AbsentEye

Cybersecurity resources:

Jul 9th, 2017
6,102
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Cybersecurity resources:
  2. Learning: https://pastebin.com/VNTsyNKp
  3. CTF/Wargames: https://pastebin.com/u2QTfmZn
  4. News: https://pastebin.com/tDn5qzZE
  5. Other useful stuff: https://pastebin.com/u21XrVaz
  6. Essentials Pastebin: https://pastebin.com/UY7RxEqp
  7. Books: http://www.allitebooks.com/
  8. Network visualisation: https://dowse.eu/
  9. Unofficial grsec: https://github.com/minipli/linux-unofficial_grsec/tree/linux-4.9.x-unofficial_grsec
  10. Security tips in order of difficulty: https://pastebin.com/5XfDX4wL
  11. Qualys Security Advisory - The Stack Clash: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
  12. http://boards.4chan.org/g/thread/61062751#p61064761's advice: https://pastebin.com/xRqEW8W7
  13. Firefox extensions: https://pastebin.com/dinBuXxJ
  14. TEMPEST attacks against AES: https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf
  15. Shared thoughts after 6+ years in Pentesting (http://boards.4chan.org/g/thread/61194248#p61211017): https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492
  16. Cybrary: https://www.cybrary.it/
  17. Awesome Infosec: https://github.com/onlurking/awesome-infosec
  18. InfoSec and exploitation tool diagram: https://netsec.ws/infosec.svg
  19. So you want to be a Hacker: https://netsec.ws/?p=468
  20. The OWASP Mobile Security Testing Guide: https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/
  21.  
  22. Cryptocurrency:
  23. Verge:
  24. Website: https://vergecurrency.com/
  25. Interview: https://youtu.be/EFXkJjgPlII
  26. Monero:
  27. Website: https://getmonero.org/
  28.  
  29. Anonymity networks:
  30. I2P: https://geti2p.net/en/
  31.  
  32. Tox:
  33. Tuntox - Tox protocol TCP tunnel: https://github.com/gjedeer/tuntox
  34. ToxBot: https://github.com/JFreegman/ToxBot
  35. ToxVPN: https://github.com/cleverca22/toxvpn
  36.  
  37. Cybersecurity videos:
  38. DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights: https://youtu.be/gYOy7CGpPIU
  39. DEFCON 16: Nmap: Scanning the Internet: https://youtu.be/Hk-21p2m8YY
  40.  
  41. Cybersecurity news:
  42.  
  43. https://www.schneier.com/
  44. https://grsecurity.net/blog.php
  45. https://isc.sans.edu/
  46. https://blog.torproject.org/category/tags/security-fixes
  47. http://resources.infosecinstitute.com/
  48. http://www.windowsecurity.com/articles-tutorials/
  49. https://www.sans.org/reading-room/
  50. https://threatpost.com/
  51. https://packetstormsecurity.com/
  52.  
  53. Introduction to cybersecurity:
  54.  
  55. https://ssd.eff.org/
  56. your first steps.
  57. https://trailofbits.github.io/ctf/index.html
  58. introduction to CTFs. even if you never do one, this is a good read.
  59. https://wiki.installgentoo.com/index.php/Anonymizing_yourself
  60. quick and dirty guide to anonymizing yourself.
  61. https://pastebin.com/raw/5a0y9hsp
  62. this is the old, fabled, Paranoid #! security guide. not all of it is up to date, but it is very thorough.
  63. https://samsymons.com/blog/reverse-engineering-with-radare2-part-1/
  64.  
  65. Learning resources:
  66.  
  67. https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md
  68. absolutely massive collection of free resources for learning programming from beginner to expert level.
  69. https://www.offensive-security.com/metasploit-unleashed/
  70. http://www.allitebooks.com/
  71. http://opensecuritytraining.info/Training.html
  72. http://www.und.edu/org/crypto/crypto/lanaki.crypt.class/
  73.  
  74. CTF and wargames:
  75.  
  76. https://www.pentesterlab.com/
  77. https://www.mavensecurity.com/resources/web-security-dojo/
  78. https://exploit-exercises.com/
  79. http://www.itsecgames.com/
  80. http://forensicscontest.com/puzzles
  81. https://pwnable.tw/
  82. https://io.netgarage.org/
  83. https://ctftime.org/
  84. https://www.vulnhub.com/
  85. https://w3challs.com/challenges/hacking
  86. https://xss-game.appspot.com/
  87. http://smashthestack.org/
  88. http://www.hackertest.net/
  89. https://www.hackthissite.org/
  90. https://overthewire.org/wargames/
  91. https://0x0539.net/
  92. http://3564020356.org/
  93. http://pwnable.kr/
  94.  
  95. Vulnerability management:
  96.  
  97. https://www.cvedetails.com/
  98. https://www.exploit-db.com/
  99. https://www.rapid7.com/db/
  100. http://mvfjfugdwgc5uwho.onion/
  101. https://cve.mitre.org/cve/cve.html
  102. this site lets you download their CVE list in formats easier to work with.
  103.  
  104. Cryptography:
  105.  
  106. https://pqcrypto.org/
  107. http://www.tandfonline.com/toc/ucry20/current
  108.  
  109. Penetration testing:
  110.  
  111. http://ytxmrc3pcbv5464e.onion/files/
  112. collection of various ebooks mostly focused on pentesting.
  113.  
  114. Reverse engineering:
  115.  
  116. https://beginners.re/
  117. https://github.com/rpisec/mbe
  118. http://blog.ijun.org/2009/12/understanding-elf-using-readelf-and.html
  119. http://ref.x86asm.net/index.html
  120. easily-searchable opcode and instruction reference.
RAW Paste Data