Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mrtouch93/awesome-security-feed
A semi-curated list of Security Feeds
https://github.com/mrtouch93/awesome-security-feed
List: awesome-security-feed
awesome-list cybersecurity feeds hacking offensive-security security-news
Last synced: 3 months ago
JSON representation
A semi-curated list of Security Feeds
- Host: GitHub
- URL: https://github.com/mrtouch93/awesome-security-feed
- Owner: mrtouch93
- Created: 2020-11-11T20:42:54.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2022-11-20T09:35:05.000Z (almost 2 years ago)
- Last Synced: 2024-04-09T23:26:57.264Z (7 months ago)
- Topics: awesome-list, cybersecurity, feeds, hacking, offensive-security, security-news
- Homepage:
- Size: 224 KB
- Stars: 103
- Watchers: 11
- Forks: 12
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Security: security_feeds.opml
Awesome Lists containing this project
- awesome-hacking-lists - mrtouch93/awesome-security-feed - A semi-curated list of Security Feeds (Others)
- ultimate-awesome - awesome-security-feed - A semi-curated list of Security Feeds. (Other Lists / PowerShell Lists)
README
# Awesome Security Feeds
A semi-curated list of Security FeedsYou can import the opml file to a service like Feedly, Tiny Tiny RSS or similar.
Below a list of all the sites, feel free to suggest others!
## Contents
- [CTF](#CTF)
- [Companies](#Companies)
- [Companies research](#Companies_research)
- [Conferences & Video](#Conferences_and_Video)
- [CyberIntelligence](#CyberIntelligence)
- [Forensics](#Forensics)
- [Italiano](#Italiano)
- [Malware](#Malware)
- [Miscellaneous](#Miscellaneous)
- [Offensive Security](#Offensive_Security)
- [Pentest](#Pentest)
- [Privacy](#Privacy)
- [Security News](#Security_News)
- [Security Tools](#Security_Tools)
- [Web Security](#Web_Security)
- [reddit](#reddit)## CTF
* [#!/slash/note](https://leonjza.github.io/)* [BalalaikaCr3w](https://ctfcrew.org)
* [Brett Buerhaus](https://buer.haus)
* [The Life of a Penetration Tester](http://lifeofpentester.blogspot.com/)
* [VulnHub ~ Entries](https://www.vulnhub.com)
* [khr@sh#: echo $GREETING](https://khr0x40sh.wordpress.com)
## Companies
* [BugCrowd](https://www.bugcrowd.com)* [CrowdStrike](https://www.crowdstrike.com/blog)
* [Microsoft Security](https://www.microsoft.com/security/blog)
* [Mosaic Security Research](https://mosaicsecurity.com)
* [Mozilla Security Blog](https://blog.mozilla.org/security)
* [Shodan Blog](https://blog.shodan.io/)
* [SpiderLabs Blog from Trustwave](https://www.trustwave.com/en-us/)
* [TrustedSec](https://www.trustedsec.com)
## Companies_research
* [Fortinet Blog](https://feeds.fortinet.com/fortinet/blog/threat-research)* [Google Online Security Blog](http://security.googleblog.com/)
* [Shielder](https://www.shielder.it/blog/)
* [Threat Research](https://www.fireeye.com/blog/threat-research/_jcr_content.feed)
## Conferences_and_Video
* [Defcon](https://www.defcon.org/)* [Irongeek's Security Site](http://www.irongeek.com/)
* [Paul's Security Weekly](http://securityweekly.com/)
* [SecurityTube.Net](http://www.securitytube.net)
* [Vimeo / Offensive Security’s videos](https://vimeo.com)
* [media.ccc.de - NEWS](http://media.ccc.de)
## CyberIntelligence
* [Cyber Strategies for a World at War](https://cyberstrategies.wordpress.com)* [JestersCourt](https://th3j35t3r.wordpress.com)
* [Krypt3ia](https://krypt3ia.wordpress.com)
* [bellingcat](https://www.bellingcat.com)
## Forensics
* [Hacking Exposed Computer Forensics Blog](https://www.hecfblog.com/)* [NETRESEC Network Security Blog](http://www.netresec.com/?page=Blog)
* [PC's Xcetra Support](https://pcsxcetrasupport3.wordpress.com)
## Italiano
* [Andrea Draghetti](https://www.andreadraghetti.it)* [Arturo Di Corinto](https://dicorinto.it)
* [Autistici](https://autistici.org/underscore/)
* [Codice Insicuro, blog di Cyber Security, sviluppo sicuro, code review e altro.](https://codiceinsicuro.it/)
* [Cyber Division](https://cyberdivision.net)
* [CyberDifesa.it](https://www.cyberdifesa.it)
* [D3Lab](https://www.d3lab.net)
* [Dark Space Blogspot](http://darkwhite666.blogspot.com/)
* [Fabio Natalucci Post](https://www.fabionatalucci.it)
* [HackTips](https://hacktips.it)
* [ICT Security Magazine](https://www.ictsecuritymagazine.com)
* [IT Service Management News](http://blog.cesaregallotti.it/)
* [Il Disinformatico](http://attivissimo.blogspot.com/)
* [LastKnight.com Feed](https://mgpf.it)
* [Luca Mercatanti](https://luca-mercatanti.com)
* [PANOPTICON ESCAPE](https://panopticonescape.wordpress.com)
* [Securityinfo.it](https://www.securityinfo.it)
* [Silendo](http://silendo.org)
* [TG Soft Software House - News](http://www.tgsoft.it/)
* [TS-WAY](https://www.ts-way.com)
* [Trin Tragula 0x2A](https://trintragulablog.wordpress.com)
* [WebSecurity IT](http://www.websec.it)
* [Yoroi Warning Archive Feed](https://us9.campaign-archive.com/feed?u=00093dab1cf5ca5a1d3d08535&id=74c8e9d528)
* [cavallette](https://cavallette.noblogs.org)
* [dirittodellinformatica.it - Rivista telematica su diritto e tecnologia](http://www.dirittodellinformatica.it)
* [oneOpenSource](http://www.oneopensource.it)
## Malware
* [0x3a - Security Specialist and programmer by trade](https://blog.0x3a.com/)* [AlienVault Labs Blog](https://cybersecurity.att.com/blogs/security-essentials)
* [Blaze's Security Blog](https://bartblaze.blogspot.com/)
* [ExposedBotnets](https://www.exposedbotnets.com)
* [Furoner.CAT](https://furoner.wordpress.com)
* [Malware Analysis: The Final Frontier](http://malwageddon.blogspot.com/)
* [Malware Must Die!](https://blog.malwaremustdie.org/)
* [MalwareDomainList updates](http://www.malwaredomainlist.com/mdl.php)
* [Malwarebytes Labs](https://blog.malwarebytes.com)
* [StopBadware blogs](https://www.stopbadware.org/blog)
* [ThreatFabric](https://www.threatfabric.com)
* [Trend Micro - Security Advisories](https://www.trendmicro.com/vinfo/us/threat-encyclopedia/rss/vulnerability)
* [Virus Bulletin's blog](https://www.virusbulletin.com/)
* [contagio](http://contagiodump.blogspot.com/)
## Miscellaneous
* [#_shellntel](https://www.synercomm.com)* [/dev/random](https://blog.rootshell.be)
* [0x00sec - The Home of the Hacker - Monthly top topics](https://0x00sec.org/top/monthly)
* [0x27.me](http://0x27.me/)
* [0xAA - Random notes on security](http://antukh.com/)
* [Fox-IT International blog](https://blog.fox-it.com)
* [@D00m3dr4v3n](https://www.doomedraven.com/)
* [A Few Thoughts on Cryptographic Engineering](https://blog.cryptographyengineering.com)
* [Add / Xor / Rol](http://addxorrol.blogspot.com/)
* [Aditya Agrawal](https://manifestsecurity.com/)
* [Andrew Hay](https://www.andrewhay.ca)
* [Astr0baby's not so random thoughts _____ rand() % 100;](https://astr0baby.wordpress.com)
* [Azeria Labs](https://azeria-labs.com)
* [BREAKDEV](https://breakdev.org/)
* [Black Hills Information Security](https://www.blackhillsinfosec.com)
* [Blog - Decent Security](http://decentsecurity.com/blog/)
* [BlueKaizen](http://www.bluekaizen.org)
* [NetSPI Blog](https://blog.netspi.com)
* [CERT Blogs](https://insights.sei.cmu.edu/cert/)
* [Cybersecurity Blog](http://infosecninja.blogspot.com/)
* [Daniel Miessler](https://danielmiessler.com)
* [Dave Waterson on Security](https://dwaterson.com)
* [David Longenecker](http://www.securityforrealpeople.com/)
* [Didier Stevens](https://blog.didierstevens.com)
* [DigiNinja](https://digi.ninja/rss.xml)
* [Down the Security Rabbithole Blog - Supplemental](http://blog.wh1t3rabbit.net/)
* [Security Research & Defense](https://msrc-blog.microsoft.com)
* [Eric Conrad](https://www.ericconrad.com/)
* [Errata Security](https://blog.erratasec.com/)
* [Gynvael Coldwind](https://gynvael.coldwind.pl/)
* [Hakin9 – IT Security Magazine](https://hakin9.org)
* [Hanno's blog](https://blog.hboeck.de/)
* [Have I Been Pwned latest breaches](https://haveibeenpwned.com/)
* [HolisticInfoSec™](https://holisticinfosec.io/)
* [I CAN'T HACK IT …OR CAN I?](https://icanthackit.wordpress.com)
* [ImperialViolet](http://www.imperialviolet.org/)
* [Infosec Island Latest Articles](https://www.infosecisland.com)
* [Inspired-Sec](https://blog.inspired-sec.com/)
* [Intercept the planet!](https://intercepter-ng.blogspot.com/)
* [Javvad Malik](https://javvadmalik.com)
* [Joe's Security Blog](https://www.gironsec.com/blog)
* [Jump ESP, jump!](https://jumpespjump.blogspot.com/)
* [Just another infosec blog type of thing - Medium](https://blog.0day.rocks?source=rss----6beb88197afc---4)
* [KahuSecurity](http://www.kahusecurity.com/feed.xml)
* [KernelPicnic](http://www.kernelpicnic.net/)
* [Kevin Chung](https://blog.kchung.co/)
* [Labs PortCullis](https://labs.portcullis.co.uk)
* [Lenny Zeltser](https://zeltser.com)
* [Linux Audit](https://linux-audit.com)
* [Martin Vigo](https://www.martinvigo.com)
* [Max Kersten](https://maxkersten.nl)
* [NotSoSecure](https://notsosecure.com)
* [Null Byte](https://null-byte.wonderhowto.com/)
* [Pentestmag](https://pentestmag.com)
* [Posts on malicious.link](https://malicious.link/post/)
* [Real-time communications security on Communication Breakdown - real-time communications security](https://www.rtcsec.com/)
* [Red Teaming - Red Teams](https://redteams.net/redteaming/)
* [SANS Internet Storm Center, InfoCON: green](https://isc.sans.edu)
* [Schneier on Security](https://www.schneier.com)
* [Security Intelligence and Big Data](https://raffy.ch/blog)
* [Security Spread](http://securityspread.com)
* [Security Training](https://www.securitytut.com)
* [Security and risk](http://securityandrisk.blogspot.com/)
* [Security on the edge](http://edge-security.blogspot.com/)
* [Securosis Complete](http://securosis.com/blog)
* [SkullSecurity](https://blog.skullsecurity.org)
* [Stories by Scott J Roberts on Medium](https://medium.com/@sroberts?source=rss-62a130e55951------2)
* [Subliminal Hacking](http://www.subliminalhacking.net)
* [TaoSecurity Blog](https://taosecurity.blogspot.com/)
* [Team-Cymru](https://team-cymru.com)
* [Tech Vomit](https://techvomit.net/)
* [The Exploit Laboratory](https://blog.exploitlab.net/)
* [The Grymoire](https://grymoire.wordpress.com)
* [The Sakurity Blog](https://sakurity.com/blog/)
* [The World of IT & Cyber Security: ehacking.net](http://www.ehacking.net/)
* [TheGeryCorner](http://thegreycorner.com/)
* [Thoughts on Security](https://www.scriptjunkie.us)
* [Travis Altman](http://travisaltman.com)
* [Troy Hunt's Blog](https://www.troyhunt.com/)
* [Uncommon Sense Security](http://blog.uncommonsensesecurity.com/)
* [Volatility Labs](https://volatility-labs.blogspot.com/)
* [WhiteScope IO](http://blog.whitescope.io/)
* [ZeroSec - Adventures In Information Security](https://blog.zsec.uk/)
* [anti-virus rants](http://anti-virus-rants.blogspot.com/)
* [binary foray](https://binaryforay.blogspot.com/)
* [damsky](https://damsky.tech)
* [harmj0y](http://www.harmj0y.net/blog)
* [myexploit](https://myexploit.wordpress.com)
* [shell-storm](http://shell-storm.org)
* [sploitF-U-N](https://sploitfun.wordpress.com)
* [thepcn3rd - Passion for Infosec](https://thepcn3rd.blogspot.com/)
* [thinkst Thoughts...](https://blog.thinkst.com/)
* [w00tsec](https://w00tsec.blogspot.com/)
* [xorl %eax, %eax](https://xorl.wordpress.com)
## Offensive_Security
* [Home](https://connormcgarr.github.io/)* [Posts on Maurice's Blog 🐍](https://momo5502.com/posts/)
* [Shogun Lab | 将軍ラボ](http://www.shogunlab.com/)
* [The Human Machine Interface](https://h0mbre.github.io/)
* [MOV AX, BX](https://movaxbx.ru)
* [NVISO Labs](https://blog.nviso.eu)
* [Posts By SpecterOps Team Members](https://posts.specterops.io?source=rss----f05f8696e3cc---4)
* [Shell is Only the Beginning](https://www.darkoperator.com/)
* [GitHub Security Lab | Research](https://securitylab.github.com/)
* [Tyranid's Lair](https://www.tiraniddo.dev/)
* [Haxolot.com](https://haxolot.com/)
* [Corelan Team](https://www.corelan.be)
* [eXploit](https://exploit.ph/)
* [APT::WTF - APTortellini’s blog](http://aptw.tf/)
* [Include Security Research Blog](https://blog.includesecurity.com)
* [Bill Demirkapi’s Blog](https://billdemirkapi.me/)
* [CENSUS](https://census-labs.com/news/)
* [CodeColorist](https://blog.chichou.me/)
* [MDSec](https://www.mdsec.co.uk)
* [MalwareTech](https://www.malwaretech.com)
* [Max Justicz](https://justi.cz/)
* [Microsoft Browser Vulnerability Research](https://microsoftedge.github.io)
* [Mogozobo](https://www.mogozobo.com)
* [NVISO Labs](https://blog.nviso.eu)
* [Niemand – Cyber Security](https://niemand.com.ar)
* [Orange Tsai](http://blog.orange.tw/)
* [Project Zero](https://googleprojectzero.blogspot.com/)
* [Randy Westergren](https://randywestergren.com)
* [Rhino Security Labs](https://rhinosecuritylabs.com)
* [SecLists - Full Disclosure](https://seclists.org/fulldisclosure/)
* [Sector 7](https://sector7.computest.nl/)
* [Security Sift](https://www.securitysift.com)
* [Sensepost](https://sensepost.com/rss.xml)
* [SerHack – Security research on SerHack – Security researcher](https://serhack.me/)
* [Source Incite](https://srcincite.io/)
* [Taszk Labs on taszk.io labs](https://labs.taszk.io/)
* [TheHackerBlog](https://thehackerblog.com)
* [VoidSec](https://voidsec.com)
* [enigma0x3](https://enigma0x3.net)
* [evilsocket](https://www.evilsocket.net/)
* [l.avala.mp's place](https://l.avala.mp)
* [vibrio’s personal infosec blog](https://ricardojba.github.io/)
* [| bohops |](https://bohops.com)
## Pentest
* [BorderGate](https://www.bordergate.co.uk/)* [Active Directory Security](https://adsecurity.org)
* [Adepts of 0xCC](https://adepts.of0x.cc/)
* [Appsecco](https://blog.appsecco.com?source=rss----e2adb3957733---4)
* [Attack and Defense Labs](http://blog.andlabs.org/)
* [Boschko Security Blog](https://boschko.ca/)
* [Carnal0wnage & Attack Research Blog](http://carnal0wnage.attackresearch.com/)
* [Cheesy Rumbles](https://rastamouse.me/)
* [DEADCODE](https://0xdeadcode.se)
* [Darknet](https://www.darknet.org.uk)
* [FoxGlove Security](https://foxglovesecurity.com)
* [Fzuckerman©](https://fzuckerman.wordpress.com)
* [Hacking Articles](https://www.hackingarticles.in)
* [HighOn.Coffee](https://highon.coffee/)
* [Jack Hacks](https://jhalon.github.io/)
* [Lab of a Penetration Tester](http://www.labofapenetrationtester.com/)
* [Milo2012's Security Blog](https://milo2012.wordpress.com)
* [Nat McHugh](https://natmchugh.blogspot.com/)
* [Oddvar Moe's Blog](https://oddvar.moe)
* [PenTest Labs](https://pentest-labs.com)
* [Shawar Khan](https://www.shawarkhan.com/)
* [Shell is coming ...](https://www.shelliscoming.com/)
* [Silent Robot Systems](https://www.silentrobots.com/)
* [Silent Signal Techblog](https://blog.silentsignal.eu)
* [Stealing the Network](https://stealingthe.network)
* [StefLan's Security Blog](https://steflan-security.com)
* [Stories by theMiddle on Medium](https://medium.com/@themiddleblue?source=rss-638c6a6ed4ad------2)
* [The Ethical Hacker Network](https://www.ethicalhacker.net)
* [Wiremask's Feed](https://wiremask.eu)
* [Youssef Sammouda](https://ysamm.com)
* [blackMORE Ops](https://www.blackmoreops.com)
* [br3akp0int](https://br3akp0int.blogspot.com/)
* [cat /dev/brain](https://naehrdine.blogspot.com/)
* [dotcppfile's Blog](https://dotcppfile.wordpress.com)
* [markitzeroday.com](https://markitzeroday.com/)
* [phillips321.co.uk](https://www.phillips321.co.uk)
* [sirdarckcat](http://sirdarckcat.blogspot.com/)
* [🔐Blog of Osanda](https://osandamalith.com)
## Privacy
* [EFF](https://www.eff.org/rss/updates.xml)* [Updates from the Tor Project](https://blog.torproject.org/)
## Security_News
* [Graham Cluley](https://grahamcluley.com)* [Krebs on Security](https://krebsonsecurity.com)
* [Security Affairs](https://securityaffairs.co/wordpress)
* [The Hacker News](https://thehackernews.com/)
## Security_Tools
* [Darknet](https://www.darknet.org.uk)* [KitPloit - PenTest Tools!](http://www.kitploit.com/)
## Web_Security
* [Vickie Li’s Security Blog](https://vickieli.dev/)* [Agarri : Sécurité informatique offensive](https://www.agarri.fr/blog)
* [Brett Buerhaus](https://buer.haus)
* [Bug Bounty POC](https://bugbountypoc.com)
* [Minded Security Blog](https://blog.mindedsecurity.com/)
* [Nibble Security](http://blog.nibblesec.org/)
* [Nikhil Mittal's Blog](http://c0d3g33k.blogspot.com/)
* [Noob Ninja!](https://www.noob.ninja/)
* [Offensi](https://offensi.com)
* [OpnSec](https://opnsec.com)
* [Patrik Fehrenbach](https://blog.it-securityguard.com)
* [PortSwigger Blog](https://portswigger.net/blog)
* [Random stuff by yappare](https://blog.yappare.com/)
* [Security Breached Blog](https://blog.securitybreached.org)
* [Security Thoughts](http://www.wisec.it/sectou.php)
* [Telekom Security](https://telekomsecurity.github.io/)
* [WHITE HAT - WRITE UPS - RSS](https://whwriteups.blogspot.com/)
* [mert's blog](https://blog.mert.ninja/)
* [the world. according to koto](http://blog.kotowicz.net/)
* [tint0](https://blog.tint0.com/)
* [Blackhat Library](https://www.reddit.com/r/blackhat/)* [Computer Forensics](https://www.reddit.com/r/computerforensics/)
* [Deep Web](https://www.reddit.com/r/deepweb/)
* [HowToHack](https://www.reddit.com/r/HowToHack/)
* [Information Security](https://www.reddit.com/r/Information_Security/)
* [Netsec](https://www.reddit.com/r/netsec/)
* [Netsecstudents](https://www.reddit.com/r/netsecstudents/)
* [Reverse Engineering](https://www.reddit.com/r/ReverseEngineering/)
* [Social Engineering](https://www.reddit.com/r/SocialEngineering/)