Security Resources
OWASP Testing Guide 4.2 (PDF)
Computer and Information Security Handbook - Vacca (PDF)
Reverse Engineering
BIOS Disassembly Ninjutsu Uncovered 1st Edition - Darmawan Salihun (PDF)
Hacking the Xbox: An Introduction to Reverse Engineering - Andrew "bunnie" Huang
Reverse Engineering for Beginners - Dennis Yurichev (PDF)
</br>
Still Hungry?
Repository | Description |
Curated list of awesome adversarial machine learning resources | |
Curated list of AI security resources | |
Checklist of the most important security countermeasures when designing, testing, and releasing your API | |
Various public documents, whitepapers and articles about APT campaigns | |
List of bug bounty write-up that is categorized by the bug nature | |
Cryptography resources and tools | |
List of Capture The Flag (CTF) frameworks, libraries, resources and softwares | |
List of CVE Proof of Concepts (PoCs) | |
Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices | |
List of awesome forensic analysis tools and resources | |
Free programming books for developers | |
Useful for CTFs, wargames, pentesting | |
A free class for web security by HackerOne | |
A collection of resources, documentation, links, etc to help people learn about Infosec | |
Information Security Reference That Doesn't Suck | |
Collection of sources of indicators of compromise | |
A bunch of links related to Linux kernel fuzzing and exploitation | |
Resources relating to the security and compromise of locks, safes, and keys. | |
Curated list of tools and resources related to the use of machine learning for cyber security | |
Collection of web attack payloads | |
List of useful payloads and bypass for Web Application Security and Pentest/CTF | |
Collection of the cheat sheets useful for pentesting | |
A free online security knowledge library for pentesters / researchers | |
Wordlists sorted by probability originally created for password generation and testing | |
Collection of useful GitHub projects loosely categorised | |
List of Reverse Engineering articles, books, and papers | |
Collection of Radio Frequency Communication Protocol Hacktools | |
Collection of cheatsheets for various infosec tools and topics | |
Great security list for fun and profit | |
List of awesome command-line frameworks, toolkits, guides and gizmos to make complete use of shell | |
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns | |
Curated list of Web Security materials and resources |
Last updated