buffer-overflowctfexploithackingmalwaremitmowasppenetration-testingprivilege-escalationprivilege-escalation-linuxreverse-engineeringwindows-privilege-escalation
f1ff94004c
add linux-exploitation-course |
||
---|---|---|
LICENSE | ||
README.md | ||
contributing.md | ||
tools.md |
README.md
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Let's make it the biggest resource repository for our community.
You are welcome to fork and contribute.
We started a new tools list, come and contribute
Table of Contents
- Learning the Skills
- YouTube Channels
- Sharpening Your Skills
- Reverse Engineering, Buffer Overflow and Exploit Development
- Privilege Escalation
- Malware Analysis
- Vulnerable Web Application
- Vulnerable OS
- Exploits
- Forums
- Archived Security Conference Videos
- Online Communities
- Online News Sources
Learning the Skills
- Learning Exploitation with Offensive Computer Security 2.0
- Cybrary
- OffensiveComputerSecurity
- CS 642: Intro to Computer Security
- Free cyber security training
- SecurityTube
- Seed Labs
- Hak5
- OWASP top 10 web security risks
- MIT OCW 6.858 Computer Systems Security
YouTube Channels
- OWASP
- Hak5
- BlackHat
- Christiaan008
- Samy Kamkar's Applied Hacking
- danooct1
- DedSec
- DEFCON Conference
- DemmSec
- Don Does 30
- Geeks Fort - KIF
- iExplo1t
- Latest Hacking News
- HACKING TUTORIALS
- LiveOverflow
- Metasploitation
- NetSecNow
- Open SecurityTraining
- BalCCon - Balkan Computer Congress
- Penetration Testing in Linux
- rwbnetsec
- Security Weekly
- Seytonic
- Shozab Haxor
- SSTec Tutorials
- Troy Hunt
- Waleed Jutt
- webpwnized
- JackkTutorials
- Zer0Mem0ry
- LionSec
- Adrian Crenshaw
- HackerSploit
Sharpening Your Skills
- OWASP Security Shepherd
- CTFLearn
- CTF365
- Pentestit
- Hacksplaining
- The cryptopals crypto challenges
- The enigma group
- Ringzer0 Team
- Hack The Box
- Over the wire
- Backdoor
- Vulnhub
- Hack.me
- Hack this site!
- Exploit exercises
- PentesterLab
- SmashTheStack
- Root-Me
- PicoCTF
- Shellter Labs
- Pentest Practice
- Pentest.training
- pwnable.kr
- hackburger.ee
- http://noe.systems/
- Hacker Gateway
- Solve Me
- Challenge Land
- Participating Challenge Sites
- Hacker test
Reverse Engineering, Buffer Overflow and Exploit Development
- Shell storm
- Buffer Overflow Exploitation Megaprimer for Linux
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102
- Modern Binary Exploitation - CSCI 4968
- Introductory Intel x86
- Binary hacking
- Shellcode Injection
- Reverse Engineering for Beginners
- Exploit tutorials
- Exploit development
- Corelan tutorials
- Reverse engineering reading list
- Reverse Engineering challenges
- Reverse Engineering for beginners (GitHub project)
- reversing.kr challenges
- Analysis and exploitation (unprivileged)
- A Course on Intermediate Level Linux Exploitation
Privilege Escalation
- Reach the root
- Basic linux privilege escalation
- Windows Privilege Escalation
- Privilege escalation for Windows and Linux
- Windows Privilege Escalation Fundamentals
- RootHelper
- Windows exploits, mostly precompiled.
- Unix privesc checker
- Privilege escalation linux with live example
- Windows privilege escalation checker
- Linux Privilege Escalation Scripts
- AutoLocalPrivilegeEscalation
- Linux Privilege Escalation Check Script
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- 4 Ways get linux privilege escalation
Malware Analysis
Vulnerable Web Application
- OWASP Hackademic Challenges project
- bWAPP
- Damn Vulnerable Web Application (DVWA)
- Xtreme Vulnerable Web Application (XVWA)
- WebGoat: A deliberately insecure Web Application
- OWASP Mutillidae II
- OWASP Broken Web Applications Project
- Damn Small Vulnerable Web
- OWASP Juice Shop