Linux-Server)\n* [A practical guide to advanced Linux security in production environments](https://github.com/trimstray/the-practical-linux-hardening-guide)\n* https://www.itsecdb.com/\n* [Vulnerability scanner for Linux/FreeBSD, agentless, written in Go](https://github.com/future-architect/vuls)\n* [some learning notes about Linux Security](https://github.com/JnuSimba/LinuxSecNotes)\n* [API samples for the Universal Windows Platform.](https://github.com/Microsoft/Windows-universal-samples)\n* [Set of tools to analyze and attack Windows sandboxes.](https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools)\n* https://github.com/trimstray/test-your-sysadmin-skills\n* https://github.com/wstart/DB_BaseLine\n* [Windows memory hacking library](https://github.com/DarthTon/Blackbone)\n* https://github.com/j00ru/windows-syscalls\n* https://github.com/zodiacon/WindowsInternals\n* https://github.com/GDSSecurity/Windows-Exploit-Suggester\n* https://github.com/EasyHook/EasyHook\n* [Bypass Windows Exploit Guard ASR （PPT）](https://github.com/sevagas/WindowsDefender_ASR_Bypass-OffensiveCon2019)\n* [Windows 中一些启动相关的注册表项介绍](http://www.hexacorn.com/blog/2019/02/23/beyond-good-ol-run-key-part-104/)\n\n## Blockchain\n\n* [Knowledge Base 慢雾安全团队知识库](https://github.com/slowmist/Knowledge-Base)\n* [SlowMist Vulnerability Research Advisories ](https://github.com/slowmist/papers)\n* https://github.com/knownsec/Ethereum-Smart-Contracts-Security-CheckList\n* https://github.com/bcosorg/whitepaper/blob/master/BCOS_Whitepaper.md\n* https://github.com/1522402210/BlockChain-Security-List\n* https://github.com/liuchengxu/blockchain-tutorial\n* https://github.com/dvf/blockchain\n\n## Security conference\n\n* [2019 Pass the SALT 会议的大部分议题 PPT 公开了](https://2019.pass-the-salt.org/schedule/)\n* [RuhrSec 2019 会议的视频公开了](https://www.ruhrsec.de/2019/videos.html)\n* [学术届 ACM ASIACCS 2019 会议的议题 PPT 都公开了](https://asiaccs2019.github.io/program.html)\n* [即将举办的 Black Hat USA 2019 大会值得关注的七大热点网络安全趋势](https://www.freebuf.com/news/207907.html)\n* [lack Hat USA 2019 会议上，微软宣布对于可以成功利用的 Azure 平台的 Exploit，微软最多可以奖励 30 万美金](https://threatpost.com/microsoft-lab-300k-working-azure-exploits/146938/)\n* [Nicolas Joly 在 BlackHat USA 2019 对 Outlook/Exchange 漏洞及利用的总结](https://i.blackhat.com/USA-19/Wednesday/us-19-Joly-Hunting-For-Bugs-Catching-Dragons.pdf)\n* [研究员 Maor Shwartz 在 BlackHat USA 2019 会议上对 0Day 市场买卖交易双方的介绍](http://i.blackhat.com/USA-19/Wednesday/us-19-Shwartz-Selling-0-Days-To-Governments-And-Offensive-Security-Companies.pdf)\n* [5G 通信网络的新漏洞，来自 BlackHat USA 2019](https://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks-wp.pdf)\n* [腾讯安全Blade Team在blackhat usa 2019 上关于利用WiFi漏洞RCE的细节公开了。 – freener0](https://i.blackhat.com/USA-19/Thursday/us-19-Pi-Exploiting-Qualcomm-WLAN-And-Modem-Over-The-Air-wp.pdf)\n* [来自 DEF CON 27 会议上针对 MikroTik RouterOS 系统的漏洞利用研究](https://medium.com/tenable-techblog/routeros-post-exploitation-784c08044790)\n* [BSides Canberra 2019 会议议题 “iOS 越狱需要什么？Hacking the iPhone: 2014 - 2019” 的视频](https://www.youtube.com/watch?v=31azOpD7DmI)\n* [来自 Kcon 2019 360 安全研究员的议题《如何去挖掘物联网环境中的高级恶意软件威胁》 ](https://drive.google.com/open?id=1H_NX2L3KebS9-f1oPS8IbVg9CfWuOj4U)\n* [KCon 2019 安全会议的议题 PPT 可以下载了](https://paper.seebug.org/1023/)\n* [HITB GSEC 2019 会议议题的 PPT 都公开了](https://gsec.hitb.org/materials/sg2019/)\n* [DerbyCon 会议 NCC Group 研究员关于 COM Hijacking 的议题](https://www.slideshare.net/DavidTulis1/com-hijacking-techniques-derbycon-2019)\n* [R2CON 2019 会议的议题 PPT 公开了](https://github.com/radareorg/r2con2019)\n* [Derbycon 2019 会议的视频上线了](http://bit.ly/302eUZM)\n* [Black Hat Europe 2019 会议议题列表（部分）公开了](http://ow.ly/cRPK30pyRHC)\n* [OSDFCon19 会议关于 Linux 操作系统取证分析的议题 PPT](https://github.com/ashemery/LinuxForensics)\n\n\n\n## Tools\n\n### SSH\n\n* https://github.com/ncsa/ssh-auditor\n* https://github.com/r3vn/punk.py\n* https://github.com/mthbernardes/sshLooter\n* https://github.com/ropnop/windows_sshagent_extract\n* https://github.com/arthepsy/ssh-audit\n* https://github.com/mozilla/ssh_scan\n* https://github.com/govolution/betterdefaultpasslist/blob/master/ssh.txt\n* https://hackertarget.com/ssh-examples-tunnels/\n\n### DNS\n\n* [In-depth DNS Enumeration and Network Mapping](https://github.com/caffix/amass)\n* [A DNS rebinding attack framework.](https://github.com/nccgroup/singularity)\n* [Knock Subdomain Scan](https://github.com/guelfoweb/knock)\n* https://github.com/iphelix/dnschef\n\n### Exploiter\n\n* https://github.com/offensive-security/exploitdb\n* [Automated Mass Exploiter](https://github.com/NullArray/AutoSploit)\n* [Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.](https://github.com/Coalfire-Research/Red-Baron)\n* [A bunch of links related to VMware escape exploits](https://github.com/xairy/vmware-exploitation)\n* [This contains common local exploits and enumeration scripts](https://github.com/AusJock/Privilege-Escalation)\n* [Windows Exploits](https://github.com/WindowsExploits/Exploits)\n* [windows-kernel-exploits Windows平台提权漏洞集合](https://github.com/SecWiki/windows-kernel-exploits)\n* [MS17-010](https://github.com/worawit/MS17-010)\n* https://github.com/akayn/PostExploits\n* https://github.com/smgorelik/Windows-RCE-exploits\n* [A Course on Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course)\n* https://github.com/Semmle/SecurityExploits\n* https://github.com/lukechilds/reverse-shell\n* https://github.com/klsfct/getshell\n* https://github.com/rootm0s/WinPwnage\n* https://github.com/51x/WHP\n* https://github.com/SecWiki/linux-kernel-exploits\n* https://github.com/hardenedlinux/linux-exploit-development-tutorial\n* https://github.com/Coalfire-Research/java-deserialization-exploits\n\n### OSINT\n\n* [People tracker on the Internet: OSINT analysis and research tool by Jose Pino](https://github.com/jofpin/trape)\n* [Email OSINT and password breach hunting.](https://github.com/khast3x/h8mail)\n* [Maintained collection of OSINT related resources. (All Free \u0026 Actionable)](https://github.com/Ph055a/OSINT-Collection)\n* [Incredibly fast crawler designed for OSINT.](https://github.com/s0md3v/Photon)\n* [OSINT Framework](https://github.com/lockfale/OSINT-Framework)\n* https://github.com/Moham3dRiahi/Th3inspector\n* https://github.com/jivoi/awesome-osint\n\n### Wordlist\n\n* https://github.com/RicterZ/genpAss\n* https://github.com/lavalamp-/password-lists\n* https://github.com/LandGrey/pydictor\n* https://github.com/bit4woo/passmaker\n* https://github.com/brannondorsey/PassGAN\n\n### Git\n\n* [Reconnaissance tool for GitHub organizations](https://github.com/michenriksen/gitrob)\n* [GitHub Sensitive Information Leakage Monitor Spider](https://github.com/0xbug/Hawkeye)\n* [Searches through git repositories for high entropy strings and secrets, digging deep into commit history](https://github.com/dxa4481/truffleHog)\n* [GitHub Sensitive Information Leakage](https://github.com/FeeiCN/GSIL)\n\n### Burpsuite\n\n * https://github.com/1N3/IntruderPayloads\n * https://github.com/vulnersCom/burp-vulners-scanner\n \n\n### IoT\n\n* http://va.ler.io/myfiles/dva/iot-rev-engineering.pdf\n* https://github.com/jaredthecoder/awesome-vehicle-security\n* https://github.com/V33RU/IoTSecurity101\n* https://github.com/schutzwerk/CANalyzat0r\n* https://github.com/w3h/icsmaster\n* https://github.com/xl7dev/ICSecurity\n* https://github.com/SecarmaLabs/IoTChecklist\n* https://github.com/mrmtwoj/0day-mikrotik\n* https://github.com/jiayy/android_vuln_poc-exp\n* https://github.com/advanced-threat-research/firmware-security-training\n* [Exploitation Framework for Embedded Devices](https://github.com/threat9/routersploit)\n* [Printer Exploitation Toolkit ](https://github.com/RUB-NDS/PRET)\n* [作者分析了一款IoT路由的安全性，从web到硬件进行了全面的漏洞挖掘和分析，值得一看](https://www.pentestpartners.com/security-blog/ewon-flexy-iot-router-a-deep-dive/)\n* [针对Arlo相机设备功能及安全性的一次深入分析](https://medium.com/tenable-techblog/an-analysis-of-arlo-6f1b691236b5)\n* [研究人员在 Orvibo 智能家居产品的开放数据库中发现了用户的用户名、密码、精确位置等隐私数据](https://www.vpnmentor.com/blog/report-orvibo-leak/)\n* [嵌入式与 IoT 安全方向的资料](https://github.com/fkie-cad/awesome-embedded-and-iot-security)\n* [Cyber-ITL 对来自 22 个厂商的近 5000 个版本的 IoT 固件的分析报告](https://cyber-itl.org/2019/08/26/iot-data-writeup.html)\n* [入门教程-如何探索网络摄像的漏洞（固件）](https://medium.com/@knownsec404team/getting-started-tutorial-how-to-explore-the-camera-vulnerability-firmware-c405e25ed177)\n\n\n### Traffic\n\n* [Malicious traffic detection system](https://github.com/stamparm/maltrail)\n\n### Honey \n\n* https://github.com/paralax/awesome-honeypots\n* https://github.com/ppacher/honeyssh\n* [Kippo - SSH Honeypot](https://github.com/desaster/kippo)\n* https://github.com/ysrc/yulong-hids\n\n### Hunter\n\n* https://github.com/SpiderLabs/Responder\n* https://github.com/Tencent/HaboMalHunter\n* https://github.com/sapphirex00/Threat-Hunting\n* https://github.com/kbandla/APTnotes\n* https://github.com/aptnotes/data\n* [APT \u0026 CyberCriminal Campaign Collection](https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections)\n* [Modlishka. Reverse Proxy. Phishing NG.](https://github.com/drk1wi/Modlishka)\n* [A toolset to make a system look as if it was the victim of an APT attack](https://github.com/NextronSystems/APTSimulator)\n* https://github.com/bit4woo/domain_hunter\n* https://github.com/mvelazc0/Oriana\n* [An informational repo about hunting for adversaries in your IT environment.](https://github.com/ThreatHuntingProject/ThreatHunting)\n* [The Hunting ELK](https://github.com/Cyb3rWard0g/HELK)\n* https://github.com/dafthack/MailSniper\n* https://github.com/threatexpress/domainhunter\n* https://github.com/A3sal0n/CyberThreatHunting\n* https://github.com/Cyb3rWard0g/ThreatHunter-Playbook\n\n\n\n### Scanner\n\n* [Web Application Security Scanner Framework](https://github.com/Arachni/arachni)\n* [Web path scanner](https://github.com/maurosoria/dirsearch)\n* [Fast and powerful SSL/TLS server scanning library.](https://github.com/nabla-c0d3/sslyze)\n* [Next generation web scanner](https://github.com/urbanadventurer/WhatWeb)\n* [A high performance offensive security tool for reconnaissance and vulnerability scanning](https://github.com/evyatarmeged/Raccoon)\n* [Docker security analysis \u0026 hacking tools](https://github.com/cr0hn/dockerscan)\n* [AIL framework - Analysis Information Leak framework](https://github.com/CIRCL/AIL-framework)\n* [Network Security Vulnerability Scanner](https://github.com/jeffzh3ng/Fuxi-Scanner)\n* [A fast and modular scanner for Tor exit relays.](https://github.com/NullHypothesis/exitmap)\n* [OpenVAS remote network security scanner](https://github.com/greenbone/openvas-scanner)\n* [Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架](https://github.com/WyAtu/Perun)\n* [Use ExpiredDomains.net and BlueCoat to find useful domains for red team.](https://github.com/t94j0/AIRMASTER)\n* [分布式web漏洞扫描](https://github.com/TideSec/WDScanner)\n* [Golang编写的开源POC检测框架](https://github.com/opensec-cn/kunpeng)\n* [ Weak password blasting of weak ports and integrated detection tools for unauthorized access.](https://github.com/aedoo/Allscanner)\n* [DeepSearch - Advanced Web Dir Scanner](https://github.com/m4ll0k/DeepSearch)\n* [Nmap Web Dashboard and Reporting](https://github.com/Rev3rseSecurity/WebMap)\n* [Fast CORS misconfiguration vulnerabilities scanner](https://github.com/chenjj/CORScanner)\n* [Web App Monitor](https://github.com/knownsec/wam)\n* https://github.com/joaomatosf/jexboss\n* [Automated pentest framework for offensive security experts ](https://github.com/1N3/Sn1per)\n* https://github.com/ysrc/xunfeng\n\n\n### Phisher\n\n* https://github.com/wifiphisher/wifiphisher\n* [Swordphish Phishing Awareness Tool](https://github.com/certsocietegenerale/swordphish-awareness)\n* [Ruby on Rails Phishing Framework ](https://github.com/pentestgeek/phishing-frenzy)\n* https://github.com/ryhanson/phishery\n* https://github.com/vishnudxb/docker-blackeye\n\n### RAT\n\n* [Android Remote Administration Tool](https://github.com/AhMyth/AhMyth-Android-RAT)\n* [Hardware backdoors in some x86 CPUs](https://github.com/xoreaxeaxeax/rosenbridge)\n* https://github.com/sincoder/gh0st\n* [Koadic C3 COM Command \u0026 Control - JScript RAT](https://github.com/zerosum0x0/koadic)\n* [iOS/macOS/Linux Remote Administration Tool](https://github.com/neoneggplant/EggShell)\n* https://github.com/secretsquirrel/the-backdoor-factory\n* [(Windows, Linux, OSX, Android) remote administration and post-exploitation tool ](https://github.com/n1nj4sec/pupy)\n* [Python Remote Administration Tool (RAT)](https://github.com/nathanlopez/Stitch)\n* https://github.com/jgamblin/Mirai-Source-Code\n\n### Wordlist \n\n* https://github.com/jeanphorn/wordlist\n* https://github.com/We5ter/Scanners-Box\n* https://github.com/berzerk0/Probable-Wordlists\n\n### Proxy\n\n* https://github.com/realgam3/pymultitor\n* https://github.com/stamparm/fetch-some-proxies\n* https://github.com/fate0/proxylist\n* http://www.cnproxy.com/proxy1.html\n* https://www.cool-proxy.net/proxies/http_proxy_list/sort:score/direction:desc\n* https://free-proxy-list.net/\n* https://proxy-list.org/english/index.php\n* http://comp0.ru/downloads/proxylist.txt\n* http://www.proxylists.net/http_highanon.txt\n* http://www.proxylists.net/http.txt\n* http://ab57.ru/downloads/proxylist.txt\n* https://www.rmccurdy.com/scripts/proxy/good.txt\n\n### Other\n\n* https://github.com/meirwah/awesome-incident-response\n* [A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications](https://github.com/python-security/pyt)\n* [Official Black Hat Arsenal Security Tools Repository](https://github.com/toolswatch/blackhat-arsenal-tools)\n* [List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.](https://github.com/toniblyx/my-arsenal-of-aws-security-tools)\n* [Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.](https://github.com/nullsecuritynet/tools)\n* [Open-Source Security Architecture](https://github.com/bloodzer0/ossa)\n* [Golang安全资源合集](https://github.com/re4lity/Hacking-With-Golang)\n* [PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform ](https://github.com/Patrowl/PatrowlManager)\n* https://github.com/luyg24/IT_security\n* [Find open databases with Shodan](https://github.com/woj-ciech/LeakLooker)\n* https://github.com/Truneski/external_c2_framework\n* https://github.com/nshalabi/ATTACK-Tools\n* https://github.com/byt3bl33d3r/SprayingToolkit\n* https://github.com/threatexpress/malleable-c2\n* https://github.com/rsmudge/Malleable-C2-Profiles\n* [Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts. ](https://github.com/nullsecuritynet/tools)\n* https://github.com/EmpireProject/Empire\n* https://github.com/PowerShellMafia/PowerSploit\n* https://github.com/MobSF/Mobile-Security-Framework-MobSF\n* https://github.com/BugScanTeam/DNSLog\n* [An advanced memory forensics framework](https://github.com/volatilityfoundation/volatility)\n* https://github.com/beefproject/beef\n\n## Vulnerability\n\n### XXE\n\n* https://www.w3.org/TR/REC-xml/#sec-prolog-dtd\n* https://www.vsecurity.com//download/publications/XMLDTDEntityAttacks.pdf\n* https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.md\n* https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing\n* https://github.com/BuffaloWill/oxml_xxe\n* https://github.com/enjoiz/XXEinjector\n\n### SSRF\n\n* https://github.com/swisskyrepo/SSRFmap\n* https://github.com/samhaxr/XXRF-Shots\n* https://github.com/cujanovic/SSRF-Testing\n* https://github.com/tarunkant/Gopherus\n* https://github.com/bcoles/ssrf_proxy\n* https://github.com/dreadlocked/SSRFmap\n* http://blog.safebuff.com/2016/07/03/SSRF-Tips/\n* http://ceye.io/\n* [SSRF bible. Cheatsheet](https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit)\n* https://github.com/jayeshchauhan/SKANDA\n* [从 SSRF 到最终获取 AWS S3 Bucket 访问权限的实际案例](https://medium.com/@logicbomb_1/chain-of-hacks-leading-to-database-compromise-b2bc2b883915)\n\n\n### XSS\n\n* [ ws-na.amazon-adsystem.com(Amazon) 反射型 XSS 漏洞披露](https://medium.com/@newp_th/reflected-xss-on-ws-na-amazon-adsystem-com-amazon-f1e55f1d24c)\n* [ 浏览器 XSS Filter 绕过速查表 ](https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet)\n* [CentOS Web Panel 0.9.8.763 存储型 XSS 漏洞披露（CVE-2019-7646](https://www.exploit-db.com/exploits/46349)\n* [Browser's XSS Filter Bypass Cheat Sheet](https://github.com/masatokinugawa/filterbypass)\n* https://github.com/s0md3v/XSStrike\n* https://github.com/evilcos/xssor2\n* [Microsoft Office 365 Outlook 的两个 XSS 漏洞披露](https://leucosite.com/Microsoft-Office-365-Outlook-XSS/)\n* [漏洞赏金私人项目中的 XSS 及 RCE 漏洞实例](https://zetc0de.github.io/bugbounty/2019/02/14/RCE-and-XSS-on-Private-Program-Cyber-Army.html)\n* [Video Downloader and Video Downloader Plus Chrome Extension Hijack Exploit - UXSS via CSP Bypass (~15.5 Million Affected)](https://thehackerblog.com/video-download-uxss-exploit-detailed/)\n* [Gitlab Markdown 存储型 XSS 漏洞详情披露：]( https://gitlab.com/gitlab-org/gitlab-ce/issues/54427)\n* [实用的DOM XSS入门手册](https://public-firing-range.appspot.com/urldom/index.html)\n\n### Shooting\n\n* https://github.com/vulhub/vulhub\n* https://github.com/Medicean/VulApps\n* https://github.com/davevs/dvxte\n* https://github.com/MyKings/docker-vulnerability-environment\n* https://github.com/payatu/diva-android\n* https://github.com/snoopysecurity/dvws\n* https://github.com/s4n7h0/xvwa\n\n### Buffer Overflow\n\n* https://0xrick.github.io/binary-exploitation/bof2/\n\n### Other\n\n* [A list of interesting payloads, tips and tricks for bug bounty hunters.](https://github.com/EdOverflow/bugbounty-cheatsheet)\n* [some learning notes about Web/Cloud/Docker Security、 Penetration Test、 Security Building](https://github.com/JnuSimba/MiscSecNotes)\n* [Command Injection Payload List](https://github.com/ismailtasdelen/command-injection-payload-list)\n* [NSE script based on Vulners.com API](https://github.com/vulnersCom/nmap-vulners)\n* [Named vulnerabilities and their practical impact](https://github.com/hannob/vulns)\n* https://github.com/Hacker0x01/hacker101\n* https://github.com/ctf-wiki/ctf-wiki\n* https://github.com/SecWiki/sec-chart\n* [各种安全相关思维导图整理收集](https://github.com/phith0n/Mind-Map)\n* https://github.com/OWASP/Top10\n* https://github.com/SuperKieran/WooyunDrops\n* [1000个PHP代码审计案例(2016.7以前乌云公开漏洞)](https://github.com/Xyntax/1000php)\n* https://github.com/trustedsec/ptf\n* https://github.com/evilcos/papers\n","created_at":"2024-04-06T12:32:52.621Z","updated_at":"2026-04-18T09:00:27.076Z","primary_language":null,"list_of_lists":false,"displayable":true,"categories":["Tools","Pentest","Fuzzing","Vulnerability","Developer","Malware","Browser","Operating System","Security conference","Blockchain","Mobile Application Security","Deep Net"],"sub_categories":["IoT","Exploiter","XSS","SSRF","RAT","Scanner","Hunter","Other","Traffic","Git","OSINT","DNS","Honey","Phisher"],"projects_url":"https://awesome.ecosyste.ms/api/v1/lists/mykings%2Fsecurity-study-tutorial/projects"}