mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 02:46:24 +00:00
A collection of hacking / penetration testing resources to make you better!
buffer-overflowctfexploithackingmalwaremitmowasppenetration-testingprivilege-escalationprivilege-escalation-linuxreverse-engineeringwindows-privilege-escalation
b9f1c5ff23
Update README.md |
||
---|---|---|
LICENSE | ||
README.md |
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Let's make it the biggest resource repository for our community.
You are welcome to fork and contribute.
Learning the Skills
- Learning Exploitation with Offensive Computer Security 2.0
- Cybrary
- OffensiveComputerSecurity
- CS 642: Intro to Computer Security
- Free cyber security training
- SecurityTube
- Seed Labs
- Hak5
- OWASP top 10 web security risks
YouTube channels
- OWASP
- Hak5
- BlackHat
- Christiaan008
- Samy Kamkar's Applied Hacking
- danooct1
- DedSec
- DEFCON Conference
- DemmSec
- Don Does 30
- Geeks Fort - KIF
- iExplo1t
- Latest Hacking News
- HACKING TUTORIALS
- LiveOverflow
- Metasploitation
- NetSecNow
- Open SecurityTraining
- BalCCon - Balkan Computer Congress
- Penetration Testing in Linux
- rwbnetsec
- Security Weekly
- Shozab Haxor
- SSTec Tutorials
- Troy Hunt
- Waleed Jutt
- webpwnized
- JackkTutorials
- Zer0Mem0ry
- LionSec
Sharpening Your Skills
- OWASP Security Shepherd
- CTF365
- Pentestit
- Hacksplaining
- The cryptopals crypto challenges
- The enigma group
- Ringzer0 Team
- Hack The Box
- Over the wire
- Backdoor
- Vulnhub
- Hack.me
- Hack this site!
- Exploit exercises
- PentesterLab
- SmashTheStack
- Root-Me
- PicoCTF
- Shellter Labs
- Pentest Practice
- Pentest.training
Reverse Engineering, Buffer overflow and Exploit development
- Shell storm
- Buffer Overflow Exploitation Megaprimer for Linux
- Reverse Engineering Malware 101
- Reverse Engineering Malware 102
- Modern Binary Exploitation - CSCI 4968
- Introductory Intel x86
- Binary hacking
- Shellcode Injection
- Reverse Engineering for Beginners
- Exploit tutorials
- Exploit development
- Corelan tutorials
- Reverse engineering reading list
- Reverse Engineering challenges
- Reverse Engineering for beginners (GitHub project)
- reversing.kr challenges
- Analysis and exploitation (unprivileged)
Privileged escalation
- Reach the root
- Basic linux privilege escalation
- Windows Privilege Escalation
- Privilege escalation for Windows and Linux
- Windows Privilege Escalation Fundamentals
- RootHelper
- Windows exploits, mostly precompiled.
- Unix privesc checker
- Privilege escalation linux with live example
- Windows privilege escalation checker
- Linux Privilege Escalation Scripts
- AutoLocalPrivilegeEscalation
- Linux Privilege Escalation Check Script
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- 4 Ways get linux privilege escalation
Malware analysis
Vulnerable Web Application
- OWASP Hackademic Challenges project
- bWAPP
- Damn Vulnerable Web Application (DVWA)
- Xtreme Vulnerable Web Application (XVWA)
- WebGoat: A deliberately insecure Web Application
- OWASP Mutillidae II
- OWASP Juice Shop
- OWASP Broken Web Applications Project
- Damn Small Vulnerable Web