User Tools

Site Tools


cybersecurity

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
cybersecurity [2025/09/01 15:31] – created admincybersecurity [2025/09/04 13:41] (current) admin
Line 2: Line 2:
  
 [[https://cheatsheetseries.owasp.org/Glossary.html|cheatsheets for protecting your service]] [[https://cheatsheetseries.owasp.org/Glossary.html|cheatsheets for protecting your service]]
 +
 +Learning resources
 +  * [[https://github.com/notthehiddenwiki/NTHW|Not The Hidden Wiki]] - huge repository of learning resources
 +  * [[https://pwn.college/|pwn.college]]
 +  * [[https://maxkersten.nl/binary-analysis-course/|Binary Analysis Course]]
 +  * [[https://www.wechall.net/|WeChall]]
 +  * [[https://cryptohack.org/|CryptoHack]]
 +  * [[https://cryptopals.com/|the cryptopals crypto challenges]]
 +  * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]
 +  * [[https://guyinatuxedo.github.io/|Nightmare]] - intro to binay exploitation
 +
 +Training
 +  * [[http://www.itsecgames.com/|bWAPP, a buggy web application]]
 +  * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty
 +  * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges
 +  * [[https://github.com/hacksysteam/HackSysExtremeVulnerableDriver]]
 +  * [[https://crackmes.one/]]
 +  * [[https://www.smashthestack.org/]]
 +  * [[https://io.netgarage.org/]]
 +  * [[https://archive.ooo/|archive.ooo]] - archived challenges from DEFCON
 +
 +Wordlists
 +  * [[https://github.com/berzerk0/Probable-Wordlists|Probable Wordlists]] - passwords sorted by popularity
 +  * [[https://weakpass.com/|Weakpass]]
 +
 +For beginners
 +  * [[https://trailofbits.github.io/ctf/|CTF Field Guide]]
 +  * [[https://gynvael.live/faq_pl.html#starthacking|gynvael coldwind faq (in polish)]]
 +
 +Other
 +  * [[https://github.com/danielmiessler/SecLists|SecLists]]
 +  * [[https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation|Evading Detection: A Beginner's Guide to Obfuscation]]
 +  * [[https://exploitation.ashemery.com/|Offensive Software Exploitation Course]]
 +  * [[https://ropemporium.com/|ROP Emporium]]
 +  * [[https://hextree.io/|hextree.io]] - they have free android cybersecurity course
 +  * [[https://gralhix.com/list-of-osint-exercises/|osint exercises]]
 +  * [[https://xeushack.com/|Hacking Tutorials by Xeus]]
 +  * [[https://heap-exploitation.dhavalkapil.com/|Heap exploitation book]]
 +  * [[https://github.com/swisskyrepo/PayloadsAllTheThings|PayloadAllThings]] - list of payloads
 +  * [[https://cado-nfs.gitlabpages.inria.fr/|CADO-NFS]] - program for factoring numbers
 +  * [[https://www.hardbreak.wiki/]]
 +  * [[https://sizeof.cat/post/top-pentesting-tools/]] - pentesting tools list
cybersecurity.1756740664.txt.gz · Last modified: by admin

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki