diff --git a/_LEARNING_AND_SOCIALS/BOOKS.md b/_LEARNING_AND_SOCIALS/BOOKS.md index f1d9dc2..0296e84 100644 --- a/_LEARNING_AND_SOCIALS/BOOKS.md +++ b/_LEARNING_AND_SOCIALS/BOOKS.md @@ -26,9 +26,9 @@ - [OWASP Testing Guide: Stable](https://owasp.org/www-project-web-security-testing-guide/stable/) - [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman (2014)](https://nostarch.com/pentesting) - [Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough (2018)](https://nostarch.com/azure) -- [PoC||GTFO, Volume 2 by Manul Laphroaig (2017)](https://nostarch.com/gtfo) +- [PoC||GTFO, Volume 1 by Manul Laphroaig (2017)](https://nostarch.com/gtfo) - [PoC||GTFO, Volume 2 by Manul Laphroaig (2018)](https://nostarch.com/gtfo2) -- [PoC||GTFO, Volume 2 by Manul Laphroaig (2021)](https://nostarch.com/gtfo3) +- [PoC||GTFO, Volume 3 by Manul Laphroaig (2021)](https://nostarch.com/gtfo3) - [Practical Binary Analysis: Build Your Own Linux Tools for Binary instrumentation, Analysis, and Disassembly by Dennis Andriesse (2019)](https://nostarch.com/binaryanalysis) - [Practical Doomsday: A User's Guide to the End of the World by Michal Zalewski (2022)](https://nostarch.com/practical-doomsday) - [Practical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel (2016)](https://nostarch.com/forensicimaging) @@ -49,5 +49,5 @@ - [The Shellcoders Handbook by Chris Anley et al. (2007)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html) - [The Web Application Hackers Handbook by D. Stuttard, M. Pinto (2011)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html) - [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by T.J. O'Connor (2012)](https://www.goodreads.com/book/show/16192263-violent-python) -- [Web Hacking 101](https://leanpub.com/web-hacking-101) +- [Web Hacking 101 - How to Make Money Hacking Ethically by Peter Yaworski (2018)](https://leanpub.com/web-hacking-101) - [Windows Security Internals with PowerShell by James Forshaw (2024)](https://nostarch.com/windows-security-internals-powershell) diff --git a/_LEARNING_AND_SOCIALS/TWITTER.md b/_LEARNING_AND_SOCIALS/TWITTER.md index ffb3013..d16adbd 100644 --- a/_LEARNING_AND_SOCIALS/TWITTER.md +++ b/_LEARNING_AND_SOCIALS/TWITTER.md @@ -1,6 +1,6 @@ # Twitter -Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers. +> Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers. ## Accounts @@ -21,7 +21,6 @@ Twitter is very common in the InfoSec area. Many advices and tips on bug hunting - [@NahamSec - Hacker & content creator & co-founder bugbountyforum and http://recon.dev](https://twitter.com/NahamSec) - [@orange_8361 - bug bounty hunter and security researcher, specialized on RCE bugs](https://twitter.com/orange_8361) - [@pentest_swissky - Author of PayloadsAllTheThings & SSRFmap](https://twitter.com/pentest_swissky) -- [@putsi - Bug bounty hunter and white hat hacker in Team ROT](https://twitter.com/putsi) - [@r0bre - Bug Hunter for web- and systemsecurity, iOS Security researcher](https://twitter.com/r0bre) - [@samwcyo - Full time bug bounty hunter](https://twitter.com/samwcyo) - [@securinti - Dutch bug bounty hunter & head of hackers and bord member @ intigriti](https://twitter.com/securinti) diff --git a/_LEARNING_AND_SOCIALS/YOUTUBE.md b/_LEARNING_AND_SOCIALS/YOUTUBE.md index 5a08682..2e7d1f3 100644 --- a/_LEARNING_AND_SOCIALS/YOUTUBE.md +++ b/_LEARNING_AND_SOCIALS/YOUTUBE.md @@ -1,39 +1,62 @@ # Youtube +> Discover the best YouTube channels, must-watch conference talks, and handpicked videos on information security. + ## Channels -- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA) -- [LiveOverflow - Explore weird machines...](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) +- [0xdf](https://www.youtube.com/@0xdf) +- [Assetnote - Surfacing Security Podcast](https://www.youtube.com/@assetnote2016) +- [Bug Bounty Reports Explained](https://www.youtube.com/@BugBountyReportsExplained) +- [Codingo](https://www.youtube.com/@codingo) +- [Critical Thinking - Bug Bounty Podcast](https://www.youtube.com/@criticalthinkingpodcast) +- [Embrace The Red - wunderwuzzi](https://www.youtube.com/@embracethered) - [GynvaelEN - Podcasts about CTFs, computer security, programming and similar things.](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg) -- [John Hammond - Wargames and CTF writeups](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw) -- [Murmus CTF - Weekly live streamings](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A) -- [PwnFunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A) -- [OJ Reeves](https://www.youtube.com/channel/UCz2aqRQWMhJ4wcJq3XneqRg) -- [Hacksplained - A Beginner Friendly Guide to Hacking](https://www.youtube.com/c/hacksplained) -- [STÖK](https://www.youtube.com/c/STOKfredrik) -- [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q) -- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw) -- [Nahamsec](https://www.youtube.com/c/Nahamsec) - [Hackerone](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw) -- [The Hated one](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) -- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) +- [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q) +- [Hacksplained - A Beginner Friendly Guide to Hacking](https://www.youtube.com/c/hacksplained) - [Hak5](https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ) +- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA) +- [Jack Rhysider - Darknet Diaries](https://www.youtube.com/@JackRhysider) +- [John Hammond - Wargames and CTF writeups](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw) +- [Laluka - OffenSkill - Sharing is Caring](https://www.youtube.com/@TheLaluka) +- [LiveOverflow - Explore weird machines...](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) +- [Murmus CTF - Weekly live streamings](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A) +- [Nahamsec](https://www.youtube.com/c/Nahamsec) +- [OJ Reeves](https://www.youtube.com/channel/UCz2aqRQWMhJ4wcJq3XneqRg) +- [PwnFunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A) +- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) +- [STÖK](https://www.youtube.com/c/STOKfredrik) +- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw) +- [The Hated one](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) +- [xct hacks](https://www.youtube.com/@xct_de) + +## Conferences + +- [BlackAlps CyberSecurityConference](https://www.youtube.com/@blackalpscybersecurityconf8699) +- [DEFCON Conference](https://www.youtube.com/user/DEFCONConference/videos) +- [DEFCON Paris](https://www.youtube.com/@DEFCONParis) +- [Hack In Paris](https://www.youtube.com/user/hackinparis) +- [Hexacon](https://www.youtube.com/@hexacon4091) +- [INSOMNI'HACK](https://www.youtube.com/@scrtinsomnihack) +- [LeHack / HZV](https://www.youtube.com/user/hzvprod) +- [OffensiveCon](https://www.youtube.com/@OffensiveCon) +- [OrangeCon](https://www.youtube.com/@OrangeCon) +- [Recon Conference](https://www.youtube.com/@reconmtl) +- [Recon Village](https://www.youtube.com/@ReconVillage) +- [x33fcon Conference](https://www.youtube.com/c/x33fcon) + + +## Curated Videos + +- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc) +- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4) +- [Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans Rosén](https://www.youtube.com/watch?v=KDo68Laayh8) +- [The Conscience of a Hacker](https://www.youtube.com/watch?v=0tEnnvZbYek) - [HACKING GOOGLE Series](https://www.youtube.com/watch?v=aOGFY1R4QQ4) - [EP000: Operation Aurora | HACKING GOOGLE](https://youtu.be/przDcQe6n5o) - [EP001: Threat Analysis Group | HACKING GOOGLE](https://youtu.be/N7N4EC20-cM) - [EP002: Detection and Response | HACKING GOOGLE](https://youtu.be/QZ0cpBocl3c) - [EP003: Red Team | HACKING GOOGLE](https://youtu.be/TusQWn2TQxQ) - [EP004: Bug Hunters | HACKING GOOGLE](https://youtu.be/IoXiXlCNoXg) - - [EP005: Project Zero | HACKING GOOGLE](https://youtu.be/My_13FXODdU) - -## Conferences - -- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4) -- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc) -- [Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans Rosén](https://www.youtube.com/watch?v=KDo68Laayh8) -- [The Conscience of a Hacker](https://www.youtube.com/watch?v=0tEnnvZbYek) -- [Defcon Conference](https://www.youtube.com/user/DEFCONConference/videos) -- [x33fcon Conference](https://www.youtube.com/c/x33fcon) -- [Hack In Paris](https://www.youtube.com/user/hackinparis) -- [LeHack / HZV](https://www.youtube.com/user/hzvprod) + - [EP005: Project Zero | HACKING GOOGLE](https://youtu.be/My_13FXODdU) \ No newline at end of file