update lists
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Hacking -An Amazing Project [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Hacking -An Amazing Project [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12mA curated list of awesome Hacking. Inspired by [39m[38;5;14m[1mawesome-machine-learning[0m[38;5;12m (https://github.com/josephmisiti/awesome-machine-learning/)[39m
|
||||
|
||||
@@ -46,12 +46,12 @@
|
||||
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mSystem[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mSystem[0m
|
||||
|
||||
[38;2;255;187;0m[4mTutorials[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers Computing Fundamentals[0m[38;5;12m (https://www.roppers.org/courses/fundamentals)[39m
|
||||
[48;5;235m[38;5;249m* Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student with no prior technical knowledge to be confident in their ability to learn anything and continue their security e[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249mducation. Full text available as a **gitbook** (https://www.hoppersroppers.org/fundamentals/).[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249m* Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student with no prior technical knowledge to be confident in their ability to learn anything and continue their security education. [49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[48;5;235m[38;5;249mFull text available as a **gitbook** (https://www.hoppersroppers.org/fundamentals/).[49m[39m[48;5;235m[38;5;249m [49m[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCorelan Team's Exploit writing tutorial[0m[38;5;12m (https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Writing Tutorials for Pentesters[0m[38;5;12m (http://web.archive.org/web/20140916085343/http://www.punter-infosec.com/exploit-writing-tutorials-for-pentesters/)[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUnderstanding the basics of Linux Binary Exploitation[0m[38;5;12m (https://github.com/r0hi7/BinExp)[39m
|
||||
@@ -88,7 +88,7 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit database[0m[38;5;12m (https://www.exploit-db.com/) - An ultimate archive of exploits and vulnerable software[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mReverse Engineering[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mReverse Engineering[0m
|
||||
|
||||
[38;2;255;187;0m[4mTutorials[0m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBegin RE: A Reverse Engineering Tutorial Workshop[0m[38;5;12m (https://www.begin.re/the-workshop)[39m
|
||||
@@ -176,11 +176,11 @@
|
||||
[38;2;255;187;0m[4mGeneral[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Malware[0m[38;5;12m (http://www.offensivecomputing.net/)[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mWeb[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mWeb[0m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSpyse[0m[38;5;12m [39m[38;5;12m(https://spyse.com/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mData[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mservice[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcollects[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mOSINT.[39m[38;5;12m [39m[38;5;12mProvided[39m[38;5;12m [39m[38;5;12minfo:[39m[38;5;12m [39m[38;5;12mIPv4[39m[38;5;12m [39m[38;5;12mhosts,[39m[38;5;12m [39m[38;5;12mdomains/whois,[39m[38;5;12m [39m[38;5;12mports/banners/protocols,[39m[38;5;12m [39m[38;5;12mtechnologies,[39m[38;5;12m [39m[38;5;12mOS,[39m[38;5;12m [39m[38;5;12mAS,[39m[38;5;12m [39m[38;5;12mmaintains[39m[38;5;12m [39m[38;5;12mhuge[39m[38;5;12m [39m[38;5;12mSSL/TLS[39m[38;5;12m [39m[38;5;12mDB,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore...[39m[38;5;12m [39m[38;5;12mAll[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m
|
||||
[38;5;12mstored[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mits[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mdatabase[39m[38;5;12m [39m[38;5;12mallowing[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mwithout[39m[38;5;12m [39m[38;5;12mscanning.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSpyse[0m[38;5;12m [39m[38;5;12m(https://spyse.com/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mData[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mservice[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcollects[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12minfo[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mOSINT.[39m[38;5;12m [39m[38;5;12mProvided[39m[38;5;12m [39m[38;5;12minfo:[39m[38;5;12m [39m[38;5;12mIPv4[39m[38;5;12m [39m[38;5;12mhosts,[39m[38;5;12m [39m[38;5;12mdomains/whois,[39m[38;5;12m [39m[38;5;12mports/banners/protocols,[39m[38;5;12m [39m[38;5;12mtechnologies,[39m[38;5;12m [39m[38;5;12mOS,[39m[38;5;12m [39m[38;5;12mAS,[39m[38;5;12m [39m[38;5;12mmaintains[39m[38;5;12m [39m[38;5;12mhuge[39m[38;5;12m [39m[38;5;12mSSL/TLS[39m[38;5;12m [39m[38;5;12mDB,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore...[39m[38;5;12m [39m[38;5;12mAll[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mstored[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m
|
||||
[38;5;12mits[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mdatabase[39m[38;5;12m [39m[38;5;12mallowing[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mwithout[39m[38;5;12m [39m[38;5;12mscanning.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msqlmap[0m[38;5;12m (https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNoSQLMap[0m[38;5;12m (https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtools.web-max.ca[0m[38;5;12m (http://tools.web-max.ca/encode_decode.php) - base64 base85 md4,5 hash, sha1 hash encoding/decoding[39m
|
||||
@@ -200,7 +200,7 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mStrong node.js[0m[38;5;12m (https://github.com/jesusprubio/strong-node) - An exhaustive checklist to assist in the source code security analysis of a node.js web service.[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mNetwork[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mNetwork[0m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetworkMiner[0m[38;5;12m (http://www.netresec.com/?page=NetworkMiner) - A Network Forensic Analysis Tool (NFAT)[39m
|
||||
@@ -225,7 +225,7 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRustScan[0m[38;5;12m (https://github.com/rustscan/rustscan) - Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPETEP[0m[38;5;12m (https://github.com/Warxim/petep) - Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mForensic[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mForensic[0m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAutopsy[0m[38;5;12m (http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to [39m[38;5;14m[1mThe Sleuth Kit[0m[38;5;12m (http://www.sleuthkit.org/sleuthkit/index.php) and other digital forensics tools[39m
|
||||
@@ -234,10 +234,10 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmalzilla[0m[38;5;12m (http://malzilla.sourceforge.net/) - Malware hunting tool[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIPED - Indexador e Processador de Evidências Digitais[0m[38;5;12m (https://servicos.dpf.gov.br/ferramentas/IPED/) - Brazilian Federal Police Tool for Forensic Investigation[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCyLR[0m[38;5;12m (https://github.com/orlikoski/CyLR) - NTFS forensic image collector [39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCAINE[0m[38;5;12m [39m[38;5;12m(https://www.caine-live.net/)-[39m[38;5;12m [39m[38;5;12mCAINE[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mUbuntu-based[39m[38;5;12m [39m[38;5;12mapp[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12moffers[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomplete[39m[38;5;12m [39m[38;5;12mforensic[39m[38;5;12m [39m[38;5;12menvironment[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mprovides[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mgraphical[39m[38;5;12m [39m[38;5;12minterface.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mintegrated[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mexisting[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mmodule.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mautomatically[39m[38;5;12m [39m
|
||||
[38;5;12mextracts[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtimeline[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mRAM.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCAINE[0m[38;5;12m [39m[38;5;12m(https://www.caine-live.net/)-[39m[38;5;12m [39m[38;5;12mCAINE[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mUbuntu-based[39m[38;5;12m [39m[38;5;12mapp[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12moffers[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomplete[39m[38;5;12m [39m[38;5;12mforensic[39m[38;5;12m [39m[38;5;12menvironment[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mprovides[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mgraphical[39m[38;5;12m [39m[38;5;12minterface.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mintegrated[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mexisting[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mmodule.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mautomatically[39m[38;5;12m [39m[38;5;12mextracts[39m[38;5;12m [39m[38;5;12ma[39m
|
||||
[38;5;12mtimeline[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mRAM.[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mCryptography[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mCryptography[0m
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mxortool[0m[38;5;12m (https://github.com/hellman/xortool) - A tool to analyze multi-byte XOR cipher[39m
|
||||
@@ -246,7 +246,7 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCiphey[0m[38;5;12m (https://github.com/ciphey/ciphey) - Automated decryption tool using artificial intelligence & natural language processing.[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mWargame[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mWargame[0m
|
||||
|
||||
[38;2;255;187;0m[4mSystem[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOverTheWire - Semtex[0m[38;5;12m (http://overthewire.org/wargames/semtex/)[39m
|
||||
@@ -285,7 +285,7 @@
|
||||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntigriti[0m[38;5;12m (https://www.intigriti.com/) Europe's #1 ethical hacking and bug bounty program.[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mCTF[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mCTF[0m
|
||||
|
||||
[38;2;255;187;0m[4mCompetition[0m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDEF CON[0m[38;5;12m (https://legitbs.net/)[39m
|
||||
@@ -313,10 +313,10 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRookit Arsenal[0m[38;5;12m (https://amzn.com/144962636X) - OS RE and rootkit development[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Cheat Sheets[0m[38;5;12m (https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Collection of cheat sheets useful for pentesting[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMovies For Hackers[0m[38;5;12m (https://github.com/k4m4/movies-for-hackers) - A curated list of movies every hacker & cyberpunk must watch.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers[0m[38;5;14m[1m [0m[38;5;14m[1mCTF[0m[38;5;14m[1m [0m[38;5;14m[1mFundamentals[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;12m [39m[38;5;12m(https://www.roppers.org/courses/ctf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mcourse[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mstudent[39m[38;5;12m [39m[38;5;12mcrushing[39m[38;5;12m [39m[38;5;12mCTFs[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mpossible.[39m[38;5;12m [39m[38;5;12mTeaches[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmentality[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mskills[39m[38;5;12m [39m[38;5;12mrequired[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcrypto,[39m[38;5;12m [39m[38;5;12mforensics,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m[38;5;12m [39m[38;5;12mFull[39m[38;5;12m [39m[38;5;12mtext[39m[38;5;12m [39m
|
||||
[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgitbook[0m[38;5;12m [39m[38;5;12m(https://www.hoppersroppers.org/ctf/).[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers[0m[38;5;14m[1m [0m[38;5;14m[1mCTF[0m[38;5;14m[1m [0m[38;5;14m[1mFundamentals[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;12m [39m[38;5;12m(https://www.roppers.org/courses/ctf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mcourse[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mstudent[39m[38;5;12m [39m[38;5;12mcrushing[39m[38;5;12m [39m[38;5;12mCTFs[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mpossible.[39m[38;5;12m [39m[38;5;12mTeaches[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmentality[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mskills[39m[38;5;12m [39m[38;5;12mrequired[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcrypto,[39m[38;5;12m [39m[38;5;12mforensics,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m[38;5;12m [39m[38;5;12mFull[39m[38;5;12m [39m[38;5;12mtext[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m
|
||||
[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgitbook[0m[38;5;12m [39m[38;5;12m(https://www.hoppersroppers.org/ctf/).[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mOS[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mOS[0m
|
||||
|
||||
[38;2;255;187;0m[4mOnline resources[0m
|
||||
|
||||
@@ -325,7 +325,7 @@
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity @ Distrowatch[0m[38;5;12m (http://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing and keeping up to date with open source operating systems[39m
|
||||
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPost exploitation[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mPost exploitation[0m
|
||||
|
||||
[38;2;255;187;0m[4mtools[0m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mempire[0m[38;5;12m (https://github.com/EmpireProject/Empire) - A post exploitation framework for powershell and python.[39m
|
||||
@@ -333,11 +333,12 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerSploit[0m[38;5;12m (https://github.com/PowerShellMafia/PowerSploit) - A PowerShell post exploitation framework[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mebowla[0m[38;5;12m (https://github.com/Genetic-Malware/Ebowla) - Framework for Making Environmental Keyed Payloads[39m
|
||||
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mETC[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mETC[0m
|
||||
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecTools[0m[38;5;12m (http://sectools.org/) - Top 125 Network Security Tools[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mFundamentals[0m[38;5;12m [39m[38;5;12m(https://www.roppers.org/courses/security)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mcourse[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mteaches[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbeginner[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mworks[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mreal[39m[38;5;12m [39m[38;5;12mworld.[39m[38;5;12m [39m[38;5;12mLearn[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtheory[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexecute[39m[38;5;12m [39m[38;5;12mdefensive[39m[38;5;12m [39m[38;5;12mmeasures[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mprepared[39m
|
||||
[38;5;12magainst[39m[38;5;12m [39m[38;5;12mthreats[39m[38;5;12m [39m[38;5;12monline[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mphysical[39m[38;5;12m [39m[38;5;12mworld.[39m[38;5;12m [39m[38;5;12mFull[39m[38;5;12m [39m[38;5;12mtext[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgitbook[0m[38;5;12m [39m[38;5;12m(https://www.hoppersroppers.org/security/).[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mFundamentals[0m[38;5;12m [39m[38;5;12m(https://www.roppers.org/courses/security)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mcourse[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mteaches[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbeginner[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mworks[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mreal[39m[38;5;12m [39m[38;5;12mworld.[39m[38;5;12m [39m[38;5;12mLearn[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtheory[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexecute[39m[38;5;12m [39m[38;5;12mdefensive[39m[38;5;12m [39m[38;5;12mmeasures[39m[38;5;12m [39m[38;5;12mso[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mprepared[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m
|
||||
[38;5;12mthreats[39m[38;5;12m [39m[38;5;12monline[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mphysical[39m[38;5;12m [39m[38;5;12mworld.[39m[38;5;12m [39m[38;5;12mFull[39m[38;5;12m [39m[38;5;12mtext[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgitbook[0m[38;5;12m [39m[38;5;12m(https://www.hoppersroppers.org/security/).[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers Practical Networking[0m[38;5;12m (https://www.roppers.org/courses/networking) - A hands-on, wildly practical introduction to networking and making packets dance. No wasted time, no memorizing, just learning the fundamentals.[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRawsec's CyberSecurity Inventory[0m[38;5;12m (https://inventory.raw.pm/) - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([39m[38;5;14m[1mSource[0m[38;5;12m (https://gitlab.com/rawsec/rawsec-cybersecurity-list))[39m
|
||||
[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Cyberclopaedia[0m[38;5;12m (https://cr0mll.github.io/cyberclopaedia/) - The open-source encyclopedia of cybersecurity. [39m[38;5;14m[1mGitHub Repository[0m[38;5;12m (https://github.com/cr0mll/cyberclopaedia)[39m
|
||||
[38;5;12mhacking Github: https://github.com/carpedm20/awesome-hacking[39m
|
||||
|
||||
Reference in New Issue
Block a user