Awesome Hacking Resources / Table of Contents / Learning the Skills |
| CS 642: Intro to Computer Security | | | |
| CyberSec WTF | | | |
| Cybrary | | | |
| Free Cyber Security Training | | | |
| Hak5 | | | |
| Hopper's Roppers Security Training | | | |
| Learning Exploitation with Offensive Computer Security 2.0 | | | |
| Mind Maps | | | |
| MIT OCW 6.858 Computer Systems Security | | | |
| OffensiveComputerSecurity | | | |
| OWASP top 10 web security risks | | | |
| SecurityTube | | | |
| Seed Labs | | | |
| TryHackMe | | | |
Awesome Hacking Resources / Table of Contents / YouTube Channels |
| 0patch by ACROS Security | | | |
| BlackHat | | | |
| Christiaan008 | | | |
| Detectify | | | |
| Hak5 | | | |
| Kaspersky Lab | | | |
| Metasploit | | | |
| ntop | | | |
| nVisium | | | |
| OpenNSM | | | |
| OWASP | | | |
| Rapid7 | | | |
| Securelist | | | |
| Segment Security | | | |
| SocialEngineerOrg | | | |
| Sonatype | | | |
| SophosLabs | | | |
| Sourcefire | | | |
| Station X | | | |
| Synack | | | |
| TippingPoint Zero Day Initiative | | | |
| Tripwire, Inc. | | | |
| Vincent Yiu | | | |
| 44contv | | | |
| MIT OCW 6.858 Computer Systems Security | | | |
| BruCON Security Conference | | | |
| BSides Manchester | | | |
| BSidesAugusta | | | |
| CarolinaCon | | | |
| Cort Johnson | | | |
| DevSecCon | | | |
| Garage4Hackers - Information Security | | | |
| HACKADAY | | | |
| Hack In The Box Security Conference | | | |
| Hack in Paris | | | |
| Hacklu | | | |
| Hacktivity | | | |
| Hardwear.io | | | |
| IEEE Symposium on Security and Privacy | | | |
| LASCON | | | |
| leHACK | | | |
| Marcus Niemietz | | | |
| Media.ccc.de | | | |
| NorthSec | | | |
| Pancake Nopcode | | | |
| Psiinon | | | |
| SJSU Infosec | | | |
| Secappdev.org | | | |
| Security Fest | | | |
| SecurityTubeCons | | | |
| ToorCon | | | |
| USENIX Enigma Conference | | | |
| ZeroNights | | | |
| 0x41414141 | | | |
| Adrian Crenshaw | | | |
| Corey Nachreiner | | | |
| BalCCon - Balkan Computer Congress | | | |
| danooct1 | | | |
| DedSec | | | |
| DEFCON Conference | | | |
| DemmSec | | | |
| Derek Rook - CTF/Boot2root/wargames Walkthrough | | | |
| Don Does 30 | | | |
| Error 404 Cyber News | | | |
| Geeks Fort - KIF | | | |
| GynvaelEN | | | |
| HackerSploit | | | |
| HACKING TUTORIALS | | | |
| iExplo1t | | | |
| JackkTutorials | | | |
| John Hammond | | | |
| Latest Hacking News | | | |
| LionSec | | | |
| LiveOverflow | | | |
| Metasploitation | | | |
| NetSecNow | | | |
| Open SecurityTraining | | | |
| Pentester Academy TV | | | |
| Penetration Testing in Linux | | | |
| rwbnetsec | | | |
| Samy Kamkar's Applied Hacking | | | |
| SecureNinjaTV | | | |
| Security Weekly | | | |
| Seytonic | | | |
| Shozab Haxor | | | |
| SSTec Tutorials | | | |
| Tradecraft Security Weekly | | | |
| Troy Hunt | | | |
| Waleed Jutt | | | |
| webpwnized | | | |
| Zer0Mem0ry | | | |
| LionSec | | | |
| Adrian Crenshaw | | | |
| HackerSploit | | | |
| Derek Rook - CTF/Boot2root/wargames Walkthrough | | | |
| Tradecraft Security Weekly | | | |
| IPPSec | | | |
| The Daily Swig | | | |
Awesome Hacking Resources / Table of Contents / Sharpening Your Skills |
| Backdoor | | | |
| The cryptopals crypto challenges | | | |
| Challenge Land | | | |
| Crackmes.de Archive (2011-2015) | | | |
| Crackmes.one | | | |
| CTFLearn | | | |
| CTFs write-ups | | | |
| CTF365 | | | |
| The enigma group | | | |
| Exploit exercises | | | |
| Google CTF | 4,556 | 11 months ago | |
| Google CTF 2019 | | | |
| Google's XSS game | | | |
| Hack The Box | | | |
| Hacker test | | | |
| Hacker Gateway | | | |
| Hacksplaining | | | |
| hackburger.ee | | | |
| Hack.me | | | |
| Hack this site! | | | |
| knock.xss.moe | | | |
| Lin.security | | | |
| noe.systems | | | |
| Over the wire | | | |
| Participating Challenge Sites | | | |
| PentesterLab | | | |
| Pentestit | | | |
| Pentest Practice | | | |
| Pentest.training | | | |
| PicoCTF | | | |
| pwnable.kr | | | |
| pwnable.tw | | | |
| Ringzer0 Team | | | |
| ROP Emporium | | | |
| SmashTheStack | | | |
| Shellter Labs | | | |
| Solve Me | | | |
| Vulnhub | | | |
| websec.fr | | | |
| tryhackme | | | |
| webhacking.kr | | | |
| Stereotyped Challenges | | | |
| Stripe CTF 2.0 | | | |
| Windows / Linux Local Privilege Escalation Workshop | 1,893 | about 3 years ago | |
| Hacking Articles | | | |
| Hacker101 CTF | | | |
| Hacking Lab | | | |
| Portswigger | | | |
Awesome Hacking Resources / Table of Contents / Reverse Engineering, Buffer Overflow and Exploit Development |
| A Course on Intermediate Level Linux Exploitation | 990 | about 5 years ago | |
| Analysis and exploitation (unprivileged) | | | |
| Binary hacking | | | |
| Buffer Overflow Exploitation Megaprimer for Linux | | | |
| Corelan tutorials | | | |
| Exploit tutorials | | | |
| Exploit development | | | |
| flAWS challenge | | | |
| Introduction to ARM Assembly Basics | | | |
| Introductory Intel x86 | | | |
| Lena's Reversing for Newbies (Complete) | | | |
| Linux (x86) Exploit Development Series | | | |
| Megabeets journey into Radare2 | | | |
| Modern Binary Exploitation - CSCI 4968 | 5,547 | almost 4 years ago | |
| Recon.cx - reversing conference | | | |
| Reverse Engineering for Beginners | | | |
| Reverse engineering reading list | 2,369 | over 2 years ago | |
| Reverse Engineering challenges | | | |
| Reverse Engineering for beginners (GitHub project) | | | |
| Reverse Engineering Malware 101 | | | |
| Reverse Engineering Malware 102 | | | |
| reversing.kr challenges | | | |
| Shell storm | | | |
| Shellcode Injection | | | |
| Micro Corruption — Assembly | | | |
Awesome Hacking Resources / Table of Contents / Privilege Escalation |
| 4 Ways get linux privilege escalation | | | |
| A GUIDE TO LINUX PRIVILEGE ESCALATION | | | |
| Abusing SUDO (Linux Privilege Escalation) | | | |
| AutoLocalPrivilegeEscalation | 487 | about 4 years ago | |
| Basic linux privilege escalation | | | |
| Common Windows Privilege Escalation Vectors | | | |
| Editing /etc/passwd File for Privilege Escalation | | | |
| Linux Privilege Escalation | | | |
| Linux Privilege Escalation Check Script | 1,590 | almost 4 years ago | |
| Linux Privilege Escalation Scripts | | | |
| Linux Privilege Escalation Using PATH Variable | | | |
| Linux Privilege Escalation using Misconfigured NFS | | | |
| Linux Privilege Escalation via Dynamically Linked Shared Object Library | | | |
| Local Linux Enumeration & Privilege Escalation Cheatsheet | | | |
| OSCP - Windows Priviledge Escalation | | | |
| Privilege escalation for Windows and Linux | | | |
| Privilege escalation linux with live example | | | |
| Reach the root | | | |
| RootHelper | 485 | over 4 years ago | |
| Unix privesc checker | | | |
| Windows exploits, mostly precompiled. | 1,837 | about 5 years ago | |
| Windows Privilege Escalation | | | |
| Windows Privilege Escalation | | | |
| Windows privilege escalation checker | 2,515 | about 1 year ago | |
| Windows Privilege Escalation Fundamentals | | | |
| Windows Privilege Escalation Guide | | | |
| Windows Privilege Escalation Methods for Pentesters | | | |
Awesome Hacking Resources / Table of Contents / Malware Analysis |
| Malware traffic analysis | | | |
| Malware Analysis - CSCI 4976 | 3,776 | about 3 years ago | |
| https://www.badbinaries.com/ | | | [Bad Binaries] ( ) |
Awesome Hacking Resources / Table of Contents / Network Scanning / Reconnaissance |
| Foot Printing with WhoIS/DNS records | | | |
| Google Dorks/Google Hacking | | | |
Awesome Hacking Resources / Table of Contents / Vulnerable Web Application |
| bWAPP | | | |
| Damn Small Vulnerable Web | 794 | over 1 year ago | |
| Damn Vulnerable Web Application (DVWA) | | | |
| Google Gruyere | | | |
| OWASP Broken Web Applications Project | 298 | over 1 year ago | |
| OWASP Hackademic Challenges project | 319 | about 5 years ago | |
| OWASP Mutillidae II | | | |
| OWASP Juice Shop | 10,585 | 11 months ago | |
| WebGoat: A deliberately insecure Web Application | 7,096 | 11 months ago | |
Awesome Hacking Resources / Table of Contents / Vulnerable OS |
| General Test Environment Guidance | | | |
| Metasploitable2 (Linux) | | | |
| Metasploitable3 | 4,812 | over 1 year ago | [ ] |
| Vulnhub | | | |
Awesome Hacking Resources / Table of Contents / Linux Penetration Testing OS |
| Android Tamer | | | |
| BackBox | | | |
| BlackArch | | | |
| Bugtraq | | | |
| Docker for pentest | 732 | over 3 years ago | |
| Kali | | | |
| LionSec Linux | | | |
| Parrot | | | |
| Pentoo | | | |
Awesome Hacking Resources / Table of Contents / Exploits |
| 0day.today | | | |
| Exploit Database | | | |
| CXsecurity | | | |
| Snyk Vulnerability DB | | | |
Awesome Hacking Resources / Table of Contents / Forums |
| 0x00sec | | | |
| Antichat | | | |
| CODEBY.NET | | | |
| EAST Exploit database | | | |
| Greysec | | | |
| Hackforums | | | |
| 4Hat Day | | | |
| CaveiraTech | | | |
Awesome Hacking Resources / Table of Contents / Archived Security Conference Videos |
| InfoCon.org | | | |
| Irongeek | | | |
| infocondb.org | | | |
Awesome Hacking Resources / Table of Contents / Online Communities |
| Hacktoday | | | |
| Hack+ | | | |
| MPGH | | | |
Awesome Hacking Resources / Table of Contents / Online News Sources |
| InfoSec | | | |
| Recent Hash Leaks | | | |
| Security Intell | | | |
| Threatpost | | | |
| Secjuice | | | |
| The Hacker News | | | |