Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-cyber-security
A curated list of cyber security resources and tools.
https://github.com/okhosting/awesome-cyber-security
Last synced: about 7 hours ago
JSON representation
-
Awesome lists
- Awesome Web Security - A curated list of Web Security materials and resources for learning cutting edge penetration techniques.
- Awesome Malware Analysis - A curated list of awesome malware analysis tools and resources.
- Awesome Machine Learning for Cyber Security - A curated list of amazingly awesome tools and resources related to the use of machine learning for cyber security.
- awesome-web-hacking - This list is for anyone wishing to learn about web application security but do not have a starting point.
- awesome-mobile-security - Maintained by @vaib25vicky with contributions from the security and developer communities.
- awesome-threat-intelligence - A curated list of awesome Threat Intelligence resources.
- awesome-security-hardening - collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
- Awesome Cyber Security - A collection of awesome software, libraries, documents, books, resources and cool stuff about security.
- Awesome Security - A collection of awesome software, libraries, documents, books, resources and cool stuff about security.
-
Threat databases and alerts
- ATT&CK - ATT&CK is a knowledge base of cyber adversary behavior and taxonomy for adversarial actions across their lifecycle. ATT&CK has two parts: ATT&CK for Enterprise, which covers behavior against enterprise IT networks and cloud, and ATT&CK for Mobile, which focuses on behavior against mobile devices.
- NHS Digital Cyber Alerts - We issue cyber security alert notifications to health and care organisations, ranging from weekly threat bulletins to immediate high-severity alerts.
- cve-search - cve-search is accessible via a web interface and an HTTP API. cve-search is an interface to search publicly known information from security vulnerabilities in software and hardware along with their corresponding exposures.
- VULDB - Number one vulnerability database documenting and explaining security vulnerabilities, threats, and exploits since 1970.
- The Exploit Database - The Exploit Database is maintained by Offensive Security, an information security training company that provides various Information Security Certifications as well as high end penetration testing services.
- 0day.today - 0day.today - Biggest Exploits Database and 0day market - The Underground, is one of the world's most popular and comprehensive computer security web sites.
- RAPID7 - A curated repository of vetted computer software exploits and exploitable vulnerabilities.
- National Vulnerability Database - The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
- CXSecurity - (WLB2) World Laboratory of Bugtraq is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.
- Vulnerability Assessment Platform - Largest correlated database of vulnerabilities and exploits
- OSV - OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers of open source.
- Vulnerability Notes Database - The Vulnerability Notes Database provides information about software vulnerabilities. Vulnerability notes include summaries, technical details, remediation information, and lists of affected vendors.
- Intelligence X - Intelligence X is a search engine and data archive. The company is based in Prague, Czech Republic. Its mission is to develop and maintain the search engine and data archive.
- VULDB - Number one vulnerability database documenting and explaining security vulnerabilities, threats, and exploits since 1970.
- CXSecurity - (WLB2) World Laboratory of Bugtraq is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications.
- Stellastra TLS Cipher Suite Database - List of hundreds of TLS cipher suites alongside their security rating and vulnerability/deprecation status.
- Snyk Vulnerability DB - Detailed information and remediation guidance for known vulnerabilities.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States’s CVE database hosted by Mitre Corporation.
-
Security advice and guidance
- The National Cyber Security Centre - Helping to make the UK the safest place to live and work online.
- End user device (EUD) security guidance - Guidance for organisations deploying a range of end user device platforms as part of a remote working solution
- Políticas de seguridad para la pyme - Para ayudar a la pyme a poner en marcha los procesos internos con los que mejorar su ciberseguridad presentamos una serie de documentos que hemos denominado como «políticas de seguridad».
-
Lits of cyber security resources
- SANS - The most trusted source for cyber security training, certification, and research.
- The Uber List of Cybersecurity Resources - We’ve subtitled this list: “Everything you want to know about cyber security and are too tired to search for.” Whatever you may be interested in — from DEF CON to SANS — you will find on this page.
- Cybersecurity resource center - This guide is intended to provide actionable resources for everyone looking to learn more about the field.
- US Homeland Security - Cybersecurity Resources - DHS Science and Technology Directorate (S&T) published documents and other cybersecurity references and links can be found on this page.
- Cyber Security Education - This page is devoted to helping cyber security experts find the resources they need to grow and thrive.
- NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES - The premier online resource for cybersecurity training. NICCS connects Government employees, students, educators, and industry with cybersecurity training providers throughout the Nation.
- 25 Free Cybersecurity Resources, Courses, and Tools - A plethora of free cybersecurity courses and resources on all topics related to the field.
- Top Cybersecurity Sites and Blogs - Here are some of the best top cybersecurity blogs and sites.
- Cybersecurity Related Websites - The listing of related sites provide additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
- IEEE - IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
- The best resources to learn cybersecurity online in 2021 - his list of free and paid cybersecurity resources, courses, books, blogs, tools and cheat codes will help both freshers and professionals to stay updated.
- Internet Safety 101SM - Internet Safety 101SM is a digitally-based internet safety resource designed to educate, equip and empower parents, educators and other adults with the knowledge and resources needed to protect children from Internet dangers including pornography, predators, cyberbullies and threats related to online gaming, social networking and mobile devices.
- vnaya - Cybersecurity For Your Kids - These Top Educational Cyber Security Resources Will Help Your Kids To Stay Safe From Cyber Crime.
- Security Acronyms - Curated list of security related acronyms and terms.
- COMPUTER SECURITY RESOURCE CENTER - For 20 years, the Computer Security Resource Center (CSRC) has provided access to NIST's cybersecurity- and information security-related projects, publications, news and events. CSRC supports stakeholders in government, industry and academia—both in the U.S. and internationally.
- 50+ Cybersecurity Resources - Dark Cubed’s cybersecurity resources page provides links to dozens of 100% free resources you can use for your own business or for your customers.
- Secureworks Resources & Research - Cybersecurity thought leadership resources & Counter Threat Unit™ research.
- Sifma Cybersecurity Resources - Here are resources for the financial industry to address critical cyber threats and improve the industry’s overall cybersecurity.
- US Homeland Security - Cybersecurity Resources - DHS Science and Technology Directorate (S&T) published documents and other cybersecurity references and links can be found on this page.
- NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES - The premier online resource for cybersecurity training. NICCS connects Government employees, students, educators, and industry with cybersecurity training providers throughout the Nation.
- Gracker AI - AI Cybersecurity Marketing Tool
-
Check out also
- Awesome Storage - A curated list of storage open source tools. Backups, redundancy, sharing, distribution, encryption, etc.
-
Must Read
- RTFM: Red Team Field Manual v2
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Bug Bounty Bootcamp
- Black Hat Python
- Black Hat Go
- RTFM: Red Team Field Manual v2
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Bug Bounty Bootcamp
- Black Hat Python
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Black Hat Go
- RTFM: Red Team Field Manual v2
- Black Hat Python
-
Fundamental Books
- Ethical Hacking
- Foundations of Information Security
- Penetration Testing
- Metasploit
- The Tangled Web: A Guide to Securing Modern Web Applications
- Ethical Hacking
- Penetration Testing
- Metasploit
- Foundations of Information Security
- Ethical Hacking
- The Tangled Web: A Guide to Securing Modern Web Applications
- The Tangled Web: A Guide to Securing Modern Web Applications
- Foundations of Information Security
-
Web Hacking & Bug Bounty
-
Platforms to learn cyber security
- vulnmachines
- hackthissite
- Tracelabs
- LetsDefend
- SECURITY BLUE TEAM
- Cybersecurity roadmap
- PortSwigger
- TCM academy
- Hacking Articles - Raj Chandel's Blog
- Active Directory Security
- HackTricks
- Home | RedTeamRecipe
- PentesterLab
- The Red Canary Blog
- Projectdiscovery.io
- BugBountyHunting.com
- Bug Bounty Guide
- Pentester Land
- Purple Academy | picussecurity.com
- OPSWAT Academy
- APIsec University
- HackerSploit
- Practical DevSecOps
- CyberPython
- CyberPython
-
Certifications
Programming Languages
Categories
Sub Categories
Keywords
awesome-list
6
awesome
4
security
4
cyber-security
3
hacking
3
list
2
penetration-testing
2
hacking-tools
2
pentesting
2
security-tools
2
machine-learning
1
data-mining
1
linux-hardening
1
threatintel
1
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-research
1
malware-collection
1
malware-analysis
1
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1
chinese
1
automated-analysis
1
analysis-framework
1
websecurity
1
web
1
security-hardening
1
windows-hardening
1
certification
1
operation-systens
1
papers-published
1
blueteam
1
blue-team
1
best-practices
1
cis-benchmarks
1
reverse-engineering
1
resources
1
redteam
1
mobile-security
1
mobile
1
ios-security
1
ios
1
bugbounty
1
android-security
1
android
1