bookmarks

Infosec resource list

A personal repository of resources and tools for learning about infosec and hacking

A personal list of various resources for those who are interested in learning about infosec and hacking and keeping themselves up to date. This is by no means a complete nor fresh list, but I occasionally add entries to lists.

GitHub

124 stars
5 watching
18 forks
last commit: 11 days ago
hackinginfosecsecurity

Related projects:

Repository Description Stars
inputsh/kako-postati-haker A collection of articles and resources about hacking and computer security, aimed at educating individuals about the hobby and profession 1
phiat/markdown-lists A collection of curated lists of books, tools, and other resources organized in markdown format. 0
hackershare/hackershare A social bookmarking service and community platform for hackers to share and discover content 597
fuzzysecurity/resource-list A curated collection of exploit tools and frameworks used in penetration testing and security research. 332
viralk/uses A personal record of essential tools and gear used daily by an individual 0
zbetcheckin/security_list A curated collection of security resources for developers and security professionals 1,737
hackercollective/resources A personal collection of resources and tools for learning and development 159
tonyday567/numhask A Haskell numeric prelude providing a structured approach to numbers and operations. 68
arunmagesh/hw_hacking_cheatsheet A resource for understanding hardware hacking concepts and techniques in an easily digestible format. 147
saberma/ruby-dev-bookmarks A curated list of Ruby development resources and tools 414
openlists/otherlists A curated collection of resources and lists on various topics, including science, coding, neuroscience, and industry. 5
justjavac/free-programming-books-zh_cn A comprehensive collection of programming book indexes and resources in Chinese. 111,788
cybersecurityup/mitre-attack-matrix A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. 18
yogeshkk/k8spurger A script that scans Kubernetes clusters for unused resources and reports them in a usable format. 254
kasperskylab/klara Helps Threat Intelligence researchers hunt for new malware by efficiently scanning large collections of files with Yara rules 697