Skip to content

This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain

pathakabhi24/Infosec-Resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

List of InfoSec resources

This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX & LINUX compatible, free and open source.

Where to start?

How-To Guides

  • Threat Protection

    • Protect against SIM-swap scam: via wired
    • How to spot a phishing attack: via EFF
    • Protection from Identity Theft: via Restore Privacy
    • Protecting from key-stroke-logging, with KeyScrambler: via TechRepublic
    • Guide to Hash Checks, to ensure a program has not been tampered with: via ProPrivacy
    • Permanently and Securely Delete ‘Files and Directories’ in Linux: via TechMint
  • Networking

  • Communication

  • Devices

  • Software

    • Complete guide to configuring Firefox for Privacy + Speed: via 12bytes
    • Firefox Configuration Guide for Beginners: via 12bytes
    • How to use Vera Crypt: via howtogeek
    • How to use KeePassXC: via EFF
    • How to use uMatrix browser addon to block trackers: via ProPrivacy
    • How to set up 2-Factor Auth on common websites: via The Verge
    • How to use DuckDuckGo advanced search features: via Ghacks
    • How to use Cryptomator (encrypt files on cloud storage): via It's Foss
  • Physical Security

  • Enterprise

  • Reference Info

    • A direcory of websites, apps and services supporting 2FA: via TwoFactorAuth.org
    • A directory of direct links to delete your account from web services: via JustDeleteMe.xyz
    • Impartial VPN Comparison Data: via ThatOnePrivacySite
    • Terms of Service; Didn't Read - Vital resource that summarizes and extracts the key details from Privacy Policies/ Terms of Services, aiming to fix the issues caused by blindly agreeing to these Terms: via tosdr.org
    • Free, open-source and privacy-respecting alternatives to popular software: via Switching.Software
    • Product reviews from a privacy perspective, by Mozilla: via Privacy Not Included
    • Surveillance Catalogue - Database of secret government surveillance equipment, Snowden: via The Intercept
    • Who Has Your Back? - Which companies hand over your comply with Government Data Requests 2019: via EFF
    • Check who your local and government representatives in your local area are WhoAreMyRepresentatives.org
    • Open project to rate, annotate, and archive privacy policies: via PrivacySpy.org
    • Hosts to block: via someonewhocares/ hosts / StevenBlack/ hosts
    • Magic Numbers - Up-to-date file signature table, to identify / verify files have not been tampered with: via GaryKessler
    • List of IP ranges per country: via Nirsoft
    • Database of default passwords for various devices by manufacturer and model: via Default-Password.info
  • All-in-one digital and physical security

    • Umbrella: an open source iOS/Android/Web app for learning about and managing digital, operational and physical security (from safe communication to dealing with a kidnap) via Security First

Articles

  • General

  • Encryption

    • Overview of projects working on next-generation secure email: via OpenTechFund
    • Anatomy of a GPG Key: via @DaveSteele
  • Surveillance

    • Twelve Million Phones, One Dataset, Zero Privacy: via NY Times
    • Windows data sending: via The Hacker News
    • Is your Anti-Virus spying on you: via Restore Privacy
    • What does your car know about you?: via Washington Post
    • Turns Out Police Stingray Spy Tools Can Indeed Record Calls: via Wired
    • UK Police Accessing Private Phone Data Without Warrant: via Restore Privacy
    • Rage Against Data Dominance: via Privacy International
    • NSA Files Decoded, What the revelations mean for you: via The Guardian
    • How to Track a Cellphone Without GPS—or Consent: via Gizmodo
    • Apps able to track device location, through power manager: via Wired
    • Hackers and governments can see you through your phone’s camera: via Business Insider
    • Law Enforcement Geo-Fence Data Requests - How an Innocent cyclist became a suspect when cops accessed his Google location data: via Daily Mail
    • IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color: via TheIntercept
  • Threats

    • 23 reasons not to reveal your DNA: via Internet Health Report
    • Security of Third-Party Keyboard Apps on Mobile Devices: via Lenny Zelster
    • Mobile Websites Can Tap Into Your Phone's Sensors Without Asking: via Wired
    • Non-admin accounts mitigate 94% of critical Windows vulnerabilities: via ghacks
    • Android Apps are able to monitor screen state, data usage, installed app details and more without any permissions: by @databurn-in, via GitHub
      • See also, PrivacyBreacher - an app developed by @databurn-in, which demonstrates these issues
    • How URL Previews in Apps can Leak Personal Info: via hunch.ly
    • Big data privacy risks: via CSO Online
    • Anti-Doxing Guide (For Activists Facing Attacks): via Equality Labs
  • Breaches

    • Wired guide to data breaches - past, present and future: via Wired
    • Grindr and OkCupid Spread Personal Details Study Says: via NY Times
    • The Asia-Pacific Cyber Espionage Campaign that Went Undetected for 5 Years: via TheHackerNews
    • ClearView AI Data Breach - 3 Billion Faces: via Forbes
    • The MongoDB hack and the importance of secure defaults: via Synk
    • Truecaller Data Breach – 47.5 Million Indian Truecaller Records On Sale: via GBHackers
    • Hundreds of millions of Facebook user records were exposed on Amazon cloud server: via CBS News
    • Microsoft data breach exposes 250 million customer support records: via Graham Cluley
  • Data Collection

    • Ring Doorbell App Packed with Third-Party Trackers: via EFF
    • How a highly targeted ad can track your precise movements: via Wired
      • Based on the paper, Using Ad Targeting for Surveillance on a Budget: via Washington.edu
    • How websites can see your full personal details, from your phone contract info: via Medium/@philipn
    • Facebook and America’s largest companies give worker data to Equifax: via FastCompany
    • Exfiltration of personal data by session-replay scripts: via Freedom-to-Tinker
    • Apple's iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests: via BleepingComputer
    • Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking: via propublica.org

Books / Manuals

Warning: I have not read all of them so do not consider I am recommending them because I liked them. Those seem to provide useful resources that's why I'm recommending them.

Blogs

  • Security Reserachers

    • Krebs on Security - Lots of up-to-date, in-depth interesting cyber security news and investigations, by a true legend in the field and NY Times Bestseller, Brian Krebs. RSS
    • Schneier on Security - Commentary, news, essays and more all about cryptography, cyber security and privacy. New posts are written almost daily, and this is also home to the famous Crypto Gram weekly newsletter, that's been popular since 1994. By the world-renowned security professional, and serial bestselling author, Bruce Schneier. RSS
    • Troy Hunt - Security researcher and data breach collector. RSS
    • Graham Cluley - Security news, advise and opinion. From Graham Cluley, co-host of Smashing Security.
    • The Last Watch Dog - Privacy and Security articles, opinion and media by Byron Acohido
    • Daniel Miessler - Summaries recent news and events, and focuses on security, technology and people. RSS
    • Errata Security - Covers latest interesting news, and explains concepts clearly. By Robert Graham and David Maynor. RSS
    • Underground Tradecraft - Counterintelligence, OPSEC and Tradecraft for everyone
    • Google Project Zero blog - Cutting-edge vulnerability research.
    • Secret Club - Syndicated publication on various innovative research on reverse engineering, esp. game hacking.
    • Can Bölük's blog - Hypervisors, Windows internals, anticheats. He is a legendary reverse engineer
    • Orange Tsai's blog - Lot of cutting-edge research on a broad range of topics. He is totally an infosec legend
    • Rolf Rolles' blog - Reverse engineering, program analysis, (de)obfuscation, IDA Pro
    • back.engineering - Mainly xeroxz's blog but also features some syndicated articles.
    • lcamtuf's blog - Fuzzing and systems.
    • Halvarflake's blog - Various topics in systems and security.
    • Trail of Bits blog - State-of-the-art research on cryptography, program analysis, bug hunting
    • Bruce Dawson's blog - Systems, compilers, and performance.
    • Travis Downs' blog - Systems, compilers, and performance.
    • Bruce Schneier's blog - Cryptography and privacy news.
    • Hex-Rays blog - Tips and tricks for IDA Pro
  • Cyber Security News

    • Dark Reading - Well-known cyber security news site, with articles on a range of topics, ranging from data breaches, IoT, cloud security and threat intelligence. RSS
    • Threat Post - News and Articles Cloud Security, Malware, Vulnerabilities, Waterfall Security and Podcasts. RSS
    • We Live Security - Security news, views, and insight, by ESET + Community. RSS
    • The Hacker News - News and info covering Data Breaches, Cyber Attacks, Vulnerabilities, Malware. RSS
    • Sophos: Naked Security - Security news and updates, presented in an easy-to-digest format. RSS
    • IT Security Guru - Combines top cyber security news from multiple sites, easier to stay up-to-date
    • FOSS Bytes - Cyber Security - News about the latest exploits and hacks
  • Cyber Security Infomation

  • Privacy Guides

  • Privacy News

  • Internet Freedom

    • OONI, Internet freedom and analysis on blocked sites
    • Internet Health Report - Mozilla is documenting and explaining what’s happening to openness and freedom on the Internet
    • Worth Hiding - Posts about privacy, politics and the law

Youtube Channels

  • John Hammond: link Amazing content on Cybersecurity
  • IppSec: link Weekly Hackthebox WriteUps
  • Conda: link He post videos on how to build and break things in the cybersecurity world. Currently he is a penetration tester and am passionate about helping others learn about and break in to this industry.
  • The Cyber Mentor: link I'm a hacker by trade, but this channel will contain various lessons and even off-topic stuff from time to time.
  • PwnFunction: link I make Animated Computer Science Videos.
  • InsiderPhD: link PhD (Def&Sec) Student investigating Insider Threats using Natural Language Processing at Cranfield University. BSc in Computer Science.
  • Alh4zr3d: link Practitioner, scholar, and teacher of the eldritch knowledge of hacking. Cthulhu fhtagn.
  • Farah Hawa: link Hi! Welcome to my channel. Join me as I learn new things everyday and share useful resources as I move along in my journey as a hacker.
  • HackerSploit: link HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
  • DC CyberSec: link I'm a CyberSec professional who has worked in multiple countries around the world primarily in defensive security and social engineering field operations.
  • Cyber Warrior Studios: link I will be using this channel to provide tutorials to fellow security professionals, share my opinion on how companies can improve their network security, and otherwise provide other security information.
  • The XSS Rat: link Hello everyone! I'm a full time dad and part time bug bounty hunter. My day job is mostly QA/QC but my heart is at NetSec. Currently a top 50 intigriti all time leaderboard hacker, i want invest my time into helping the community. We need ethical hackers like you in the future. My opinions are mine and mine alone and if you want a pentest from me, so is the content of your hard drive.
  • SecAura: link SecAura was created for the distribution of Educational (Ethical) Hacking content, like and subscribe to inspire more content!
  • STÖK: link HACKERS GONNA HACK // CREATORS GONNA CREATE
  • Eric Belardo - Cyber Security / Raices Cyber: link Cyber Security and Online Safety Expert, Security Professional of 30+ years, USArmy Vet, Recovering CISO
  • INEtraining: link From expert level CCIE training, to the many other Cisco certification courses being offered, INE can help you learn at any pace you desire.
  • David Bombal: link On this channel, He discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
  • Tech69: link He post on Web, Red team, CSharp, Python and other general security related videos

Cybersecurity & Hacking Documentaries

Some Great Cybersecurity & Hacking Documentaries Recommendations!

  1. We Are Legion – The Story Of The Hacktivists
  2. 21st Century Hackers
  3. Hackers Wanted
  4. Hackers in wonderland
  5. The Internet’s Own Boy: The Story Of Aaron Swartz
  6. Def Con: The Documentary
  7. Hackers Are People Too
  8. Secret History Of Hacking
  9. Risk (2016)
  10. Zero Days (2016)
  11. Guardians Of The New World (Hacking Documentary) | Real Stories
  12. A Origem dos Hackers
  13. The Great Hack
  14. The Networks Dilemma
  15. Web Warriors
  16. Cyber War - Dot of Documentary
  17. CyberWar Threat - Inside Worlds Deadliest Cyberattack
  18. The Future of Cyberwarfare
  19. Dark Web Fighting Cybercrime Full Hacking
  20. Cyber Defense: Military Training for Cyber Warfare
  21. Hacker Hunter: WannaCry The History Marcus Hutchin
  22. The Life Hacker Documentary
  23. Hacker The Realm and Electron - Hacker Group
  24. Chasing Edward Snowden
  25. The Hacker Wars
  26. Hackers World
  27. In the Realm of the Hackers
  28. The Pirate Bay Away From Keyboard
  29. Wannacry: The Marcus Hutchins Story
  30. THE INSIDE LIFE OF A HACKER
  31. High Tech Hackers Documentary
  32. Drones, hackers and mercenaries - The future of war

Podcasts

  • Darknet Diaries by Jack Rhysider: Stories from the dark sides of the internet.
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • CYBER by Motherboard: News and analysis about the latest cyber threats
    Stitcher iTunes Spotify SoundCloud PocketCasts
  • The Privacy, Security, & OSINT Show by Michael Bazzell: Comprehensive guides on Privacy and OSINT
    Stitcher iTunes Spotify SoundCloud PocketCasts
  • Smashing Security by Graham Cluley and Carole Theriault: Casual, opinionated and humerous chat about current cybersecurity news
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • IRL Podcast by Mozilla: Online Life is Real Life, Stories about the future of the Web
    Stitcher iTunes Spotify Google Podcasts PocketCasts
  • Random but Memorable by 1Password - A Security advice podcast
    Stitcher iTunes Spotify Google Podcasts PocketCasts

More Security Podcasts on player.fm

More Podcasts (Verification Required): Naked Security | Open Source Security Podcast | Defensive Security Podcast | Malicious Life | Down the Security Rabbit Hole | Cyber Wire | Hacking Humans | Security Now | Cyber Security Interviews | Security Weekly | The Shared Security Podcast | Risky Business | Crypto-Gram Security Podcast | Off the Hook | Opt Out Podcast

Discord servers

(Remember to be nice there, don't be rude or annoying, etc. Act like an adult)

Videos

See also: awesome-sec-talks by @PaulSec

Data, API's and Visualisations

  • Research Results

    • Internet Census Data - Includes data on address space allocation, traffic, DNS, service enumeration, internet outages and other internet topology data
    • Web Tracking Data by Princeton University - This is the largest and most detailed analysis of online tracking to date, and measures both stateful (cookie-based) and stateless (fingerprinting-based) tracking. The crawls were made with OpenWPM
    • Who has your Back? by EFF - Anual report assessing how companies handle personal data
    • Lists of Websites Abusing Session Replay - Third-party sesssion replay scripts, record all your acions and allow them to be watched by a human. This list of websites include this
    • Sensor Access Data - A Crawl of the Mobile Web Measuring Sensor Accesses, Illinois
    • Canalys Newsroom - Research Studies on Security, Privacy, Technology and Finance
    • Data Never Sleeps - An infographic visualizing how much data is generated every minute (2019)
    • What they Know about You - An Infographic showing what information are Giant Tech Companies collecting from you (2020)
  • Databases

    • Exodus - Trackers in Android Apps
    • Exploit Database - A database or Current software vulnerabilities
    • URLScan - Service scanning for malicious domains, with historical results
    • Dehashed - Data Breaches and Credentials
    • VirusTotal - Detailed virus scans of software
    • Abuse IP DB - Database of IPs reported for abuse
    • SnusBase - Long standing database hosting breached data
    • OpenPhish - A feed of current phishing endpoints
    • HashToolkit - Database of 'cracked' hashes
    • SecLists - Starter list of leaked databases, passwords, usernames etc (Great for programming)
    • Qualys SSL Pulse - A continuous and global dashboard for monitoring the quality of SSL / TLS support over time across 150,000 SSL - and TLS-enabled websites, based on Alexa’s list of the most popular sites in the world
    • Tor Bulk Exit List - List of all exit nodes (IP) in use on the Tor network
  • Fun with Live Data 🌠

Interested in discovering more awesome real-time data visualizations? Check out this post, here 🌠

Academic

  • Journals

    • Rethinking information privacy‐security: Does it really matter? By Waseem Afzal: via Wiley
    • Crypto Paper: Privacy, Security, and Anonymity For Every Internet User, by Crypto Seb: via GitHub
    • Challenges in assessing privacy impact, Tales from the Front Line: via Wiley
    • A privacy‐preserving multifactor authentication system: via Wiley
    • Web Browser Privacy: What Do Browsers Say When They Phone Home?: via scss.tcd.ie
    • Online Tracking, A 1-million-site Measurement and Analysis: via Princeton University
    • Detecting and Defending Against Third-Party Tracking on the Web: via Franziska Roesner
    • Is Google degrading search? Consumer Harm from Universal Search: via law.berkeley.edu
    • A Comprehensive Evaluation of Third-Party Cookie Policies: via WhoLeftOpenTheCookieJar.com
    • The Dangers of Surveillance: via Harvard Law Review
    • Recognizing Speech From Gyroscope Signals: via Stanford
    • A Study of Scripts Accessing Smartphone Sensors: via sensor-js.xyz
    • Pixel Perfect, Fingerprinting Canvas in HTML5: hovav.net
    • Shining the Floodlights on Mobile Web Tracking — A Privacy Survey: via semanticscholar.org
    • Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking: via aruneshmathur.co.in
    • Privacy implications of email tracking: via senglehardt.com
    • Battery Status Not Included, Assessing Privacy in Web Standards: via princeton.edu
    • Achieving Anonymity Against Major Face Recognition Algorithms: via ruhr-uni-bochum.de
    • De-anonymizing Web Browsing Data with Social Networks: via princeton.edu
    • The Surveillance Implications of Web Tracking: via senglehardt.com
    • Understanding Facebook Connect login permissions: via jbonneau.com
    • Corporate Surveillance in Everyday Life, How Companies Collect, Combine, Analyze, Trade, and Use Personal Data on Billions: By Wolfie Christl, via crackedlabs.org
    • Using Ad Targeting for Surveillance on a Budget: via washington.edu
    • Cross-Site WebSocket Hijacking: via christian-schneider.net
    • Location Tracking using Mobile Device Power Analysis: scribd.com
    • HORNET, High-speed Onion Routing at the Network Layer: via arxiv.org
    • Decoy Routing: Toward Unblockable Internet Communication: via usenix.org
    • Trackers Vs Firefox, Comparing different blocking utilities: via GitHub - @jawz101
    • 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy: via ssrn.com
  • Write-Ups

    • Privacy - An Encyclopedic Definition and Background stanford.edu
  • Implementations and Standards

Foundations

Mega Guides

  • Trusted software reccomendations and avice for privacy: privacytools.io
  • Tips and tricks, for internet freedom, data health and privacy: datadetoxkit.org
  • Digital security tools and tactics: securityinabox.org
  • Online privacy guide, and software reccomendations: via Fried
  • Guide to security through encryption: via ProPrivacy
  • Large collection of beginner security guides: Heimdal Security
  • The Motherboard guide to not getting hacked: via Vice
  • Online anonimity, and Tor + VPN tutorials: via ivpn

Awesome GitHub Lists

Discussions

  • Reddit/HowToHack Learn and ask about hacking, security and pen testing.
  • Reddit/hacking Discuss about hacking and web security.
  • ax0nes Hacking, security, and software development forum.
  • 0Day.rocks on discord Discord server about the 0day.rocks blog for technical and general InfoSec/Cyber discussions & latest news.
  • Reddit/AskNetsec Discuss about network security, ask professionals for advices about jobs and stuff.

Security Advisories

Challenges

  • Vulnhub - Has a lot of VMs to play with. Some are beginner friendly, some aren't.
  • Itsecgames - bWAPP or buggy web app is a deliberately insecure web application.
  • Dvwa - Damn Vulnerable Web Application is another deliberately insecure web application to practice your skills on.
  • Hackthissite - A site which provides challenges, CTFs, and more to improve your hacking skills.
  • Defend the Web - Defend the Web is an interactive security platform where you can learn and challenge your skills.
  • Root-me - Another website which hosts challenges to test your hacking skills.
  • HackTheBox - An online platform to test and advance your skills in penetration testing and cyber security.
  • Overthewire - Learn and practice security concepts in the form of fun-filled games.
  • Ctftime - The de facto website for everything CTF related.
  • TryHackMe - TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs.
  • PicoCTF - Provides you with fun CTF challenges of varying levels of difficulty to practice on.

CTFs

If you are new, you should start with high school level and eventually level up to college level.

  • NSA Codebreaker challenge
  • CSAW RED (high school level) - Formerly known as CSAW HSF
  • CSAW CTF (college level)

For more details about CTF here. Complete list of how many type of CTF present on the internet.

Binary Exploitation

Game hacking and reversing

  • Pointers for REAL dummies - This is how I finally understood pointers when I was 12 years old. GREAT guide and it will teach you about C and what is memory.
  • Fl33p's CS:S bunnyhop hack tutorial (YT) - A bit outdated but this is what helped me finally understand how to use a debugger and Cheat Engine and Visual Studio. The explanations are not 100% accurate but most importantly it is really beginner friendly for noobs
  • godbolt.org Compiler Explorer - Good to learn what code looks like when it gets compiled
  • Reverse Engineering Stack Exchange - Good place to figure out how to do something in IDA Pro.
  • osdev wiki - Has some outdated or inaccurate info, but usually a good starting point.

Other InfoSec newsletters, zines, and publications

Must-have, essential tools

Other handy tools

Online Tools

  • Check and Test
  • Utilities
    • Privacy.sexy - A collection of commands you can run to impplement best prctices on Windows or MacOS
    • ExifRemove - Remove Meta/ EXIF data online
    • Secure Password Check - Fun little tool, to demonstrate how long it could take to crack a password
    • 33Mail or Anonaddy or SimpleLogin Protect your email address, by auto-generating unique permeant aliases for each account, so all emails land in your primary inbox
    • Deseat Me - Clean up your online presence
  • Anti-Tracking Analysis
  • Phishing, Hacking and Abuse
    • VirusTotal - Analyse a suspicious web resource for malware
    • ScamAdviser - Check if a website is a scam, before buying from it
    • Abuse IP DB - Report an IP address for abuse, spam or attacks, and check the status of any IP
    • Phish Tank - Check if a link is a known phishing URL, Submit a phishing URL, browse recent phishing URLs
    • Is It Hacked? - Check if a website or page appears to be hacked, hijacked or generally suspicious
  • IP Tools
  • Public Domain and Website Scanning Tools
    • URL Scan - Scan and analyse websites, shows IP, DNS, domain and host data, as well as info about resources and requests
    • Security Trails - Shows all DNS records, historical DNS data and sub domains
    • crt.sh - Shows current and previous SSL/ TLS certificates for a given domain, has advanced search option
    • Virus Total - Scans any URL, web asset or file for malware
    • DomainTools WhoIs - Who Is Lookup. Check who registered a domain name, and find contact details
    • Pentest Tools Vulnerability Scanner - Light scan searches for client and server-side vulnerabilities and missing HTTP security headers
    • Qualys SSL Server Test - Perform a deep analysis of the configuration of any SSL web server on the public Internet
    • Abuse IP DB - Check if an IP or domain has been reported for abuse, or file a report
    • RIPEstat - Detailed analysis of IP Addresses (Routing, DNS, Abuse History, Activity etc)
    • Multirbl - Complete IP check for sending Mailservers
    • IPVoid - Full suit of Domain, IP, and DNS tools for Tracing, Lookup, Checking and Pinging
  • Net Neutrality
  • Anonymous Services - The following sites host a veriety of anonymous online services
  • Archives
    • The Way Back Machine - See previous versions of any website. An archive of 431 billion snapshots over 20 years
    • PolitiTweet - Archives Tweets from powerful public figures, and records silent retractions and deleted tweets
    • Internet Archive Software Collection - The largest vintage and historical software library
    • OpenLibrary - A free, digital library of over 2 million eBooks, and information on over 20 million books
    • Archive-It - Collecting and accessing cultural heritage on the web

Hex-Rays plugins

x64dbg plugins

Lectures and slides

Reference materials

  • Intel Manual volume 3 - they say that every question you have is answered somewhere in this book. the question is where to find it. and also how to understand it. since this shit is not easy nor fun to read. sometimes if you ask some stupid question people will tell you to go read the intel manual. it's an advanced way to tell people to fuck off.
  • Hacker's Delight - bit hacking tricks, you see them used by compilers often. Division constants
  • Dragon Book - popular compilers textbook
  • SSA book - resource for advanced topics on single static assignment form in compilers

Additional resources

About

This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published