SHOW:
|
|
- or go back to the newest paste.
1 | Cybersecurity resources: | |
2 | Learning: https://pastebin.com/VNTsyNKp | |
3 | CTF/Wargames: https://pastebin.com/u2QTfmZn | |
4 | News: https://pastebin.com/tDn5qzZE | |
5 | Other useful stuff: https://pastebin.com/u21XrVaz | |
6 | Essentials Pastebin: https://pastebin.com/UY7RxEqp | |
7 | Books: http://www.allitebooks.com/ | |
8 | Network visualisation: https://dowse.eu/ | |
9 | Unofficial grsec: https://github.com/minipli/linux-unofficial_grsec/tree/linux-4.9.x-unofficial_grsec | |
10 | Security tips in order of difficulty: https://pastebin.com/5XfDX4wL | |
11 | Qualys Security Advisory - The Stack Clash: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | |
12 | http://boards.4chan.org/g/thread/61062751#p61064761's advice: https://pastebin.com/xRqEW8W7 | |
13 | Firefox extensions: https://pastebin.com/dinBuXxJ | |
14 | TEMPEST attacks against AES: https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf | |
15 | Shared thoughts after 6+ years in Pentesting (http://boards.4chan.org/g/thread/61194248#p61211017): https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492 | |
16 | Cybrary: https://www.cybrary.it/ | |
17 | Awesome Infosec: https://github.com/onlurking/awesome-infosec | |
18 | InfoSec and exploitation tool diagram: https://netsec.ws/infosec.svg | |
19 | So you want to be a Hacker: https://netsec.ws/?p=468 | |
20 | The OWASP Mobile Security Testing Guide: https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/ | |
21 | ||
22 | Cryptocurrency: | |
23 | Verge: | |
24 | Website: https://vergecurrency.com/ | |
25 | Interview: https://youtu.be/EFXkJjgPlII | |
26 | Monero: | |
27 | Website: https://getmonero.org/ | |
28 | ||
29 | Anonymity networks: | |
30 | I2P: https://geti2p.net/en/ | |
31 | ||
32 | Tox: | |
33 | Tuntox - Tox protocol TCP tunnel: https://github.com/gjedeer/tuntox | |
34 | ToxBot: https://github.com/JFreegman/ToxBot | |
35 | ToxVPN: https://github.com/cleverca22/toxvpn | |
36 | ||
37 | Cybersecurity videos: | |
38 | DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights: https://youtu.be/gYOy7CGpPIU | |
39 | DEFCON 16: Nmap: Scanning the Internet: https://youtu.be/Hk-21p2m8YY | |
40 | ||
41 | Cybersecurity news: | |
42 | ||
43 | https://www.schneier.com/ | |
44 | https://grsecurity.net/blog.php | |
45 | https://isc.sans.edu/ | |
46 | https://blog.torproject.org/category/tags/security-fixes | |
47 | http://resources.infosecinstitute.com/ | |
48 | http://www.windowsecurity.com/articles-tutorials/ | |
49 | https://www.sans.org/reading-room/ | |
50 | https://threatpost.com/ | |
51 | https://packetstormsecurity.com/ | |
52 | ||
53 | Introduction to cybersecurity: | |
54 | ||
55 | https://ssd.eff.org/ | |
56 | your first steps. | |
57 | https://trailofbits.github.io/ctf/index.html | |
58 | introduction to CTFs. even if you never do one, this is a good read. | |
59 | https://wiki.installgentoo.com/index.php/Anonymizing_yourself | |
60 | quick and dirty guide to anonymizing yourself. | |
61 | https://pastebin.com/raw/5a0y9hsp | |
62 | this is the old, fabled, Paranoid #! security guide. not all of it is up to date, but it is very thorough. | |
63 | https://samsymons.com/blog/reverse-engineering-with-radare2-part-1/ | |
64 | ||
65 | Learning resources: | |
66 | ||
67 | https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md | |
68 | absolutely massive collection of free resources for learning programming from beginner to expert level. | |
69 | https://www.offensive-security.com/metasploit-unleashed/ | |
70 | http://www.allitebooks.com/ | |
71 | http://opensecuritytraining.info/Training.html | |
72 | http://www.und.edu/org/crypto/crypto/lanaki.crypt.class/ | |
73 | ||
74 | CTF and wargames: | |
75 | ||
76 | https://www.pentesterlab.com/ | |
77 | https://www.mavensecurity.com/resources/web-security-dojo/ | |
78 | https://exploit-exercises.com/ | |
79 | http://www.itsecgames.com/ | |
80 | http://forensicscontest.com/puzzles | |
81 | https://pwnable.tw/ | |
82 | https://io.netgarage.org/ | |
83 | https://ctftime.org/ | |
84 | https://www.vulnhub.com/ | |
85 | https://w3challs.com/challenges/hacking | |
86 | https://xss-game.appspot.com/ | |
87 | http://smashthestack.org/ | |
88 | http://www.hackertest.net/ | |
89 | https://www.hackthissite.org/ | |
90 | https://overthewire.org/wargames/ | |
91 | https://0x0539.net/ | |
92 | http://3564020356.org/ | |
93 | http://pwnable.kr/ | |
94 | ||
95 | Vulnerability management: | |
96 | ||
97 | https://www.cvedetails.com/ | |
98 | https://www.exploit-db.com/ | |
99 | https://www.rapid7.com/db/ | |
100 | http://mvfjfugdwgc5uwho.onion/ | |
101 | https://cve.mitre.org/cve/cve.html | |
102 | this site lets you download their CVE list in formats easier to work with. | |
103 | ||
104 | Cryptography: | |
105 | ||
106 | https://pqcrypto.org/ | |
107 | http://www.tandfonline.com/toc/ucry20/current | |
108 | ||
109 | Penetration testing: | |
110 | ||
111 | http://ytxmrc3pcbv5464e.onion/files/ | |
112 | collection of various ebooks mostly focused on pentesting. | |
113 | ||
114 | Reverse engineering: | |
115 | ||
116 | https://beginners.re/ | |
117 | https://github.com/rpisec/mbe | |
118 | http://blog.ijun.org/2009/12/understanding-elf-using-readelf-and.html | |
119 | http://ref.x86asm.net/index.html | |
120 | easily-searchable opcode and instruction reference. |