Skip to content

I come across a lot of resources when I am reading papers/blogs/resources for my studies. I will try to my best to organize them together here

License

Notifications You must be signed in to change notification settings

psyklopp/Learn-to-Hack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 

Repository files navigation

Learn to Hack || Hack to Learn 🥷

I come across a lot of resources when I am reading papers/blogs/resources for my studies. I will try to my best to organize them together here. It's not only about penetration testing, blue-teaming or red-teaming, I have also included links to resources where you can learn about cryptography and the maths behind it.

👓 Protect your Privacy

  1. Data Broker Remover Tool - Open source tool to generate and send emails to data brokers to remove your details
More...
  1. Privacy Rights - View data brokers database.

  2. Cover Your Tracks - Tool to show the data a website can use to fingerprint your browser.

🗺️ Cybersecurity Roadmap

  1. Cybersecurity - Roadmap.sh - Don't know where to start? Go here.
  2. Certification Roadmap - With prices and levels.

🚩 Capture the Flag (CTF) and Wargames

  1. try to decrypt!
  2. OverTheWire

⛳ Instructor-Led\Self-paced training

  1. Antisyphon Training

💻 Platforms - Hands-on labs, exercises

  1. TryHackMe
  2. HackTheBox
  3. CyberDefenders
  4. PentesterAcademy
  5. PentesterLab
  6. PortSwigger
  7. Cybrary
  8. Qualys
  9. Cisco Networking Academy
  10. Pwned Labs

🗞️ Companies - offering certifications

  1. OffSec 🍯
  2. Security Blue Team
  3. TCM Security
  4. INE Security
  5. The SecOps Group

📋 Certifications and cost

  1. Microsoft Certified: Security, Compliance, and Identity Fundamentals
  2. Canonical Ubuntu Essentials

🔪 Research and Reconnaissance

  1. Censys
  2. DNSDumpster - DNS lookup and more

🪟 Windows OS

  1. Living Off The Land binaries

🐧Linux OS

  1. GTFOBins

😼 Vulnerable machines

  1. VulnHub
  2. Exploit.Education
  3. HackingHub

🔑 Vulnerability database

  1. VulDB
  2. NVD - National Vulnerability Database
  3. CVE - MITRE

🐛 Exploit Database and Development

  1. Exploit Database

🔎 Analyse suspicious files, domains, IPs and URLs

  1. VirusTotal
  2. urlscan.io
  3. OPSWAT - MetaDefender

🐡 Phishing Database

  1. PhishTank

🗃️ Malware research

  1. Any.RUN - Sandbox
  2. MalAPI - Windows APIs
  3. Malpedia

🧭 Cybersecurity Frameworks and Resources

  1. MITRE ATT&CK
  2. OWASP

🖋️ Crontab

  1. Crontab.guru
  2. Crontab Generator

✍️ Shell/Command-line

  1. ExplainShell

🧰 Misc. Tools

  1. CyberChef - CTF Tool💡 Explore data formats, useful for analysis and decoding of data.
  2. Living Off Trusted Sites (LOTS) Project - Legitimate domains you can use when conducting phishing, C&C, exfiltration and downloading tools to evade detection.

📔 Theory - Lecture notes

  1. Perfect Secrecy - IISc Bangalore, IN
  2. Hash Functions, Merkle-Damgaard, Random Oracle - Northeastern University
  3. Lattice Based Cryptography for Beginners - Notes

About

I come across a lot of resources when I am reading papers/blogs/resources for my studies. I will try to my best to organize them together here

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published