Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/pandazheng/securitysite
收集了一些安全公司的博客
https://github.com/pandazheng/securitysite
Last synced: 2 months ago
JSON representation
收集了一些安全公司的博客
- Host: GitHub
- URL: https://github.com/pandazheng/securitysite
- Owner: pandazheng
- Created: 2017-05-18T01:59:04.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2019-03-19T00:53:11.000Z (almost 6 years ago)
- Last Synced: 2024-08-04T23:10:54.054Z (6 months ago)
- Size: 30.3 KB
- Stars: 143
- Watchers: 4
- Forks: 48
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-security-collection - **90**星
README
# SecuritySite
收集了一些安全公司的博客,用于安全情报http://contagiodump.blogspot.com
https://mmd.sougaoqing.com/mmd/index.htm
http://researchcenter.paloaltonetworks.com
https://www.fireeye.com/blog.html
http://www.symantec.com/connect/blogs
https://blog.kaspersky.com
https://labs.bitdefender.com/
http://cybersecurityminute.com/security-blogs/source/Trend+Micro+Blog/
https://securingtomorrow.mcafee.com
http://resources.infosecinstitute.com
https://blog.fortinet.com
https://blog.trustlook.com/
http://www.hackingarticles.in
https://www.offensive-security.com/blog/
http://thehackernews.com/
https://community.rapid7.com/community/metasploit/blog/
https://blog.malwarebytes.com/
https://www.nowsecure.com/blog/
https://security.berkeley.edu/resources/phishing/phishing-examples-archive
http://malware-traffic-analysis.net/
http://www.vantagepoint.sg/blog
https://www.endgame.com/blog
https://www.incapsula.com/blog/
https://crackinglandia.wordpress.com
https://www.pentestpartners.com/
https://www.binarydefense.com/
https://blogs.technet.microsoft.com/
https://astr0baby.wordpress.com/2017/07/
http://blog.sec-consult.com/
https://www.besttechie.com/
https://vallejo.cc
http://nullcon.net/website/
https://r3mrum.wordpress.com/
https://www.bonkersabouttech.com/security
https://n0tty.github.io/
https://www.christophertruncer.com/
https://cybersyndicates.com/
https://www.offensive-security.com/blog/
https://www.scriptjunkie.us/
https://www.rebootuser.com/
https://www.darknet.org.uk/
https://webstersprodigy.net/
https://www.hackingloops.com/
https://pentestlab.wordpress.com
https://parsiya.net/archive/
http://www.ws-attacks.org/Welcome_to_WS-Attacks
http://www.harmj0y.net/blog/
https://enigma0x3.net/
https://bluescreenofjeff.com/
https://leonjza.github.io/
https://chousensha.github.io/
https://stealthsploit.com/
http://rastamouse.me/
https://blog.zsec.uk/
http://www.rvrsh3ll.net/blog/
https://cybersyndicates.com/
https://blog.joelj.org/
http://threat.tevora.com/
http://www.netmux.com/
http://www.floyd.ch/
http://buffered.io/
https://jivoi.github.io/
http://amanda.secured.org/
https://ramblingcookiemonster.github.io/
http://bencane.com/
http://www.sixdub.net/
https://www.darknet.org.uk/
https://labs.mwrinfosecurity.com/
https://blog.kenaro.com/
http://bughunting.guide/
http://michaeldaw.org/
https://pentestlab.blog/
https://enigma0x3.net/
https://www.pentesterlab.com/
http://www.invoke-ir.com/
http://www.labofapenetrationtester.com/
http://subt0x10.blogspot.co.uk/
http://www.kitploit.com/
http://tk-blog.blogspot.com/
https://www.trustedsec.com/
https://room362.com/
https://www.corelan.be/
https://www.us-cert.gov/
https://holidayhackchallenge.com/
https://www.anthonys.io/
https://www.arbornetworks.com/blog/asert/
https://0x00sec.org/
http://blog.malwaremustdie.org
https://www.anquanke.com/
https://www.malware-traffic-analysis.net/
https://sec-wiki.com/
https://pastebin.com/
https://landave.io/
https://threatpost.com/
https://www.peppermalware.com/
# 工具官网
https://portswigger.net/https://wiki.wireshark.org/
http://w3af.org/
https://hashcat.net/
http://www.powershellempire.com/?page_id=561
https://blog.cobaltstrike.com/
https://www.metasploit.com/
https://www.netsparker.com/
https://www.bleepingcomputer.com/
# IDA插件
https://n0where.net/best-ida-plugins/# IoT
https://arstechnica.com/security/
http://www.devttys0.com
https://github.com/nebgnahz/awesome-iot-hacks
https://www.exploitee.rs/index.php/Main_Page
https://iot.sec-wiki.com/# hack
https://github.com/Hack-with-Github/Awesome-Hacking# PPT
https://www.slideshare.net/# Chart
https://github.com/SecWiki/sec-chart# Penetration Testing
https://github.com/enaqx/awesome-pentest
https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/# Wooyun
https://superkieran.github.io/WooyunDrops/#!/
http://cb.drops.wiki/# Kali
https://github.com/tiancode/learn-hacking
http://www.hackfun.org/kali-tools/kali-tools-zh.html# dictionary
https://pan.baidu.com/s/1clxaCA# OWASP
https://www.owasp.org/index.php/Main_Page
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project# Python for penetration testers
https://vulnerablelife.wordpress.com/2017/05/13/python-for-penetration-testers/# Honeypot
https://github.com/SecWiki/ipot
https://ipot.sec-wiki.com/
https://sosly.me/index.php/2017/09/05/jymiguan2/# WiFi Cracker
https://github.com/brannondorsey/wifi-cracking
http://www.freebuf.com/articles/wireless/137641.html
https://klionsec.github.io/2015/04/14/aircrack-hascat/# Radio
http://www.hackrf.net/# Vuln Linux渗透测试
https://www.vulnhub.com/# Metasploit
http://uknowsec.cn/posts/skill/Meatsploit-Framework-%E5%88%A9%E7%94%A8%E6%80%BB%E7%BB%93.html# DDOS
http://uknowsec.cn/posts/skill/%E6%B5%85%E8%B0%88ddos%E7%9A%84%E6%B5%8B%E8%AF%95%E6%96%B9%E6%B3%95.html
http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/
http://www.hackingarticles.in/dos-attack-packet-crafting-using-colasoft/
http://www.hackingarticles.in/dos-attack-penetration-testing-part-2/# Sandbox
https://www.hybrid-analysis.com/# Shodan
http://www.freebuf.com/sectool/121339.html# 傻蛋联网搜索
https://www.oshadan.com# ZoomEye
https://www.zoomeye.org/# XMind 思维导图工具
http://www.xmindchina.net/# Exploit
https://www.peerlyst.com/posts/the-best-resources-for-learning-exploit-development?trk=search_page_search_result# PWNDBG
https://github.com/pwndbg/pwndbg# OFFICE MALWARE
https://remnux.org/
https://r3mrum.wordpress.com/2017/06/29/analyzing-malicious-password-protected-office-documents/
https://dfir.it/blog/2015/06/17/analysts-handbook-analyzing-weaponized-documents/# Software-Security-Learning
https://github.com/CHYbeta/Software-Security-Learning# Web-Security-Learning
https://github.com/CHYbeta/Web-Security-Learning# Python爬虫
https://segmentfault.com/p/1210000009117809/read# 黑客大会
https://www.defcon.org/http://www.blackhat.com/
http://www.securitybsides.com/
https://events.ccc.de/congress/
https://www.derbycon.com
http://phreaknic.info
http://shmoocon.org/
http://www.carolinacon.org/
https://chcon.nz
http://www.summercon.org/
https://2016.hack.lu/
https://conference.hitb.org
https://www.troopers.de
http://hack3rcon.org
http://thotcon.org/
http://www.layerone.org/
https://deepsec.net/
http://www.skydogcon.com/
http://secuinside.com
http://def.camp/
https://appsecusa.org/
http://brucon.org
http://www.infosecurityeurope.com/
http://nullcon.net/website/
https://www.rsaconference.com/
https://www.swisscyberstorm.com/
https://www.virusbulletin.com/conference/index
http://www.ekoparty.org
https://44con.com/
https://www.balccon.org
http://fsec.foi.hr
https://www.syscan360.org/
http://kcon.knownsec.com/
# 在线工具
https://haveibeenpwned.com/https://www.tineye.com/
http://ddecode.com/phpdecoder/?home
http://www.fuzzysecurity.com/links.html
https://crackstation.net/
http://www.objectif-securite.ch/
# Radare2
https://www.megabeets.net/a-journey-into-radare-2-part-1/
https://www.megabeets.net/a-journey-into-radare-2-part-2/# REMnux
REMnux: A Linux Toolkit for Reverse-Engineering and Analyzing Malware
https://remnux.org/# Gnuradio
http://eu2-dist.gnuradio.org/# Malware Source
https://github.com/mwsrc# Cheat Sheet for Analyzing Malicious Software
https://zeltser.com/malware-analysis-cheat-sheet/# 知道工具之硬件路由相关
https://mp.weixin.qq.com/s/QdiI66ZDsHj7MaMB6c88Ug# Analyzing Malicious Documents Cheat Sheet
https://zeltser.com/analyzing-malicious-documents/
https://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator# Iot Exploit Tools
https://www.attify-store.com/collections/frontpage/products/iot-security-exploitation-training-learning-kit# Objective-C Reveser
https://blog.fortinet.com/2017/09/19/rewriting-idapython-script-objc2-xrefs-helper-py-for-hopper# Metasploitbale2
https://sourceforge.net/projects/metasploitable/files/Metasploitable2/# Shodan
http://www.jianshu.com/p/ee22367303d5# 蓝牙攻击基础篇
http://www.whitecell-club.org/?p=1524# Kali Docker
http://blog.csdn.net/u013814153/article/details/53925790# DDoS
http://www.freebuf.com/column/132782.html