An open API service indexing awesome lists of open source software.

https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks

List: Awesome-Cybersecurity-Handbooks

capture-the-flag ctf cybersecurity handbooks infosec offensive offensive-security penetration-testing pentesting red-teaming security

Last synced: 11 days ago
JSON representation

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.

Awesome Lists containing this project

README

        



# Awesome Cybersecurity Handbooks [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)

![GitHub stars](https://img.shields.io/github/stars/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=yellow) ![GitHub forks](https://img.shields.io/github/forks/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=purple) ![GitHub watchers](https://img.shields.io/github/watchers/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=green)
![GitHub commit activity (branch)](https://img.shields.io/github/commit-activity/m/0xsyr0/Awesome-Cybersecurity-Handbooks) ![GitHub contributors](https://img.shields.io/github/contributors/0xsyr0/Awesome-Cybersecurity-Handbooks)

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.

> [!IMPORTANT]
> Please note that these documents are **only** provided for **legal purposes**. Please do **not** use the content for illigal actions.

If you like the project, give it a :star: or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.

> [!NOTE]
> As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on [X](https://twitter.com/syr0_) — or preferably [Bluesky](https://bsky.app/profile/0xsyr0.bsky.social) — and I will add you asap.

Thank you for reading.


## Table of Contents

| | | | |
| --- | --- | --- | --- |
| [01 Information Gathering](handbooks/01_information_gathering.md) | [AI](handbooks/ai.md) | [DFIR](handbooks/dfir.md) | [Privacy](handbooks/privacy.md) |
| [02 Vulnerability Analysis](handbooks/02_vulnerability_analysis.md) | [Attack Surface Management](handbooks/attack_surface_management.md) | [EDR & XDR](handbooks/edr_xdr.md) | [Secure Architecture](handbooks/secure_architecture.md) |
| [03 Web Application Analysis](handbooks/03_web_application_analysis.md) | [Basics](handbooks/basics.md) | [Evasion](handbooks/evasion.md) | [Security Operations Center](handbooks/security_operations_center.md) |
| [04 Database Assessment](handbooks/04_database_assessment.md) | [Blockchain](handbooks/blockchain.md) | [Exploitation](handbooks/exploitation.md) | [SIEM](handbooks/siem.md) |
| [05 Password Attacks](handbooks/05_password_attacks.md) | [Bug Bounty](handbooks/bug_bounty.md) | [Frameworks](handbooks/frameworks.md) | [Simulation & Emulation](handbooks/simulation_emulation.md) |
| [06 Wireless Attacks](handbooks/06_wireless_attacks.md) | [Cloud](handbooks/cloud.md) | [Hardware](handbooks/hardware.md) | [SOAR & SecOps](handbooks/soar_%26_secops.md) |
| [07 Reverse Engineering](handbooks/07_reverse_engineering.md) | [Command and Control](handbooks/command_and_control.md) | [IDS & IPS](handbooks/ids_ips.md) | [Templates](handbooks/templates.md) |
| [08 Exploitation Tools](handbooks/08_exploitation_tools.md) | [Container](handbooks/container.md) | [IoT](handbooks/iot.md) | [Threat Hunting](handbooks/threat_hunting.md) |
| [09 Sniffing & Spoofing](handbooks/09_sniffing_%26_spoofing.md) | [Cryptography](handbooks/cryptography.md) | [Malware Development](handbooks/malware_development.md) | [Threat Modeling](handbooks/threat_modeling.md) |
| [10 Post Exploitation](handbooks/10_post_exploitation.md) | [CVE](handbooks/cve.md) | [Mobile](handbooks/mobile.md) | [Wordlists](handbooks/wordlists.md) |
| [11 Forensics](handbooks/11_forensics.md) | [Cyber Threat Intelligence](handbooks/cyber_threat_intelligence.md) | [Operations Security](handbooks/operations_security.md) |
| [12 Reporting Tools](handbooks/12_reporting_tools.md) | [Decrypter](handbooks/decrypter.md) | [OSINT](handbooks/osint.md) |
| [13 Social Engineering Tools](handbooks/13_social_engineering_tools.md) | [Detection Engineering](handbooks/detection_engineering.md) | [Payloads](handbooks/payloads.md) |