User Tools

Site Tools


cybersecurity

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cybersecurity [2025/09/03 14:25] admincybersecurity [2025/12/23 14:33] (current) admin
Line 3: Line 3:
 [[https://cheatsheetseries.owasp.org/Glossary.html|cheatsheets for protecting your service]] [[https://cheatsheetseries.owasp.org/Glossary.html|cheatsheets for protecting your service]]
  
 +[[https://check.labs.greynoise.io/|GreyNoise IP check]] - check if some malicious activity has been observed on your network
 +
 +Applications
 +  * [[https://www.netresec.com/?page=NetworkMiner|NetworkMiner]]
 +  * [[https://github.com/angr/angr-management|angr management]] - official angr gui
 Learning resources Learning resources
   * [[https://github.com/notthehiddenwiki/NTHW|Not The Hidden Wiki]] - huge repository of learning resources   * [[https://github.com/notthehiddenwiki/NTHW|Not The Hidden Wiki]] - huge repository of learning resources
Line 11: Line 16:
   * [[https://cryptopals.com/|the cryptopals crypto challenges]]   * [[https://cryptopals.com/|the cryptopals crypto challenges]]
   * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]   * [[https://github.com/antonio-morales/Fuzzing101|Fuzzing 101]]
 +  * [[https://guyinatuxedo.github.io/|Nightmare]] - intro to binay exploitation
  
 Training Training
Line 16: Line 22:
   * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty   * [[https://vvmlist.github.io/|vvmlist]] - list of vulnerable virtual machines (meant for training) with tags and difficulty
   * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges   * [[https://pwnable.kr/index.php|pwnable.kr]] - binary exploitation challenges
 +  * [[https://github.com/hacksysteam/HackSysExtremeVulnerableDriver]]
 +  * [[https://crackmes.one/]]
 +  * [[https://www.smashthestack.org/]]
 +  * [[https://io.netgarage.org/]]
 +  * [[https://archive.ooo/|archive.ooo]] - archived challenges from DEFCON
 +  * [[https://rehayilmazlar.com/challenge/|Reha's CyberChallenges]]
 +  * [[https://www.root-me.org/|Root me]]
 +
  
 Wordlists Wordlists
Line 23: Line 37:
 For beginners For beginners
   * [[https://trailofbits.github.io/ctf/|CTF Field Guide]]   * [[https://trailofbits.github.io/ctf/|CTF Field Guide]]
-  * [[https://gynvael.live/faq_pl.html#starthacking|gynvael coldwind faq (in polish)]] +  * [[https://gynvael.live/faq_pl.html#starthacking|gynvael coldwind'faq (in polish)]] 
 +Zines 
 +  * [[https://tmpout.sh/|tmpout.sh]] 
 +  * [[https://phrack.org/|Phrack]] 
 +  * [[https://pagedout.institute/|pagedout.institute]]
 Other Other
   * [[https://github.com/danielmiessler/SecLists|SecLists]]   * [[https://github.com/danielmiessler/SecLists|SecLists]]
Line 38: Line 55:
   * [[https://www.hardbreak.wiki/]]   * [[https://www.hardbreak.wiki/]]
   * [[https://sizeof.cat/post/top-pentesting-tools/]] - pentesting tools list   * [[https://sizeof.cat/post/top-pentesting-tools/]] - pentesting tools list
 +  * [[https://shellsharks.com/online-training|shellsharks.com resource list]]
 +  * [[https://shirajuki.js.org/blog/pyjail-cheatsheet/|python jail escaping cheatsheet]]
 +  * [[https://lolol.farm/|lolol.farm]] - list of Living Off the Land resources
cybersecurity.1756909534.txt.gz · Last modified: by admin

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki