Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks

List: Awesome-Cybersecurity-Handbooks

capture-the-flag ctf cybersecurity handbooks infosec offensive offensive-security penetration-testing pentesting red-teaming security

Last synced: about 1 month ago
JSON representation

A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.

Awesome Lists containing this project

README

        



# Awesome Cybersecurity Handbooks [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)

![GitHub stars](https://img.shields.io/github/stars/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=yellow) ![GitHub forks](https://img.shields.io/github/forks/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=purple) ![GitHub watchers](https://img.shields.io/github/watchers/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=green)
![GitHub commit activity (branch)](https://img.shields.io/github/commit-activity/m/0xsyr0/Awesome-Cybersecurity-Handbooks) ![GitHub contributors](https://img.shields.io/github/contributors/0xsyr0/Awesome-Cybersecurity-Handbooks)

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.

> [!IMPORTANT]
> Please note that these documents are **only** provided for **legal purposes**. Please do **not** use the content for illigal actions.

If you like the project, give it a :star: or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.

> [!NOTE]
> As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on [X](https://twitter.com/syr0_) and I will add you asap.

Thank you for reading.


## Table of Contents

- [01 Information Gathering](handbooks/01_information_gathering.md)
- [02 Vulnerability Analysis](handbooks/02_vulnerability_analysis.md)
- [03 Web Application Analysis](handbooks/03_web_application_analysis.md)
- [04 Database Assessment](handbooks/04_database_assessment.md)
- [05 Password Attacks](handbooks/05_password_attacks.md)
- [06 Wireless Attacks](handbooks/06_wireless_attacks.md)
- [07 Reverse Engineering](handbooks/07_reverse_engineering.md)
- [08 Exploitation Tools](handbooks/08_exploitation_tools.md)
- [09 Sniffing & Spoofing](handbooks/09_sniffing_%26_spoofing.md)
- [10 Post Exploitation](handbooks/10_post_exploitation.md)
- [11 Forensics](handbooks/11_forensics.md)
- [12 Reporting Tools](handbooks/12_reporting_tools.md)
- [13 Social Engineering Tools](handbooks/13_social_engineering_tools.md)
- [AI](handbooks/ai.md)
- [Basics](handbooks/basics.md)
- [Blue Teaming](handbooks/blue_teaming.md)
- [Bug Bounty](handbooks/bug_bounty.md)
- [Cloud](handbooks/cloud.md)
- [Command and Control](handbooks/command_and_control.md)
- [Container](handbooks/container.md)
- [Cryptography](handbooks/cryptography.md)
- [CVE](handbooks/cve.md)
- [Decrypter](handbooks/decrypter.md)
- [Evasion](handbooks/evasion.md)
- [Exploitation](handbooks/exploitation.md)
- [Frameworks](handbooks/frameworks.md)
- [Hardware](handbooks/hardware.md)
- [IoT](handbooks/iot.md)
- [Malware Development](handbooks/malware_development.md)
- [Mobile](handbooks/mobile.md)
- [Operational Security](handbooks/operational_security.md)
- [OSINT](handbooks/osint.md)
- [Payloads](handbooks/payloads.md)
- [Privacy](handbooks/privacy.md)
- [Templates](handbooks/templates.md)
- [Wordlists](handbooks/wordlists.md)