mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
cd56b1364f
Recent hash leak sites, and a community hacking forum
16 KiB
16 KiB
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Let's make it the biggest resource repository for our community.
You are welcome to fork and contribute.
We started a new tools list, come and contribute
Table of Contents
- Learning the Skills
- YouTube Channels
- Sharpening Your Skills
- Reverse Engineering, Buffer Overflow and Exploit Development
- Privilege Escalation
- Network Scanning / Reconnaissance
- Malware Analysis
- Vulnerable Web Application
- Vulnerable OS
- Exploits
- Forums
- Archived Security Conference Videos
- Online Communities
- Online News Sources
- Linux Penetration Testing OS
Learning the Skills
- Learning Exploitation with Offensive Computer Security 2.0
- Cybrary
- OffensiveComputerSecurity
- CS 642: Intro to Computer Security
- Free cyber security training
- SecurityTube
- Seed Labs
- Hak5
- OWASP top 10 web security risks
- MIT OCW 6.858 Computer Systems Security
YouTube Channels
- OWASP
- Hak5
- BlackHat
- Christiaan008
- Companies
- Conferences
- 44contv
- BruCON Security Conference
- BSides Manchester
- BSidesAugusta
- CarolinaCon
- Cort Johnson
- DevSecCon
- Garage4Hackers - Information Security
- HACKADAY
- Hack In The Box Security Conference
- Hack in Paris
- Hacklu
- Hacktivity
- Hardwear.io
- IEEE Symposium on Security and Privacy
- LASCON
- Marcus Niemietz
- Media.ccc.de
- NorthSec
- Pancake Nopcode
- Psiinon
- SJSU Infosec
- Secappdev.org
- Security Fest
- SecurityTubeCons
- ToorCon
- USENIX Enigma Conference
- NEWS
- Samy Kamkar's Applied Hacking
- danooct1
- DedSec
- DEFCON Conference
- DemmSec
- Don Does 30
- Geeks Fort - KIF
- iExplo1t
- HACKING TUTORIALS
- LiveOverflow
- Metasploitation
- NetSecNow
- Open SecurityTraining
- BalCCon - Balkan Computer Congress
- Penetration Testing in Linux
- rwbnetsec
- Security Weekly
- Seytonic
- Shozab Haxor
- SSTec Tutorials
- Waleed Jutt
- webpwnized
- JackkTutorials
- Zer0Mem0ry
- LionSec
- Adrian Crenshaw
- HackerSploit
Sharpening Your Skills
- OWASP Security Shepherd
- CTFLearn
- CTFs write-ups
- CTF365
- Pentestit
- Hacksplaining
- The cryptopals crypto challenges
- The enigma group
- Ringzer0 Team
- Hack The Box
- Over the wire
- Backdoor
- Vulnhub
- Hack.me
- Hack this site!
- Exploit exercises
- PentesterLab
- SmashTheStack
- Root-Me
- PicoCTF
- Shellter Labs
- Pentest Practice
- Pentest.training
- pwnable.kr
- pwnable.tw
- hackburger.ee
- http://noe.systems/
- Hacker Gateway
- Solve Me
- Challenge Land
- Participating Challenge Sites
- Hacker test
- Crackmes.de Archive (2011-2015)
- ROP Emporium
Reverse Engineering, Buffer Overflow and Exploit Development
- Shell storm
- Buffer Overflow Exploitation Megaprimer for Linux
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102
- Modern Binary Exploitation - CSCI 4968
- Introductory Intel x86
- Binary hacking
- Shellcode Injection
- Reverse Engineering for Beginners
- Exploit tutorials
- Exploit development
- Corelan tutorials
- Reverse engineering reading list
- Reverse Engineering challenges
- Reverse Engineering for beginners (GitHub project)
- reversing.kr challenges
- Analysis and exploitation (unprivileged)
- A Course on Intermediate Level Linux Exploitation
- Lena's Reversing for Newbies (Complete)
- Megabeets journey into Radare2
Privilege Escalation
- Reach the root
- Basic linux privilege escalation
- Windows Privilege Escalation
- Privilege escalation for Windows and Linux
- Windows Privilege Escalation Fundamentals
- RootHelper
- Windows exploits, mostly precompiled.
- Unix privesc checker
- Privilege escalation linux with live example
- Windows privilege escalation checker
- Linux Privilege Escalation Scripts
- AutoLocalPrivilegeEscalation
- Linux Privilege Escalation Check Script
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- 4 Ways get linux privilege escalation
Malware Analysis
Network Scanning / Reconnaissance
Vulnerable Web Application
- OWASP Hackademic Challenges project
- bWAPP
- Damn Vulnerable Web Application (DVWA)
- Xtreme Vulnerable Web Application (XVWA)
- WebGoat: A deliberately insecure Web Application
- OWASP Mutillidae II
- OWASP Broken Web Applications Project
- Damn Small Vulnerable Web
- OWASP Juice Shop
- Google Gruyere