# Security Resources

* [A Graduate Course in Applied Cryptography](http://toc.cryptobook.us)
* [Crypto 101 - Crypto for everyone](https://www.crypto101.io)
* [CryptoParty Handbook](https://unglue.it/work/141611/)
* [Handbook of Applied Cryptography](http://cacr.uwaterloo.ca/hac/index.html)
* [How to deal with Passwords](https://github.com/MHM5000/pass)
* [Intrusion Detection Systems with Snort](http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf) (PDF)
* [OpenSSL Cookbook](https://www.feistyduck.com/library/openssl-cookbook/)
* [OWASP Testing Guide 4.2](https://github.com/OWASP/wstg/releases/download/v4.1/wstg-v4.1.pdf) (PDF)
* [OWASP Top 10 for .NET Developers](http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html)
* [Security Engineering](http://www.cl.cam.ac.uk/~rja14/book.html)
* [Computer and Information Security Handbook](https://drive.google.com/file/d/1abOjUYqSfQ1N4oNTeLRxURINO-wVfGHv/view) - Vacca (PDF)

## Reverse Engineering

* [BIOS Disassembly Ninjutsu Uncovered 1st Edition](http://bioshacking.blogspot.co.uk/2012/02/bios-disassembly-ninjutsu-uncovered-1st.html) - Darmawan Salihun (PDF)
* [Hacking the Xbox: An Introduction to Reverse Engineering](https://www.nostarch.com/xboxfree/) - Andrew "bunnie" Huang
* [iOS App Reverse Engineering](https://github.com/iosre/iOSAppReverseEngineering) (PDF)
* [Reverse Engineering for Beginners](http://beginners.re) - Dennis Yurichev (PDF)

\</br>

## Still Hungry?

| Repository                                                                                         | Description                                                                                                   |
| -------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------- |
| [Adversarial Machine Learning](https://github.com/yenchenlin/awesome-adversarial-machine-learning) | Curated list of awesome adversarial machine learning resources                                                |
| [AI Security](https://github.com/RandomAdversary/Awesome-AI-Security)                              | Curated list of AI security resources                                                                         |
| [API Security Checklist](https://github.com/shieldfy/API-Security-Checklist)                       | Checklist of the most important security countermeasures when designing, testing, and releasing your API      |
| [APT Notes](https://github.com/kbandla/APTnotes)                                                   | Various public documents, whitepapers and articles about APT campaigns                                        |
| [Bug Bounty Reference](https://github.com/ngalongc/bug-bounty-reference)                           | List of bug bounty write-up that is categorized by the bug nature                                             |
| [Cryptography](https://github.com/sobolevn/awesome-cryptography)                                   | Cryptography resources and tools                                                                              |
| [CTF Tool](https://github.com/SandySekharan/CTF-tool)                                              | List of Capture The Flag (CTF) frameworks, libraries, resources and softwares                                 |
| [CVE PoC](https://github.com/qazbnm456/awesome-cve-poc)                                            | List of CVE Proof of Concepts (PoCs)                                                                          |
| [Detection Lab](https://github.com/clong/DetectionLab)                                             | Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices |
| [Forensics](https://github.com/Cugu/awesome-forensics)                                             | List of awesome forensic analysis tools and resources                                                         |
| [Free Programming Books](https://github.com/EbookFoundation/free-programming-books)                | Free programming books for developers                                                                         |
| [Gray Hacker Resources](https://github.com/bt3gl/Gray-Hacker-Resources)                            | Useful for CTFs, wargames, pentesting                                                                         |
| [Hacker101](https://github.com/Hacker0x01/hacker101)                                               | A free class for web security by HackerOne                                                                    |
| [Infosec Getting Started](https://github.com/gradiuscypher/infosec_getting_started)                | A collection of resources, documentation, links, etc to help people learn about Infosec                       |
| [Infosec Reference](https://github.com/rmusser01/Infosec_Reference)                                | Information Security Reference That Doesn't Suck                                                              |
| [IOC](https://github.com/sroberts/awesome-iocs)                                                    | Collection of sources of indicators of compromise                                                             |
| [Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation)                    | A bunch of links related to Linux kernel fuzzing and exploitation                                             |
| [Lockpicking](https://github.com/meitar/awesome-lockpicking)                                       | Resources relating to the security and compromise of locks, safes, and keys.                                  |
| [Machine Learning for Cyber Security](https://github.com/jivoi/awesome-ml-for-cybersecurity)       | Curated list of tools and resources related to the use of machine learning for cyber security                 |
| [Payloads](https://github.com/foospidy/payloads)                                                   | Collection of web attack payloads                                                                             |
| [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings)                        | List of useful payloads and bypass for Web Application Security and Pentest/CTF                               |
| [Pentest Cheatsheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets)                     | Collection of the cheat sheets useful for pentesting                                                          |
| [Pentest Wiki](https://github.com/nixawk/pentest-wiki)                                             | A free online security knowledge library for pentesters / researchers                                         |
| [Probable Wordlists](https://github.com/berzerk0/Probable-Wordlists)                               | Wordlists sorted by probability originally created for password generation and testing                        |
| [Resource List](https://github.com/FuzzySecurity/Resource-List)                                    | Collection of useful GitHub projects loosely categorised                                                      |
| [Reverse Engineering](https://github.com/onethawt/reverseengineering-reading-list)                 | List of Reverse Engineering articles, books, and papers                                                       |
| [RFSec-ToolKit](https://github.com/cn0xroot/RFSec-ToolKit)                                         | Collection of Radio Frequency Communication Protocol Hacktools                                                |
| [Security Cheatsheets](https://github.com/andrewjkerr/security-cheatsheets)                        | Collection of cheatsheets for various infosec tools and topics                                                |
| [Security List](https://github.com/zbetcheckin/Security_list)                                      | Great security list for fun and profit                                                                        |
| [Shell](https://github.com/alebcay/awesome-shell)                                                  | List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell            |
| [ThreatHunter-Playbook](https://github.com/Cyb3rWard0g/ThreatHunter-Playbook)                      | A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns          |
| [Web Security](https://github.com/qazbnm456/awesome-web-security)                                  | Curated list of Web Security materials and resources                                                          |


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://resources.dscvit.com/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
