Learning and Socials updates

This commit is contained in:
Swissky 2024-12-01 12:18:45 +01:00
parent 32d9f7550d
commit e42edaab74
3 changed files with 52 additions and 30 deletions

View File

@ -26,9 +26,9 @@
- [OWASP Testing Guide: Stable](https://owasp.org/www-project-web-security-testing-guide/stable/) - [OWASP Testing Guide: Stable](https://owasp.org/www-project-web-security-testing-guide/stable/)
- [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman (2014)](https://nostarch.com/pentesting) - [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman (2014)](https://nostarch.com/pentesting)
- [Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough (2018)](https://nostarch.com/azure) - [Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough (2018)](https://nostarch.com/azure)
- [PoC||GTFO, Volume 2 by Manul Laphroaig (2017)](https://nostarch.com/gtfo) - [PoC||GTFO, Volume 1 by Manul Laphroaig (2017)](https://nostarch.com/gtfo)
- [PoC||GTFO, Volume 2 by Manul Laphroaig (2018)](https://nostarch.com/gtfo2) - [PoC||GTFO, Volume 2 by Manul Laphroaig (2018)](https://nostarch.com/gtfo2)
- [PoC||GTFO, Volume 2 by Manul Laphroaig (2021)](https://nostarch.com/gtfo3) - [PoC||GTFO, Volume 3 by Manul Laphroaig (2021)](https://nostarch.com/gtfo3)
- [Practical Binary Analysis: Build Your Own Linux Tools for Binary instrumentation, Analysis, and Disassembly by Dennis Andriesse (2019)](https://nostarch.com/binaryanalysis) - [Practical Binary Analysis: Build Your Own Linux Tools for Binary instrumentation, Analysis, and Disassembly by Dennis Andriesse (2019)](https://nostarch.com/binaryanalysis)
- [Practical Doomsday: A User's Guide to the End of the World by Michal Zalewski (2022)](https://nostarch.com/practical-doomsday) - [Practical Doomsday: A User's Guide to the End of the World by Michal Zalewski (2022)](https://nostarch.com/practical-doomsday)
- [Practical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel (2016)](https://nostarch.com/forensicimaging) - [Practical Forensic Imaging: Securing Digital Evidence with Linux Tools by Bruce Nikkel (2016)](https://nostarch.com/forensicimaging)
@ -49,5 +49,5 @@
- [The Shellcoders Handbook by Chris Anley et al. (2007)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html) - [The Shellcoders Handbook by Chris Anley et al. (2007)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
- [The Web Application Hackers Handbook by D. Stuttard, M. Pinto (2011)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html) - [The Web Application Hackers Handbook by D. Stuttard, M. Pinto (2011)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
- [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by T.J. O'Connor (2012)](https://www.goodreads.com/book/show/16192263-violent-python) - [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by T.J. O'Connor (2012)](https://www.goodreads.com/book/show/16192263-violent-python)
- [Web Hacking 101](https://leanpub.com/web-hacking-101) - [Web Hacking 101 - How to Make Money Hacking Ethically by Peter Yaworski (2018)](https://leanpub.com/web-hacking-101)
- [Windows Security Internals with PowerShell by James Forshaw (2024)](https://nostarch.com/windows-security-internals-powershell) - [Windows Security Internals with PowerShell by James Forshaw (2024)](https://nostarch.com/windows-security-internals-powershell)

View File

@ -1,6 +1,6 @@
# Twitter # Twitter
Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers. > Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers.
## Accounts ## Accounts
@ -21,7 +21,6 @@ Twitter is very common in the InfoSec area. Many advices and tips on bug hunting
- [@NahamSec - Hacker & content creator & co-founder bugbountyforum and http://recon.dev](https://twitter.com/NahamSec) - [@NahamSec - Hacker & content creator & co-founder bugbountyforum and http://recon.dev](https://twitter.com/NahamSec)
- [@orange_8361 - bug bounty hunter and security researcher, specialized on RCE bugs](https://twitter.com/orange_8361) - [@orange_8361 - bug bounty hunter and security researcher, specialized on RCE bugs](https://twitter.com/orange_8361)
- [@pentest_swissky - Author of PayloadsAllTheThings & SSRFmap](https://twitter.com/pentest_swissky) - [@pentest_swissky - Author of PayloadsAllTheThings & SSRFmap](https://twitter.com/pentest_swissky)
- [@putsi - Bug bounty hunter and white hat hacker in Team ROT](https://twitter.com/putsi)
- [@r0bre - Bug Hunter for web- and systemsecurity, iOS Security researcher](https://twitter.com/r0bre) - [@r0bre - Bug Hunter for web- and systemsecurity, iOS Security researcher](https://twitter.com/r0bre)
- [@samwcyo - Full time bug bounty hunter](https://twitter.com/samwcyo) - [@samwcyo - Full time bug bounty hunter](https://twitter.com/samwcyo)
- [@securinti - Dutch bug bounty hunter & head of hackers and bord member @ intigriti](https://twitter.com/securinti) - [@securinti - Dutch bug bounty hunter & head of hackers and bord member @ intigriti](https://twitter.com/securinti)

View File

@ -1,39 +1,62 @@
# Youtube # Youtube
> Discover the best YouTube channels, must-watch conference talks, and handpicked videos on information security.
## Channels ## Channels
- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA) - [0xdf](https://www.youtube.com/@0xdf)
- [LiveOverflow - Explore weird machines...](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) - [Assetnote - Surfacing Security Podcast](https://www.youtube.com/@assetnote2016)
- [Bug Bounty Reports Explained](https://www.youtube.com/@BugBountyReportsExplained)
- [Codingo](https://www.youtube.com/@codingo)
- [Critical Thinking - Bug Bounty Podcast](https://www.youtube.com/@criticalthinkingpodcast)
- [Embrace The Red - wunderwuzzi](https://www.youtube.com/@embracethered)
- [GynvaelEN - Podcasts about CTFs, computer security, programming and similar things.](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg) - [GynvaelEN - Podcasts about CTFs, computer security, programming and similar things.](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg)
- [John Hammond - Wargames and CTF writeups](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw)
- [Murmus CTF - Weekly live streamings](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A)
- [PwnFunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A)
- [OJ Reeves](https://www.youtube.com/channel/UCz2aqRQWMhJ4wcJq3XneqRg)
- [Hacksplained - A Beginner Friendly Guide to Hacking](https://www.youtube.com/c/hacksplained)
- [STÖK](https://www.youtube.com/c/STOKfredrik)
- [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)
- [Nahamsec](https://www.youtube.com/c/Nahamsec)
- [Hackerone](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw) - [Hackerone](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw)
- [The Hated one](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) - [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) - [Hacksplained - A Beginner Friendly Guide to Hacking](https://www.youtube.com/c/hacksplained)
- [Hak5](https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ) - [Hak5](https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ)
- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)
- [Jack Rhysider - Darknet Diaries](https://www.youtube.com/@JackRhysider)
- [John Hammond - Wargames and CTF writeups](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw)
- [Laluka - OffenSkill - Sharing is Caring](https://www.youtube.com/@TheLaluka)
- [LiveOverflow - Explore weird machines...](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
- [Murmus CTF - Weekly live streamings](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A)
- [Nahamsec](https://www.youtube.com/c/Nahamsec)
- [OJ Reeves](https://www.youtube.com/channel/UCz2aqRQWMhJ4wcJq3XneqRg)
- [PwnFunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A)
- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw)
- [STÖK](https://www.youtube.com/c/STOKfredrik)
- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)
- [The Hated one](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q)
- [xct hacks](https://www.youtube.com/@xct_de)
## Conferences
- [BlackAlps CyberSecurityConference](https://www.youtube.com/@blackalpscybersecurityconf8699)
- [DEFCON Conference](https://www.youtube.com/user/DEFCONConference/videos)
- [DEFCON Paris](https://www.youtube.com/@DEFCONParis)
- [Hack In Paris](https://www.youtube.com/user/hackinparis)
- [Hexacon](https://www.youtube.com/@hexacon4091)
- [INSOMNI'HACK](https://www.youtube.com/@scrtinsomnihack)
- [LeHack / HZV](https://www.youtube.com/user/hzvprod)
- [OffensiveCon](https://www.youtube.com/@OffensiveCon)
- [OrangeCon](https://www.youtube.com/@OrangeCon)
- [Recon Conference](https://www.youtube.com/@reconmtl)
- [Recon Village](https://www.youtube.com/@ReconVillage)
- [x33fcon Conference](https://www.youtube.com/c/x33fcon)
## Curated Videos
- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc)
- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4)
- [Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans Rosén](https://www.youtube.com/watch?v=KDo68Laayh8)
- [The Conscience of a Hacker](https://www.youtube.com/watch?v=0tEnnvZbYek)
- [HACKING GOOGLE Series](https://www.youtube.com/watch?v=aOGFY1R4QQ4) - [HACKING GOOGLE Series](https://www.youtube.com/watch?v=aOGFY1R4QQ4)
- [EP000: Operation Aurora | HACKING GOOGLE](https://youtu.be/przDcQe6n5o) - [EP000: Operation Aurora | HACKING GOOGLE](https://youtu.be/przDcQe6n5o)
- [EP001: Threat Analysis Group | HACKING GOOGLE](https://youtu.be/N7N4EC20-cM) - [EP001: Threat Analysis Group | HACKING GOOGLE](https://youtu.be/N7N4EC20-cM)
- [EP002: Detection and Response | HACKING GOOGLE](https://youtu.be/QZ0cpBocl3c) - [EP002: Detection and Response | HACKING GOOGLE](https://youtu.be/QZ0cpBocl3c)
- [EP003: Red Team | HACKING GOOGLE](https://youtu.be/TusQWn2TQxQ) - [EP003: Red Team | HACKING GOOGLE](https://youtu.be/TusQWn2TQxQ)
- [EP004: Bug Hunters | HACKING GOOGLE](https://youtu.be/IoXiXlCNoXg) - [EP004: Bug Hunters | HACKING GOOGLE](https://youtu.be/IoXiXlCNoXg)
- [EP005: Project Zero | HACKING GOOGLE](https://youtu.be/My_13FXODdU) - [EP005: Project Zero | HACKING GOOGLE](https://youtu.be/My_13FXODdU)
## Conferences
- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4)
- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc)
- [Security Fest 2016 The Secret life of a Bug Bounty Hunter - Frans Rosén](https://www.youtube.com/watch?v=KDo68Laayh8)
- [The Conscience of a Hacker](https://www.youtube.com/watch?v=0tEnnvZbYek)
- [Defcon Conference](https://www.youtube.com/user/DEFCONConference/videos)
- [x33fcon Conference](https://www.youtube.com/c/x33fcon)
- [Hack In Paris](https://www.youtube.com/user/hackinparis)
- [LeHack / HZV](https://www.youtube.com/user/hzvprod)