Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/theredditbandit/awesome-cybersec

A collection of awesome platforms, blogs, documents, books, resources and cool stuff about security
https://github.com/theredditbandit/awesome-cybersec

List: awesome-cybersec

bounty-hunters bug-bounties bug-hunters bugbounty ctf hacking owasp penetration-testing web-hacking

Last synced: about 2 months ago
JSON representation

A collection of awesome platforms, blogs, documents, books, resources and cool stuff about security

Awesome Lists containing this project

README

        

# awesome-cybersec
[![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
![](https://img.shields.io/badge/Contribuitions-Welcome-brightgreen)

A collection of awesome platforms, blogs, documents, books, resources and cool stuff about security

While this repository is still a work in progress , the goal is to build a categorized community-driven collection of very well-known resources.

# All the good stuff in one place

[![DigitalOcean Referral Badge](https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg)](https://www.digitalocean.com/?refcode=124172eb5f4a&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge)


## Training

* [Defbox](https://defbox.io)
* [Range force](https://portal.rangeforce.com/courses)
* [HTB](https://www.hackthebox.eu/)
* [Tryhackme](https://tryhackme.com/)
* [Blue team academy](https://app.letsdefend.io/academy/)
* [Blue team labs](https://blueteamlabs.online/)
* [Kali revealed](https://kali.training/)
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/)
* [platform.mosse-institute.com](https://platform.mosse-institute.com/#/dashboard)
* [riptutorial.com/bash](https://riptutorial.com/bash)
* [hackerrank.com/domains/shell](https://www.hackerrank.com/domains/shell)
* [https://pentesterlab.com/](https://pentesterlab.com/)
* [https://www.pentesteracademy.com/](https://www.pentesteracademy.com/)
* [https://www.offensive-security.com/labs/individual/](https://www.offensive-security.com/labs/individual/)
* [https://www.vulnhub.com/](https://www.vulnhub.com/)
* [Google doc : vulnhub oscp like vm's list](https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=0)
* [Wordpress boxes on vulnhub](https://www.reddit.com/user/therealsavalon/comments/o3cn1l/wordpress_boxes_on_vulnhub/?utm_source=share&utm_medium=web2x&context=3)
* [Vulnhub CTF writeups](https://github.com/Ignitetechnologies/Vulnhub-CTF-Writeups)
* [Linux Privilige escalation Cheatsheet](https://github.com/Ignitetechnologies/Linux-Privilege-Escalation)
* [Privilige escalation](https://github.com/Ignitetechnologies/Privilege-Escalation)
* [corelan: exploit-writing-tutorial-part-1-stack-based-overflows](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [https://scs.hacking-lab.com/](https://scs.hacking-lab.com/)
* [Malware Noob2Ninja course](https://www.youtube.com/watch?v=GE_aSVq8ZnQ&list=PLiFO-R_BI-kAqDPqtnOq2n70mtAZ6xg5N)
* [n3t2.3c](https://nets.ec/Main_Page)
* [Hacking-cisco](https://hackingcisco.blogspot.com/)
* [Open security training](https://opensecuritytraining.info/Training.html)
* [Pentest standard](http://www.pentest-standard.org/index.php/Main_Page)
* [Security-tube](http://www.securitytube.net/)
* [Binary Analysis course](https://maxkersten.nl/binary-analysis-course/)
* [https://training.zempirians.com/start/here](https://training.zempirians.com/start/here)
* [Pwncollege](https://pwn.college/) pwn.college is a first-stage education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. It is designed to take a “white belt” in cybersecurity to becoming a “blue belt”, able to approach (simple) CTFs and wargames. The philosophy of pwn.college is “practice makes perfect”.


* [Web Application Exploits and Defenses](https://google-gruyere.appspot.com/)This codelab is built around **Gruyere** /ɡruːˈjɛər/ - a small, cheesy web application that allows its users to publish snippets of text and store assorted files. "Unfortunately," Gruyere has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The goal of this codelab is to guide you through discovering some of these bugs and learning ways to fix them both in Gruyere and in general.
* [Course materials for Modern Binary Exploitation](https://github.com/RPISEC/MBE)
* [professormesser.com](https://www.professormesser.com/)
* [MCSI free training](https://platform.mosse-institute.com/#/dashboard)
* [insecure.org/stf/smashstack.html](https://insecure.org/stf/smashstack.html)

## WebApp/Bugbounty resources
* [Web Security Academy](https://portswigger.net/web-security)
* [https://owasp.org/www-project-juice-shop/](https://owasp.org/www-project-juice-shop/)
* [Mutillidae II](https://github.com/webpwnized/mutillidae/)
* [VulnWeb](http://www.vulnweb.com/)
* [https://www.bugbountyhunter.com/](https://www.bugbountyhunter.com/)
* [hacker101](https://www.hacker101.com/) is a free class for web security. Whether you’re a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
* [https://www.hacksplaining.com/](https://www.hacksplaining.com/)
* [awesome-web-hacking](https://github.com/infoslack/awesome-web-hacking)
- [Resources-for-Beginner-Bug-Bounty-Hunters](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters)
- [https://thexssrat.podia.com/dashboard](https://thexssrat.podia.com/dashboard)
- [https://github.com/websploit/websploit](https://github.com/websploit/websploit)
- [https://dvwa.co.uk/](https://dvwa.co.uk/)
- [https://owasp.org/www-project-webgoat/](https://owasp.org/www-project-webgoat/)
- [Resources & Disclosed Reports](https://github.com/HolyBugx/HolyTips/tree/main/Resources)
- [Bug-bounty-roadmaps](https://github.com/1ndianl33t/Bug-Bounty-Roadmaps)
- [Bug-hunting-methodologies](https://github.com/IamLucif3r/Bug-Hunting)
- [Open Source Bug Bounty Guide - Methodology, Tools, Resources](https://www.youtube.com/watch?v=BHIGJQdId3k)
- [Thug-bounty](https://start.me/p/vjEPvb/thug-bounty)
- [Bugbounty-Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
- [The Best Bug Bounty Recon Methodology](https://securib.ee/beelog/the-best-bug-bounty-recon-methodology/)
- [Pentesting web checklist](https://pentestbook.six2dez.com/others/web-checklist/)
- [Web-application cheatsheet](https://github.com/Ignitetechnologies/Web-Application-Cheatsheet)
- [Web-pentesting-checklist](https://github.com/harshinsecurity/web-pentesting-checklist)
- [OWASP Web Security Testing Guide](https://owasp.org/www-project-web-security-testing-guide/)
- [OWASP Top Ten](https://owasp.org/www-project-top-ten/)
- [Bugcroud university](https://www.bugcrowd.com/hackers/bugcrowd-university/)
- [OWASP Web Security Testing Guide](https://github.com/OWASP/wstg/tree/master/document)

- learning how various stacks function seems to be an important aspect of bug bounty hunting , so you need to learn at least one of MERN or LAMP or whatever.
You can learn the MERN Stack by building your own Yelp-like restaurant review site. MERN stands for MongoDB + Express + React + Node.js. Then in the second half of the course, you'll learn how to swap out your Node.js/Express back end in favor of Serverless Architecture. (3 hour YouTube course): [https://www.freecodecamp.org/news/create-a-mern-stack-app-with-a-serverless-backend/](https://www.freecodecamp.org/news/create-a-mern-stack-app-with-a-serverless-backend/)

### Resources from the hacker101 discord server
**How to get started with hacking and bug bounties?**
We've gathered some useful resources to get your started on your bug bounty journey!
- [Guide to learn hacking](https://www.youtube.com/watch?v=2TofunAI6fU)
- [Finding your first bug](https://portswigger.net/blog/finding-your-first-bug-bounty-hunting-tips-from-the-burp-suite-community)
- [Port Swigger Web Security Academy](https://portswigger.net/web-security/learning-path)
- [Nahamsec's Twitch](https://www.twitch.tv/nahamsec)
- [Nahamsec interviews with top bug bounty hunters](https://www.youtube.com/c/Nahamsec)
- [Nahamsec's beginner repo](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters)
- [Stök](https://www.youtube.com/c/STOKfredrik)
- [InsiderPhD](https://www.youtube.com/c/InsiderPhD)
- [Series for new bug hunters](https://www.youtube.com/playlist?list=PLbyncTkpno5FAC0DJYuJrEqHSMdudEffw)
- [Jhaddix](https://www.youtube.com/c/jhaddix)

### Posts from Hacker101 members on how to get started hacking
- [zonduu](https://medium.com/@zonduu/bug-bounty-beginners-guide-683e9d567b9f)
- [p4nda](https://enfinlay.github.io/bugbounty/2020/08/15/so-you-wanna-hack.html)
- [also a blog on subdomain takeovers](https://enfinlay.github.io/sto/ip/domain/bugbounty/2020/09/12/ip-server-domain.html)
- [clos2100 on getting started without a technical background ](https://twitter.com/pirateducky/status/1300566000665014275)
- [al-madjus from 0 to bug hunter](https://klarsen.net/uncategorized/from-0-to-bug-hunter-my-journey/)
- [dee-see's resources for Android Hacking](https://blog.deesee.xyz/android/security/2020/01/13/android-application-hacking-resources.html)
- [hacker101 videos](https://www.hacker101.com/videos)


## Tools
- [Pwncat](https://github.com/calebstewart/pwncat) is a post-exploitation platform ~~for Linux targets~~. It started out as a wrapper around basic bind and reverse shells and has grown from there. It streamlines common red team operations while staging code from your attacker machine, not the target.
- [Automatic bypass (brute force) waf](https://github.com/3xp10it/xwaf)
- [DFIR-Tools](https://github.com/archanchoudhury/DFIR-Tools)
- [https://pentestbox.org/](https://pentestbox.org/)
- [Notes , tons of notes](https://enotes.nickapic.com/)
- [Writehat : A pentest reporting tool written in Python. Free yourself from Microsoft Word.](https://github.com/blacklanternsecurity/writehat)
- [OSINT4ALL](https://start.me/p/L1rEYQ/osint4all)
- [Shadrak : Shadrak is a script to generate decompression bomb in various formats.](https://gitlab.com/brn1337/shadrak)
- [Fish: a phishing tool](https://github.com/aarav2you/Fish/)
- [Owasp Zap](https://www.zaproxy.org/), a free and opensource burpsuite alternative
- [Pimpmykai](https://github.com/Dewalt-arch/pimpmykali)
- [Name that hash](https://github.com/HashPals/Name-That-Hash)
- [Burp Automator(burpa) - A Burp Suite Automation Tool.](https://github.com/tristanlatr/burpa)
- [The harvester](https://github.com/laramies/theHarvester)
- [https://technisette.com/p/tools](https://technisette.com/p/tools)
- [Hakrawler](https://github.com/hakluke/hakrawler)
- [Service Enumeration](https://github.com/ssstonebraker/Pentest-Service-Enumeration)
-

## CTF's
* [https://ctftime.org/](https://ctftime.org/)
* [https://ctf.hackthebox.eu/ctfs](https://ctf.hackthebox.eu/ctfs)
* [https://www.hackthissite.org/](https://www.hackthissite.org/)
* [Hack.me](https://hack.me/)
* [Try2Hackme](https://try2hack.me/)
* [Hackthissite](https://www.hackthissite.org/)
* [https://overthewire.org/wargames/](https://overthewire.org/wargames/)
* [https://underthewire.tech/wargames](https://underthewire.tech/wargames)
* [Pwnable.tw](https://pwnable.tw/challenge/)
* [Pwnable.kr](http://pwnable.kr/play.php)
* [Root-me](https://www.root-me.org/?lang=en)
* [Smash the stack](http://smashthestack.org/wargames.html)
* [Cryptohack.org](https://cryptohack.org/)
* [PicoCTF](https://www.picoctf.org/)
* [CMDchallenge](https://cmdchallenge.com/)
* [Defend the web](https://defendtheweb.net/)
* [ChaosVPN](https://wiki.hamburg.ccc.de/ChaosVPN)
* [PentestIT](https://lab.pentestit.ru/)
* [Overthewire-Warzone](https://overthewire.org/warzone/)
* [CTF Difficulty cheatsheet (Vulnhub)](https://github.com/Ignitetechnologies/CTF-Difficulty)
* [hpwnadventure](https://pwnadventure.com/)
* [ctf.komodosec](http://ctf.komodosec.com/)
* [counterhack.net](http://counterhack.net/Counter_Hack/Challenges.html)
* [hellboundhackers](https://www.hellboundhackers.org/)
* [ringzer0ctf.com](https://ringzer0ctf.com/challenges)
* [io.netgarage](https://io.netgarage.org/)
* [pwn0.com](https://pwn0.com)
* [w3c.com](https://w3challs.com/)
* [hax.tor.hu](http://hax.tor.hu/welcome/)
* [reversing.kr](http://reversing.kr/)
* [ctflearn.com](https://ctflearn.com/)
* [microcorruption.com](https://microcorruption.com/login)
* [ctf365.com](https://ctf365.com/)
* [codegate.org](http://codegate.org/en/)
* [legitbs.net](https://legitbs.net/)
* [ghostintheshellcode](http://ghostintheshellcode.com/)
* [try2hack](http://www.try2hack.nl/)
* [gameofhacks](https://www.gameofhacks.com/)
* [https://hackingzone.net/](https://hackingzone.net/) try using this with google translate
* [http://suninatas.com/challenges](http://suninatas.com/challenges)
* [Dream hack](https://dreamhack.io/) is Korean cyber security course. it also offer CTF. You can try it out with google translate.
* [The cyber institute](https://courses.thecyberinst.org/collections) Free OSINT Courses and Free OSINT Challenges.
* [Sans holiday hack challenge - past challenges](https://holidayhackchallenge.com/past-challenges/)
* [Holidayhackchallenge-2020](https://holidayhackchallenge.com/2020/)
* [Kringlecon](https://2020.kringlecon.com/invite)
* [Sans cyber-ranges](https://www.sans.org/blog/and-now-for-something-awesome-sans-launches-new-series-of-worldwide-capture-the-flag-cyber-events/)
* [CTF-challenge](https://ctfchallenge.com/)
* [247CTF](https://247ctf.com/)
* [Backdoor ctf](https://backdoor.sdslabs.co/)
* [Cybersecurity.wtf](https://cybersecurity.wtf/#)


## Github resources
* [Malware Analysis Course](https://github.com/hasherezade/malware_training_vol1)
* [Malware-IR-TH-TI-Resources](https://github.com/ShilpeshTrivedi/Malware-IR-TH-TI-Resources/blob/main/Malware-IR-TH-TI-Resources.md#malware-ir-th-ti-resources)
* [Red Team tactics and techniques](https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques)
* [Red Teaming toolkit](https://github.com/infosecn1nja/Red-Teaming-Toolkit)
* [Red Team](https://github.com/BankSecurity/Red_Team)
* [awesome red teaming](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming)
* [Powershell red team](https://github.com/tobor88/PowerShell-Red-Team)
* [Red Teaming](https://github.com/winterwolf32/Red-teaming)
* [Red-team](https://github.com/Sorsnce/red-team)
* [Red team diaries](https://github.com/ihebski/A-Red-Teamer-diaries)
* [awesome-web-hacking](https://github.com/infoslack/awesome-web-hacking)
* [awesome-security](https://github.com/sbilly/awesome-security)
* [infosec-resources](https://github.com/pascalschulz/Infosec-Resources)
* [Everything about web application firewalls (WAFs)](https://github.com/0xInfection/Awesome-WAF)
* [awesome-hacking](https://github.com/carpedm20/awesome-hacking)
* [Awesome-Hacking-2](https://github.com/Hack-with-Github/Awesome-Hacking)
* [BARF: Binary analysis and reverse engineering framework](https://github.com/programa-stic/barf-project)
* [Automatic Linux privesc via exploitation of low-hanging fruit](https://github.com/liamg/traitor)
* [CTF-KATANA](https://github.com/JohnHammond/ctf-katana)
* [Active-directory-exploitation-cheatsheet](https://github.com/fuzz-security/Active-Directory-Exploitation-Cheat-Sheet)
* [The book of secret knowledge : A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.](https://github.com/trimstray/the-book-of-secret-knowledge)
* [PyWhat : identify anything](https://github.com/bee-san/pyWhat)
* [OSEE prep resources](https://github.com/dhn/OSEE)
* [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)
* [Thefuck](https://github.com/nvbn/thefuck)







## Blogs
* [https://blog.tryhackme.com/free\_path/](https://blog.tryhackme.com/free_path/)
* [From zero to hero in your first pentest](https://corneacristian.medium.com/from-zero-to-your-first-penetration-test-7479bce3a5)
* [So you want to be a hacker in 2021](https://tcm-sec.com/so-you-want-to-be-a-hacker-2021-edition/)
* [netsecfocus](https://www.netsecfocus.com/)
* [https://nosecurity.blog/cptc2020](https://nosecurity.blog/cptc2020)
* [https://null-byte.wonderhowto.com/](https://null-byte.wonderhowto.com/)
* [https://portswigger.net/blog/flying-high-in-the-web-security-academy](https://portswigger.net/blog/flying-high-in-the-web-security-academy)
* [https://www.simplycyber.io/free-cyber-resources](https://www.simplycyber.io/free-cyber-resources)
* [https://blog.g0tmi1k.com/](https://blog.g0tmi1k.com/)
* [https://www.hackingarticles.in/](https://www.hackingarticles.in/)
* [https://www.hackingtutorials.org/](https://www.hackingtutorials.org/)
* [https://www.hacking-tutorial.com/](https://www.hacking-tutorial.com/)
* [The Journey to Try Harder- TJnull's Preparation Guide for PEN-200 PWK OSCP 2.0](https://www.netsecfocus.com/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html)
* [https://hacklido.com/](https://hacklido.com/)
* [What is a block cypher](https://www.freecodecamp.org/news/what-is-a-block-cipher/)
* [freecodecamp blog](https://www.freecodecamp.org/news/)
* [Redhuntlabs blog](https://redhuntlabs.com/blog)
* [Hackthebox blog](https://www.hackthebox.eu/blog)
* [Tryhackme blog](https://blog.tryhackme.com/)
* [Start in infosec](https://malicious.link/start/)
* [Ethical Hacking With Hack The Box :A free book for getting started in Ethical Hacking](https://book.ethicalhackinghtb.xyz/)
* [Hacking tutorials](https://www.hackingtutorials.org/)
* [Halls of valhalla](https://halls-of-valhalla.org/beta/) is a place for sharing knowledge and ideas. Users can submit code, as well as science, technology, and engineering-oriented news and articles.They also have an assortment of fun and educational challenges intended to help users learn more about programming, mathematics, encryption, hacking and more.
* [Pentest.blog](https://pentest.blog/)
* [https://hausec.com/](https://hausec.com/)
* [https://dirkjanm.io/]( https://dirkjanm.io/)
* [https://adsecurity.org/](https://adsecurity.org/)
* [infosec write-ups](https://infosecwriteups.com/)
* [Hacksplained blog](https://hacksplained.it/blog/)
* [Get ready to pass the CISSP](https://www.freecodecamp.org/news/get-ready-to-pass-cissp-exam/?utm_source=pocket_mylist)
* [Blackmorerepos](https://www.blackmoreops.com/)

## Paid training
* [cybersec labs](https://www.cyberseclabs.co.uk/)
* [Virtual Hacking Labs](https://www.virtualhackinglabs.com/)
* [https://academy.tcm-sec.com/courses]( https://academy.tcm-sec.com/courses)
* [INE](https://my.ine.com/learning-paths)
* [https://hackersacademy.com/](https://hackersacademy.com/)
* [Red team ops](https://www.zeropointsecurity.co.uk/red-team-ops)
* [Pentester academy - red team labs](https://www.pentesteracademy.com/topics)
* [Pentester labs](https://pentesterlab.com/)

## Resources
* [https://startupstash.com/cybersecurity-resources/](https://startupstash.com/cybersecurity-resources/)
* [https://threatexpress.com/redteaming/resources/](https://threatexpress.com/redteaming/resources/)
* [Reverse enginering](https://www.infosecinstitute.com/skills/learning-paths/reverse-engineering/)
* [https://ippsec.rocks/?#](https://ippsec.rocks/?#)
* [https://liveoverflow.com/](https://liveoverflow.com/)
* [Learn vim](https://www.vim.so/) or [Emacs](https://www.emacswiki.org/emacs/LearningEmacs) i don't care , i'm not trying to start a war
* [Python Cybersecurity - Build your own tools](https://www.reddit.com/r/Python/comments/o0dzk6/python_cybersecurity_build_your_own_tools/)
* [Osint framework](https://osintframework.com/)
* [Getting started with OSINT](https://www.reddit.com/r/OSINT/comments/e78he1/osint_for_beginners_part_1_introduction/?utm_source=share&utm_medium=web2x&context=3)
* [Vulnhub resources](https://www.vulnhub.com/resources/)

## Programing resources

### **Learn git**

[Flight rules for Git](https://github.com/k88hudson/git-flight-rules)

[https://ohmygit.org/](https://ohmygit.org/)

[https://www.freecodecamp.org/news/what-is-git-learn-git-version-control/](https://www.freecodecamp.org/news/what-is-git-learn-git-version-control/)

### **General**

[Comprehensive Guide to Learn CS Online](https://qvault.io/2020/11/18/comprehensive-guide-to-learn-computer-science-online/)

[What Is Test Automation?](https://www.perfecto.io/blog/what-is-test-automation)

[Get Started With TypeScript the Easy Way](https://austingil.com/typescript-the-easy-way/)

[Machine Learning with Introduction](https://rubikscode.net/2021/01/04/machine-learning-with-ml-net-introduction/)

[freecodecamp](https://www.freecodecamp.org/)

[Programiz](https://www.programiz.com/)

[Codewars](https://www.codewars.com/)

[Code academy](https://www.codecademy.com/)

[Fullstackopen : Deep Dive Into Modern Web Development](https://fullstackopen.com/en/)

[Learn {Python,Java,C,JavaScript,PHP,Shell,C#}](https://www.learn-c.org/)

[JavaPoint](https://www.javatpoint.com/)

Learn to build a website with [LandChad.net](https://landchad.net/)

[Scaler](https://www.scaler.com/topics/)

### **Python**

[Ultimate Python study guide](https://github.com/huangsam/ultimate-python)

[A beginner’s guide to data visualization with Python](https://old.reddit.com/r/Python/comments/kriteb/a_beginners_guide_to_data_visualization_with/)

[and Seaborn](https://old.reddit.com/r/Python/comments/kriteb/a_beginners_guide_to_data_visualization_with/)

[Nice Guide on Modern Python Packages](https://old.reddit.com/r/Python/comments/kxev5h/nice_guide_on_modern_python_packages/)

[Intro to Python and Programming for non-CS majors](https://github.com/webartifex/intro-to-python)


[https://www.gormanalysis.com/blog/python-pandas-for-your-grandpa/](https://www.gormanalysis.com/blog/python-pandas-for-your-grandpa/)

[Practicepython.org](http://www.practicepython.org/)
[Python Tutorial: A Comprehensive Guide for Beginners](https://wiingy.com/learn/python/python-tutorial/)

### **Javascript**

[The Modern JavaScript Tutorial](https://javascript.info/)

[JavaScript 101 - Variables & Primitives](https://spdevuk.com/javascript-101-variables-and-primitives/)

[Guide To Javascript Array Functions: Why you should pick the least powerful tool for the job](https://jesseduffield.com/array-functions-and-the-rule-of-least-power/)

[Learn and practice modern JavaScript](https://learnjavascript.online/)

### **Java**

[A Hitchhiker's Guide to Containerizing (Spring Boot) Java Apps](https://blog.frankel.ch/hitchhiker-guide-containerizing-java-apps/)

[A beginner’s guide to CDC (Change Data Capture)](https://vladmihalcea.com/a-beginners-guide-to-cdc-change-data-capture/)

[Java 15 Programmer's Guide To Text Blocks](https://inside.java/2020/08/05/textblocks-programmer-guide/)

[Modern Web Development in Java - The (Never) Complete Guide](https://asd.learnlearn.in/java-web/)

[Java Modules Cheat Sheet](https://old.reddit.com/r/java/comments/jyddn9/java_modules_cheat_sheet/)

[Java Modules Cheat Sheet](https://nipafx.dev/build-modules/)

### **C++**

[The Definitive C++ Book Guide and List](https://stackoverflow.com/questions/388242/the-definitive-c-book-guide-and-list)

[Linear-cpp](https://github.com/jesyspa/linear-cpp)

[Tony Gaddis Early Objects](http://instructor.sdu.edu.kz/~bakhyt/CPP/suggested%20books/Starting%20out%20with%20C++.pdf)

### **PHP**
[PHP The right way](https://phptherightway.com/)

## Misclaneous links


* [https://freetraining.dfirdiva.com]( https://freetraining.dfirdiva.com)


* [You'll find majority of the books you're looking for here](https://b-ok.global/)
* [ssh-audit](https://github.com/jtesta/ssh-audit)
* [Secure your linux install](https://www.reddit.com/r/linux/comments/ns7r7o/a_complete_yet_beginner_friendly_guide_on_how_to/)
* [Awesome-Linux-Software](https://github.com/luong-komorebi/Awesome-Linux-Software)
* [Twitter-geolocate](https://github.com/davidkowalk/twitter_geolocate)
* [Linux training academy](https://www.linuxtrainingacademy.com/)
* [modern-unix](https://github.com/ibraheemdev/modern-unix) A collection of modern/faster/saner alternatives to common unix commands.
* [Linuxzoo](https://linuxzoo.net/)
* [Snaplabs.io](https://www.snaplabs.io/)
* [shortcutfoo.com](https://www.shortcutfoo.com/)

## Youtube channels
[Pwnfunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A)

[zSecurity](https://www.youtube.com/user/zaidsabeeh)

[HckerSploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)

[Nullbyte](https://www.youtube.com/channel/UCgTNupxATBfWmfehv21ym-g)

[LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)

[John hammond](https://www.youtube.com/user/RootOfTheNull)

[The cyber mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)

[Network Chuck](https://www.youtube.com/user/NetworkChuck)

[Ippsec ](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)

[Insiderphd ](https://www.youtube.com/user/RapidBug)

[David bomball ](https://www.youtube.com/user/ConfigTerm)

[Alhz4r3d ](https://www.youtube.com/channel/UCz-Z-d2VPQXHGkch0-_KovA)

## Discord servers
[the cyber mentor](https://discord.gg/tcm)

[infosec prep ](https://discord.gg/infosecprep)

[certification station](https://discord.gg/certstation)

[network Chuck](https://discord.gg/networkchuck)

[nahmsec](https://discord.gg/xd75Stsuxk)

[bounty hunters](https://discord.gg/bugbounty)

[The Alh4z-R3d Team](https://discord.gg/thealh4zr3dteam)

[hack the box](https://discord.gg/hackthebox)

[tryhackme](https://discord.gg/tryhackme)

[hack this site](https://discord.gg/ETm3Q8SSht)

[PG (proving grounds) ](https://discord.gg/6neBxaGjHD)

[Getting started in security ](https://discord.gg/dnEcAqZn4x)

[INE Unofficial server ](https://discord.gg/XGVaBeapXQ)

[Offsec official server](https://discord.gg/offsec)

[ctf learn](https://discord.gg/Susw824A2T)

[Hacker101](https://discord.gg/HuwdMBJ2WS)

### ➡️ Contributions
You are Welcome to Contribute. You can contribute by:
- Translating into other languages
- Adding more Tools, and other Resources.
- Just adding a star the Github project :)

If you have some new idea about this Repository, issue, feedback or found some valuable tool feel free to open an issue or just DM me on discord @thelastmethbender#4823

## Star History





Star History Chart