User Tools

Site Tools


cybersecurity

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cybersecurity [2025/09/03 12:50] admincybersecurity [2025/09/04 13:41] (current) admin
Line 8: Line 8:
   * [[https://maxkersten.nl/binary-analysis-course/|Binary Analysis Course]]   * [[https://maxkersten.nl/binary-analysis-course/|Binary Analysis Course]]
   * [[https://www.wechall.net/|WeChall]]   * [[https://www.wechall.net/|WeChall]]
 +  * [[https://cryptohack.org/|CryptoHack]]
 +  * [[https://cryptopals.com/|the cryptopals crypto challenges]]
 +  * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]
 +  * [[https://guyinatuxedo.github.io/|Nightmare]] - intro to binay exploitation
 +
 +Training
 +  * [[http://www.itsecgames.com/|bWAPP, a buggy web application]]
 +  * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty
 +  * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges
 +  * [[https://github.com/hacksysteam/HackSysExtremeVulnerableDriver]]
 +  * [[https://crackmes.one/]]
 +  * [[https://www.smashthestack.org/]]
 +  * [[https://io.netgarage.org/]]
 +  * [[https://archive.ooo/|archive.ooo]] - archived challenges from DEFCON
  
 Wordlists Wordlists
   * [[https://github.com/berzerk0/Probable-Wordlists|Probable Wordlists]] - passwords sorted by popularity   * [[https://github.com/berzerk0/Probable-Wordlists|Probable Wordlists]] - passwords sorted by popularity
   * [[https://weakpass.com/|Weakpass]]   * [[https://weakpass.com/|Weakpass]]
 +
 +For beginners
 +  * [[https://trailofbits.github.io/ctf/|CTF Field Guide]]
 +  * [[https://gynvael.live/faq_pl.html#starthacking|gynvael coldwind faq (in polish)]]
  
 Other Other
   * [[https://github.com/danielmiessler/SecLists|SecLists]]   * [[https://github.com/danielmiessler/SecLists|SecLists]]
   * [[https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation|Evading Detection: A Beginner's Guide to Obfuscation]]   * [[https://github.com/BC-SECURITY/Beginners-Guide-to-Obfuscation|Evading Detection: A Beginner's Guide to Obfuscation]]
 +  * [[https://exploitation.ashemery.com/|Offensive Software Exploitation Course]]
 +  * [[https://ropemporium.com/|ROP Emporium]]
 +  * [[https://hextree.io/|hextree.io]] - they have free android cybersecurity course
 +  * [[https://gralhix.com/list-of-osint-exercises/|osint exercises]]
 +  * [[https://xeushack.com/|Hacking Tutorials by Xeus]]
 +  * [[https://heap-exploitation.dhavalkapil.com/|Heap exploitation book]]
 +  * [[https://github.com/swisskyrepo/PayloadsAllTheThings|PayloadAllThings]] - list of payloads
 +  * [[https://cado-nfs.gitlabpages.inria.fr/|CADO-NFS]] - program for factoring numbers
 +  * [[https://www.hardbreak.wiki/]]
 +  * [[https://sizeof.cat/post/top-pentesting-tools/]] - pentesting tools list
cybersecurity.1756903831.txt.gz · Last modified: by admin

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki