# Awesome Hacking Resources A collection of hacking / penetration testing resources to make you better! **lets make it the biggest resource repository for our community** **You are welcome to fork and contribute.** Learning the Skills -- * [Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html) * [Cybrary](https://www.cybrary.it/) * [OffensiveComputerSecurity](https://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html) * [CS 642: Intro to Computer Security](http://pages.cs.wisc.edu/~ace/cs642-spring-2016.html) * [Free cyber security training](https://www.samsclass.info/) * [SecurityTube](http://www.securitytube.net/) * [Seed Labs](http://www.cis.syr.edu/~wedu/seed/labs.html) * [Hak5](https://www.hak5.org/) YouTube channels -- * [OWASP](https://www.youtube.com/user/OWASPGLOBAL) * [Hak5](https://www.youtube.com/user/Hak5Darren) * [BlackHat](https://www.youtube.com/channel/UCJ6q9Ie29ajGqKApbLqfBOg) * [Christiaan008](https://www.youtube.com/channel/UCEPzS1rYsrkqzSLNp76nrcg) * [danooct1](https://www.youtube.com/channel/UCqbkm47qBxDj-P3lI9voIAw) * [DedSec](https://www.youtube.com/channel/UCx34ZZW2KgezfUPPeL6m8Dw) * [DEFCON Conference](https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw) * [DemmSec](https://www.youtube.com/channel/UCJItQmwUrcW4VdUqWaRUNIg) * [Geeks Fort - KIF](https://www.youtube.com/channel/UC09NdTL2hkThGLSab8chJMw) * [iExplo1t](https://www.youtube.com/channel/UCx0HClQ_cv0sLNOVhoO2nxg/videos) * [Latest Hacking News](https://www.youtube.com/channel/UCDSLIfPnsK1WdEZi_AcvSlQ) * [HACKING TUTORIALS](https://www.youtube.com/channel/UCbsn2kQwNxcIzHwbdDjzehA) * [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) * [Metasploitation](https://www.youtube.com/channel/UC9Qa_gXarSmObPX3ooIQZrg) * [NetSecNow](https://www.youtube.com/channel/UC6J_GnSAi7F2hY4RmnMcWJw) * [Open SecurityTraining](https://www.youtube.com/channel/UCthV50MozQIfawL9a_g5rdg) * [BalCCon - Balkan Computer Congress](https://www.youtube.com/channel/UCoHypmu8rxlB5Axh5JxFZsA) * [Penetration Testing in Linux](https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA) * [rwbnetsec](https://www.youtube.com/channel/UCAJ8Clc3188ek9T_5XTVzZQ) * [Security Weekly](https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg) * [Shozab Haxor](https://www.youtube.com/channel/UCBwub2kRoercWQJ2mw82h3A) * [SSTec Tutorials](https://www.youtube.com/channel/UCHvUTfxL_9bNQgqzekPWHtg) * [Troy Hunt](https://www.youtube.com/channel/UCD6MWz4A61JaeGrvyoYl-rQ) * [Waleed Jutt](https://www.youtube.com/channel/UCeN7cOELsyMHrzfMsJUgv3Q) * [webpwnized](https://www.youtube.com/channel/UCPeJcqbi8v46Adk59plaaXg) Sharpening Your Skills -- * [OWASP Security Shepherd](https://security-shepherd.ctf365.com/login.jsp) * [CTF365](https://ctf365.com/) * [Pentestit](https://lab.pentestit.ru/) * [Hacksplaining](https://www.hacksplaining.com/) * [The cryptopals crypto challenges](http://cryptopals.com/) * [The enigma group](https://www.enigmagroup.org/) * [Ringzer0 Team](https://ringzer0team.com/challenges) * [Hack The Box](https://www.hackthebox.gr/en/login) * [Over the wire](http://overthewire.org/wargames/) * [Backdoor](https://backdoor.sdslabs.co) * [Vulnhub](https://www.vulnhub.com/) * [Hack.me](https://hack.me/) * [Exploit exercises](https://exploit-exercises.com/) * [PentesterLab](https://pentesterlab.com/) * [SmashTheStack](http://smashthestack.org/wargames.html) * [Root-Me](https://www.root-me.org/) * [PicoCTF](https://2017game.picoctf.com/) Reverse Engineering and Buffer overflow -- * [Shell storm](http://shell-storm.org/) * [Buffer Overflow Exploitation Megaprimer for Linux](http://www.securitytube.net/groups?operation=view&groupId=4) * [Malware Unicorn](https://securedorg.github.io/RE101/) * [Modern Binary Exploitation - CSCI 4968](https://github.com/RPISEC/MBE) * [Introductory Intel x86](http://www.opensecuritytraining.info/IntroX86.html) * [Binary hacking](http://liveoverflow.com/binary_hacking/index.html) * [Shellcode Injection](https://dhavalkapil.com/blogs/Shellcode-Injection/) * [Reverse Engineering for Beginners](https://beginners.re/RE4B-EN.pdf) Privileged escalation -- * [Reach the root](https://hackmag.com/security/reach-the-root/) * [Basic linux privilege escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) * [Windows Privilege Escalation](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation) * [Privilege escalation for Windows and Linux](https://github.com/AusJock/Privilege-Escalation) * [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html) * [RootHelper](https://github.com/NullArray/RootHelper) * [Windows exploits, mostly precompiled.](https://github.com/abatchy17/WindowsExploits) * [Unix privesc checker](http://pentestmonkey.net/tools/audit/unix-privesc-check) * [Privilege escalation linux with live example](http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/) * [Windows privilege escalation checker](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md) * [Linux Privilege Escalation Scripts](http://netsec.ws/?p=309#more-309) * [AutoLocalPrivilegeEscalation](https://github.com/ngalongc/AutoLocalPrivilegeEscalation) * [Linux Privilege Escalation Check Script](https://github.com/sleventyeleven/linuxprivchecker) * [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623)