Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xedward/awesome-infosec
A curated list of awesome infosec blog posts, courses, books and more!
https://github.com/0xedward/awesome-infosec
List: awesome-infosec
awesome binary-exploitation books bug-bounty courses cryptography ctf hacker-blogs infosec malware oscp penetration-testing pentesting privilege-escalation recon reverse-engineering scripting security vulnerable-applications wargames
Last synced: 4 days ago
JSON representation
A curated list of awesome infosec blog posts, courses, books and more!
- Host: GitHub
- URL: https://github.com/0xedward/awesome-infosec
- Owner: 0xedward
- Created: 2018-07-26T19:49:22.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2020-05-27T18:51:07.000Z (over 4 years ago)
- Last Synced: 2024-05-22T14:06:11.261Z (6 months ago)
- Topics: awesome, binary-exploitation, books, bug-bounty, courses, cryptography, ctf, hacker-blogs, infosec, malware, oscp, penetration-testing, pentesting, privilege-escalation, recon, reverse-engineering, scripting, security, vulnerable-applications, wargames
- Homepage:
- Size: 13.7 KB
- Stars: 95
- Watchers: 6
- Forks: 24
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-security-collection - **20**星
- ultimate-awesome - awesome-infosec - A curated list of awesome infosec blog posts, courses, books and more!. (Other Lists / PowerShell Lists)
README
[![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
This is a list of Information Security resources and tools I've found useful at some time during my study of security and I hope that others will too.
This list is will be updated whenever I've found something awesome to add.
### Contents
- [Recon](#recon)
- [Web](#web)
- [Vulnerable Web Applications](#vulnerable-web-applications)
- [Linux](#linux)
- [Exploit Development](#exploit-development)
- [Cryptography](#cryptography)
- [Privilege Escalation](#privilege-escalation)
- [Scripting](#scripting)
- [Courses](#courses)
- [Labs](#labs)
- [CTF](#ctf)
- [Wargames](#wargames)
- [OSCP](#oscp)
- [Penetration Testing](#penetration-testing)
- [Binary Exploitation](#binary-exploitation)
- [Reverse Engineering](#reverse-engineering)
- [Malware Samples](#malware-samples)
- [Bug Bounty](#bug-bounty)
- [Hacker Blogs](#hacker-blogs)
- [Controls](#controls)### Recon
- [DNS Dumpster](https://dnsdumpster.com/)
- [SecLists](https://github.com/jhaddix/SecLists)
- [Sublist3r](https://github.com/aboul3la/Sublist3r)
- [Subfinder](https://github.com/subfinder/subfinder)
- [Amass](https://github.com/OWASP/Amass)
- [httprobe](https://github.com/tomnomnom/httprobe)
- [dirsearch](https://github.com/maurosoria/dirsearch)
- [webscreenshot](https://github.com/maaaaz/webscreenshot)
- [cc.py](https://github.com/si9int/cc.py)
- [@ITSecurityguard Visual Recon Guide](https://blog.it-securityguard.com/visual-recon-a-beginners-guide/)### Web
- [Web Application Hacker’s Handbook 2nd Edition](http://mdsec.net/wahh/toc2e.html)
- [The Tangled Web](https://nostarch.com/tangledweb)
- [OWASP Top 10 - 2017](https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf)
- [OWASP Top 10 - 2013](https://www.owasp.org/images/f/f8/OWASP_Top_10_-_2013.pdf)
- [Portswigger Web Security Blog](https://portswigger.net/blog)
- [detectify Web Security Blog](https://blog.detectify.com/category/web-security/)
- [HTTP Status Codes](https://httpstatuses.com/)
- [Dave Kukfa - Web Application Cheat Sheet](https://kukfa.co/resources/web-application-cheat-sheet/)### Vulnerable Web Applications
- [Damn Vulnerable Web Application (DVWA)](http://www.dvwa.co.uk/)
- [OWASP Mutillidae 2](https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project)
- [OWASP WebGoat](https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project)
- [Rapid7 Hackazon](https://github.com/rapid7/hackazon)
- [Google Gruyere](https://google-gruyere.appspot.com/)### Linux
- [Linux Journey](https://linuxjourney.com/)### Exploit Development
- [Exploit Exercises](https://exploit-exercises.com/)
- [LiveOverflow - Binary Hacking Playlist](http://liveoverflow.com/binary_hacking/index.html)### Cryptography
- [A Stick Figure Guide to AES](http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html)
- [Cryptopals Challenges](https://cryptopals.com/)
- [The Manga Guide to Cryptography](https://books.google.com/books/about/The_Manga_Guide_to_Cryptography.html?id=mrgrDwAAQBAJ&printsec=frontcover&source=kp_read_button#v=onepage&q&f=false)
- [Crypto 101](https://www.crypto101.io/)### Privilege Escalation
- [g0tmi1k's Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check)### Scripting
- [Shell Scripting Tutorial](https://www.shellscript.sh)
- [Bash Academy](https://guide.bash.academy/)### Courses
- [OSCP](https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/)
- [Hacker101](https://www.hacker101.com)
- [Bugcrowd University](https://github.com/bugcrowd/bugcrowd_university)
- [Cybrary](https://www.cybrary.it/)
- [Pluralsight - Information and Cyber Security](https://www.pluralsight.com/browse/information-cyber-security)### Labs
- [PentesterLab](https://pentesterlab.com/referral/-MCa2tgjacaaaQ)
- [Hack The Box](https://www.hackthebox.eu)
- [AttackDefense Labs](https://attackdefense.com/)
- [VulnHub](https://www.vulnhub.com/)### CTF
- [Hacker101 CTF](https://ctf.hacker101.com/)
- [PicoCTF](https://picoctf.com/)
- [Google CTF](https://capturetheflag.withgoogle.com)
- [CTF Time](https://ctftime.org/)### Wargames
- [OverTheWire](http://overthewire.org/wargames/)
- [SmashTheStack](http://smashthestack.org/wargames.html)
- [HackThisSite](https://www.hackthissite.org/)### OSCP
- [Jeremy Chisamore's Zero to OSCP in 292 Days](https://blog.mallardlabs.com/zero-to-oscp-in-292-days-or-how-i-accidentally-the-whole-thing-part-2/)
- [Tulpa Security - Prep Guide for Offsec's PWK](https://tulpa-security.com/2016/09/19/prep-guide-for-offsecs-pwk/)### Penetration Testing
- [Penetration Testing - A Systematic Approach](https://infosecwriters.com/Papers/MSaindane_Pentest.pdf)
- [The Red Team Field Manual (RTFM)](https://doc.lagout.org/rtfm-red-team-field-manual.pdf)
- [The Hacker Playbook](https://www.amazon.com/Hacker-Playbook-Practical-Penetration-Testing/dp/1980901759/ref=pd_lpo_sbs_14_t_0?_encoding=UTF8&psc=1&refRID=RXPDZKDEYEJRQZ48YMYQ)
- [IppSec - Hack The Box Walkthrough Videos](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)### Binary Exploitation
- [Pwnable.tw](https://pwnable.tw/)
- [Pwnable.kr](http://pwnable.kr/)
- [Exploit-Exercises](https://exploit-exercises.com)### Reverse Engineering
- [malwareunicorn - How to start reverse engineering malware](http://amanda.secured.org/how-to-start-reverse-engineering-malware/)
- [malwareunicorn - RE101](https://securedorg.github.io/RE101/)
- [Ophir Harpaz - Reverse Engineering for Beginners](https://www.begin.re/)
- [Reversing.Kr](http://reversing.kr)### Malware Samples
- [VirusBay](https://beta.virusbay.io/)
- [contagio malware dump](http://contagiodump.blogspot.com/)
- [VirusShare](https://virusshare.com/)
- [Malware.lu](https://malware.lu/)
- [MalShare](http://www.malshare.com/)### Bug Bounty
- [Bug Bounty Forum](https://bugbountyforum.com/)
- [Bug Bounty World](https://bugbountyworld.com/)
- [Bug Bounty Notes](https://www.bugbountynotes.com/)
- [Pentester Land - List of bug bounty writeups](https://pentester.land/list-of-bug-bounty-writeups.html)
- [FireBounty](https://firebounty.com/)
- [Improving your reports - Google Bughunter University](https://sites.google.com/site/bughunteruniversity/improve)
- [Facebook Bounty Hunter's Guide](https://www.facebook.com/notes/facebook-bug-bounty/a-bounty-hunters-guide-to-facebook/946955115318715)
- [Breaking into Information Security: Learning the Ropes 101](https://leanpub.com/ltr101-breaking-into-infosec)
- [Web Hacking 101](https://leanpub.com/web-hacking-101)
- [jhaddix - The Bug Hunters Methodology](https://github.com/jhaddix/tbhm)### Hacker Blogs
- [zseano](https://zseano.com/index.html)
- [Alyssa Herrera](https://medium.com/@alyssa.o.herrera)
- [Jonathan Bouman](https://medium.com/@jonathanbouman)
- [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)### Controls
- [SANS CIS Top 20](https://www.sans.org/security-resources/posters/20-critical-security-controls/55/download)