Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-infosec
A curated list of awesome infosec courses and training resources.
https://github.com/eric-erki/awesome-infosec
- Stanford University - Computer Security
- Stanford University - Cryptography I
- Stanford University - Cryptography II
- University of Maryland - Usable Security
- University of Maryland - Software Security
- University of Maryland - Cryptography
- University of Maryland - Hardware Security
- NYU Tandon's OSIRIS Lab's Hack Night
- CSCI 4976 - Fall '15 Malware Analysis
- CSCI 4974/6974 - Spring '14 Hardware Reverse Engineering
- CNIT 40: DNS Security
- CNIT 120 - Network Security
- CNIT 121 - Computer Forensics
- CNIT 123 - Ethical Hacking and Network Defense
- CNIT 124 - Advanced Ethical Hacking
- CNIT 126 - Practical Malware Analysis
- CNIT 127 - Exploit Development
- CNIT 128 - Hacking Mobile Devices
- CNIT 129S: Securing Web Applications
- CNIT 140: IT Security Practices
- Violent Python and Exploit Development
- Android Forensics & Security Testing
- Certified Information Systems Security Professional (CISSP)® <br>Common Body of Knowledge (CBK)® Review
- NSTISSI-4011 - M](http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf), Information Assurance Workforce Improvement Program.
- Flow Analysis & Network Hunting
- Hacking Techniques and Intrusion Detection
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- Introductory Intel x86-64: Architecture, Assembly, Applications, & Alliteration
- Introduction to ARM
- Introduction to Cellular Security
- Introduction to Network Forensics
- Introduction to Secure Coding
- Introduction to Vulnerability Assessment
- Introduction to Trusted Computing
- Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
- Pcap Analysis & Network Hunting
- Malware Dynamic Analysis
- Secure Code Review
- Smart Cards
- The Life of Binaries
- Understanding Cryptology: Core Concepts
- Understanding Cryptology: Cryptanalysis
- Core Concepts
- Exploits 1: Introduction to Software Exploits
- Exploits 2: Exploitation in the Windows Environment
- Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
- Advanced x86: Virtualization with Intel VT-x
- Advanced x86: Introduction to BIOS & SMM
- Introduction to Reverse Engineering Software
- Reverse Engineering Malware
- Introduction to Reverse Engineering Software
- Rootkits: What they are, and how to find them
- The Adventures of a Keystroke: An in-depth look into keylogging on Windows
- CompTIA A+
- CompTIA Linux+
- CompTIA Cloud+
- CompTIA Network+
- CompTIA Advanced Security Practitioner
- CompTIA Security+
- ITIL Foundation
- Cryptography
- Cisco CCNA
- Virtualization Management
- Penetration Testing and Ethical Hacking
- Computer and Hacking Forensics
- Web Application Penetration Testing
- CISA - Certified Information Systems Auditor
- Secure Coding
- NIST 800-171 Controlled Unclassified Information Course
- Advanced Penetration Testing
- Intro to Malware Analysis and Reverse Engineering
- Social Engineering and Manipulation
- Post Exploitation Hacking
- Python for Security Professionals
- Metasploit
- ISC2 CCSP - Certified Cloud Security Professional
- CISSP - Certified Information Systems Security Professional
- CISM - Certified Information Security Manager
- PMP - Project Management Professional
- CRISC - Certified in Risk and Information Systems Control
- Risk Management Framework
- ISC2 CSSLP - Certified Secure Software Life-cycle Professional
- COBIT - Control Objectives for Information and Related Technologies
- Corporate Cybersecurity Management
- Learning How to Learn How to Hack
- Buffer-Overflow Vulnerability Lab
- Return-to-libc Attack Lab
- Environment Variable and Set-UID Lab
- Set-UID Program Vulnerability Lab
- Race-Condition Vulnerability Lab
- Format-String Vulnerability Lab
- Shellshock Attack Lab
- TCP/IP Attack Lab
- Heartbleed Attack Lab
- Local DNS Attack Lab
- Remote DNS Attack Lab
- Packet Sniffing and Spoofing Lab
- Linux Firewall Exploration Lab
- Firewall-VPN Lab: Bypassing Firewalls using VPN
- Virtual Private Network (VPN) Lab
- Minix IPSec Lab
- Minix Firewall Lab
- Cross-Site Scripting Attack Lab
- Cross-Site Request Forgery Attack Lab
- Web Tracking Lab
- SQL Injection Attack Lab
- Cross-site Scripting Attack Lab
- Cross-site Request Forgery Attack Lab
- SQL Injection Lab
- Web Browser Access Control Lab
- Cross-site Scripting Attack Lab
- Cross-site Request Forgery Attack Lab
- SQL Injection Lab
- ClickJacking Attack Lab
- Linux Capability Exploration Lab
- Role-Based Access Control (RBAC) Lab
- Encrypted File System Lab
- Secret Key Encryption Lab
- One-Way Hash Function Lab
- Public-Key Cryptography and PKI Lab
- Android Repackaging Lab
- Android Device Rooting Lab
- From SQL Injection to Shell
- From SQL Injection to Shell II
- From SQL Injection to Shell: PostgreSQL edition
- Web for Pentester
- Web for Pentester II
- PHP Include And Post Exploitation
- Linux Host Review
- Electronic Code Book
- Rack Cookies and Commands injection
- Padding Oracle
- XSS and MySQL FILE
- Axis2 Web service and Tomcat Manager
- Play Session Injection
- Play XML Entities
- CVE-2007-1860: mod_jk double-decoding
- CVE-2008-1930: Wordpress 2.5 Cookie Integrity Protection Vulnerability
- CVE-2012-1823: PHP CGI
- CVE-2012-2661: ActiveRecord SQL injection
- CVE-2012-6081: MoinMoin code execution
- CVE-2014-6271/Shellshock
- Binary Auditing
- Damn Vulnerable Web Application (DVWA)
- Damn Vulnerable Web Services
- OWASP Mutillidae
- OWASP Broken Web Applications Project
- OWASP Bricks
- OWASP Hackademic Challenges project
- Web Attack and Exploitation Distro (WAED)
- Xtreme Vulnerable Web Application (XVWA)
- WebGoat
- SQLi-LABS
- SQLi-LABS Videos
- Hack The Box link
- Vulnhub Repository
- CTF Resources
- CTF write-ups 2016
- CTF write-ups 2015
- CTF write-ups 2014
- CTF write-ups 2013
- captf
- shell-storm
- SecurityTube Metasploit Framework Expert (SMFE)
- Wireless LAN Security and Penetration Testing Megaprimer
- Exploit Research Megaprimer
- Buffer Overflow Exploitation Megaprimer for Linux
- Crypto101
- LaTeX Source
- A Graduate Course in Applied Cryptography
- Security Engineering, Second Edition
- Reverse Engineering for Beginners
- LaTeX Source
- CTF Field Guide
- Markdown Source
- Reverse Engineering Challenges
- Matasano Crypto Challenges
- Open Web Application Security Project
- Applied Crypto Hardening
- LaTeX Source
- Penetration Testing Execution Standard
- Awesome Pentest
- Awesome Appsec
- Awesome Malware Analysis
- Android Security Awesome
- Awesome CTF
- Awesome Security
- Awesome Honeypots
- Awesome Incident Response
- Awesome Threat Intelligence
- Awesome PCAP Tools
- Awesome Forensics
- Awesome Hacking
- Awesome Industrial Control System Security
- Awesome Web Hacking
- Awesome Sec Talks
- Awesome YARA
- Sec Lists
- Contributing
- ![Creative Commons License
- Creative Commons Attribution 4.0 International License
Keywords
awesome
10
security
9
awesome-list
9
list
4
hacking
3
ctf
3
malware-research
2
dfir
2
malware-analysis
2
owasp
2
tutorials
2
security-ctf
2
application-security
2
vulnerability
2
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-collection
1
knowledge
1
learning-appsec
1
mysql
1
php
1
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1
chinese
1
automated-analysis
1
analysis-framework
1
security-experts
1
xvwa
1
reading-list
1
curated
1
applied-cryptography
1
documentation
1
cryptography
1
metasploit
1
penetration-testing
1
pentesting
1
scanner
1
vulnerabilities
1
web-hacking
1
web-security
1
conferences
1
infosec
1
awesome-yara
1
ioc
1
malware-detection
1