Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/txuswashere/pentesting

CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
https://github.com/txuswashere/pentesting

active-directory audit auditing bugbounty cloudsecurity cyber-security cybersecurity exploiting hacking networksecurity osint pentesting pentesting-tools privilegeescalation purple-team purpleteam resources reversing webpentest webpentesting

Last synced: 1 day ago
JSON representation

CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...

Awesome Lists containing this project

README

        

# pentesting
![This image owns Daniel Miessler https://danielmiessler.com/](https://github.com/txuswashere/pentesting/raw/main/The%20BAD%20Pyramid%20image%20owns%20Daniel%20Miessler%20danielmiessler.com%20.png)
# CyberSec Resources: Pentesting, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, Mobile Apps pentesting, FRAMEWORKS & STANDARDS, Pentest Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds & CTF, ...

# PHASES OF A PENTEST
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/PhasesOfaPentest.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ต๐—ฒ ๐—ฝ๐—ต๐—ฎ๐˜€๐—ฒ๐˜€ ๐—ผ๐—ณ ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜
###
๐ŸŒŸ Basis of penetration testing execution by the PTES
http://www.pentest-standard.org/index.php/Main_Page

๐ŸŒŸ Penetration Testing Phases & Steps Explained by Ray Fernandez on Esecurityplanet:
https://www.esecurityplanet.com/networks/penetration-testing-phases/

๐Ÿ‘‰ ๐—ฃ๐—ฟ๐—ฒ-๐—˜๐—ป๐—ด๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜
###
๐ŸŒŸ Pre-engagement by the PTES
http://www.pentest-standard.org/index.php/Pre-engagement

๐ŸŒŸ Scoping a pentest on PentesterLab
https://blog.pentesterlab.com/scoping-f3547525f9df

๐ŸŒŸ Pentest Scope Worksheet by SANS
https://www.sans.org/posters/pen-test-scope-worksheet/

๐ŸŒŸ API Pentesting 101: The rules of Engagement by Dana Epp
https://danaepp.com/api-pentesting-101-the-rules-of-engagement

๐ŸŒŸ Pentest Rules of Engagement Worksheet by SANS
https://www.sans.org/posters/pen-test-rules-of-engagement-worksheet/

๐Ÿ‘‰ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—š๐—ฎ๐˜๐—ต๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด
###
๐ŸŒŸ Intelligence Gathering by the PTES
http://www.pentest-standard.org/index.php/Intelligence_Gathering

๐ŸŒŸ Gabrielle B's post of resources about OSINT
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/OSINT.jpeg)
##
OSINT is often part of a pentest.

If you want to learn more about it or specialize in it.
Here are some resources!

๐Ÿ‘‰ Check out The Ultimate OSINT collection by Hatless1der:
https://start.me/p/DPYPMz/the-ultimate-osint-collection

๐Ÿ‘‰ Have a look at this 5 hours free course by TCM Security
https://youtu.be/qwA6MmbeGNo
https://www.linkedin.com/company/tcm-security-inc/

๐Ÿ‘‰ Check out this article by Giancarlo Fiorella on Bellingcat:
https://www.bellingcat.com/resources/2021/11/09/first-steps-to-getting-started-in-open-source-research/

๐Ÿ‘‰ Check out this amazing list of Tools and Resources by onlineosint: https://osint.link/

๐ŸŒŸ The OSINT Framework by jnordine
https://osintframework.com/

๐ŸŒŸ Gabrielle B's pentips about Information Gathering
https://csbygb.gitbook.io/pentips/ethical-hacking-general-methodology/information-gathering

๐ŸŒŸ Understanding the Steps of Footprinting on Cybersecurity Exchange
https://www.eccouncil.org/cybersecurity-exchange/penetration-testing/footprinting-steps-penetration-testing/

๐ŸŒŸ Passive Information Gathering for pentesting
https://www.dummies.com/article/academics-the-arts/study-skills-test-prep/comptia-pentestplus/passive-information-gathering-for-pentesting-275726/

๐ŸŒŸ Active information Gathering for pentesting
https://www.dummies.com/article/academics-the-arts/study-skills-test-prep/comptia-pentestplus/active-information-gathering-for-pentesting-275736/

๐Ÿ‘‰ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐— ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด
###
๐ŸŒŸ Threat Modeling by the PTES
http://www.pentest-standard.org/index.php/Threat_Modeling

๐ŸŒŸ Threat modeling 101 Infosec resources
https://resources.infosecinstitute.com/topic/applications-threat-modeling/

๐Ÿ‘‰ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€
###
๐ŸŒŸ Vulnerability Analysis by the PTES
http://www.pentest-standard.org/index.php/Vulnerability_Analysis

๐ŸŒŸ Gabrielle B's pentips about Scanning & Enumeration
https://csbygb.gitbook.io/pentips/ethical-hacking-general-methodology/scanenum

๐ŸŒŸ What is Vulnerability Analysis and How Does It work on Cybersecurity Exchange
https://www.eccouncil.org/cybersecurity-exchange/ethical-hacking/conduct-a-vulnerability-analysis/

๐ŸŒŸ NCSC Guide for vulnerability management
https://www.ncsc.gov.uk/guidance/vulnerability-management

๐Ÿ‘‰ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Exploitation by the PTES
http://www.pentest-standard.org/index.php/Exploitation

๐ŸŒŸ Gabrielle B's pentips about Exploitation
https://csbygb.gitbook.io/pentips/ethical-hacking-general-methodology/exploitation

๐ŸŒŸ The Exploitation Phase in Penetration Testing by Gaurav Tiwari
https://gauravtiwari.org/exploitation-phase-in-penetration-testing/

๐Ÿ‘‰ ๐—ฃ๐—ผ๐˜€๐˜ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Post Exploitation by the PTES
http://www.pentest-standard.org/index.php/Post_Exploitation

๐ŸŒŸ Introduction to Post-Exploitation Phase on geeksforgeeks
https://www.geeksforgeeks.org/introduction-to-post-exploitation-phase/

๐ŸŒŸ 9 Post Exploitation Tools for Your next Penetration Test
https://bishopfox.com/blog/post-exploitation-tools-for-pen-test

๐Ÿ‘‰ ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜๐—ถ๐—ป๐—ด
###
๐ŸŒŸ Reporting by the PTES
http://www.pentest-standard.org/index.php/Reporting

๐ŸŒŸ Gabrielle B's pentips on reporting
https://csbygb.gitbook.io/pentips/reporting/pentest-report

# REPORTING
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/PentestReport.jpeg)
##
๐Ÿ‘‰ ๐—ฆ๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—ผ๐—ณ ๐—ฎ ๐—ฝ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜ ๐—ฟ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜
###
๐ŸŒŸ Gabrielle B's article on how to write a pentest report:
https://csbygb.gitbook.io/pentips/reporting/pentest-report

๐Ÿ‘‰ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐˜๐—ฎ๐—ธ๐—ฒ ๐—ป๐—ผ๐˜๐—ฒ๐˜€
###
๐ŸŒŸ Cherry Tree
https://www.giuspen.com/cherrytree/

๐ŸŒŸ Joplin
https://joplinapp.org/

๐ŸŒŸ Keepnote
http://keepnote.org/

๐Ÿ‘‰ ๐—ง๐—ถ๐—ฝ๐˜€ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐˜๐˜€
###
๐ŸŒŸ Writing Tips for IT Professionals by Lenny Zeltser
https://zeltser.com/writing-tips-for-it-professionals/

๐ŸŒŸ How to write a Penetration Testing Report by HackerSploit
https://www.youtube.com/watch?v=J34DnrX7dTo

๐Ÿ‘‰ ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Blackstone project by micro-joan
https://github.com/micro-joan/BlackStone

๐ŸŒŸ Pentext by Radically Open Security
https://github.com/radicallyopensecurity/pentext

๐Ÿ‘‰ ๐—˜๐˜…๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ผ๐—ณ ๐—ฟ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜๐˜€
###
๐ŸŒŸ A list of public pentest reports by juliocesarfort
https://github.com/juliocesarfort/public-pentesting-reports

๐ŸŒŸ A list of bug bounty writeup on Pentester Land
https://pentester.land/writeups/

# PENTEST TOOLS
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/PentestTools.jpeg)
##
๐Ÿ‘‰ See Rajneesh Guptaโ€™s post about some of the Practical web Pentesting tools. He even share them according to the pentest steps:
https://www.linkedin.com/posts/rajneeshgupta01_web-pentesting-practical-tools-activity-6946808678402375680-CJjt/

Some of the practical Web Pentesting Tools!

๐Ÿ‘‰ Reconnaisaance
###
โœ” Nmap - Web Service detection

โœ” Nessus - Automated Scan

โœ” Skipfish - Web App Active Scanning for vulnerabilities

๐Ÿ‘‰ Mapping/Discovery
###
โœ” Burp-Suite- Web Proxy

โœ” OWASP ZAP - Web Proxy

๐Ÿ‘‰ Exploitation
###
โœ” Metasploit Framework: Exploitation tool with payloads, exploits

โœ” Burp-Suite- Web Proxy

โœ” Exploit-db - To search for exploits

โœ” Netcat

๐Ÿšจ Follow Rajneesh he offers amazing content ๐Ÿšจ

๐Ÿ‘‰ You know the Nmap project? Well they have a list of the top 125 Network Security Tools:
https://sectools.org/

๐Ÿ‘‰ You want Open Source?
###
โœด๏ธJulien Maury shared a Top 10 on eSecurity Planet:
https://www.esecurityplanet.com/applications/open-source-penetration-testing-tools/

โœด๏ธAnd SANS has a list of tools including plenty of pentest tools:
https://www.sans.org/img/free-faculty-tools.pdf

๐Ÿ‘‰ Finally arch3rPro has an amazing amount of tools listed on github:
https://github.com/arch3rPro/PentestTools

# NETWORK SECURITY, Networking
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/Networking,NetworkSecurity.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ๐—ถ๐—ป๐—ด?
###
๐ŸŒŸ Cover your digital basics with netacad:
https://www.netacad.com/courses/os-it/get-connected

๐ŸŒŸ Professor Messerโ€™s CompTIA Network+ Course
https://www.professormesser.com/network-plus/n10-008/n10-008-video/n10-008-training-course/

๐ŸŒŸ OSI Model
https://en.wikipedia.org/wiki/OSI_model

๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†?
###
๐ŸŒŸ What is Network Security on Hackthebox blog by Kim Crawley:
https://www.hackthebox.com/blog/what-is-network-security

๐ŸŒŸ Network Security Course on OpenLearn by The Open University
https://www.open.edu/openlearn/digital-computing/network-security

๐ŸŒŸ OSI Layers and related Attack types by Harun Seker

![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/OSIlayersrelatedAttacktypesbyHarunSeker.jpeg)

๐Ÿ‘‰ ๐—›๐—ผ๐˜„ ๐˜๐—ผ P๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ๐˜€?
###
๐ŸŒŸ Full Ethical Hacking Course - Beginner Network Penetration Testing by TCM Security
https://youtu.be/WnN6dbos5u8

๐ŸŒŸ Infrastructure Pentesting Checklist by Purab Parihar:
https://github.com/purabparihar/Infrastructure-Pentesting-Checklist

# PRIVILEGE ESCALATION, Windows and Linux
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/PrivilegeEscalation.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป?
###
๐ŸŒŸ Cybersecurity 101 - What is Privilege escalation on CrowdStrike
https://www.crowdstrike.com/cybersecurity-101/privilege-escalation/
https://www.linkedin.com/company/crowdstrike/

๐ŸŒŸ Privilege Escalation Attack and defend explained on BeyondTrust
https://www.beyondtrust.com/blog/entry/privilege-escalation-attack-defense-explained
https://www.linkedin.com/company/beyondtrust/

๐Ÿ‘‰ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Gabrielle B ๐Ÿ”‘'s Pentips on Windows Privilege escalation on CSbyGB - Pentips
https://csbygb.gitbook.io/pentips/windows/privesc

๐ŸŒŸ Windows Privilege Escalation on PayloadsAllTheThings
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md

๐ŸŒŸ Windows Privesc guide on absolombโ€™s security blog
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/

๐ŸŒŸ Privilege Escalation Windows on sushant747โ€™s gitbook
https://sushant747.gitbooks.io/total-oscp-guide/content/privilege_escalation_windows.html

๐ŸŒŸ Windows Local Privilege Escalation checklist on HackTricks
https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation

๐Ÿ‘‰ ๐—Ÿ๐—ถ๐—ป๐˜‚๐˜… ๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Gabrielle B ๐Ÿ”‘'s Pentips on Linux Privilege Escalation on CSbyGB - Pentips
https://csbygb.gitbook.io/pentips/linux/privesc

๐ŸŒŸ Linux Privilege Escalation on PayloadsAllTheThings
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md

๐ŸŒŸ Basic Linux Privilege Escalation on g0tm1lkโ€™s blog
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

๐ŸŒŸ Guide Linux Privilege Escalation on Payatu
https://payatu.com/blog/a-guide-to-linux-privilege-escalation/
https://www.linkedin.com/company/payatu/

๐ŸŒŸ A curated list of Unix Binaries to bypass local security restrictions by GTFOBins
https://gtfobins.github.io/

๐ŸŒŸ Linux Privilege Escalation Checklist on HackTricks
https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist

# EXPLOITING
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/ExploitDevelopment.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜ ๐—ฑ๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—บ๐—ฒ๐—ป๐˜?
###
๐ŸŒŸ Exploit Development Introduction on Hack the Box Academy
https://academy.hackthebox.com/course/preview/stack-based-buffer-overflows-on-linux-x86/exploit-development-introduction

๐ŸŒŸ Exploit Development - Everything you need to know by null-bytes
https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/

๐Ÿ‘‰ ๐—Ÿ๐—ฒ๐˜โ€™๐˜€ ๐˜€๐˜๐—ฎ๐—ฟ๐˜ ๐—น๐—ฒ๐—ฎ๐—ฟ๐—ป๐—ถ๐—ป๐—ด ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐—ถ๐˜ ๐—ฎ๐—ป๐—ฑ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ
###
๐ŸŒŸ Getting Started with Exploit Development by Specter and zi
https://dayzerosec.com/blog/2021/02/02/getting-started.html

๐ŸŒŸ Exploit Courses by Dobin Rutishauser
https://exploit.courses/#/index

๐ŸŒŸ Pwn College
https://pwn.college/
https://www.twitch.tv/pwncollege/videos
https://www.youtube.com/pwncollege

๐ŸŒŸ A curated list of resources for learning about Exploit Development by wtsxDev
https://github.com/wtsxDev/Exploit-Development/blob/master/README.md

๐ŸŒŸ Practice with exploit education
https://exploit.education/

๐ŸŒŸ Fundamentals of Software Exploitation
https://wargames.ret2.systems/course

๐ŸŒŸ Shellcode Devlopment by Joas Antonio
https://drive.google.com/file/d/1R3ZTFerBaBSfnS0rP_r2d8xH2p-n3kdt/view

๐ŸŒŸ Shellcode Development by Aayush Malla
https://aayushmalla56.medium.com/shellcode-development-4590117a26bf

๐ŸŒŸ Joas Antonio OSEP guide with plenty of resources
https://github.com/CyberSecurityUP/OSCE-Complete-Guide#osep

๐ŸŒŸ Awesome Exploit Development by Joas Antonio
https://github.com/CyberSecurityUP/Awesome-Exploit-Development#readme

๐Ÿ‘‰ ๐—•๐—ข๐—ก๐—จ๐—ฆ: ๐—ช๐—ฎ๐—ป๐˜ ๐˜๐—ผ ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—ต๐—ผ๐˜„ ๐—ฎ ๐—บ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐˜„๐—ผ๐—ฟ๐—ธ๐˜€?
###
๐ŸŒŸ Beginnerโ€™s Blue Team Guide to creating Malware in Python by David Elgut
https://www.linkedin.com/pulse/beginners-blue-team-guide-creating-malware-python-david-elgut/

# REVERSING
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/ReverseEngineering.jpeg)
##
๐Ÿ‘‰ ๐—ฅ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฒ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด
###
๐ŸŒŸ Reverse Engineering for Beginners by Ophir Harpaz
https://www.begin.re/

๐ŸŒŸ Reverse Engineering for Everyone by Kevin Thomas My Technotalent
https://0xinfection.github.io/reversing/

๐ŸŒŸ Reverse Engineering for beginners by Dennis Yurichev (available in many languages)
https://beginners.re/main.html

๐ŸŒŸ Reverse Engineering 101 by 0x00 (with exercises)
https://0x00sec.org/t/reverse-engineering-101/1233

๐Ÿ‘‰ ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€
###
๐ŸŒŸ Malware Analysis In 5+ Hours - Full Course - Learn Practical Malware Analysis! by HuskyHacks
https://youtu.be/qA0YcYMRWyI

๐ŸŒŸ Malware Analysis โ€“ Mind Map by Thatintel
https://thatintel.blog/2016/05/30/malware-analysis-mind-map/

๐ŸŒŸ Malware Analysis Tutorials: a Reverse Engineering Approach by Dr Xiang Fu
https://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html

๐Ÿ‘‰ ๐—”๐—บ๐—ฎ๐˜‡๐—ถ๐—ป๐—ด ๐—•๐—ผ๐—ป๐˜‚๐˜€
###
Malware Analysis and Reverse Engineering courses by DFIR Diva
https://training.dfirdiva.com/listing-category/malware-analysis-and-re

# SECURE CODE
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/SecureCode.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„?
###
๐ŸŒŸ How to Identify Vulnerabilities in code โ€“ Manual Code Review on Hackingloops
https://www.hackingloops.com/how-to-identify-vulnerabilities-in-code-manual-code-review/

๐ŸŒŸ Security Code Review 101 by Paul Ionescu:
https://medium.com/@paul_io/security-code-review-101-a3c593dc6854

๐ŸŒŸ OWASPยฎ Foundation Secure Coding Practice
https://owasp.org/www-pdf-archive/OWASP_SCP_Quick_Reference_Guide_v2.pdf
https://www.linkedin.com/company/owasp/

๐Ÿ‘‰ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„
###
๐ŸŒŸ Farah Hawaโ€™s post about the subject:
A few weeks ago, I took up a challenge to learn Secure Code Reviews in 20 days. I chose PHP as the language to focus on and here are the resources I used to learn:

1. PentesterLab videos about different strategies to use while reviewing code
https://www.linkedin.com/company/pentesterlab/

2. Sonar Rules for code review rules/hacks to find vulnerabilities in PHP. This had great examples of compliant vs non-compliant code snippets.
https://www.linkedin.com/company/sonarsource/
https://rules.sonarsource.com/php/type/Vulnerability

3. Looking for bugs in vulnerable apps like DVWA after finding their code on GitHub:
https://github.com/digininja/DVWA/tree/master/vulnerabilities

4. Watching videos by Vickie Li, and Shubham Shah on the OWASP DevSlop YouTube channel:
https://www.youtube.com/c/OWASPDevSlop
https://www.linkedin.com/company/owasp-devslop/

5. Solving challenges posted by YesWeHack โ ตand Intigriti on Twitter but they can also be found on their websites:
https://www.yeswehack.com/
https://www.linkedin.com/company/yes-we-hack/
https://blog.yeswehack.com/yeswerhackers/dojoweb-application-bypass-v2-0/
https://www.linkedin.com/company/intigriti/

6. OWASPยฎ Foundation has a great book Code Review Guide which has good theoretical knowledge about different bug classes
https://owasp.org/www-pdf-archive/OWASP_Code_Review_Guide_v2.pdf
https://www.linkedin.com/company/owasp/

You can also watch the video I made about this:
https://youtu.be/ajcxjnTFo6A

๐ŸŒŸ Introduction to Secure Code Review on PentesterLab:
https://www.linkedin.com/company/pentesterlab/
https://pentesterlab.com/exercises/codereview/course

๐ŸŒŸ Freddy Machoโ€™s PDF Code review checklist

๐ŸŒŸ Check out the dedicated section on Secure Code Review on my pentips
https://csbygb.gitbook.io/pentips/secure-code-review/code-review

๐Ÿ‘‰ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ต๐—ฎ๐—ฟ๐—ฝ๐—ฒ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„๐—ฒ๐—ฟ ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€
###
๐ŸŒŸ Security training platform for devs Hacksplaining:
https://www.hacksplaining.com/

๐ŸŒŸ Make a vulnerable PHP App with this video by Wesley (The XSS Rat) Thijs
https://www.youtube.com/live/e_dLSVpQy40?feature=share

๐ŸŒŸ Join the WeHackPurple Community to talk about secure code practice and more
https://community.wehackpurple.com/

๐Ÿ‘‰ ๐—ง๐—ผ๐—ผ๐—น๐˜€
###
๐ŸŒŸ Manual code review versus using a SAST Tool on We Hack Purple
https://wehackpurple.com/pushing-left-like-a-boss-part-7-code-review-and-static-code-analysis/
https://www.linkedin.com/company/wehackpurple/

๐ŸŒŸ Code Review tools on HackTricks
https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/code-review-tools

๐ŸŒŸ Awesome DevSecOps by TaptuIT
https://github.com/TaptuIT/awesome-devsecops

# BUG BOUNTY
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/BugBounty.jpeg)
##
๐Ÿ‘‰ A great introduction on how to get into bug bounty by Wesley Thijs xssrat
https://thexssrat.medium.com/bug-bounty-methodology-v3-0-hunt-like-a-rat-9e030fc54363

๐Ÿ‘‰ A list of bug bounty platforms by Bughacking
https://bughacking.com/best-bug-bounty-platforms/

๐Ÿ‘‰ A list of bug bounty programs by vpnmentor:
https://www.vpnmentor.com/blog/the-complete-list-of-bug-bounty-programs/

๐Ÿ‘‰ Want to apply to the Synack Red Team Artemis program?
https://www.linkedin.com/company/synack-red-team/

An exclusive community open to security professionals who identify as women, trans and nonbinary people, and others who identify as a gender minority. See this link:
https://www.synack.com/artemis/

๐Ÿ‘‰ Farah Hawa has a great video about bug bounty resources:
https://youtu.be/ig5DuM6M2CQ

๐Ÿ‘‰ The Bug Hunter Handbook by Gowthams
https://gowthams.gitbook.io/bughunter-handbook/

๐Ÿ‘‰ A repo โ€œAllAboutBugBountyโ€ by daffainfo
https://github.com/daffainfo/AllAboutBugBounty#readme

# Mobile App pentest
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/MobileAppPentest.jpeg)
##
๐Ÿ‘‰ Android Bug Bounty Hunting: Hunt Like a Rat by Wesley Thijs
https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat

๐Ÿ‘‰ Set up your lab, learn about the methodology and get more resources on my Pentips

๐ŸŒŸ Gabrielle B's talk and resources for TDI 2022:
https://csbygb.gitbook.io/pentips/talks/android-app

๐ŸŒŸ The dedicate Android App hacking page:
https://csbygb.gitbook.io/pentips/mobile-app-pentest/android

๐Ÿ‘‰ Mobile App Penetration Testing Cheat Sheet by tanprathan
https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet

๐Ÿ‘‰ Donโ€™t forget the standards. Read OWASP MASVS and OWASP MASTG here
https://mas.owasp.org/#our-mission

# API Pentesting
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/APIhacker.jpeg)
##
๐ŸŒŸ I highly recommend taking the API Penetration Testing course by Corey J. Ball on APIsec University
https://university.apisec.ai/
https://www.linkedin.com/company/apisec-university/

๐Ÿ‘‰ I had a blast working on this course. You will have the opportunity to learn and apply the concepts right after with a hands-on lab that you can install and deploy yourself.

๐Ÿ‘‰ You will learn about the following topics
* Set Up an API Hacking lab
* API Reconnaissance
* Endpoint Analysis
* Scanning APIs
* API Authentication Attacks
* Exploiting API Authorization
* Testing for Improper Assets Management
* Mass Assignment
* Injection Attacks
* Rate Limit Testing
* Combining Tools and Techniques

๐Ÿ™ I can not thank enough the team of APIsec University special mention to Corey J. Ball and Dan Barahona for all that you do for the community. ๐Ÿ™

๐ŸŒŸ Learn more about the course:

๐Ÿ‘‰ Corey's Book:
https://nostarch.com/hacking-apis

๐Ÿ‘‰ Corey talks about API Hacking with David Bombal:
https://youtu.be/CkVvB5woQRM

๐Ÿ‘‰ Check out my notes about API Hacking here:
https://csbygb.gitbook.io/pentips/web-pentesting/api

# Threat Modeling
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/ThreatModeling.jpeg)
##
๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด?
###
๐ŸŒŸ Threat Modeling on OWASP by Victoria Drake
https://owasp.org/www-community/Threat_Modeling

๐Ÿ‘‰ ๐—›๐—ผ๐˜„ ๐—ฑ๐—ผ๐—ฒ๐˜€ ๐—ถ๐˜ ๐˜„๐—ผ๐—ฟ๐—ธ?
###
๐ŸŒŸ Threat Modeling the Right way for builders Workshop on AWS Skill builder
https://explore.skillbuilder.aws/learn/course/external/view/elearning/13274/threat-modeling-the-right-way-for-builders-workshop

๐ŸŒŸ Even my dad is a threat modeler by Sarthak Taneja
https://youtu.be/Y587UFgjqhQ

๐Ÿ‘‰ ๐—˜๐˜…๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฅ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€
###
๐ŸŒŸ Threat Model Examples by Tal Eliyahu
https://github.com/TalEliyahu/Threat_Model_Examples#readme

๐ŸŒŸ Julien Provenzano made multiple posts on the subject

โœ… GUIDE TO CYBER THREAT MODELLING by Cyber Security Agency of Singapore (CSA)
This document aims to provide a practical and systematic way to identify threat events that can be used in a cybersecurity risk assessment.

It will introduce various approaches and methods of threat modelling, and provide a suggested framework, coupled with practical examples, for individuals and groups to adopt to derive a robust system threat model and
relevant threat events.

System owners can then incorporate these threat events into their cybersecurity risk assessment to develop and prioritise effective controls.

target audience:

* Internal stakeholders e.g. system owners, business unit heads, Chief Information Security Officers, and personnel involved in IT risk assessment and management within any organisation, including Critical Information Infrastructure Owners;
* External consultants or service providers engaged to conduct threat modelling on behalf of system owners; and
* Red team members, blue team defenders, and purple team members.

2 APPROACH

2.1 System Level Approach

2.2 Common Missteps in Threat Modelling

2.3 Integrating Threat Modelling into Risk Assessment Process

3 METHODOLOGY

3.1 Overview of Method

3.2 Step 1: Preliminaries and Scope Definition

3.3 Step 2: System Decomposition

3.4 Step 3: Threat Identification

3.5 Step 4: Attack Modelling

3.6 Step 5: Bringing Everything Together

โœ… Threat Modeling course by British Columbia Provincial Government

This training course is just one part of the Office of the Chief Information Officer (OCIO) Information Security Branch (ISB) education series.

The goal of this course is to inform staff of what threat modelling is, why it is important, and how it fits into the Security Threat Risk Assessment, and Statement of Acceptable Risk, processes.

Threat Modelling Frameworks

A threat modelling practice flows from a methodology or framework. There are many threat modelling frameworks available for use. Some of these are specialised models designed for a specific task, for example, some focus specifically on risk or on privacy concerns.

They can be optionally combined to create a more robust and well-rounded view of potential threats.

Threat modelling should be performed early in the development cycle because if potential issues arise, they can be caught early and remedied.
This can prevent a much costlier fix down the line.
Using threat modelling to think about security requirements can lead to proactive architectural decisions that help reduce threats right from the start.

Threat Modeling frameworks

- Microsoft STRIDE Threat Modelling Tool (Developer Focused)
- OWASP Application Threat modelling (Software Focused)
- OCTAVE (Practice Focused)
- Trike Threat modelling (Acceptable Risk Focused)
- P.A.S.T.A. Threat modelling (Attacker Focused)
- VAST Threat modelling (Enterprise Focused)

Threat Modelling Tools
- IriusRisk
- PyTM
- SecuriCAD
- ThreatModeler
- SD Elements
- Tutamantic
- OWASP Threat Dragon Project
- Mozilla SeaSponge
- OVVL

โœ… Threat Modeling Architecting & Designing with Security in Mind by OWASPยฎ Foundation - Venkatesh Jagannathan

Why do we create application threat models in the Software Development Life Cycle ?

SDLC refers to a methodology with clearly defined processes for creating high-quality software.

To identify potential flaws that have been there since the applications were created, threat modeling identifies risks and flaws affecting an application, no matter how old or new that application is.

Threat modeling should take place as soon as the architecture is in place as the cost of resolving issues generally increases further along in the SDLC.

- Introduction to Threat Modeling
- Precursors to Threat Modeling
- Threat Modeling โ€“ How-To
- Test Focused Threat Modeling
- Alternate Threat Models
- Estimating Threat Modeling for Applications
- CVSS vs OCTAVE

๐ŸŒŸ The threat Model playbook by Toreon
https://github.com/Toreon/threat-model-playbook

๐ŸŒŸ OWASP Threat Modeling Cheat Sheet
https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Threat_Modeling_Cheat_Sheet.md

# SEARCH ENGINES FOR PENTESTERS
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/SearchEngine.jpeg)
##
๐Ÿ‘‰ TryHackMe room Introductory Researching:
https://tryhackme.com/room/introtoresearch
https://www.linkedin.com/company/tryhackme/

๐Ÿ‘‰ Rajnessh Gupta - How to use Google for hacking
https://youtu.be/lLnDrv696u4

๐Ÿ‘‰ Have you heard about dorking? It is also very helpful.

โœด๏ธ Hack The Box What is Google Dorking:
https://www.hackthebox.com/blog/What-Is-Google-Dorking
https://www.linkedin.com/company/hackthebox/

โœด๏ธ Tryhackme Google Dorking:
https://tryhackme.com/room/googledorking

๐Ÿ’ญ TIP: Lots of Engine use dorking, see DuckDuckGo Search Syntax:
https://help.duckduckgo.com/duckduckgo-help-pages/results/syntax/

๐Ÿ’ญ TIP2: Automate Google dorking with Katana by TebbaaX:
https://github.com/TebbaaX/Katana

๐Ÿ‘‰ Bruce Clay, Inc. - Advanced Search Operators for Bing and Google (Guide and Cheat Sheet)
https://www.bruceclay.com/blog/bing-google-advanced-search-operators/
https://www.linkedin.com/company/bruce-clay-inc-/

๐Ÿ‘‰ Daniel Kelley 30 cybersecurity search engines

Here are 30 cybersecurity search engines:
1. Dehashedโ€”View leaked credentials.
2. SecurityTrailsโ€”Extensive DNS data.
3. DorkSearchโ€”Really fast Google dorking.
4. ExploitDBโ€”Archive of various exploits.
5. ZoomEyeโ€”Gather information about targets.
6. Pulsediveโ€”Search for threat intelligence.
7. GrayHatWarfareโ€”Search public S3 buckets.
8. PolySwarmโ€”Scan files and URLs for threats.
9. Fofaโ€”Search for various threat intelligence.
10. LeakIXโ€”Search publicly indexed information.
11. DNSDumpsterโ€”Search for DNS records quickly.
12. FullHuntโ€”Search and discovery attack surfaces.
13. AlienVaultโ€”Extensive threat intelligence feed.
14. ONYPHEโ€”Collects cyber-threat intelligence data.
15. Grep Appโ€”Search across a half million git repos.
16. URL Scanโ€”Free service to scan and analyse websites.
17. Vulnersโ€”Search vulnerabilities in a large database.
18. WayBackMachineโ€”View content from deleted websites.
19. Shodanโ€”Search for devices connected to the internet.
20. Netlasโ€”Search and monitor internet connected assets.
21. CRT shโ€”Search for certs that have been logged by CT.
22. Wigleโ€”Database of wireless networks, with statistics.
23. PublicWWWโ€”Marketing and affiliate marketing research.
24. Binary Edgeโ€”Scans the internet for threat intelligence.
25. GreyNoiseโ€”Search for devices connected to the internet.
26. Hunterโ€”Search for email addresses belonging to a website.
27. Censysโ€”Assessing attack surface for internet connected devices.
28. IntelligenceXโ€”Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Securityโ€”Browse latest vulnerabilities and exploits.
30. SearchCodeโ€”Search 75 billion lines of code from 40 million projects.

# Cybersec FRAMEWORKS & STANDARDS:
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/Frameworks_Standards.jpeg)

## PENTESTING STANDARDS:

(PTES) The Penetration Testing Execution Standard
http://www.pentest-standard.org/

(OSSTMM) The Open Source Security Testing Methodology https://www.isecom.org/
https://www.isecom.org/OSSTMM.3.pdf

## MITRE ATT&CK

MITRE ATT&CK framework by MITRE ATT&CK
https://youtu.be/Yxv1suJYMI8

Putting MITRE ATT&CK into Action with What You Have, Where You Are (By Katie Nickels)
https://youtu.be/bkfwMADar0M

MITRE room on TryHackMe
https://tryhackme.com/room/mitre

## Cyber Kill Chainย Framework:
The Cyber Kill Chainยฎย framework, developed by Lockheed Martin, is part of theย Intelligence Driven Defenseยฎย model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html

## NIST:

NIST Cybersecurity Framework Explained - Kelly Hood, Thomas Conkle - RSA Conference
https://youtu.be/nFUyCrSnR68

## PCI Security Standards:

PCI Security Standards Council
https://www.pcisecuritystandards.org/

## ISO STANDARDS:

ISO 27000 Family of Standards by Aron Lange
https://youtu.be/7PscOoWtR7g

A youtube playlist about ISO27001 by risk3sixty https://www.youtube.com/c/risk3sixty
https://www.youtube.com/playlist?list=PLboNZ8lgLkUjg353Am3x4SytHme-XDL2N

## Frameworks compared:
NIST Cybersecurity Framework vs ISO 27001/27002 vs NIST 800-53 vs Secure Controls Framework on Compliance Forge
https://www.complianceforge.com/faq/nist-800-53-vs-iso-27002-vs-nist-csf-vs-scf

Mitre Attack vs Cyber Kill chain on blackberry.com
https://www.blackberry.com/us/en/solutions/endpoint-security/mitre-attack/mitre-attack-vs-cyber-kill-chain

# PENTEST reporting:
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/PentestReporting.jpeg)
### How to take NOTES:

CherryTree, a hierarchical note taking application.
https://www.giuspen.com/cherrytree/

Joplin, an Open Source note-taking app.
https://joplinapp.org/

KeepNote, a note taking application
http://keepnote.org/

## How to report your findings:
https://csbygb.gitbook.io/pentips/reporting/pentest-report

Writing Tips for IT Professionals (By Lenny Zeltser)
https://zeltser.com/writing-tips-for-it-professionals/

How To Write A Penetration Testing Report by HackerSploit https://www.youtube.com/c/HackerSploit/
https://youtu.be/J34DnrX7dTo

## REPORTING:

### A list of public penetration test reports published by several consulting firms and academic security groups.
https://github.com/juliocesarfort/public-pentesting-reports

### A Directory of ethical hacking writeups including bug bounty, responsible disclosure and pentest writeups.
https://pentester.land/writeups/

## PENTEST AUTOMATION:

BlackStone Project by MicroJoan https://microjoan.com/
https://github.com/micro-joan/BlackStone

Pentext by https://www.radicallyopensecurity.com/
https://github.com/radicallyopensecurity/pentext

# Web PENTEST:
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/WebAppPentesting.jpeg)
## Web Security Academy by PortSwigger:
https://portswigger.net/web-security/learning-path

### Rana Khalil Youtube channel
https://www.youtube.com/c/RanaKhalil101

### Wesley Thijs XSSratโ€™s Youtube channel
https://www.youtube.com/c/TheXSSrat

## The Pentesting Web Checklist on Pentest Book by six2dez
https://pentestbook.six2dez.com/others/web-checklist

## OWASPยฎ Foundation Top 10:
https://owasp.org/www-project-top-ten/

## Vulnerable Web Applications to practice:
https://owasp.org/www-project-vulnerable-web-applications-directory/

# API PENTEST
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/APIpentesting.jpeg)

API Hacking beginners guide by Dana Epp
https://danaepp.com/beginners-guide-to-api-hacking

Corey J. Ball API workshop
https://sway.office.com/HVrL2AXUlWGNDHqy
https://github.com/hAPI-hacker/Hacking-APIs

## API PENTEST ORGANIZING:

MalAPI by mrd0x
https://malapi.io/

MindAPI by David Sopas
https://dsopas.github.io/MindAPI/play/

## API PENTESTING PRACTICE:

Hackxpert - OWASP top 10 API training
https://hackxpert.com/API-testing.php

VAmPI by erev0s:
https://hakin9.org/vampi-vulnerable-rest-api-with-owasp-top-10-vulnerabilities-for-security-testing/
https://github.com/erev0s/VAmPI

## API Pentest videos and conferences:
APISecure Conference all their 2022 videos are available on their website
https://www.apisecure.co/

Hacking mHealth Apps and APIs on KnightTV with Alissa Valentina Knight
https://youtu.be/GLnhkf3JcL8

# CLOUD PENTEST
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/CloudsPentest.jpeg)

Get familiar with Cloud Security fundamentals with Learn to cloud by Gwyneth Peรฑa-Siguenza and Dayspring Johnson
https://learntocloud.guide/#/phase5/README

Hacking the cloud by Nick Frichette an encyclopedia of the techniques that offensive security professionals can use against cloud environments.
https://hackingthe.cloud/

## Cloud Security - Attacks by CyberSecurityUP
https://github.com/CyberSecurityUP/Cloud-Security-Attacks

### Practice with this free lab from Pentester Academy
https://attackdefense.pentesteracademy.com/challengedetailsnoauth?cid=2074
https://attackdefense.pentesteracademy.com/

# ACTIVE DIRECTORY Pentest
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/ADpentest.jpeg)
## AD Practice
Building an Active Directory Lab by spookysec:
https://blog.spookysec.net/ad-lab-1/

A script to set up a Vulnerable AD Lab by WazeHell
https://github.com/WazeHell/vulnerable-AD

### Collection of various common attack scenarios on Azure Active Directory by Cloud-Architekt:
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense

### A great document full of resources by Julien Provenzano:
https://www.ralfkairos.com/
https://github.com/infosecn1nja/AD-Attack-Defense

### An Active Directory Exploitation Cheat Sheet by Integration-IT
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet

# CTF
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/CTF.jpeg)

HACKTHEBOX, A Massive Hacking Playground; CTF challenges: Fullpwn (based on vulnerable machines), Cryptographic, Forensic, Pwn (based on binary exploitation and memory corruption), Web, Reversing, Cloud cybersecurity (AWS, GCP, and Azure misconfigurations) and Hardware.
https://www.hackthebox.com/

What is CTF in hacking? Tips & CTFs for beginners by HTB.
https://www.hackthebox.com/blog/what-is-ctf

Learn to Hack with Hack The Box: The Beginner's Bible.
https://www.hackthebox.com/blog/learn-to-hack-beginners-bible

Getting Into CTFs As a Web Developer.
https://erichogue.ca/2022/03/GettingIntoCTFsAsADev

## CTFs (Write-Ups and Resources)
https://github.com/ctfs

Rootย Me
https://www.root-me.org

TryHackMe
https://tryhackme.com/

RingZer0 Team Online CTF
https://ringzer0ctf.com/challenges

Cryptopals
https://cryptopals.com/

CTF Time
https://ctftime.org/

### Marcelle Leeโ€™s website reference sheet
https://info.marcellelee.com/
https://drive.google.com/drive/folders/1cfwjm_VqXwAFpFdBnUXkUi0-qT4_cpiJ
https://docs.google.com/spreadsheets/d/1AkczyGQbtabSMbxq1P-c7u3NSXlmXqqv3cDoVpTlSoM/edit#gid=0

# PURPLE TEAM
![This image owns Gabrielle B ๐Ÿ”‘ https://github.com/CSbyGB](https://github.com/txuswashere/pentesting/raw/main/jpg/PurpleTeam.jpeg)
###
The Difference Between Red, Blue, and Purple Teams (By Daniel Miessler)
https://danielmiessler.com/study/red-blue-purple-teams/

Purple Teaming for Dummies
https://www.attackiq.com/lp/purple-teaming-for-dummies/

Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
https://github.com/ch33r10/EnterprisePurpleTeaming

## PURPLE TEAMING: Practice & Tips

Purple Team Exercise Framework
https://github.com/scythe-io/purple-team-exercise-framework/blob/master/PTEFv2.md

Actionable Purple Teaming: Why and How You Can (and Should) Go Purple
https://www.scythe.io/library/actionable-purple-teaming-why-and-how-you-can-and-should-go-purple
https://www.scythe.io/ptef

## TOOLS:

Bloodhound for Blue and Purple Teams.
https://github.com/PlumHound/PlumHound

PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments.
https://github.com/mvelazc0/PurpleSharp

# CYBER FUN
![This image owns Gabrielle B https://github.com/CSbyGB ](https://github.com/txuswashere/pentesting/raw/main/jpg/cyberFun.jpeg)
##
๐Ÿ‘‰ ๐— ๐—ผ๐˜ƒ๐—ถ๐—ฒ๐˜€
###
๐ŸŒŸ A list of movies on Movies for Hackers by hackermovie club
https://hackermovie.club/

๐ŸŒŸ The Complete List of Hacker And Cybersecurity Movies by Cybercrime Magazine
https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/
https://www.linkedin.com/company/cybercrime-magazine/

๐ŸŒŸ Knight TV+
https://www.youtube.com/@knighttvplus

๐Ÿ‘‰ ๐—™๐—ถ๐—ฐ๐˜๐—ถ๐—ผ๐—ป
###
๐ŸŒŸ Hacker stories on Wattpad by various authors
https://www.wattpad.com/stories/hacker

๐Ÿ‘‰ ๐— ๐˜‚๐˜€๐—ถ๐—ฐ
###
๐ŸŒŸ The SOC Analyst playlist by LetsDefend
https://open.spotify.com/playlist/0G35948whLbeCBjHjIAIES
https://www.linkedin.com/company/letsdefend/

๐ŸŒŸ INE Study room RnB playlist
https://open.spotify.com/playlist/571cQb5ZfmV5eHzCmCSHNG

๐ŸŒŸ API Security playlist by 12135211372
https://open.spotify.com/playlist/7A6TsA3cKxxY253dPHlkcO

๐ŸŒŸ INE Study Room Classical playlist
https://open.spotify.com/playlist/6Q5UNkiJLFQcBS8FnLE41A

๐ŸŒŸ Cyber Apocalypse 2021 by Kamil Gierach-Pacanek
https://open.spotify.com/playlist/3LfUN18cfrleZN5SlNWY6S

๐ŸŒŸ ./Hacking by fi3nds2
https://open.spotify.com/playlist/66sn9JCqts84k196NAhNS3

๐ŸŒŸ Coding / Hacking Music by Mark Tey
https://open.spotify.com/playlist/7KnyNJbKMJawssU93kUhLE

๐ŸŒŸ Coding Programming Hacking Slashing by Techno Tim
https://open.spotify.com/playlist/5SgJR30RfzR5hO21TsQhBp

๐ŸŒŸ Hacking by Edwin Finch
https://open.spotify.com/playlist/5R8erMpe2s3IcbxEGhBih4

๐Ÿ‘‰ ๐—–๐—ผ๐—บ๐—ถ๐—ฐ๐˜€
###
๐ŸŒŸ Best Female Super Genius / Computer Hacker / Vigilante
https://comicvine.gamespot.com/profile/megawubba/lists/best-female-super-geniuscomputer-hackervigilante/58810/

๐ŸŒŸ The Ella Project - The Big Hack
https://www.theellaproject.com/thebighack

๐ŸŒŸ Planet Heidi
http://www.planetheidi.com/

๐ŸŒŸ Hackers Super heroes of the digital Age by vrncomics. Get your copy of issue #1 for free here:
https://www.vrncomics.com/

###
๐Ÿšจ๐Ÿšจ ๐’๐‡๐€๐‘๐„!๐Ÿšจ๐Ÿšจ
Do you know other resources?

###
* Compiled from the differents latest posts from Gabrielle B ๐Ÿ”‘
https://github.com/CSbyGB