SHARE
TWEET

Untitled

a guest Sep 22nd, 2014 1,159 Never
  1. 8chan /hack/ resources list, v1
  2.  
  3. Note: many books can easily be found by searching google with filetype:pdf (or epub, or mobi etc) [book name], or by using a dedicated ebook SE like http://books.cryto.net/ or http://it-ebooks-search.info/
  4.  
  5. OS:
  6. Linux:
  7. The Linux Programming Interface (http://it-ebooks.info/book/2014/)
  8. Kali Linux (http://www.kali.org/) (Related: The Basics of Hacking and Penetration Testing, Second Edition)
  9.  
  10. Programming:
  11. Grey Hat Python
  12. Violent Python
  13. A bighuge list of books: https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md (thank you based anon)
  14.  
  15. Articles/magazines:
  16. http://www.phrack.org/
  17. https://evilzone.org/anonymity/the-art-of-anonymity-9178/
  18. http://www.rohitab.com/discuss/topic/35537-cc-reverse-engineering-tutorial-for-newbies/
  19.  
  20. Sites (many with exercises):
  21. http://overthewire.org/wargames/
  22. http://halls-of-valhalla.org/beta/challenges
  23. http://pentestmonkey.net/
  24. hackforums.net
  25. enigmagroup.org
  26. hackthissite.org
  27. http://www.exploit-db.com/
  28.  
  29. Youtube:
  30. http://networkingprogramming.com/1024x768/index.html
  31. https://www.youtube.com/user/ShrikeCast/videos
  32. https://www.youtube.com/user/danscourses/videos
  33.  
  34. Leddit subleddits:
  35. /r/netsec
  36. /r/crypto
  37. /r/malware
  38. /r/xss
  39. /r/reverseengineering
  40. /r/blackhat
  41.  
  42. Tools:
  43. netcat
  44. tcpdump
  45. python + scapy
  46. metasploit
  47. SET
  48. Browser Exploitation Framework (BeEF)
  49. hexdump
  50. objdump
  51. radare2
  52. gdb
  53. YARA
  54. Aircrack-ng
  55. reaver
  56. LANs.py
  57. https://ipalyzer.com/ (IP analyzer)
  58.  
  59. Online courses:
  60. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html
  61. http://ocw.mit.edu/courses/find-by-topic/#cat=engineering&subcat=computerscience
  62.  
  63. Misc:
  64. Practical Packet Analysis 2nd Edition
  65. http://punkspider.hyperiongray.com/ (vulnerability search engine)
RAW Paste Data
Top