Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-Hacking-Resources
A collection of hacking / penetration testing resources to make you better!
https://github.com/vitalysim/Awesome-Hacking-Resources
Last synced: 6 days ago
JSON representation
-
Table of Contents
-
Learning the Skills
- CS 642: Intro to Computer Security
- CyberSec WTF - ups
- Cybrary - contributed content, account required, content can be filtered by experience level
- Free Cyber Security Training
- Hak5 - style videos covering various topics, has a forum, "metasploit-minute" video series could be useful
- Hopper's Roppers Security Training - paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
- Learning Exploitation with Offensive Computer Security 2.0 - style instruction, includes: slides, videos, homework, discussion. No login required.
- Mind Maps
- MIT OCW 6.858 Computer Systems Security - semester course, includes assigned readings, lectures, videos, required lab files.
- OffensiveComputerSecurity
- OWASP top 10 web security risks
- SecurityTube - styled content, "megaprimer" videos covering various topics, no readable content on site.
- Seed Labs
- TryHackMe
- Hopper's Roppers Security Training - paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
- Learning Exploitation with Offensive Computer Security 2.0 - style instruction, includes: slides, videos, homework, discussion. No login required.
-
YouTube Channels
- 0patch by ACROS Security
- BlackHat
- Christiaan008
- Detectify
- Hak5
- Kaspersky Lab
- Metasploit
- ntop
- nVisium
- OpenNSM
- OWASP
- Rapid7
- Securelist
- Segment Security - instructional
- SocialEngineerOrg - style, instructional, lengthy content ~1 hr each
- Sonatype
- SophosLabs - style content, "7 Deadly IT Sins" segment is of note
- Sourcefire
- Station X
- Synack - style videos, disorganized, non-instructional
- TippingPoint Zero Day Initiative
- Tripwire, Inc. - style videos, non-instructional
- Vincent Yiu
- 44contv
- MIT OCW 6.858 Computer Systems Security
- BruCON Security Conference
- BSides Manchester
- BSidesAugusta
- CarolinaCon
- Cort Johnson - style talks from Hack Secure Opensec 2017
- DevSecCon
- Garage4Hackers - Information Security
- HACKADAY
- Hack In The Box Security Conference - style instructional talks from an international security con
- Hack in Paris
- Hacklu - style instructional videos
- Hacktivity - style instructional videos from a con in central/eastern europe
- Hardwear.io - style video, emphasis on hardware hacks
- IEEE Symposium on Security and Privacy
- LASCON - style talks from an OWASP con held in Austin, TX
- leHACK
- Marcus Niemietz
- Media.ccc.de - tons of lengthy con-style vids
- NorthSec - style talks from an applied security conference in Canada
- Pancake Nopcode
- Psiinon
- SJSU Infosec
- Secappdev.org
- Security Fest - style talks from a security festival in Sweden
- SecurityTubeCons - style talks from various cons including BlackHat and Shmoocon
- ToorCon
- USENIX Enigma Conference
- ZeroNights - style talks from international conference ZeroNights
- 0x41414141
- Adrian Crenshaw - style talks
- Corey Nachreiner - 3 videos a week, no set schedule
- BalCCon - Balkan Computer Congress - style talks from the Balkan Computer Congress, doesn't update regularly
- danooct1 - to vids regarding malware, regular content updates, 186K followerss
- DedSec - to vids based in Kali, no recent posts.
- DEFCON Conference - style vids from the iconical DEFCON
- DemmSec
- Derek Rook - CTF/Boot2root/wargames Walkthrough
- Don Does 30 - tester posting lots of brief screenshot vids regularly, 9K Followers
- Error 404 Cyber News - shot videos with loud metal, no dialog, bi-weekly
- Geeks Fort - KIF
- GynvaelEN
- HackerSploit
- HACKING TUTORIALS
- iExplo1t
- JackkTutorials
- John Hammond
- Latest Hacking News
- LionSec
- LiveOverflow - to-medium instructional vids, covering things like buffer overflows and exploit writing, regular posts.
- Metasploitation
- NetSecNow
- Open SecurityTraining - style vids, no recent posts, but quality info.
- Pentester Academy TV
- Penetration Testing in Linux
- rwbnetsec
- Samy Kamkar's Applied Hacking
- SecureNinjaTV
- Security Weekly - style interviews with industry pros
- Seytonic
- Shozab Haxor
- SSTec Tutorials
- Tradecraft Security Weekly
- Troy Hunt
- Waleed Jutt
- webpwnized
- Zer0Mem0ry
- IPPSec
- The Daily Swig
-
Sharpening Your Skills
- Backdoor
- The cryptopals crypto challenges
- Crackmes.de Archive (2011-2015)
- Crackmes.one
- websec.fr
- tryhackme
- webhacking.kr
- Stripe CTF 2.0
- Hacker101 CTF
- Hacking Lab
- Portswigger
- CTFLearn - based ctf site, where users can go in and solve a range of challenges
- CTFs write-ups
- CTF365 - Mobile
- The enigma group
- Exploit exercises
- Google CTF 2019
- Google's XSS game
- Ringzer0 Team
- Hack The Box
- Hacker test
- Hacker Gateway
- SmashTheStack
- hackburger.ee
- Hack.me
- Hack this site!
- knock.xss.moe
- Lin.security
- noe.systems
- Over the wire
- Participating Challenge Sites
- PentesterLab
- Pentestit
- Pentest Practice - as-you-go feature
- Pentest.training
- PicoCTF
- pwnable.kr
- pwnable.tw
- ROP Emporium
- Shellter Labs
- Solve Me
- pwnable.tw
- noe.systems
- Hacking Articles
- Challenge Land - up, you have to solve a challengeto even get that far!
-
Reverse Engineering, Buffer Overflow and Exploit Development
- Analysis and exploitation (unprivileged)
- Binary hacking
- Buffer Overflow Exploitation Megaprimer for Linux
- Corelan tutorials
- Exploit tutorials
- Exploit development
- flAWS challenge
- Introduction to ARM Assembly Basics
- Introductory Intel x86
- Lena's Reversing for Newbies (Complete)
- Linux (x86) Exploit Development Series
- Megabeets journey into Radare2
- Recon.cx - reversing conference
- Reverse Engineering for Beginners - source
- Reverse engineering reading list
- Reverse Engineering challenges
- Reverse Engineering for beginners (GitHub project)
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102
- reversing.kr challenges
- Shell storm
- Shellcode Injection
- Micro Corruption — Assembly
-
Vulnerable Web Application
-
Privilege Escalation
- 4 Ways get linux privilege escalation
- A GUIDE TO LINUX PRIVILEGE ESCALATION
- Abusing SUDO (Linux Privilege Escalation)
- Basic linux privilege escalation
- Common Windows Privilege Escalation Vectors
- Editing /etc/passwd File for Privilege Escalation
- Linux Privilege Escalation
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Using PATH Variable
- Linux Privilege Escalation using Misconfigured NFS
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- OSCP - Windows Priviledge Escalation
- Privilege escalation for Windows and Linux
- Privilege escalation linux with live example
- Reach the root
- Unix privesc checker
- Windows Privilege Escalation
- Windows Privilege Escalation
- Windows privilege escalation checker
- Windows Privilege Escalation Fundamentals
- Windows Privilege Escalation Guide
- Windows Privilege Escalation Methods for Pentesters
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- 4 Ways get linux privilege escalation
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Linux Privilege Escalation Scripts
- A GUIDE TO LINUX PRIVILEGE ESCALATION
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Linux Privilege Escalation Scripts
- Editing /etc/passwd File for Privilege Escalation
- Linux Privilege Escalation Using PATH Variable
- Linux Privilege Escalation using Misconfigured NFS
- A GUIDE TO LINUX PRIVILEGE ESCALATION
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation via Dynamically Linked Shared Object Library
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Scripts
- Linux Privilege Escalation Scripts
-
Malware Analysis
-
Network Scanning / Reconnaissance
-
Vulnerable OS
-
Linux Penetration Testing OS
- Android Tamer
- BackBox
- BlackArch
- Bugtraq - testing technology
- Kali
- LionSec Linux
- Pentoo
- Parrot
-
Exploits
-
Forums
- 0x00sec
- Antichat
- CODEBY.NET - russian based forum
- EAST Exploit database
- Greysec
- Hackforums
- CaveiraTech
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- 4Hat Day
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- Antichat
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
- EAST Exploit database
-
Archived Security Conference Videos
- InfoCon.org
- Irongeek
- infocondb.org - reference all hacker conferences.
-
Online Communities
-
Online News Sources
-
Categories
Sub Categories
YouTube Channels
93
Sharpening Your Skills
45
Forums
45
Privilege Escalation
43
Reverse Engineering, Buffer Overflow and Exploit Development
23
Learning the Skills
16
Linux Penetration Testing OS
8
Vulnerable Web Application
5
Online News Sources
5
Exploits
4
Vulnerable OS
3
Online Communities
3
Archived Security Conference Videos
3
Malware Analysis
2
Network Scanning / Reconnaissance
2