Awesome-Security-Resources
This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.
https://github.com/Johnson90512/Awesome-Security-Resources
Last synced: about 5 hours ago
JSON representation
-
Table of Contents
-
Awesome Repos
- Application Security
- Security
- CTF
- Malware Analysis
- Android Security
- Hacking - carpedm20
- Honeypots
- Incident Response
- Vehicle Security and Car Hacking
- Web Security
- Lockpicking
- Cybersecurity Blue Team
- Fuzzing
- Embedded and IoT Security
- Pcap Tools
- Windows Exploitation
- Hacking - Hack with Github
- Hacking - vitalysim
- Pentest
- Reversing
- Industrial Control Systems Security
- ICS Writeups
- DevSecOps
- GDPR
-
Books and Cheatsheets
- Pentesting Tools Cheatsheet
- x86 and and64 instruction reference
- SANS Pentest Posters
- Programming from the Ground Up
- Radare2 Cheatsheet
- Volatility Command Reference
- Windows Post Exploitation Command List - exploitation of windows machines.
- THC Favorite tips, tricks and hacks
- Programming from the Ground Up
- Windows Post Exploitation Command List - exploitation of windows machines.
- SANS Pentest Posters
- SANS DFIR
-
Learning Materials
- Basic Linux Privilege Escalation
- Building a Home Lab for Offensive Security
- Beginner Reverse Engineering Info
- Windows oneliners to download and execute code
- Practical guide to NTLM Relaying
- Malware Analysis Tutorial
- Intro to x86
- Intermediate x86
- Reverse Engineering 101 - Malware Unicorn
- Windows Privilege Escalation
- Assembly Programming Tutorial
- RE Guide for beginners
- Mastering Ghidra
- Advanced Nmap:Scanning Firewalls
- Learning Nmap: The Basics - Part 1
- Advanced Nmap: Some Scan Types - Part 2
- Advanced Nmap: Scanning Techniques Continued - Part 3
- Advanced Nmap: Fin Scan & OS Detection - line options.
- db_nmap
- GoBuster Guide
- Parsing ls
- AppLocker Bypass
- How to pentest your WordPress site
- Executing Meterpreter in Memory - CradleCrafter in memory.
- How to hack a Wordpress site
- Metasploit Tutorial
- WordPress plugin Vulneribilities
- Beginners Guide to Assembly
- Ghidra Simple Keygen Generation
- Ghidra Tutorial
- Guide to Assmebly in VS .NET
- How to start out in Reverse Engineering
- IDA Pro Tutorial
- Intel 64 and IA32 Software Manual - 32 Architectures Software Developer's Manual.
- Myne-US
- Reverse Engineering 101
- Reverse Engineering 102
- Reversing for Newbies
- Where to start in leaning reverse engineering
- Linux Privilege Escalation tools/tactics
- LXD Privilege Escalation
- How to build a RAT
- How to create a backdoor
- How to create a reverse Shell
- Reverse Shell in Bash
- Pentesting Methodology
- Guide to Penetration Testing
- So you want to be a Malware Analyst
- CTF Field Guide
- Parsing ls
- IDA Pro Tutorial
- Myne-US
- Linux Privilege Escalation Techniques
-
Podcasts
-
Networking
-
Industrial Control System Info
-
OSINT
- TinEye
- NameCheckup
- WhatsMyName
- DeHashed - database search-engine.
- HaveIBeenPwned
- Threat Jammer
- NameCheck
- Bing Image Search
- Scylla.sh
- Online Traceroute
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Yandex
- Sherlock
- Threat Jammer
-
Penetration Testing Tools
- DirtyCow POC
- Hack Tricks
- Exploit Suggester
- CyberChef
- Pentest Book
- Various Pentest Tools
- ShellPop
- PWNTools
- Payload All the Things
- WPScan - commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their WordPress websites.
- LinEnum
- Unix Privilege Escalation
- p0wny shell - file PHP shell.
- PSPY
- Pentest Checklist
- SharpCat
- Shellcode tools
- ZackAttack!
- Exploit Suggester
- CyberChef
- Nmap
- Red Team Toolkit
- GTFOBins
- Pentest Book
- GTFOBins
- Hack Tricks
-
Reverse Engineering
-
Practice Sites
- HackMe
- OvertheWire
- RootMe
- Microcorruption
- Hacking Lab
- WebGOAT - based applications that use common and popular open source components.
- Attack/Defense Labs
- Certified Hacker
- Defend the Web
- Exploit Education
- GameofHacks
- Pentest Practice
- Permanent CTF List
- Reversing.kr
- Try2Hack - oriented challenges.
- WeChall
- Metasploitable
- Pentest Training
- Gh0st Networks
- SecGen
- VulnHub
- Certified Hacker
- Reversing.kr
- Metasploitable
- Pentest Lab
- WeChall
- Pwnable.kr
- PentestIt
- HackThisSite
- Hellbound Hackers
- Google CTF
- SmashTheStack
- WeChalls
-
Security Focused Operating Systems
- Parrot OS - based linux operting system focused on security and privacy. Has lots of built in tools.
- FLARE-VM
- SIFT Workstation - source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
- FLARE-VM
- Commando VM
- Kali Linux
-
Youtube Channels
- 13Cubed - related topics including Digital Forensics and Incident Response (DFIR) and Penetration Testing.
- IppSec
- Guided Hacking
- John Hammond
- Learn Forensics
- Stacksmashing
-
Walkthroughs
- Hackso.me
- HackTheBox Guides
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
- Hackso.me
-
Documentation
-
DFIR
- Steganography Toolkit - helps with CTF challenges.
- Volatility
- VolUtility
-
Malware Analysis
-
Categories
Sub Categories
Learning Materials
53
OSINT
47
Walkthroughs
41
Practice Sites
33
Penetration Testing Tools
26
Awesome Repos
24
Books and Cheatsheets
12
Networking
12
Reverse Engineering
7
Podcasts
7
Industrial Control System Info
6
Security Focused Operating Systems
6
Youtube Channels
6
DFIR
3
Documentation
2
Malware Analysis
1
Keywords
security
17
awesome
16
awesome-list
15
hacking
8
list
5
ctf
5
python
5
ics
4
penetration-testing
4
cybersecurity
4
scada
3
infosec
3
pentesting
3
enumeration
2
ics-security
2
fuzzing
2
pentest
2
honeypot
2
android
2
redteam
2
python3
2
privilege-escalation
2
malware
2
linux
2
exploit
2
reverse-engineering
2
owasp
2
tools
2
computer-security
1
defensive-security
1
blue-team
1
picking-locks
1
physical-security
1
physec
1
locksport
1
locksmithing
1
locksmith
1
cpuu
1
fuzz-testing
1
embedded
1
firmware
1
iot
1
bind
1
pop-shells
1
remote
1
reverse
1
shell
1
bug-bounty
1
pentesting-windows
1
assembly
1