Security Resources

Reverse Engineering

</br>

Still Hungry?

Repository

Description

Curated list of awesome adversarial machine learning resources

Curated list of AI security resources

Checklist of the most important security countermeasures when designing, testing, and releasing your API

Various public documents, whitepapers and articles about APT campaigns

List of bug bounty write-up that is categorized by the bug nature

Cryptography resources and tools

List of Capture The Flag (CTF) frameworks, libraries, resources and softwares

List of CVE Proof of Concepts (PoCs)

Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices

List of awesome forensic analysis tools and resources

Free programming books for developers

Useful for CTFs, wargames, pentesting

A free class for web security by HackerOne

A collection of resources, documentation, links, etc to help people learn about Infosec

Information Security Reference That Doesn't Suck

Collection of sources of indicators of compromise

A bunch of links related to Linux kernel fuzzing and exploitation

Resources relating to the security and compromise of locks, safes, and keys.

Curated list of tools and resources related to the use of machine learning for cyber security

Collection of web attack payloads

List of useful payloads and bypass for Web Application Security and Pentest/CTF

Collection of the cheat sheets useful for pentesting

A free online security knowledge library for pentesters / researchers

Wordlists sorted by probability originally created for password generation and testing

Collection of useful GitHub projects loosely categorised

List of Reverse Engineering articles, books, and papers

Collection of Radio Frequency Communication Protocol Hacktools

Collection of cheatsheets for various infosec tools and topics

Great security list for fun and profit

List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell

A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns

Curated list of Web Security materials and resources

Last updated