View difference between Paste ID: VTXRAPxM and NaUPUDF0
SHOW: | | - or go back to the newest paste.
1
Cybersecurity resources:
2
Learning: https://pastebin.com/VNTsyNKp
3
CTF/Wargames: https://pastebin.com/u2QTfmZn
4
News: https://pastebin.com/tDn5qzZE
5
Other useful stuff: https://pastebin.com/u21XrVaz
6
Essentials Pastebin: https://pastebin.com/UY7RxEqp
7
Books: http://www.allitebooks.com/
8
Network visualisation: https://dowse.eu/
9
Unofficial grsec: https://github.com/minipli/linux-unofficial_grsec/tree/linux-4.9.x-unofficial_grsec
10
Security tips in order of difficulty: https://pastebin.com/5XfDX4wL
11
Qualys Security Advisory - The Stack Clash: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
12
http://boards.4chan.org/g/thread/61062751#p61064761's advice: https://pastebin.com/xRqEW8W7
13
Firefox extensions: https://pastebin.com/dinBuXxJ
14
TEMPEST attacks against AES: https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdf
15
Shared thoughts after 6+ years in Pentesting (http://boards.4chan.org/g/thread/61194248#p61211017): https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492
16
Cybrary: https://www.cybrary.it/
17
Awesome Infosec: https://github.com/onlurking/awesome-infosec
18
InfoSec and exploitation tool diagram: https://netsec.ws/infosec.svg
19
So you want to be a Hacker: https://netsec.ws/?p=468
20
The OWASP Mobile Security Testing Guide: https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content/
21
22
Cryptocurrency:
23
Verge:
24
Website: https://vergecurrency.com/
25
Interview: https://youtu.be/EFXkJjgPlII
26
Monero:
27
Website: https://getmonero.org/
28
29
Anonymity networks:
30
I2P: https://geti2p.net/en/
31
32
Tox:
33
Tuntox - Tox protocol TCP tunnel: https://github.com/gjedeer/tuntox
34
ToxBot: https://github.com/JFreegman/ToxBot
35
ToxVPN: https://github.com/cleverca22/toxvpn
36
37
Cybersecurity videos:
38
DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights: https://youtu.be/gYOy7CGpPIU
39
DEFCON 16: Nmap: Scanning the Internet: https://youtu.be/Hk-21p2m8YY
40
41
Cybersecurity news:
42
43
https://www.schneier.com/
44
https://grsecurity.net/blog.php
45
https://isc.sans.edu/
46
https://blog.torproject.org/category/tags/security-fixes
47
http://resources.infosecinstitute.com/
48
http://www.windowsecurity.com/articles-tutorials/
49
https://www.sans.org/reading-room/
50
https://threatpost.com/
51
https://packetstormsecurity.com/
52
53
Introduction to cybersecurity:
54
55
https://ssd.eff.org/
56
    your first steps.
57
https://trailofbits.github.io/ctf/index.html
58
    introduction to CTFs. even if you never do one, this is a good read.
59
https://wiki.installgentoo.com/index.php/Anonymizing_yourself
60
   quick and dirty guide to anonymizing yourself.
61
https://pastebin.com/raw/5a0y9hsp
62
    this is the old, fabled, Paranoid #! security guide. not all of it is up to date, but it is very thorough.
63
https://samsymons.com/blog/reverse-engineering-with-radare2-part-1/
64
65
Learning resources:
66
67
https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md
68
    absolutely massive collection of free resources for learning programming from beginner to expert level.
69
https://www.offensive-security.com/metasploit-unleashed/
70
http://www.allitebooks.com/
71
http://opensecuritytraining.info/Training.html
72
http://www.und.edu/org/crypto/crypto/lanaki.crypt.class/
73
74
CTF and wargames:
75
76
https://www.pentesterlab.com/
77
https://www.mavensecurity.com/resources/web-security-dojo/
78
https://exploit-exercises.com/
79
http://www.itsecgames.com/
80
http://forensicscontest.com/puzzles
81
https://pwnable.tw/
82
https://io.netgarage.org/
83
https://ctftime.org/
84
https://www.vulnhub.com/
85
https://w3challs.com/challenges/hacking
86
https://xss-game.appspot.com/
87
http://smashthestack.org/
88
http://www.hackertest.net/
89
https://www.hackthissite.org/
90
https://overthewire.org/wargames/
91
https://0x0539.net/
92
http://3564020356.org/
93
http://pwnable.kr/
94
95
Vulnerability management:
96
97
https://www.cvedetails.com/
98
https://www.exploit-db.com/
99
https://www.rapid7.com/db/
100
http://mvfjfugdwgc5uwho.onion/
101
https://cve.mitre.org/cve/cve.html
102
    this site lets you download their CVE list in formats easier to work with.
103
104
Cryptography:
105
106
https://pqcrypto.org/
107
http://www.tandfonline.com/toc/ucry20/current
108
109
Penetration testing:
110
111
http://ytxmrc3pcbv5464e.onion/files/
112
    collection of various ebooks mostly focused on pentesting.
113
114
Reverse engineering:
115
116
https://beginners.re/
117
https://github.com/rpisec/mbe
118
http://blog.ijun.org/2009/12/understanding-elf-using-readelf-and.html
119
http://ref.x86asm.net/index.html
120
    easily-searchable opcode and instruction reference.