Resources
Ethical Hacking Resources
Root Me — Challenges.
Stök's YouTube — Videos.
Hacker101 Videos — Videos.
InsiderPhD YouTube — Videos.
EchoCTF — Interactive Learning.
Vuln Machines — Videos and Labs.
Try2Hack — Interactive Learning.
Pentester Land — Written Content.
Checkmarx — Interactive Learning.
Cybrary — Written Content and Labs.
RangeForce — Interactive Exercises.
Vuln Hub — Written Content and Labs.
TCM Security — Interactive Learning.
HackXpert — Written Content and Labs.
Try Hack Me — Written Content and Labs.
OverTheWire — Written Content and Labs.
Hack The Box — Written Content and Labs.
CyberSecLabs — Written Content and Labs.
Pentester Academy — Written Content and Labs.
Bug Bounty Reports Explained YouTube — Videos.
Web Security Academy — Written Content and Labs.
Securibee's Infosec Resources — Written Content.
Jhaddix Bug Bounty Repository — Written Content.
Zseano's Free Bug Bounty Methodology — Free Ebook.
Awesome AppSec GitHub Repository — Written Content.
NahamSec's Bug Bounty Beginner Repository — Written Content.
Kontra Application Security Training — Interactive Learning.
API Security Testing Resources
Video: Traceable AI, API Hacking 101.
Video: Katie Paxton-Fear, API Hacking.
Video: Bugcrowd, Bad API, hAPI Hackers.
Video: OWASP API Security Top 10 Webinar.
Blog: Detectify, How To Hack API's in 2021.
Blog: HackXpert, Let's build an API to hack.
Video: Bugcrowd, API Security 101 by Sadako.
Video: David Bombal, Free API Hacking Course.
Blog: Wallarm, How To Hack API In 60 Minutes.
Website: APIsecurity IO, API Security Articles.
Blog: Curity, The API Security Maturity Model.
Blog: Expedited Security, API Security MegaGuide.
Video: Grant Ongers, API Security Testing Workshop.
Videos: The XSS Rat, API Testing And Securing Guide.
Blog: APIsec OWASP API Security Top 10: A Deep Dive.
Podcast: We Hack Purple, API Security Best Practices.
Blog: Kontra Application Security, Owasp Top 10 for API.
Blog: Secure Delivery, OWASP API Top 10 CTF Walk-through.
Blog: SmartBear, How To Hack An API And Get Away With It.
Blog: Ping Identity, API Security: The Complete Guide 2022.
Video: SANS Offensive Operations, Analyzing OWASP API Security.
Blog: Bend Theory, Exploiting Unintended Functionality in API's.
Blog: Bright Security, Complete Guide to Threats, Methods & Tools.
Python Resources
Think Python — Free Ebook
Think Python 2e — Free Ebook
A Byte of Python — Free Ebook
Real Python — Online Platform
Full Stack Python — Free Ebook
freeCodeCamp — Online Platform
Dive Into Python 3 — Free Ebook
Practice Python — Online Platform
The Python Guru — Online Platform
The Coder's Apprentice — Free Ebook
Python Principles — Online Platform
Harvard's CS50 Python Video — Video
Cracking Codes With Python — Free Ebook
Learn Python, Break Python — Free Ebook
Google's Python Class — Online Platform
Python Like You Mean It — Online Platform
Beyond the Basic Stuff with Python — Free Ebook
Automate the Boring Stuff with Python — Free Ebook
The Big Book of Small Python Projects — Free Ebook
Python Tutorial for Beginners, Telusko — Free Videos
Learn Python 3 From Scratch — Free Interactive Course
Python Tutorial For Beginners, Edureka — Online Platform
Microsoft's Introduction to Python Course — Online Platform
Beginner's Guide to Python, Official Wiki — Online Platform
Python for Everybody Specialization, Coursera — Online Platform
Cybersec YouTube channels
Infosec Institute — Cybersecurity awareness.
Black Hat — Technical cybersecurity conferences.
Bugcrowd — Bug bounty methodology and interviews.
InfoSec Live — Everything from tutorials to interviews.
David Bombal — Everything cybersecurity related.
Nahamsec — Educational hacking and bug bounty videos.
Computerphile — Covers basic concepts and techniques.
InsiderPHD — How to get started with bug bounty hunting.
Security Weekly — Interviews with cybersecurity figures.
John Hammond — Malware analysis, programming, and careers.
Peter Yaworski — Web-application hacking tips and interviews.
IppSec — Labs and capture-the-flag tutorials, HackTheBox etc.
13Cubed — Videos on tools, forensics, and incident response.
HackerSploit — Penetration testing, web-application hacking.
STÖK — Videos on tools, vulnerability analysis, and methodology.
Security Now — Cybercrime news, hacking and web-application security.
LiveOverflow — Involves hacking, write-up videos, and capture-the-flags.
The Cyber Mentor — Ethical hacking, web-application hacking, and tools.
Joe Collins — Everything Linux related, including tutorials and guides.
Null Byte — Cybersecurity for ethical hackers, and computer scientists.
The PC Security Channel — Windows security, malware news, and tutorials.
Simply Cyber — Helps people with cybersecurity career development.
Network Chuck — Everything cybersecurity related.
BlackPerl — Malware analysis, forensics and incident response.
Professor Messer — Guides covering certifications.
Hak5 — General cybersecurity coverage.
Cybersec Newsletters
AdvisoryWeek — Security advisory roundups by major vendors.
We Live Security — Award-winning news, views and insights.
CSO Online — News, analysis and research on security and risk management.
tl;dr sec Newsletter — Tools, blog posts, conference talks and research.
Shift Security Left — Application security, architecture, and incidents.
Unsupervised Learning Community — Important cybersecurity stories.
Threatpost — Exploits, vulnerabilities, malware and cybersecurity.
Blockchain Threat Intelligence — Tools, events, threats.
Gov Info Security — Domestic and international governmental cybersecurity news.
AWS Security Digest — AWS security updates.
The Hacker News — Cybersecurity news.
Krebs On Security — Investigative cybersecurity journalism that's interesting.
This Week in 4n6 — DFIR updates.SecPro — Analysis of threats, attacks and tutorials.
Naked Security — How to protect yourself from attacks etc.
API Security Newsletter — API security news and vulnerabilities.
CyberSecNewsWeekly — Collection of news, articles and tools.
Zero Day — Stories about hackers, spies and cybercrime.
Schneier on Security —Cybersecurity news and opinions.
Hive Five Newsletter — Curated cybersecurity news.Graham Cluley — Cybersecurity news and opinions.
TripWire’s State of Security — Corporate cybersecurity news.
RTCSec — News around VOIP and WebRTC security.
Risky Biz — Analysis of big cyber stories.
Cybersec News
IT Security Guru
Security Weekly
The Hacker News
Infosecurity Magazine
CSO Online
The State of Security - Tripwire
The Last Watchdog
Naked Security
Graham Cluley
Cyber Magazine
WeLiveSecurity
Dark Reading
Threatpost
Krebs on Security
Help Net Security
HackRead
SearchSecurity
TechWorm
GBHackers On Security
The CyberWire
Cyber Defense Magazine
Hacker Combat
Cybers Guards
Cybersecurity Insiders
Information Security Buzz
The Security Ledger
Security Gladiators
Infosec Land
Cyber Security Review
Comodo News
Internet Storm Center | SANS
Daniel Miessler
TaoSecurity
Reddit
All InfoSec News
CVE Trends
Securibee
Twitter
threatABLE
Cybersec Podcasts
Cyber Work
Click Here
Defrag This
Security Now
InfoSec Real
InfoSec Live
Simply Cyber
OWASP Podcast
We Talk Cyber
Risky Business
Malicious Life
Hacking Humans
What The Shell
Life of a CISO
H4unt3d Hacker
2 Cyber Chicks
The Hacker Mind
Security Weekly
Cyberside Chats
Darknet Diaries
CyberWire Daily
Absolute AppSec
Security in Five
Smashing Security
401 Access Denied
7 Minute Security
8th Layer Insights
Adopting Zero Trust
Cyber Security Sauna
The Cyberlaw Podcast
Unsupervised Learning
Naked Security Podcast
Identity at the Center
Breaking Down Security
The Shellsharks Podcast
The Virtual CISO Moment
The Cyber Tap (cyberTAP)
The Shared Security Show
The Social-Engineer Podcast
The 443 Security Simplified
Adventures of Alice and Bob
Cybersecurity Today by ITWC
Crypto-Gram Security Podcast
Open Source Security Podcast
Hacker Valley Studio Podcast
The Hacker Chronicles Podcast
Task Force 7 Cyber Security Radio
The Privacy, Security, & OSINT Show
Cyber Security Headlines by the CISO Series
SANS Internet Stormcenter Daily Cyber Podcast (Stormcast)
Search Engines
Shodan—Search for devices connected to the internet.
Wigle—Database of wireless networks, with statistics.
Grep App—Search across a half million git repos.
Binary Edge—Scans the internet for threat intelligence.
ONYPHE—Collects cyber-threat intelligence data.
GreyNoise—Search for devices connected to the internet.
Censys—Assessing attack surface for internet connected devices.
Hunter—Search for email addresses belonging to a website.
Fofa—Search for various threat intelligence.
ZoomEye—Gather information about targets.
LeakIX—Search publicly indexed information.
IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
Netlas—Search and monitor internet connected assets.
URL Scan—Free service to scan and analyse websites.
PublicWWW—Marketing and affiliate marketing research.
FullHunt—Search and discovery attack surfaces.
CRT sh—Search for certs that have been logged by CT.
Vulners—Search vulnerabilities in a large database. 19 Pulsedive—Search for threat intelligence.
Packet Storm Security—Browse latest vulnerabilities and exploits.
GrayHatWarefare—Search public S3 buckets.
50 Cybersecurity Titles
1. Application Security Administrator – Keep software / apps safe and secure.
2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.
3. Automotive Security Engineer – Protect cars from cyber intrusions.
4. Blockchain Developer / Engineer – Code the future of secure transactions.
5. Blue Team Member – Design defensive measures / harden operating systems.
6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.
7. Cybersecurity Scrum Master – Watch over and protect all data.
8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.
9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.
10. Cloud Security Architect – Secure apps and data in the cloud.
11. Counterespionage analyst – Thwart cyber spies from hostile nation states.
12. Cryptanalyst – Decipher coded messages without a cryptographic key.
13. Cryptographer – Develop systems to encrypt sensitive information.
14. Cyber Insurance Policy Specialist – Consult on cyber risk and liability protection.
15. Cyber Intelligence Specialist – Analyze cyber threats and defend against them.
16. Cyber Operations Specialist – Conduct offensive cyberspace operations.
17. Cybercrime Investigator – Solve crimes conducted in cyberspace.
18. Cybersecurity Hardware Engineer – Develop security for computer hardware.
19. Cybersecurity Lawyer – Attorney focused on info/cyber security and cybercrime.
20. Cybersecurity Software Developer / Engineer – Bake security into applications.
21. Data Privacy Officer – Ensure legal compliance related to data protection.
22. Data Recovery Specialist – Recover hacked data from digital devices.
23. Data Security Analyst – Protect information on computers and networks.
24. Digital Forensics Analyst – Examine data containing evidence of cybercrimes.
25. Disaster Recovery Specialist – Plan for and respond to data and system catastrophes.
26. Ethical / White Hat Hacker – Perform lawful security testing and evaluation.
27. Governance Compliance & Risk (GRC) Manager – Oversee risk management.
28. IIoT (Industrial Internet of Things) Security Specialist – Protect industrial control systems.
29. Incident Responder – First response to cyber intrusions and data breaches.
30. Information Assurance Analyst – Identify risks to information systems.
31. Information Security Analyst – Plan and carry out infosecurity measures.
32. Information Security Manager / Director – Oversee an IT security team(s).
33. Intrusion Detection Analyst – Use security tools to find targeted attacks.
34. IoT (Internet of Things) Security Specialist – Protect network connected devices.
35. IT Security Architect – Implement network and computer security.
36. Malware Analyst – Detect and remediate malicious software.
37. Mobile Security Engineer – Implement security for mobile phones and devices.
38. Network Security Administrator – Secure networks from internal and external threats.
39. Penetration Tester (Pen-Tester) – Perform authorized and simulated cyberattacks.
40. PKI (Public Key Infrastructure) Analyst – Manage secure transfer of digital information.
41. Red Team Member – Participate in real-world cyberattack simulations.
42. SCADA (Supervisory control and data acquisition) Security Analyst – Secure critical infrastructures.
43. Security Auditor – Conduct audits on an organization’s information systems.
44. Security Awareness Training Specialist – Train employees on cyber threats.
45. Security Operations Center (SOC) Analyst – Coordinate and report on cyber incidents.
46. Security Operations Center (SOC) Manager – Oversee all SOC personnel.
47. Source Code Auditor – Analyze software code to find bugs, defects, and breaches.
48. Threat Hunter – Search networks to detect and isolate advanced threats.
49. Virus Technician – Detect and remediate computer viruses and malware.
50. Vulnerability Assessor – Find exploits in systems and applications.
Education
Classes (Free and Paid)
Certification Help
Professor Messer Videos
How To Guides & Tutorials
More coming soon
Videos
Reading
Podcasts
Bug Bounty Programs
Get paid to discover vulnerabilities and security issues.
Law
OSINT
Scanning
Cracking
Beginner Tutorial YouTube Videos
Cracking PASSWORD HASHES
ZIP & RAR files
Hashes
Passwords
Password & Wordlists (HTTP/HTTPS) - working as of 3/2022
WPA/WPA2
hashcat
Google Dorks
SQLi
SQLi Dumper
Useful Github Resources
Awesome Lists
Cracking & Bruteforce & Scanning
WordPress
Remote Administration & Payloads
Red Team
Maldocs
Phishing
Routers
Wifi
Shells
Internet of Things
Ransomware
Misc.
Organizations
Operating Systems
Privacy
Pentesting
Hosting
Android
Misc.
RSS Feeds
Technical Blogs
Less Technical Blogs
Social
News
Research
Last updated