Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
List: Awesome-Cybersecurity-Handbooks
capture-the-flag ctf cybersecurity handbooks infosec offensive offensive-security penetration-testing pentesting red-teaming security
Last synced: about 1 month ago
JSON representation
A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
- Host: GitHub
- URL: https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks
- Owner: 0xsyr0
- License: gpl-3.0
- Created: 2022-10-11T08:05:48.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-22T20:18:22.000Z (7 months ago)
- Last Synced: 2024-05-23T00:28:47.354Z (7 months ago)
- Topics: capture-the-flag, ctf, cybersecurity, handbooks, infosec, offensive, offensive-security, penetration-testing, pentesting, red-teaming, security
- Homepage:
- Size: 4.01 MB
- Stars: 2,094
- Watchers: 31
- Forks: 276
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-starz - 0xsyr0/Awesome-Cybersecurity-Handbooks - A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer. (Others)
README
# Awesome Cybersecurity Handbooks [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
![GitHub stars](https://img.shields.io/github/stars/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=yellow) ![GitHub forks](https://img.shields.io/github/forks/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=purple) ![GitHub watchers](https://img.shields.io/github/watchers/0xsyr0/Awesome-Cybersecurity-Handbooks?logoColor=green)
![GitHub commit activity (branch)](https://img.shields.io/github/commit-activity/m/0xsyr0/Awesome-Cybersecurity-Handbooks) ![GitHub contributors](https://img.shields.io/github/contributors/0xsyr0/Awesome-Cybersecurity-Handbooks)A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.
> [!IMPORTANT]
> Please note that these documents are **only** provided for **legal purposes**. Please do **not** use the content for illigal actions.If you like the project, give it a :star: or share it on various platforms. My goal is to create and to gather resources for people to help them on their career.
> [!NOTE]
> As always, it is pretty hard to point out every source for different tools or payloads. If I used your payload anywhere in my notes and you wanted to be mentioned, feel free to reach out to me on [X](https://twitter.com/syr0_) and I will add you asap.Thank you for reading.
## Table of Contents
- [01 Information Gathering](handbooks/01_information_gathering.md)
- [02 Vulnerability Analysis](handbooks/02_vulnerability_analysis.md)
- [03 Web Application Analysis](handbooks/03_web_application_analysis.md)
- [04 Database Assessment](handbooks/04_database_assessment.md)
- [05 Password Attacks](handbooks/05_password_attacks.md)
- [06 Wireless Attacks](handbooks/06_wireless_attacks.md)
- [07 Reverse Engineering](handbooks/07_reverse_engineering.md)
- [08 Exploitation Tools](handbooks/08_exploitation_tools.md)
- [09 Sniffing & Spoofing](handbooks/09_sniffing_%26_spoofing.md)
- [10 Post Exploitation](handbooks/10_post_exploitation.md)
- [11 Forensics](handbooks/11_forensics.md)
- [12 Reporting Tools](handbooks/12_reporting_tools.md)
- [13 Social Engineering Tools](handbooks/13_social_engineering_tools.md)
- [AI](handbooks/ai.md)
- [Basics](handbooks/basics.md)
- [Blue Teaming](handbooks/blue_teaming.md)
- [Bug Bounty](handbooks/bug_bounty.md)
- [Cloud](handbooks/cloud.md)
- [Command and Control](handbooks/command_and_control.md)
- [Container](handbooks/container.md)
- [Cryptography](handbooks/cryptography.md)
- [CVE](handbooks/cve.md)
- [Decrypter](handbooks/decrypter.md)
- [Evasion](handbooks/evasion.md)
- [Exploitation](handbooks/exploitation.md)
- [Frameworks](handbooks/frameworks.md)
- [Hardware](handbooks/hardware.md)
- [IoT](handbooks/iot.md)
- [Malware Development](handbooks/malware_development.md)
- [Mobile](handbooks/mobile.md)
- [Operational Security](handbooks/operational_security.md)
- [OSINT](handbooks/osint.md)
- [Payloads](handbooks/payloads.md)
- [Privacy](handbooks/privacy.md)
- [Templates](handbooks/templates.md)
- [Wordlists](handbooks/wordlists.md)