This commit is contained in:
The
2024-05-04 12:35:50 +01:00
committed by nbats
parent ff9de1d450
commit 281b714229
3 changed files with 31 additions and 40 deletions

View File

@@ -235,7 +235,7 @@
## ▷ Cybersecurity
* 🌐 **[Free Cyber Resources](https://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resources)** or [Applied Cybersecurity](https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content) - Cybersecurity Learning Resources
* 🌐 **[Awesome Hacking](https://github.com/Hack-with-Github/Awesome-Hacking)** - Pentesting / Security Index
* ↪️ **[Pentesting Resources]()**
***[crackmes.one](https://crackmes.one/)** / [Discord](https://discord.com/invite/2pPV3yq), [Hackers101](https://www.hacker101.com/), [EchoCTF](https://echoctf.red/), [SmashTheStack](https://smashthestack.org/), [WebHacking](https://webhacking.kr/) or [DefendTheWeb](https://defendtheweb.net/) - Cybersecurity Challenges
* [CyberArsenal](https://cyberarsenal.org/) - Cybersecurity Forums
* [TheSecMaster](https://twitter.com/TheSecMaster1) - Cybersecurity Twitter
@@ -244,7 +244,6 @@
* [Cyber Talent Kids](https://cybertalentskids.com/) or [Teach Yourself Info Sec](https://teachyourselfinfosec.com/) - Learn About Cybersecurity
* [pwn.college](https://pwn.college/) - Cybersecurity Practice
* [OverTheWire](https://overthewire.org/wargames/) - Cybersecurity Learning Game
* [Pentesting Bible](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE) or [Juice Shop](https://owasp.org/www-project-juice-shop/) - Learn Pentesting
* [iRed](https://www.ired.team/) - Red Teaming and Offensive Security
* [Hacksplaining](https://www.hacksplaining.com/) - Developer Security Lessons
* [sha256_project](https://github.com/oconnor663/sha256_project) or [cryptohack](https://cryptohack.org/) - Cryptography Learning
@@ -887,6 +886,7 @@
* 🌐 **[Awesome Cryptography](https://github.com/sobolevn/awesome-cryptography)** - Cryptography Resources
* 🌐 **[Reverse Engineering Resources](https://github.com/wtsxDev/reverse-engineering)** - Reverse Engineering Resources
* ↪️ **[Security / Hacking News](https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/misc#wiki_.25B7_tech_news)**
* ↪️ **[Pentesting Resources]()**
***[x64dbg](https://x64dbg.com/)** - Malware Reverse Engineering
* [Open Source Security Software](https://open-source-security-software.net/) - Cybersecurity Software
* [OWASP Cheatsheet](https://cheatsheetseries.owasp.org/) - Application Security Guide
@@ -896,14 +896,13 @@
* [osquery](https://osquery.io) or [Nmap](https://nmap.org/) - Security Monitors
* [Canarytokens](https://canarytokens.org/generate) - Network Breach Check
* [Nuclei](https://docs.projectdiscovery.io/tools/nuclei) / [GitHub](https://github.com/projectdiscovery/nuclei) or [NVD](https://nvd.nist.gov/) - Vulnerability Tracking / Scanning
* [Metasploit](https://www.metasploit.com/) - Pentesting Framework / [Cheatsheet](https://www.comparitech.com/net-admin/metasploit-cheat-sheet/)
* [Zeek](https://zeek.org/), [Nmap](https://nmap.org/) / [Results](https://nmap.org/ndiff/), [Kismet](https://www.kismetwireless.net/), [ntop](https://www.ntop.org/) or [Sniffnet](https://www.sniffnet.net/) - Network Monitors
* [Crowdsec](https://crowdsec.net/) - Crowd-Sourced Intrusion Detection / Prevention / [GitHub](https://github.com/crowdsecurity/crowdsec)
* [X-Force Exchange](https://exchange.xforce.ibmcloud.com/) - Security Threat Intelligence Platform
* [ThreatMap](https://threatmap.checkpoint.com/) or [CyberMap](https://cybermap.kaspersky.com/) - Live Malware Distribution Maps
* [VirusShare](https://virusshare.com/), [PulseDive](https://pulsedive.com/) or [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malware Search
* [The Void](https://www.thevoid.community/) - Software Incident Reports
* [Fail2Ban](https://github.com/fail2ban/fail2ban) - Protect Servers from Brute Force Attacks
* [Pentest Contracts](https://github.com/cure53/Contracts) - Security Contract Templates
* [OpenSCA-CLI](https://github.com/XmirrorSecurity/OpenSCA-cli) - Composition Analysis for Third Party Components
* [Unblob](https://unblob.org/) - Extraction Suite
* [Security Onion Solutions](https://securityonionsolutions.com/), [Wazuh](https://wazuh.com/) or [Snyk](https://snyk.io/) / [GitHub](https://github.com/snyk/cli) - Site Security Monitor
@@ -917,7 +916,6 @@
* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information
* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library
* [Kali NetHunter](https://store.nethunter.com/en/) or [AndroGuard](https://github.com/androguard/androguard) - Penetration Testing / Forensics Apps
* [MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - App Pentesting Cheatsheet
* [MicroCorruption](https://microcorruption.com/) - Learn Reverse Engineering / Cybersecurity
* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering
* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering