https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
List: Awesome-Cybersecurity-Handbooks
capture-the-flag ctf cybersecurity handbooks infosec offensive offensive-security penetration-testing pentesting red-teaming security
Last synced: 11 days ago
JSON representation
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
- Host: GitHub
- URL: https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
- Owner: 0xsyr0
- License: gpl-3.0
- Created: 2022-10-11T08:05:48.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-22T20:18:22.000Z (11 months ago)
- Last Synced: 2024-05-23T00:28:47.354Z (11 months ago)
- Topics: capture-the-flag, ctf, cybersecurity, handbooks, infosec, offensive, offensive-security, penetration-testing, pentesting, red-teaming, security
- Homepage:
- Size: 4.01 MB
- Stars: 2,094
- Watchers: 31
- Forks: 276
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-starz - 0xsyr0/Awesome-Cybersecurity-Handbooks - A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. (Others)
README
![]()
# Awesome Cybersecurity Handbooks [](https://github.com/sindresorhus/awesome)
  
 A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.
> [!IMPORTANT]
> Please note that these documents are **only** provided for **legal purposes**. Please do **not** use the content for illigal actions.If you like the project, give it a :star: or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.
> [!NOTE]
> As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on [X](https://twitter.com/syr0_) — or preferably [Bluesky](https://bsky.app/profile/0xsyr0.bsky.social) — and I will add you asap.Thank you for reading.
## Table of Contents
| | | | |
| --- | --- | --- | --- |
| [01 Information Gathering](handbooks/01_information_gathering.md) | [AI](handbooks/ai.md) | [DFIR](handbooks/dfir.md) | [Privacy](handbooks/privacy.md) |
| [02 Vulnerability Analysis](handbooks/02_vulnerability_analysis.md) | [Attack Surface Management](handbooks/attack_surface_management.md) | [EDR & XDR](handbooks/edr_xdr.md) | [Secure Architecture](handbooks/secure_architecture.md) |
| [03 Web Application Analysis](handbooks/03_web_application_analysis.md) | [Basics](handbooks/basics.md) | [Evasion](handbooks/evasion.md) | [Security Operations Center](handbooks/security_operations_center.md) |
| [04 Database Assessment](handbooks/04_database_assessment.md) | [Blockchain](handbooks/blockchain.md) | [Exploitation](handbooks/exploitation.md) | [SIEM](handbooks/siem.md) |
| [05 Password Attacks](handbooks/05_password_attacks.md) | [Bug Bounty](handbooks/bug_bounty.md) | [Frameworks](handbooks/frameworks.md) | [Simulation & Emulation](handbooks/simulation_emulation.md) |
| [06 Wireless Attacks](handbooks/06_wireless_attacks.md) | [Cloud](handbooks/cloud.md) | [Hardware](handbooks/hardware.md) | [SOAR & SecOps](handbooks/soar_%26_secops.md) |
| [07 Reverse Engineering](handbooks/07_reverse_engineering.md) | [Command and Control](handbooks/command_and_control.md) | [IDS & IPS](handbooks/ids_ips.md) | [Templates](handbooks/templates.md) |
| [08 Exploitation Tools](handbooks/08_exploitation_tools.md) | [Container](handbooks/container.md) | [IoT](handbooks/iot.md) | [Threat Hunting](handbooks/threat_hunting.md) |
| [09 Sniffing & Spoofing](handbooks/09_sniffing_%26_spoofing.md) | [Cryptography](handbooks/cryptography.md) | [Malware Development](handbooks/malware_development.md) | [Threat Modeling](handbooks/threat_modeling.md) |
| [10 Post Exploitation](handbooks/10_post_exploitation.md) | [CVE](handbooks/cve.md) | [Mobile](handbooks/mobile.md) | [Wordlists](handbooks/wordlists.md) |
| [11 Forensics](handbooks/11_forensics.md) | [Cyber Threat Intelligence](handbooks/cyber_threat_intelligence.md) | [Operations Security](handbooks/operations_security.md) |
| [12 Reporting Tools](handbooks/12_reporting_tools.md) | [Decrypter](handbooks/decrypter.md) | [OSINT](handbooks/osint.md) |
| [13 Social Engineering Tools](handbooks/13_social_engineering_tools.md) | [Detection Engineering](handbooks/detection_engineering.md) | [Payloads](handbooks/payloads.md) |