Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-infosec
A curated list of awesome infosec courses and training resources.
https://github.com/onlurking/awesome-infosec
Last synced: 5 days ago
JSON representation
-
Cybrary - Online Cyber Security Training
- Virtualization Management
- Penetration Testing and Ethical Hacking
- Secure Coding
- Web Application Penetration Testing
- CompTIA A+
- CompTIA Linux+
- CompTIA Cloud+
- CompTIA Network+
- CompTIA Advanced Security Practitioner
- CompTIA Security+
- CISA - Certified Information Systems Auditor
- Cryptography
- Cisco CCNA
- NIST 800-171 Controlled Unclassified Information Course
- Advanced Penetration Testing
- Intro to Malware Analysis and Reverse Engineering
- Social Engineering and Manipulation
- Post Exploitation Hacking
- Python for Security Professionals
- Metasploit
- ISC2 CCSP - Certified Cloud Security Professional
- CISSP - Certified Information Systems Security Professional
- CISM - Certified Information Security Manager
- PMP - Project Management Professional
- CRISC - Certified in Risk and Information Systems Control
- Risk Management Framework
- ISC2 CSSLP - Certified Secure Software Life-cycle Professional
- COBIT - Control Objectives for Information and Related Technologies
- Corporate Cybersecurity Management
-
Open Security Training
- Introduction to Vulnerability Assessment
- Introduction to Trusted Computing
- Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
- Pcap Analysis & Network Hunting
- Malware Dynamic Analysis
- Secure Code Review
- Smart Cards
- The Life of Binaries
- Understanding Cryptology: Cryptanalysis
- Exploits 1: Introduction to Software Exploits
- Exploits 2: Exploitation in the Windows Environment
- Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
- Advanced x86: Virtualization with Intel VT-x
- Advanced x86: Introduction to BIOS & SMM
- Introduction to Reverse Engineering Software
- Reverse Engineering Malware
- Rootkits: What they are, and how to find them
- The Adventures of a Keystroke: An in-depth look into keylogging on Windows
- Android Forensics & Security Testing
- Certified Information Systems Security Professional (CISSP)® <br>Common Body of Knowledge (CBK)® Review
- NSTISSI-4011 - M](http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf), Information Assurance Workforce Improvement Program.
- Flow Analysis & Network Hunting
- Hacking Techniques and Intrusion Detection
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- Introductory Intel x86-64: Architecture, Assembly, Applications, & Alliteration
- Introduction to ARM
- Introduction to Cellular Security
- Introduction to Network Forensics
- Introduction to Secure Coding
- Core Concepts
-
Roppers Academy
- Introduction to Computing Fundamentals
- gitbook - Reqs:** None
- Introduction to Security
- gitbook - World Examples **Pre-Reqs:** None
- Introduction to Computing Fundamentals
-
Syracuse University's SEED
-
Software Security Labs
-
Network Security Labs
-
Web Security Labs
- Cross-Site Scripting Attack Lab
- Cross-Site Request Forgery Attack Lab
- Web Tracking Lab
- SQL Injection Attack Lab
- Cross-site Scripting Attack Lab
- Cross-site Request Forgery Attack Lab
- SQL Injection Lab
- Web Browser Access Control Lab
- Cross-site Scripting Attack Lab
- Cross-site Request Forgery Attack Lab
- SQL Injection Lab
- ClickJacking Attack Lab
-
System Security Labs
-
Cryptography Labs
-
Mobile Security Labs
-
-
Pentester Lab
-
Mobile Security Labs
- From SQL Injection to Shell
- From SQL Injection to Shell II
- From SQL Injection to Shell: PostgreSQL edition
- Web for Pentester
- Web for Pentester II
- PHP Include And Post Exploitation
- Linux Host Review
- Rack Cookies and Commands injection
- Padding Oracle
- XSS and MySQL FILE
- Axis2 Web service and Tomcat Manager
- Play Session Injection
- Play XML Entities
- Web for Pentester II
- From SQL Injection to Shell
- From SQL Injection to Shell II
- From SQL Injection to Shell: PostgreSQL edition
- Web for Pentester
- PHP Include And Post Exploitation
- Linux Host Review
- Electronic Code Book
- Rack Cookies and Commands injection
- Padding Oracle
- XSS and MySQL FILE
- Axis2 Web service and Tomcat Manager
- Play Session Injection
- Play XML Entities
- CVE-2007-1860: mod_jk double-decoding
- CVE-2008-1930: Wordpress 2.5 Cookie Integrity Protection Vulnerability
- CVE-2012-1823: PHP CGI
- CVE-2012-2661: ActiveRecord SQL injection
- CVE-2012-6081: MoinMoin code execution
- CVE-2014-6271/Shellshock
-
-
Dr. Thorsten Schneider's Binary Auditing
-
Mobile Security Labs
-
-
Damn Vulnerable Web Application (DVWA)
-
Mobile Security Labs
-
-
NOWASP (Mutillidae)
-
Mobile Security Labs
-
-
OWASP Broken Web Applications Project
-
Mobile Security Labs
-
-
OWASP Bricks
-
Mobile Security Labs
-
-
Web Attack and Exploitation Distro (WAED)
-
Mobile Security Labs
-
-
Audi-1's SQLi-LABS
-
Mobile Security Labs
-
CTF Repos
-
CTF Courses
- SecurityTube Metasploit Framework Expert (SMFE)
- Wireless LAN Security and Penetration Testing Megaprimer
- Exploit Research Megaprimer
- Buffer Overflow Exploitation Megaprimer for Linux
- Crypto101
- A Graduate Course in Applied Cryptography
- Security Engineering, Second Edition
- Reverse Engineering for Beginners
- LaTeX Source
- Reverse Engineering Challenges
- Pwnable.kr - commercial wargame site which provides various pwn challenges regarding system exploitation.
- Roppers CTF Course
- Reverse Engineering for Beginners
- Matasano Crypto Challenges - world crypto by letting you implement and break the cryptoschemes yourself.
- Open Web Application Security Project
- Applied Crypto Hardening
- Penetration Testing Execution Standard
- Awesome Appsec
- Awesome Malware Analysis
- Android Security Awesome
- Awesome CTF
- Awesome Security
- Awesome Honeypots
- Awesome Incident Response
- Awesome PCAP Tools
- Awesome Hacking
- ![Creative Commons License
- Creative Commons Attribution 4.0 International License
- gitbook
- ![Creative Commons License
- Matasano Crypto Challenges - world crypto by letting you implement and break the cryptoschemes yourself.
- Creative Commons Attribution 4.0 International License
-
-
Uncategorized
-
Uncategorized
- Stanford University - Computer Security
- Stanford University - Cryptography I
- Stanford University - Cryptography II
- University of Maryland - Software Security
- University of Maryland - Cryptography
- University of Maryland - Hardware Security
- University of Washington - Introduction to CyberSecurity
- University of Washington - Finding Your Cybersecurity Career Path
- University of Washington - Essentials of Cybersecurity
- CSCI 4974/6974 - Spring '14 Hardware Reverse Engineering
- CNIT 120 - Network Security
- CNIT 121 - Computer Forensics
- CNIT 123 - Ethical Hacking and Network Defense
- CNIT 124 - Advanced Ethical Hacking
- CNIT 126 - Practical Malware Analysis
- CNIT 127 - Exploit Development
- CNIT 128 - Hacking Mobile Devices
- CNIT 129S: Securing Web Applications
- CNIT 140: IT Security Practices
- Violent Python and Exploit Development
- CS6038/CS5138 Malware Analysis
- MOBISEC2018
- CSCI 4976 - Fall '15 Malware Analysis
- CNIT 40: DNS Security
- NYU Tandon's OSIRIS Lab's Hack Night
- University of Maryland - Usable Security
- University of Maryland - Hardware Security
-
Programming Languages
Categories
Audi-1's SQLi-LABS
38
Syracuse University's SEED
37
Pentester Lab
33
Open Security Training
30
Cybrary - Online Cyber Security Training
29
Uncategorized
27
Roppers Academy
5
OWASP Broken Web Applications Project
1
OWASP Bricks
1
Damn Vulnerable Web Application (DVWA)
1
Web Attack and Exploitation Distro (WAED)
1
NOWASP (Mutillidae)
1
Dr. Thorsten Schneider's Binary Auditing
1
Sub Categories
Keywords
awesome
6
security
5
awesome-list
5
list
4
malware-collection
1
malware-analysis
1
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1
chinese
1
automated-analysis
1
analysis-framework
1
security-experts
1
reading-list
1
owasp
1
curated
1
hacking
1
incident-response-tooling
1
incident-response
1
dfir
1
cybersecurity
1
honeypot
1
honeyd
1
penetration
1
ctf
1
android
1
threatintel
1
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-research
1
application-security
1