Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
https://github.com/vitalysim/Awesome-Hacking-Resources
- CS 642: Intro to Computer Security
- CyberSec WTF - ups
- Cybrary - contributed content, account required, content can be filtered by experience level
- Free Cyber Security Training
- Hak5 - style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
- Hopper's Roppers Security Training - paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
- Learning Exploitation with Offensive Computer Security 2.0 - style instruction, includes: slides, videos, homework, discussion. No login required.
- Mind Maps
- MIT OCW 6.858 Computer Systems Security - semester course, includes assigned readings, lectures, videos, required lab files.
- OffensiveComputerSecurity
- OWASP top 10 web security risks
- SecurityTube - styled content, "megaprimer" videos covering various topics, no readable content on site.
- Seed Labs
- TryHackMe
- 0patch by ACROS Security
- BlackHat
- Christiaan008
- Detectify
- Hak5
- Kaspersky Lab
- Metasploit
- ntop
- nVisium
- OpenNSM
- OWASP
- Rapid7
- Securelist
- Segment Security - instructional
- SocialEngineerOrg - style, instructional, lengthy content ~1 hr each
- Sonatype
- SophosLabs - style content, "7 Deadly IT Sins" segment is of note
- Sourcefire
- Station X
- Synack - style videos, disorganized, non-instructional
- TippingPoint Zero Day Initiative
- Tripwire, Inc. - style videos, non-instructional
- Vincent Yiu
- 44contv
- MIT OCW 6.858 Computer Systems Security
- BruCON Security Conference
- BSides Manchester
- BSidesAugusta
- CarolinaCon
- Cort Johnson - style talks from Hack Secure Opensec 2017
- DevSecCon
- Garage4Hackers - Information Security
- HACKADAY
- Hack In The Box Security Conference - style instructional talks from an international security con
- Hack in Paris
- Hacklu - style instructional videos
- Hacktivity - style instructional videos from a con in central/eastern europe
- Hardwear.io - style video, emphasis on hardware hacks
- IEEE Symposium on Security and Privacy
- LASCON - style talks from an OWASP con held in Austin, TX
- leHACK
- Marcus Niemietz
- Media.ccc.de - tons of lengthy con-style vids
- NorthSec - style talks from an applied security conference in Canada
- Pancake Nopcode
- Psiinon
- SJSU Infosec
- Secappdev.org
- Security Fest - style talks from a security festival in Sweden
- SecurityTubeCons - style talks from various cons including BlackHat and Shmoocon
- ToorCon
- USENIX Enigma Conference
- ZeroNights - style talks from international conference ZeroNights
- 0x41414141
- Adrian Crenshaw - style talks
- Corey Nachreiner - 3 videos a week, no set schedule
- BalCCon - Balkan Computer Congress - style talks from the Balkan Computer Congress, doesn't update regularly
- danooct1 - to vids regarding malware, regular content updates, 186K followerss
- DedSec - to vids based in Kali, no recent posts.
- DEFCON Conference - style vids from the iconical DEFCON
- DemmSec
- Derek Rook - CTF/Boot2root/wargames Walkthrough
- Don Does 30 - tester posting lots of brief screenshot vids regularly, 9K Followers
- Error 404 Cyber News - shot videos with loud metal, no dialog, bi-weekly
- Geeks Fort - KIF
- GynvaelEN
- HackerSploit
- HACKING TUTORIALS
- iExplo1t
- JackkTutorials
- John Hammond
- Latest Hacking News
- LionSec
- LiveOverflow - to-medium instructional vids, covering things like buffer overflows and exploit writing, regular posts.
- Metasploitation
- NetSecNow
- Open SecurityTraining - style vids, no recent posts, but quality info.
- Pentester Academy TV
- Penetration Testing in Linux
- rwbnetsec
- Samy Kamkar's Applied Hacking
- SecureNinjaTV
- Security Weekly - style interviews with industry pros
- Seytonic
- Shozab Haxor
- SSTec Tutorials
- Tradecraft Security Weekly
- Troy Hunt
- Waleed Jutt
- webpwnized
- Zer0Mem0ry
- LionSec
- Adrian Crenshaw - style talks
- HackerSploit
- Derek Rook - CTF/Boot2root/wargames Walkthrough
- Tradecraft Security Weekly
- IPPSec
- The Daily Swig
- Backdoor
- The cryptopals crypto challenges
- Challenge Land - up, you have to solve a challengeto even get that far!
- Crackmes.de Archive (2011-2015)
- Crackmes.one
- CTFLearn - based ctf site, where users can go in and solve a range of challenges
- CTFs write-ups
- CTF365 - Mobile
- The enigma group
- Exploit exercises
- Google CTF
- Google CTF 2019
- Google's XSS game
- Hack The Box
- Hacker test
- Hacker Gateway
- Hacksplaining
- hackburger.ee
- Hack.me
- Hack this site!
- knock.xss.moe
- Lin.security
- noe.systems
- Over the wire
- Participating Challenge Sites
- PentesterLab
- Pentestit
- Pentest Practice - as-you-go feature
- Pentest.training
- PicoCTF
- pwnable.kr
- pwnable.tw
- Ringzer0 Team
- ROP Emporium
- SmashTheStack
- Shellter Labs
- Solve Me
- Vulnhub
- websec.fr
- tryhackme
- webhacking.kr
- Stereotyped Challenges
- Stripe CTF 2.0
- Windows / Linux Local Privilege Escalation Workshop
- Hacking Articles
- Hacker101 CTF
- Hacking Lab
- Portswigger
- A Course on Intermediate Level Linux Exploitation
- Analysis and exploitation (unprivileged)
- Binary hacking
- Buffer Overflow Exploitation Megaprimer for Linux
- Corelan tutorials
- Exploit tutorials
- Exploit development
- flAWS challenge
- Introduction to ARM Assembly Basics
- Introductory Intel x86
- Lena's Reversing for Newbies (Complete)
- Linux (x86) Exploit Development Series
- Megabeets journey into Radare2
- Modern Binary Exploitation - CSCI 4968
- Recon.cx - reversing conference
- Reverse Engineering for Beginners - source
- Reverse engineering reading list
- Reverse Engineering challenges
- Reverse Engineering for beginners (GitHub project)
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102
- reversing.kr challenges
- Shell storm
- Shellcode Injection
- Micro Corruption — Assembly
- 4 Ways get linux privilege escalation
- A GUIDE TO LINUX PRIVILEGE ESCALATION
- Abusing SUDO (Linux Privilege Escalation)
- AutoLocalPrivilegeEscalation
- Basic linux privilege escalation
- Common Windows Privilege Escalation Vectors
- Editing /etc/passwd File for Privilege Escalation
- Linux Privilege Escalation
- Linux Privilege Escalation Check Script
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Using PATH Variable
- Linux Privilege Escalation using Misconfigured NFS
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- OSCP - Windows Priviledge Escalation
- Privilege escalation for Windows and Linux
- Privilege escalation linux with live example
- Reach the root
- RootHelper
- Unix privesc checker
- Windows exploits, mostly precompiled.
- Windows Privilege Escalation
- Windows Privilege Escalation
- Windows privilege escalation checker
- Windows Privilege Escalation Fundamentals
- Windows Privilege Escalation Guide
- Windows Privilege Escalation Methods for Pentesters
- Malware traffic analysis
- Malware Analysis - CSCI 4976
- Foot Printing with WhoIS/DNS records
- Google Dorks/Google Hacking
- bWAPP
- Damn Small Vulnerable Web
- Damn Vulnerable Web Application (DVWA)
- Google Gruyere
- OWASP Broken Web Applications Project
- OWASP Hackademic Challenges project
- OWASP Mutillidae II
- OWASP Juice Shop
- WebGoat: A deliberately insecure Web Application
- General Test Environment Guidance
- Metasploitable2 (Linux)
- Metasploitable3
- Vulnhub
- Android Tamer
- BackBox
- BlackArch
- Bugtraq - testing technology
- Docker for pentest
- Kali
- LionSec Linux
- Parrot
- Pentoo
- 0day.today
- Exploit Database
- CXsecurity
- Snyk Vulnerability DB
- 0x00sec
- Antichat
- CODEBY.NET - russian based forum
- EAST Exploit database
- Greysec
- Hackforums
- 4Hat Day
- CaveiraTech
- InfoCon.org
- Irongeek
- infocondb.org - reference all hacker conferences.
- Hacktoday
- Hack+
- MPGH
- InfoSec
- Recent Hash Leaks
- Security Intell
- Threatpost
- The Hacker News
Programming Languages
Keywords
ctf
4
security
4
pentesting
3
wargame
2
ctf-tools
2
htb
2
hacking
2
linux
1
exploits
1
enumeration
1
bash
1
pentest-tools
1
oscp-tools
1
oscp
1
linux-security
1
linux-privilege-escalation
1
hackthebox
1
exploitation
1
google
1
ctf-challenges
1
web
1
challenges
1
vulnerable
1
vulnapp
1
owasp-top-ten
1
owasp-top-10
1
owasp
1
javascript
1
appsec
1
application-security
1
24pullrequests
1
pentesting-tools
1
pentest
1
hacking-tools
1
bugbounty
1
bug-bounty
1
windows
1
exploit
1
compiled
1
shellscript
1
root
1
privilege-escalation
1