Resources
Ethical Hacking Resources
Root Me — Challenges.
Stök's YouTube — Videos.
Hacker101 Videos — Videos.
InsiderPhD YouTube — Videos.
EchoCTF — Interactive Learning.
Vuln Machines — Videos and Labs.
Try2Hack — Interactive Learning.
Pentester Land — Written Content.
Checkmarx — Interactive Learning.
Cybrary — Written Content and Labs.
RangeForce — Interactive Exercises.
Vuln Hub — Written Content and Labs.
TCM Security — Interactive Learning.
HackXpert — Written Content and Labs.
Try Hack Me — Written Content and Labs.
OverTheWire — Written Content and Labs.
Hack The Box — Written Content and Labs.
CyberSecLabs — Written Content and Labs.
Pentester Academy — Written Content and Labs.
Bug Bounty Reports Explained YouTube — Videos.
Web Security Academy — Written Content and Labs.
Securibee's Infosec Resources — Written Content.
Jhaddix Bug Bounty Repository — Written Content.
Zseano's Free Bug Bounty Methodology — Free Ebook.
Awesome AppSec GitHub Repository — Written Content.
NahamSec's Bug Bounty Beginner Repository — Written Content.
Kontra Application Security Training — Interactive Learning.
API Security Testing Resources
Video: Traceable AI, API Hacking 101.
Video: Katie Paxton-Fear, API Hacking.
Video: Bugcrowd, Bad API, hAPI Hackers.
Video: OWASP API Security Top 10 Webinar.
Blog: Detectify, How To Hack API's in 2021.
Blog: HackXpert, Let's build an API to hack.
Video: Bugcrowd, API Security 101 by Sadako.
Video: David Bombal, Free API Hacking Course.
Blog: Wallarm, How To Hack API In 60 Minutes.
Website: APIsecurity IO, API Security Articles.
Blog: Curity, The API Security Maturity Model.
Blog: Expedited Security, API Security MegaGuide.
Video: Grant Ongers, API Security Testing Workshop.
Videos: The XSS Rat, API Testing And Securing Guide.
Blog: APIsec OWASP API Security Top 10: A Deep Dive.
Podcast: We Hack Purple, API Security Best Practices.
Blog: Kontra Application Security, Owasp Top 10 for API.
Blog: Secure Delivery, OWASP API Top 10 CTF Walk-through.
Blog: SmartBear, How To Hack An API And Get Away With It.
Blog: Ping Identity, API Security: The Complete Guide 2022.
Video: SANS Offensive Operations, Analyzing OWASP API Security.
Blog: Bend Theory, Exploiting Unintended Functionality in API's.
Blog: Bright Security, Complete Guide to Threats, Methods & Tools.
Python Resources
Think Python — Free Ebook
Think Python 2e — Free Ebook
A Byte of Python — Free Ebook
Real Python — Online Platform
Full Stack Python — Free Ebook
freeCodeCamp — Online Platform
Dive Into Python 3 — Free Ebook
Practice Python — Online Platform
The Python Guru — Online Platform
The Coder's Apprentice — Free Ebook
Python Principles — Online Platform
Harvard's CS50 Python Video — Video
Cracking Codes With Python — Free Ebook
Learn Python, Break Python — Free Ebook
Google's Python Class — Online Platform
Python Like You Mean It — Online Platform
Beyond the Basic Stuff with Python — Free Ebook
Automate the Boring Stuff with Python — Free Ebook
The Big Book of Small Python Projects — Free Ebook
Python Tutorial for Beginners, Telusko — Free Videos
Learn Python 3 From Scratch — Free Interactive Course
Python Tutorial For Beginners, Edureka — Online Platform
Microsoft's Introduction to Python Course — Online Platform
Beginner's Guide to Python, Official Wiki — Online Platform
Python for Everybody Specialization, Coursera — Online Platform
Cybersec YouTube channels
Infosec Institute — Cybersecurity awareness.
Black Hat — Technical cybersecurity conferences.
Bugcrowd — Bug bounty methodology and interviews.
InfoSec Live — Everything from tutorials to interviews.
David Bombal — Everything cybersecurity related.
Nahamsec — Educational hacking and bug bounty videos.
Computerphile — Covers basic concepts and techniques.
InsiderPHD — How to get started with bug bounty hunting.
Security Weekly — Interviews with cybersecurity figures.
John Hammond — Malware analysis, programming, and careers.
Peter Yaworski — Web-application hacking tips and interviews.
IppSec — Labs and capture-the-flag tutorials, HackTheBox etc.
13Cubed — Videos on tools, forensics, and incident response.
HackerSploit — Penetration testing, web-application hacking.
STÖK — Videos on tools, vulnerability analysis, and methodology.
Security Now — Cybercrime news, hacking and web-application security.
LiveOverflow — Involves hacking, write-up videos, and capture-the-flags.
The Cyber Mentor — Ethical hacking, web-application hacking, and tools.
Joe Collins — Everything Linux related, including tutorials and guides.
Null Byte — Cybersecurity for ethical hackers, and computer scientists.
The PC Security Channel — Windows security, malware news, and tutorials.
Simply Cyber — Helps people with cybersecurity career development.
Network Chuck — Everything cybersecurity related.
BlackPerl — Malware analysis, forensics and incident response.
Professor Messer — Guides covering certifications.
Hak5 — General cybersecurity coverage.
Cybersec Newsletters
AdvisoryWeek — Security advisory roundups by major vendors.
We Live Security — Award-winning news, views and insights.
CSO Online — News, analysis and research on security and risk management.
tl;dr sec Newsletter — Tools, blog posts, conference talks and research.
Shift Security Left — Application security, architecture, and incidents.
Unsupervised Learning Community — Important cybersecurity stories.
Threatpost — Exploits, vulnerabilities, malware and cybersecurity.
Blockchain Threat Intelligence — Tools, events, threats.
Gov Info Security — Domestic and international governmental cybersecurity news.
AWS Security Digest — AWS security updates.
The Hacker News — Cybersecurity news.
Krebs On Security — Investigative cybersecurity journalism that's interesting.
This Week in 4n6 — DFIR updates.SecPro — Analysis of threats, attacks and tutorials.
Naked Security — How to protect yourself from attacks etc.
API Security Newsletter — API security news and vulnerabilities.
CyberSecNewsWeekly — Collection of news, articles and tools.
Zero Day — Stories about hackers, spies and cybercrime.
Schneier on Security —Cybersecurity news and opinions.
Hive Five Newsletter — Curated cybersecurity news.Graham Cluley — Cybersecurity news and opinions.
TripWire’s State of Security — Corporate cybersecurity news.
RTCSec — News around VOIP and WebRTC security.
Risky Biz — Analysis of big cyber stories.
Cybersec News
IT Security Guru
Security Weekly
The Hacker News
Infosecurity Magazine
CSO Online
The State of Security - Tripwire
The Last Watchdog
Naked Security
Graham Cluley
Cyber Magazine
WeLiveSecurity
Dark Reading
Threatpost
Krebs on Security
Help Net Security
HackRead
SearchSecurity
TechWorm
GBHackers On Security
The CyberWire
Cyber Defense Magazine
Hacker Combat
Cybers Guards
Cybersecurity Insiders
Information Security Buzz
The Security Ledger
Security Gladiators
Infosec Land
Cyber Security Review
Comodo News
Internet Storm Center | SANS
Daniel Miessler
TaoSecurity
Reddit
All InfoSec News
CVE Trends
Securibee
Twitter
threatABLE
Cybersec Podcasts
Cyber Work
Click Here
Defrag This
Security Now
InfoSec Real
InfoSec Live
Simply Cyber
OWASP Podcast
We Talk Cyber
Risky Business
Malicious Life
Hacking Humans
What The Shell
Life of a CISO
H4unt3d Hacker
2 Cyber Chicks
The Hacker Mind
Security Weekly
Cyberside Chats
Darknet Diaries
CyberWire Daily
Absolute AppSec
Security in Five
Smashing Security
401 Access Denied
7 Minute Security
8th Layer Insights
Adopting Zero Trust
Cyber Security Sauna
The Cyberlaw Podcast
Unsupervised Learning
Naked Security Podcast
Identity at the Center
Breaking Down Security
The Shellsharks Podcast
The Virtual CISO Moment
The Cyber Tap (cyberTAP)
The Shared Security Show
The Social-Engineer Podcast
The 443 Security Simplified
Adventures of Alice and Bob
Cybersecurity Today by ITWC
Crypto-Gram Security Podcast
Open Source Security Podcast
Hacker Valley Studio Podcast
The Hacker Chronicles Podcast
Task Force 7 Cyber Security Radio
The Privacy, Security, & OSINT Show
Cyber Security Headlines by the CISO Series
SANS Internet Stormcenter Daily Cyber Podcast (Stormcast)
Search Engines
Shodan—Search for devices connected to the internet.
Wigle—Database of wireless networks, with statistics.
Grep App—Search across a half million git repos.
Binary Edge—Scans the internet for threat intelligence.
ONYPHE—Collects cyber-threat intelligence data.
GreyNoise—Search for devices connected to the internet.
Censys—Assessing attack surface for internet connected devices.
Hunter—Search for email addresses belonging to a website.
Fofa—Search for various threat intelligence.
ZoomEye—Gather information about targets.
LeakIX—Search publicly indexed information.
IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
Netlas—Search and monitor internet connected assets.
URL Scan—Free service to scan and analyse websites.
PublicWWW—Marketing and affiliate marketing research.
FullHunt—Search and discovery attack surfaces.
CRT sh—Search for certs that have been logged by CT.
Vulners—Search vulnerabilities in a large database. 19 Pulsedive—Search for threat intelligence.
Packet Storm Security—Browse latest vulnerabilities and exploits.
GrayHatWarefare—Search public S3 buckets.
50 Cybersecurity Titles
1. Application Security Administrator – Keep software / apps safe and secure.
2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.
3. Automotive Security Engineer – Protect cars from cyber intrusions.
4. Blockchain Developer / Engineer – Code the future of secure transactions.
5. Blue Team Member – Design defensive measures / harden operating systems.
6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.
7. Cybersecurity Scrum Master – Watch over and protect all data.
8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.
9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.
10. Cloud Security Architect – Secure apps and data in the cloud.
11. Counterespionage analyst – Thwart cyber spies from hostile nation states.
12. Cryptanalyst – Decipher coded messages without a cryptographic key.
13. Cryptographer – Develop systems to encrypt sensitive information.
14. Cyber Insurance Policy Specialist – Consult on cyber risk and liability protection.
15. Cyber Intelligence Specialist – Analyze cyber threats and defend against them.
16. Cyber Operations Specialist – Conduct offensive cyberspace operations.
17. Cybercrime Investigator – Solve crimes conducted in cyberspace.
18. Cybersecurity Hardware Engineer – Develop security for computer hardware.
19. Cybersecurity Lawyer – Attorney focused on info/cyber security and cybercrime.
20. Cybersecurity Software Developer / Engineer – Bake security into applications.
21. Data Privacy Officer – Ensure legal compliance related to data protection.
22. Data Recovery Specialist – Recover hacked data from digital devices.
23. Data Security Analyst – Protect information on computers and networks.
24. Digital Forensics Analyst – Examine data containing evidence of cybercrimes.
25. Disaster Recovery Specialist – Plan for and respond to data and system catastrophes.
26. Ethical / White Hat Hacker – Perform lawful security testing and evaluation.
27. Governance Compliance & Risk (GRC) Manager – Oversee risk management.
28. IIoT (Industrial Internet of Things) Security Specialist – Protect industrial control systems.
29. Incident Responder – First response to cyber intrusions and data breaches.
30. Information Assurance Analyst – Identify risks to information systems.
31. Information Security Analyst – Plan and carry out infosecurity measures.
32. Information Security Manager / Director – Oversee an IT security team(s).
33. Intrusion Detection Analyst – Use security tools to find targeted attacks.
34. IoT (Internet of Things) Security Specialist – Protect network connected devices.
35. IT Security Architect – Implement network and computer security.
36. Malware Analyst – Detect and remediate malicious software.
37. Mobile Security Engineer – Implement security for mobile phones and devices.
38. Network Security Administrator – Secure networks from internal and external threats.
39. Penetration Tester (Pen-Tester) – Perform authorized and simulated cyberattacks.
40. PKI (Public Key Infrastructure) Analyst – Manage secure transfer of digital information.
41. Red Team Member – Participate in real-world cyberattack simulations.
42. SCADA (Supervisory control and data acquisition) Security Analyst – Secure critical infrastructures.
43. Security Auditor – Conduct audits on an organization’s information systems.
44. Security Awareness Training Specialist – Train employees on cyber threats.
45. Security Operations Center (SOC) Analyst – Coordinate and report on cyber incidents.
46. Security Operations Center (SOC) Manager – Oversee all SOC personnel.
47. Source Code Auditor – Analyze software code to find bugs, defects, and breaches.
48. Threat Hunter – Search networks to detect and isolate advanced threats.
49. Virus Technician – Detect and remediate computer viruses and malware.
50. Vulnerability Assessor – Find exploits in systems and applications.
Education
Classes (Free and Paid)
Certification Help
Professor Messer Videos
How To Guides & Tutorials
More coming soon
Videos
Reading
Podcasts
Darknet Diaries - Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences.
Hacking Humans - Join Dave Bittner and Joe Carrigan each week as they look behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world.
Security Now - TechTV's Leo Laporte and I spend somewhat shy of two hours each week to discuss important issues of personal computer security. Sometimes we'll discuss something that just happened. Sometimes we'll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user.
Modem Mischief Podcast - Modem Mischief is a true cybercrime podcast. Created, produced and hosted by Keith Korneluk.
Bug Bounty Programs
Get paid to discover vulnerabilities and security issues.
Law
Computer Fraud and Abuse Act (CFAA) - US - is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. The law prohibits accessing a computer without authorization, or in excess of authorization. This is what the FBI is gunna use to bust your ass (or a conspiracy or wire fraud charge) if you fuck around and get caught. Read up about it. If you are busted, the FBI may pressure you into becoming a Confidential Human Source aka a snitch. Do not do it. Lawyer up!
Computer Misuse Act 1990 - UK - 1990 is a key piece of legislation that criminalizes the act of accessing or modifying data stored on a computer system without appropriate consent or permission.
OSINT
Geonames - Extremely useful for finding alternative names and co-ordinates of places.
Who Posted What - A search engine for Facebook, built by Henk Van Ess.
Twitter Advanced Search - An advanced search for Twitter, which also allows you to search by date.
Google Earth Pro - Much better than normal Google Maps, make sure to check out the historic imagery function.
Spiderfoot - Multi-source OSINT automation tool with a Web UI and report visualizations.
Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
chatter - chatter is a proof of concept osint monitoring telegram bot for windows (server, ideally) that monitors tweet content, reddit submission titles and 4chan post content for specific keywords - as well as phrases in quotation marks. it feeds content that is discovered to your telegram group in near real-time depending on your configuration. this is an early beta release with limited features.
Sherlock - Hunt down social media accounts by username across social networks
Scanning
OpenDoor - OpenDoor OWASP is console multifunctional web sites scanner. This application find all possible ways to login, index of/ directories, web shells, restricted access points, subdomains, hidden data and large backups.
Raccoon - A high performance offensive security tool for reconnaissance and vulnerability scanning
dirmap - An advanced web directory & file scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。
dirhunt - Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of" mode enabled. Dirhunt is also useful if the directory listing is not enabled. It detects directories with false 404 errors, directories where an empty index file has been created to hide things and much more.
Cracking
Need help cracking a password hash? Try posting the hash to /r/crackthis for help.
Beginner Tutorial YouTube Videos
Cracking PASSWORD HASHES
ZIP & RAR files
Hashes
Passwords
HAT - HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes during engagements. Created for Linux based systems
Password & Wordlists (HTTP/HTTPS) - working as of 3/2022
Probable Wordlists - Version 2.0 - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
Real Passwords - These are REAL passwords.
Dictionary-Style Lists - Files including dictionaries, encyclopedic lists and miscellaneous. Wordlists in this folder were not necessarily associated with the "password" label.
adjective_noun_3_digits_router.lst.gz - Some routers have this naming scheme. 4.1G
breachcompletion_no_emails.lst.gz - A long list of passwords from breaches with email pairs stripped. 1.3G.
super_wpa.lst.gz - WPA wifi wordlist. 4.3G.
more lists from the above source @ https://oxagast.org/wordlists/
https://github.com/dwyl/english-words/blob/master/words.txt (~466,000 words)
http://www.mediafire.com/file/9tf3n2d45tgktq1/Rocktastic12a.7z/file (1.37GB - Compressed)
https://download.g0tmi1k.com/wordlists/large/sp00ks_merged_file_uniq.7z (2.7 GB - Compressed)
WPA/WPA2
Aircrack-ng - Aircrack-ng is a complete suite of tools to assess WiFi network security.
hashcat
Hashcat GPU benchmarking table for Nvidia & AMD (WPA2 hashes) - If you are planning to create a cracking rig for research purposes check out GPU hashcat benchmark table below.
Google Dorks
SQLi
sqlmap - Automatic SQL injection and database takeover tool
SQLi Dumper
Useful Github Resources
Awesome Lists
Awesome OSINT - A curated list of amazingly awesome OSINT
Awesome Malware Analysis - A curated list of awesome malware analysis tools and resources.
Awesome CTF - A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.
Awesome Hacking - A curated list of awesome Hacking.
Awesome Honeypots - A curated list of awesome honeypots, plus related components and much more, divided into categories such as Web, services, and others, with a focus on free and open source projects.
Awesome Incident Response - A curated list of tools and resources for security incident response, aimed to help security analysts and DFIR teams.
Awesome Vehicle Security - curated list of awesome resources, books, hardware, software, applications, people to follow, and more cool stuff about vehicle security, car hacking, and tinkering with the functionality of your car.
Awesome Web Security - Curated list of Web Security materials and resources.
Awesome Lockpicking - A curated list of awesome guides, tools, and other resources relating to the security and compromise of locks, safes, and keys.
Awesome Cybersecurity Blue Team - A collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Awesome AppSec - A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes.
Awesome Security - A collection of awesome software, libraries, documents, books, resources and cool stuff about security.
Awesome Pentest - A collection of awesome penetration testing resources, tools and other shiny things
Cracking & Bruteforce & Scanning
Subdomain bruteforce - a subdomain brute forcing tool for windows
Instashell - Multi-threaded Instagram Brute Forcer without password limit
Nuclei - a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
WordPress
WPScan - WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites. Can be used to discover usernames and bruteforce logins.
WordPress Exploit Framework - WPXF. A Ruby framework designed to aid in the penetration testing of WordPress systems.
CMSeeK - CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs
Remote Administration & Payloads
pupy - Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
BYOB (Build Your Own Botnet) - BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats.
QuasarRAT - Free, Open-Source Remote Administration Tool for Windows
SillyRAT - A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
TheFatRat - TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus.
Powershell RAT - This RAT will help someone during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends the information to an attacker as an e-mail attachment.
Red Team
Antivirus Evasion - Various Antivirus evasion tools
UACMe - Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
Genesis Scripting Engine (gscript) - framework to rapidly implement custom droppers for all three major operating systems
SlackPirate - This is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack workspace given an access token.
Empire - Empire 3.0 is a PowerShell and Python 3.x post-exploitation framework.
seatbelt - Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Impacket - Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself.
Sliver - Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys.
Maldocs
MacroPock - is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. It also handles various shortcuts formats. This tool can be used for red teaming, pentests, demos, and social engineering assessments. MacroPack will simplify antimalware solutions bypass and automatize the process from vb source to final Office document or other payload type.
Phishing
Gophish - Open-Source Phishing Toolkit
SocialFish - Educational Phishing Tool & Information Collector
Evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Modlishka - Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy multi-domain destination traffic, both TLS and non-TLS, over a single domain, without a requirement of installing any additional certificate on the client. What does this exactly mean? In short, it simply has a lot of potential, that can be used in many use case scenarios.
BlackPhish - Super lightweight with many features and blazing fast speeds.
The Social Engineer Toolkit (SET) - The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.
Muraena - Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.
Routers
RouterSploit - The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
Wifi
Fluxion - MITM WPA attack toolset
howmanypeoplearearound - Count the number of people around you 👨👨👦 by monitoring wifi signals 📡
Wifiphisher - The Rogue Access Point Framework
wifite2 - Rewrite of the popular wireless network auditor, "wifite"
wifijammer - Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting.
hashcatch - Capture handshakes of nearby WiFi networks automatically
pwnagotchi - Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs.
bettercap - The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
Wifipumpkin3 - wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to conduct a man-in-the-middle attack.
Shells
PHP Webshells - Common PHP shells is a collection of PHP webshells that you may need for your penetration testing (PT) cases or in a CTF challenge.
Webshells - This is a webshell collection project. This project covers various common scripts such as: asp, aspx, php, jsp, pl, py
Lazypariah - A tool for generating reverse shell payloads on the fly
Internet of Things
Cotopaxi - Set of tools for security testing of Internet of Things devices using protocols: AMQP, CoAP, DTLS, HTCPCP, mDNS, MQTT, MQTT-SN, QUIC, RTSP, SSDP.
Ransomware
Demonware - Ransomware, made for a demo on ransomware awareness and how easy it is to do. Encrypt every file in your Home and send the key to a remote server.
Misc.
LaZagne - The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software
Sonar.js - A framework for identifying and launching exploits against internal network hosts. Works via WebRTC IP enumeration, WebSocket host scanning, and external resource fingerprinting.
GTFOBins - is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
Organizations
Operating Systems
Privacy
Tails - The Amnesic Incognito Live System. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.
Whonix - A High Security Method of Surfing the Internet. Whonix is a desktop operating system designed for advanced security and privacy.
QubesOS - Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.
Pentesting
Kali Linux - /r/KaliLinux - a Debian-derived Linux distribution designed for digital forensics and penetration testing.
Parrot OS - /r/ParrotOS - a Linux distribution based on Debian with a focus on computer security. It is designed for penetration testing, vulnerability assessment and mitigation, computer forensics and anonymous web browsing.
BlackArch - an Arch Linux-based penetration testing distribution for penetration testers and security researchers.
Hosting
Debian - The Universal Operating System
FreeBSD - FreeBSD is an operating system used to power modern servers, desktops, and embedded platforms.
Ubuntu - Ubuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
Fedora - Fedora creates an innovative, free, and open source platform for hardware, clouds, and containers that enables software developers and community members to build tailored solutions for their users.
CentOS - a Linux distribution that provides a free, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL).
Android
LineageOS - /r/lineageos - A free and open-source operating system for various devices, based on the Android mobile platform.
GrapheneOS - /r/GrapheneOS - GrapheneOS is a privacy and security focused mobile OS with Android app compatibility.
Misc.
Mint - Linux Mint is an elegant, easy to use, up to date and comfortable GNU/Linux desktop distribution.
Rasberrian - Raspbian is a free operating system based on Debian optimized for the Raspberry Pi hardware.
RSS Feeds
Credit to u/PM_ME_YOUR_SHELLCODE
Technical Blogs
nedwill’s security blog - https://nedwill.github.io/blog/feed.xml (https://nedwill.github.io/blog/)
Realmode Labs - Medium - https://medium.com/feed/realmodelabs (https://medium.com/realmodelabs)
Hanno's blog - https://blog.hboeck.de/feeds/index.rss2 (https://blog.hboeck.de/)
Active Directory Security - https://adsecurity.org/?feed=rss2 (https://adsecurity.org)
Carnal0wnage & Attack Research Blog - http://carnal0wnage.attackresearch.com/feeds/posts/default (http://carnal0wnage.attackresearch.com/)
gynvael.coldwind//vx.log (pl) - http://feeds.feedburner.com/GynvaelColdwindPL (https://gynvael.coldwind.pl/)
DigiNinja - https://digi.ninja/rss.xml (https://digi.ninja/rss.xml)
enigma0x3 - https://enigma0x3.net/feed/ (https://enigma0x3.net)
Randy Westergren - https://randywestergren.com/feed/ (https://randywestergren.com)
ZeroSec - Adventures In Information Security - https://blog.zsec.uk/rss/ (https://blog.zsec.uk/)
Max Justicz - https://justi.cz/feed.xml (https://justi.cz)
Blog of Osanda - https://osandamalith.com/feed/ (https://osandamalith.com)
ADD / XOR / ROL - http://addxorrol.blogspot.com/feeds/posts/default (http://addxorrol.blogspot.com/)
Intercept the planet! - https://intercepter-ng.blogspot.com/feeds/posts/default (https://intercepter-ng.blogspot.com/)
The Exploit Laboratory - https://blog.exploitlab.net/feeds/posts/default (https://blog.exploitlab.net/)
Linux Audit - https://linux-audit.com/feed/ (https://linux-audit.com)
markitzeroday.com - https://markitzeroday.com/feed.xml (https://markitzeroday.com/)
The Human Machine Interface - https://h0mbre.github.io/feed.xml (https://h0mbre.github.io/)
Trail of Bits Blog - https://blog.trailofbits.com/feed/ (https://blog.trailofbits.com)
F-Secure Labs - https://labs.f-secure.com/blog/rss.xml (https://labs.f-secure.com/blog/)
Exodus Intelligence - https://blog.exodusintel.com/feed/ (https://blog.exodusintel.com)
Diary of a reverse-engineer - https://doar-e.github.io/feeds/rss.xml (https://doar-e.github.io/)
Sean Heelan's Blog - https://sean.heelan.io/feed/ (https://sean.heelan.io)
Alex Chapman's Blog - https://ajxchapman.github.io/feed.xml (https://ajxchapman.github.io/)
pi3 blog - http://blog.pi3.com.pl/?feed=rss2 (http://blog.pi3.com.pl)
Mozilla Attack & Defense - https://blog.mozilla.org/attack-and-defense/feed/ (https://blog.mozilla.org/attack-and-defense)
Doyensec's Blog - https://blog.doyensec.com/atom.xml (https://blog.doyensec.com//)
secret club - https://secret.club/feed.xml (https://secret.club/)
Va_start's Vulnerability Research - https://blog.vastart.dev/feeds/posts/default (https://blog.whtaguy.com/)
Revers.engineering - https://revers.engineering/feed/ (https://revers.engineering)
phoenhex team - https://phoenhex.re/feed.xml (https://phoenhex.re/)
Rhino Security Labs - https://rhinosecuritylabs.com/feed/ (https://rhinosecuritylabs.com)
Zero Day Initiative - Blog - https://www.zerodayinitiative.com/blog?format=rss (https://www.thezdi.com/blog/)
BlackArrow - https://www.blackarrow.net/feed/ (https://www.blackarrow.net)
PortSwigger Research - https://portswigger.net/research/rss (https://portswigger.net/research)
Praetorian Security Blog - https://www.praetorian.com/blog/rss.xml (https://www.praetorian.com)
research.securitum.com - https://research.securitum.com/feed/ (https://research.securitum.com)
Corelan Team - https://www.corelan.be/index.php/feed/ (https://www.corelan.be)
NCC Group Research - https://research.nccgroup.com/feed/ (https://research.nccgroup.com)
Zeta-Two.com - https://zeta-two.com/feed.xml (https://zeta-two.com/)
Grsecurity Blog RSS Feed - https://grsecurity.net/blog.rss (https://www.grsecurity.net/blog.rss)
Positive Technologies - learn and secure - http://feeds.feedburner.com/positiveTechnologiesResearchLab (http://blog.ptsecurity.com/)
Alexander Popov - https://a13xp0p0v.github.io/feed.xml (https://a13xp0p0v.github.io/)
Windows Internals Blog - https://windows-internals.com/feed/ (https://windows-internals.com)
Tyranid's Lair (James Foreshaw) - https://www.tiraniddo.dev/feeds/posts/default (https://www.tiraniddo.dev/)
Less Technical Blogs
anti-virus rants - http://feeds.feedburner.com/Anti-virusRants (http://anti-virus-rants.blogspot.com/)
Secureworks Blog - https://www.secureworks.com/rss?feed=blog (https://www.secureworks.com/blog)
Microsoft Security Response Center - https://msrc-blog.microsoft.com/feed/ (https://msrc-blog.microsoft.com)
ColbaltStrike Blog - https://blog.cobaltstrike.com/feed/ (https://blog.cobaltstrike.com)
xorl %eax, %eax - https://xorl.wordpress.com/feed/ (https://xorl.wordpress.com)
TRUESEC Blog - https://blog.truesec.com/feed/ (https://blog.truesec.com)
The Daily Swig - https://portswigger.net/daily-swig/rss (https://portswigger.net/daily-swig)
(IN)SECURE Magazine Notifications RSS - http://feeds.feedburner.com/insecuremagazine (http://www.insecuremag.com)
r2c website - https://r2c.dev/rss.xml (https://r2c.dev)
SANS Internet Storm Center, InfoCON: green - https://isc.sans.edu/rssfeed_full.xml (https://isc.sans.edu)
NotSoSecure - https://notsosecure.com/feed/ (https://notsosecure.com)
TrustedSec - https://www.trustedsec.com/feed/ (https://www.trustedsec.com)
Microsoft Security - https://www.microsoft.com/security/blog/feed/ (https://www.microsoft.com/security/blog)
Zimperium Mobile Security Blog - https://blog.zimperium.com/feed/ (https://blog.zimperium.com)
Bugcrowd - https://www.bugcrowd.com/feed/ (https://www.bugcrowd.com)
codeblog - https://outflux.net/blog/feed/ (https://outflux.net/blog)
Google Online Security Blog - https://security.googleblog.com/feeds/posts/default (http://security.googleblog.com/)
Mozilla Security Blog - https://blog.mozilla.org/security/feed/ (https://blog.mozilla.org/security)
HackerOne - https://www.hackerone.com/blog.rss (https://www.hackerone.com/)
Rendition Infosec - https://blog.renditioninfosec.com/feed/ (https://blog.renditioninfosec.com)
Check Point Research - https://research.checkpoint.com/feed/ (https://research.checkpoint.com)
Offensive Security - https://www.offensive-security.com/feed/ (https://www.offensive-security.com)
Rapid7 Blog - https://blog.rapid7.com/rss/ (https://blog.rapid7.com/)
Social
newest submissions : ExploitDev - https://www.reddit.com/r/exploitdev/new.rss (https://www.reddit.com/r/exploitdev/new)
disclose.io - Latest topics - https://community.disclose.io/latest.rss (https://community.disclose.io/latest)
newest submissions : netsec - https://www.reddit.com/r/netsec/new.rss (https://www.reddit.com/r/netsec/new)
newest submissions : websecurityresearch - https://www.reddit.com/r/websecurityresearch/new.rss (https://www.reddit.com/r/websecurityresearch/new)
newest submissions : ReverseEngineering - https://www.reddit.com/r/ReverseEngineering/new.rss (https://www.reddit.com/r/ReverseEngineering/new)
newest submissions : lowlevel - https://www.reddit.com/r/lowlevel/new.rss (https://www.reddit.com/r/lowlevel/new)
News
Wired - Security Latest - https://www.wired.com/feed/category/security/latest/rss (https://www.wired.com/category/security/latest)
News ≈ Packet Storm - https://rss.packetstormsecurity.com/news/ (https://packetstormsecurity.com/)
Naked Security - https://nakedsecurity.sophos.com/feed (https://nakedsecurity.sophos.com)
The Hacker News - http://www.thehackernews.com/feeds/posts/default (https://thehackernews.com/)
ZDNet - Security - http://www.zdnet.com/topic/security/rss.xml (https://www.zdnet.com/)
Ars Technica - http://feeds.arstechnica.com/arstechnica/index/ (https://arstechnica.com)
Threatpost | The first stop for security news - http://threatpost.com/feed/ (https://threatpost.com)
Krebs on Security - http://krebsonsecurity.com/feed/atom/ (https://krebsonsecurity.com)
Dark Reading: - http://www.darkreading.com/rss_simple.asp (https://www.darkreading.com)
BleepingComputer - http://www.bleepingcomputer.com/feed/ (https://www.bleepingcomputer.com/)
Research
arXiv Crypto and Security Papers - http://export.arxiv.org/api/query?search_query=cat:cs.CR&sortBy=submittedDate&sortOrder=descending&max_results=50
IACR Transactions on Cryptographic Hardware and Embedded Systems - https://tches.iacr.org/index.php/TCHES/gateway/plugin/WebFeedGatewayPlugin/atom (https://tches.iacr.org/index.php/TCHES)
Full Disclosure - http://seclists.org/rss/fulldisclosure.rss (http://seclists.org/#fulldisclosure)
Files ≈ Packet Storm - https://rss.packetstormsecurity.com/files/ (https://packetstormsecurity.com/)
Last updated