RED-TEAMS.COM'S TOOLS PAGE
ALL CYBERSECURITY BOOKS WE PHYSICALLY OWN 100 DEADLY SKILLS – CLINT EMERSON 1001 BRILLIANT WAYS TO CHECKMATE FRED REINFELD A DICTONARY OF BASIC JAPANESE GRAMMAR –
SEIICHI MAKINO AND MICHIO TSUTSUI ACCELERATE – GENE KIM, NICOLE FORSGREN, JEZ HUMBLE ADVANCED PENETRATION…
100 DEADLY SKILLS – CLINT EMERSON
1001 BRILLIANT WAYS TO CHECKMATE FRED REINFELD
A DICTONARY OF BASIC JAPANESE GRAMMAR – SEIICHI MAKINO AND MICHIO TSUTSUI
ACCELERATE – GENE KIM, NICOLE FORSGREN, JEZ HUMBLE
ADVANCED PENETRATION TESTING – WILEY
ADVERSARIAL TRADECRAFT IN CYBERSECURITY – DAN BORGES
ALGORITHMS – MIT
ANALYSIS AND DESIGN OF THE NEXT GENERATION SOFTWARE ARCHITECTURES – LANGER
ARTIFICIAL INTELLIGENCE GOVERNANCE AND CYBERSECURITY
ARTIFIICAL INTELLIGENCE A MODERN APPROACH
ATTACKING NETWORK PROTOCOLS – NO STARCH PRESS
BIG BREACHES – DASWANI / ELBAYADI
BLACK HAT PYTHON – PYTHON PROGRAMMING FOR HACKERS AND PENTESTERS
BLACKS LAW DICTONARY ABRIDGED FIFTH EDITION
BLACKS LAWS DICTONARY – GARNER THIRD POCKET EDITION
BLUE TEAM FIELD MANUAL – ALAN WHITE AND BEN CLARK
BUG BOUNTY HUNTING ESSENTIALS PACKT2
BURNERS AND BLACKMARKETS – LANCE HENDERSON
CODES, CIPHERS, STEGANOGRAPHY AND SECRET MESSAGES – SUNIL TANNA
COMPTIA CASP+ EXAM GUIDE CAS-003
COMPTIA CEH EXAM GUIDE THIRD EDITION
COMPTIA CISSP EXAM GUIDE EIGTH EDITION
COMPTIA CLOUD+ STUDY GUIDE SECOND EDITION EXAM CVO 002
COMPTIA CYSA+ EXAM GUIDE CSO001
COMPTIA CYSA+ PRACTICE EXAMS
COMPTIA LINUX+ EXAM GIODE XKO004
COMPTIA NETWORK+ EXAM GUIDE N100006
COMPTIA PENTEST+ EXAM GUIDE PTO-001
COMPTIA PENTEST+ PRACTICE EXAMS
COMPTIA SECURITY+ EXAM GUIDE SYO501
COMPTIA SERVER+ EXAM GUIDE SKO004
COMPUTING – MIT
CONFESSIONS OF AN ECONOMIC HIT MAN – JOHN PERKINS
CONSULTING SUCCESS – MICHEAL ZIPURSKY
CRITICAL THINKING – MIT
CRYPTODICTONARY – AUMASSON – NO STARCH PRESS
CRYPTOGRAPHY ENGINEERING – WILEY
CULT OF THE DEAD COW – JOESPG MENN
CYBER THREAT INTELLIGENCE FIELD MANUAL
CYBER WAR – RICHARD A CLARKE
CYBERSECURITY – MIT
CYBERSECURITY ATTACKS RED TEAM STRATEGIES – JOHANN REHBERGER
CYBERSECURITY DIVISION TRANSITION TO PRACTICE TECHNOLOGY GUIDE – HOMELAND SECURITY
CYBERSECURITY INCIDIENT MANAGEMENT MASTERS GUIDE – VOLUME 1
CYBERSECURITY INCIDIENT MANAGEMENT MASTERS GUIDE – VOLUME 2
DARK TERRITORY FRED KAPLAN
DARK TERRITORY THE SECRET HISTORY OF CTVER WAR FRED KAPLAN
DATA SCIENCE – MIT
DEEP LEARNING – MIT
DEFENSIVE SECURITY HANDBOOK – OREILLY
DEPARTMENT OF HOMELAND SECURITY UNITED STATES COAST GUARD NAVIGATION RULES AND REGULATIONS HANDBOOK
ESSENTIAL MATH FOR DATA SCIENCE – OREILLY
EXTREME PRIVACY – WHAT IT TAKES TO DSIAPPEAR – THIRD EDITION – BAZELL
FREE WILL – MIT PRESS
GAME PLAN – FREEMAN
HACKING EXPOSED INDUSTRIAL CONTROL SYSTESMS
HACKING MULTIFACTOR AUTHENTICATION – WILEY
HACKING THE HACKER – GRIMES
HANDS ON BUG HUNTING FOR PENETRATION TESTERS – PACKT2
HANDS ON MACHINE LEARNING WITH SCIKIT LAERN, KERAS, AND TENSOR FLOW
HASH CRACK – PASSWORD CRACKING MANUAL V3
HOW TO BE A CHEIF OPERATING OFFICER – JENNIFER GEARY
HOW TO DISAPPEAR AND NEVER BE FOUND – DAVIES
HOW TO HACK LIKE A GHOST – SPARC FLOW
HOW TO INVESTIGATE LIKE A ROCKSTAR – SPARCFLOW HACKLIKEAPORNSTAR.COM
HOW TO PLAY THE CHESS OPENINGS – EUGENE A ZNOSKO-BOROVSKY
HUNTING CYBER CRIMINALS – WILEY
INCIDENT RESPONSE – WILEY
INDUSTRIAL NETWORK SECURITY – SYNGRESS
INSIDE JOBS – PAYNE HANSON WOJTASIAK
INTRO TO PYTHON – PEARSON
INTRUSTION DECTECTION HONEYPOTS CHRIS SANDERS
ISC2 – CISSP – OFFICAL PRACTICE TESTS – THIRD EDITION 2021
ISC2 CISSP OFFICAL STUDY GUIDE NINTH EDITION
KALI LINUX PENETRATION TESTING BIBLE WILEY
KALI LINUX REFERENCE GUIDE A PENTESTERS VOYAGE MATTHEW SHEIMO
LEARN PYTHON QUICKLY – CODE QUICKLY
LINUS BASICS FOR HACKERS – OCCUPY THE WEB
LINUX BIBLE – THE TENTH EDITION – WILEY
LINUX COMMAND LINE AND SHELL SCRIPTING BIBLE 4TH EDITION WILEY
LINUX FIELD MANUAL
LINUX POCKET GUIDE – OREILLY
MACHINE LEARNING – REVISED AND UPDATED EDITION – MIT
MALWARE ANALYST’S COOKBOOK AND DVD – WILEY
MALWARE DATA SCIENCE SAXE SANDERS
MANAGING CYBERSECURITY RISK – JONATHAN REUVID
MAXIMUM INFLUENCE – MORTENSEN
MECHNICAL EGINEERING REFERNECE MANUAL FOR THE PE EXAM THIRTEENTH EDITION MICHEAL R LINDEBURG
MENTAL PICKPOCKETING HOW TO GET TO THE TRUTH WITHOUT SEEMING TO ASK QUESTIONS – MICHEAL MCGUALLEY
METASPLOIT THE PENETRATION TESTERS GUIDE
MI6 SKILLS FOR CIVILIANS RILEY
OFFENSIVE COUNTERMEASURES – THE ART OF ACTIVE DEFENSE – JOHN STRAND
OPEN SOURCE INTELLIGENCE TECHNIQUES RESOURCES FOR SEARCHING AND ANALYZING ONLINE INFORMATION EIGTH EDITION BY MICHEAL BAZZELL OPERATOR HANDBOOK NETMUX
PASS YOUR AMATEUR RADIO TECHNICIAN CLASS TEST – CRAIG K4IA
PENETRATION TESTING A HANDS ON INTRODUCTION TO HACKING – WEIDMAN
PRACTICAL BINARY ANALYSIS NO STARCH PRESS
PRACTICAL CRYPTOGRAPHY – WILEY
PRACTICAL IOT HACKING – NO STARCH PRESS
PRACTICAL MALWARE ANALYSIS – NO STARCH PRESS
PRACTICAL STATISTICS FOR DATA SCIENTISTS – OREILLY
PURPLE TEAM FIELD MANUAL
PYTHON DATA SCIENCE HANDBOOK – KLEPPMANN OREILLY
PYTHON FOR DATA ANALYSIS – MCKINNEY – OREILLY
RANDSOMWARE PROTECTIVE PLAYBOOK – GRIMES / WILEY
RASPBERRY PI 4 COMPLETE MANUAL RAPHAEL STONE
REAL WORLD BUG HUNTING – NO STARCH PRESS
RED TEAM – DEVELOPMENT AND OPERATIONS – JOE VEST AND JAMES TUBBERVILLE
RED TEAM FIELD MANUAL
ROOTKITS AND BOOTKITS REVERSING MODERN MALWARE AND NEXT GENERATION THREATS
SANDWORM ANDY GREENBERG
SECURE ENOUGH ? – BRYCE AUTISN
SERIOUS CRYPTOGRAPHY – NO STARCH PRESS
SPITIAL COMPUTING – MIT
STORYTELLING WITH DATA – KNAFLIC – WILEY
STRIKING POWER – JEREMY RABKIN AND JOHN YOO
SYNGRESS APPLIED CYBER SECURITY AND THE SMART GRID
THE ART OF CYBER CONFLICT – HENRY J SIENKIEWICZ
THE ART OF DECEPTION – WILEY / MITNICK / SIMON
THE ART OF EXPLOTATION – NO STARCH PRESS
THE ART OF INTRUSION WILEY
THE ART OF INVISIBILITY KEVIN MITNICK
THE BIG BOOK OF DASHBOARDS
THE BLACK ART OF WAR – HANNIBALS 99 TRUTHS – JAMES W PETERSON
THE CAMPERS POCKET HANDBOOK BY JOHN GOLL
THE CODE BOOK SIMON SINGH
THE CONSULTING BIBLE 2ND EDITION
THE CYBER ATTACK SURVIVAL MANUAL
THE DARKENING WEB ALEXANDER KLIMBURG
THE DARKNET SUPER PACK – LANCE HENDERSON
THE DEVOPS HANDBOOK – IT REV
THE FIFTH DOMAIN RICHARD A CLARKE AND ROBERT K KNAKE
THE GHIDRA BOOK – EAGLE AND NANCE
THE GIANT BLACK BOOK OF COMPUTER VIRUSES – MARK LUDWIG
THE HACKER PLAYBOOK 2 PETER KIM
THE HACKER PLAYBOOK 3 RED TEAM EDITION PETER KIM
THE HOME NETWORK MANUAL MARLON BUCHANAN
THE MASTER ALGORITHM PEDRO DOMINGOS ALLEN LANE
THE MODERN SECURITY OPERATIONS CENTER
THE PERFECT WEAPON – DAVID E SANGER
THE PHOENIX PROJECT – GENEKIM, KEVIN BEHR, GEORGE SPAFFORD
THE SHELLCODERS HANDBOOK – WILEY
THE WEB APPLICATION HACKERS HANDBOOK – WILEY
STAY CYBER SAFE JT KOSTMAN AND BRIAN J GALLAGHER
EXPLODING DATA – MICHEAL CHERTOFF
MANAGING CYBERSECURITY RESOURCES – LAWRENCE A GORDON AND MARTIN P LOEB
CYBER WARFARE – JASON ANDRESS STEVE WINTERFIELD
THE CYBERSECURITY DILEMMA – BEN BUCHANAN
THE PUZZLE PALACE – JAMES BAMFORD
CYBER INVESTIGATTING – CRACKING WALL STREET WITH YOUR PERSONAL COMPUTER – DAVID L BROWN AND KASSANDRA BENTLEY
CYBER ATTACK – PAUL DAY
CYBER CRIME INVESTIGATIONS – ANTHONY REYES
HANDLING BAD – DANIEL ROBERT WEISS
NAVIGATING THE DIGITAL AGE
1001 BRILLIANT WAYS TO CHECKMATE FRED REINFELD
A DICTONARY OF BASIC JAPANESE GRAMMAR – SEIICHI MAKINO AND MICHIO TSUTSUI
ACCELERATE – GENE KIM, NICOLE FORSGREN, JEZ HUMBLE
ADVANCED PENETRATION TESTING – WILEY
ADVERSARIAL TRADECRAFT IN CYBERSECURITY – DAN BORGES
ALGORITHMS – MIT
ANALYSIS AND DESIGN OF THE NEXT GENERATION SOFTWARE ARCHITECTURES – LANGER
ARTIFICIAL INTELLIGENCE GOVERNANCE AND CYBERSECURITY
ARTIFIICAL INTELLIGENCE A MODERN APPROACH
ATTACKING NETWORK PROTOCOLS – NO STARCH PRESS
BIG BREACHES – DASWANI / ELBAYADI
BLACK HAT PYTHON – PYTHON PROGRAMMING FOR HACKERS AND PENTESTERS
BLACKS LAW DICTONARY ABRIDGED FIFTH EDITION
BLACKS LAWS DICTONARY – GARNER THIRD POCKET EDITION
BLUE TEAM FIELD MANUAL – ALAN WHITE AND BEN CLARK
BUG BOUNTY HUNTING ESSENTIALS PACKT2
BURNERS AND BLACKMARKETS – LANCE HENDERSON
CODES, CIPHERS, STEGANOGRAPHY AND SECRET MESSAGES – SUNIL TANNA
COMPTIA CASP+ EXAM GUIDE CAS-003
COMPTIA CEH EXAM GUIDE THIRD EDITION
COMPTIA CISSP EXAM GUIDE EIGTH EDITION
COMPTIA CLOUD+ STUDY GUIDE SECOND EDITION EXAM CVO 002
COMPTIA CYSA+ EXAM GUIDE CSO001
COMPTIA CYSA+ PRACTICE EXAMS
COMPTIA LINUX+ EXAM GIODE XKO004
COMPTIA NETWORK+ EXAM GUIDE N100006
COMPTIA PENTEST+ EXAM GUIDE PTO-001
COMPTIA PENTEST+ PRACTICE EXAMS
COMPTIA SECURITY+ EXAM GUIDE SYO501
COMPTIA SERVER+ EXAM GUIDE SKO004
COMPUTING – MIT
CONFESSIONS OF AN ECONOMIC HIT MAN – JOHN PERKINS
CONSULTING SUCCESS – MICHEAL ZIPURSKY
CRITICAL THINKING – MIT
CRYPTODICTONARY – AUMASSON – NO STARCH PRESS
CRYPTOGRAPHY ENGINEERING – WILEY
CULT OF THE DEAD COW – JOESPG MENN
CYBER THREAT INTELLIGENCE FIELD MANUAL
CYBER WAR – RICHARD A CLARKE
CYBERSECURITY – MIT
CYBERSECURITY ATTACKS RED TEAM STRATEGIES – JOHANN REHBERGER
CYBERSECURITY DIVISION TRANSITION TO PRACTICE TECHNOLOGY GUIDE – HOMELAND SECURITY
CYBERSECURITY INCIDIENT MANAGEMENT MASTERS GUIDE – VOLUME 1
CYBERSECURITY INCIDIENT MANAGEMENT MASTERS GUIDE – VOLUME 2
DARK TERRITORY FRED KAPLAN
DARK TERRITORY THE SECRET HISTORY OF CTVER WAR FRED KAPLAN
DATA SCIENCE – MIT
DEEP LEARNING – MIT
DEFENSIVE SECURITY HANDBOOK – OREILLY
DEPARTMENT OF HOMELAND SECURITY UNITED STATES COAST GUARD NAVIGATION RULES AND REGULATIONS HANDBOOK
ESSENTIAL MATH FOR DATA SCIENCE – OREILLY
EXTREME PRIVACY – WHAT IT TAKES TO DSIAPPEAR – THIRD EDITION – BAZELL
FREE WILL – MIT PRESS
GAME PLAN – FREEMAN
HACKING EXPOSED INDUSTRIAL CONTROL SYSTESMS
HACKING MULTIFACTOR AUTHENTICATION – WILEY
HACKING THE HACKER – GRIMES
HANDS ON BUG HUNTING FOR PENETRATION TESTERS – PACKT2
HANDS ON MACHINE LEARNING WITH SCIKIT LAERN, KERAS, AND TENSOR FLOW
HASH CRACK – PASSWORD CRACKING MANUAL V3
HOW TO BE A CHEIF OPERATING OFFICER – JENNIFER GEARY
HOW TO DISAPPEAR AND NEVER BE FOUND – DAVIES
HOW TO HACK LIKE A GHOST – SPARC FLOW
HOW TO INVESTIGATE LIKE A ROCKSTAR – SPARCFLOW HACKLIKEAPORNSTAR.COM
HOW TO PLAY THE CHESS OPENINGS – EUGENE A ZNOSKO-BOROVSKY
HUNTING CYBER CRIMINALS – WILEY
INCIDENT RESPONSE – WILEY
INDUSTRIAL NETWORK SECURITY – SYNGRESS
INSIDE JOBS – PAYNE HANSON WOJTASIAK
INTRO TO PYTHON – PEARSON
INTRUSTION DECTECTION HONEYPOTS CHRIS SANDERS
ISC2 – CISSP – OFFICAL PRACTICE TESTS – THIRD EDITION 2021
ISC2 CISSP OFFICAL STUDY GUIDE NINTH EDITION
KALI LINUX PENETRATION TESTING BIBLE WILEY
KALI LINUX REFERENCE GUIDE A PENTESTERS VOYAGE MATTHEW SHEIMO
LEARN PYTHON QUICKLY – CODE QUICKLY
LINUS BASICS FOR HACKERS – OCCUPY THE WEB
LINUX BIBLE – THE TENTH EDITION – WILEY
LINUX COMMAND LINE AND SHELL SCRIPTING BIBLE 4TH EDITION WILEY
LINUX FIELD MANUAL
LINUX POCKET GUIDE – OREILLY
MACHINE LEARNING – REVISED AND UPDATED EDITION – MIT
MALWARE ANALYST’S COOKBOOK AND DVD – WILEY
MALWARE DATA SCIENCE SAXE SANDERS
MANAGING CYBERSECURITY RISK – JONATHAN REUVID
MAXIMUM INFLUENCE – MORTENSEN
MECHNICAL EGINEERING REFERNECE MANUAL FOR THE PE EXAM THIRTEENTH EDITION MICHEAL R LINDEBURG
MENTAL PICKPOCKETING HOW TO GET TO THE TRUTH WITHOUT SEEMING TO ASK QUESTIONS – MICHEAL MCGUALLEY
METASPLOIT THE PENETRATION TESTERS GUIDE
MI6 SKILLS FOR CIVILIANS RILEY
OFFENSIVE COUNTERMEASURES – THE ART OF ACTIVE DEFENSE – JOHN STRAND
OPEN SOURCE INTELLIGENCE TECHNIQUES RESOURCES FOR SEARCHING AND ANALYZING ONLINE INFORMATION EIGTH EDITION BY MICHEAL BAZZELL OPERATOR HANDBOOK NETMUX
PASS YOUR AMATEUR RADIO TECHNICIAN CLASS TEST – CRAIG K4IA
PENETRATION TESTING A HANDS ON INTRODUCTION TO HACKING – WEIDMAN
PRACTICAL BINARY ANALYSIS NO STARCH PRESS
PRACTICAL CRYPTOGRAPHY – WILEY
PRACTICAL IOT HACKING – NO STARCH PRESS
PRACTICAL MALWARE ANALYSIS – NO STARCH PRESS
PRACTICAL STATISTICS FOR DATA SCIENTISTS – OREILLY
PURPLE TEAM FIELD MANUAL
PYTHON DATA SCIENCE HANDBOOK – KLEPPMANN OREILLY
PYTHON FOR DATA ANALYSIS – MCKINNEY – OREILLY
RANDSOMWARE PROTECTIVE PLAYBOOK – GRIMES / WILEY
RASPBERRY PI 4 COMPLETE MANUAL RAPHAEL STONE
REAL WORLD BUG HUNTING – NO STARCH PRESS
RED TEAM – DEVELOPMENT AND OPERATIONS – JOE VEST AND JAMES TUBBERVILLE
RED TEAM FIELD MANUAL
ROOTKITS AND BOOTKITS REVERSING MODERN MALWARE AND NEXT GENERATION THREATS
SANDWORM ANDY GREENBERG
SECURE ENOUGH ? – BRYCE AUTISN
SERIOUS CRYPTOGRAPHY – NO STARCH PRESS
SPITIAL COMPUTING – MIT
STORYTELLING WITH DATA – KNAFLIC – WILEY
STRIKING POWER – JEREMY RABKIN AND JOHN YOO
SYNGRESS APPLIED CYBER SECURITY AND THE SMART GRID
THE ART OF CYBER CONFLICT – HENRY J SIENKIEWICZ
THE ART OF DECEPTION – WILEY / MITNICK / SIMON
THE ART OF EXPLOTATION – NO STARCH PRESS
THE ART OF INTRUSION WILEY
THE ART OF INVISIBILITY KEVIN MITNICK
THE BIG BOOK OF DASHBOARDS
THE BLACK ART OF WAR – HANNIBALS 99 TRUTHS – JAMES W PETERSON
THE CAMPERS POCKET HANDBOOK BY JOHN GOLL
THE CODE BOOK SIMON SINGH
THE CONSULTING BIBLE 2ND EDITION
THE CYBER ATTACK SURVIVAL MANUAL
THE DARKENING WEB ALEXANDER KLIMBURG
THE DARKNET SUPER PACK – LANCE HENDERSON
THE DEVOPS HANDBOOK – IT REV
THE FIFTH DOMAIN RICHARD A CLARKE AND ROBERT K KNAKE
THE GHIDRA BOOK – EAGLE AND NANCE
THE GIANT BLACK BOOK OF COMPUTER VIRUSES – MARK LUDWIG
THE HACKER PLAYBOOK 2 PETER KIM
THE HACKER PLAYBOOK 3 RED TEAM EDITION PETER KIM
THE HOME NETWORK MANUAL MARLON BUCHANAN
THE MASTER ALGORITHM PEDRO DOMINGOS ALLEN LANE
THE MODERN SECURITY OPERATIONS CENTER
THE PERFECT WEAPON – DAVID E SANGER
THE PHOENIX PROJECT – GENEKIM, KEVIN BEHR, GEORGE SPAFFORD
THE SHELLCODERS HANDBOOK – WILEY
THE WEB APPLICATION HACKERS HANDBOOK – WILEY
STAY CYBER SAFE JT KOSTMAN AND BRIAN J GALLAGHER
EXPLODING DATA – MICHEAL CHERTOFF
MANAGING CYBERSECURITY RESOURCES – LAWRENCE A GORDON AND MARTIN P LOEB
CYBER WARFARE – JASON ANDRESS STEVE WINTERFIELD
THE CYBERSECURITY DILEMMA – BEN BUCHANAN
THE PUZZLE PALACE – JAMES BAMFORD
CYBER INVESTIGATTING – CRACKING WALL STREET WITH YOUR PERSONAL COMPUTER – DAVID L BROWN AND KASSANDRA BENTLEY
CYBER ATTACK – PAUL DAY
CYBER CRIME INVESTIGATIONS – ANTHONY REYES
HANDLING BAD – DANIEL ROBERT WEISS
NAVIGATING THE DIGITAL AGE
OSI
BeenVerified
BuiltWith
Censys
Creepy
Exiftool
Fierce
Foca
Google Dorks
HavelbeenPwned
IVRE
Jigsaw
Maltego
Metagoofil
Nmap
OSINT Framework
OpenVAS
Recon-Ng
Shodan
SpiderFoot
Spyse
theHarvester
Unicornscan
WebSha
ZoomEye
BuiltWith
Censys
Creepy
Exiftool
Fierce
Foca
Google Dorks
HavelbeenPwned
IVRE
Jigsaw
Maltego
Metagoofil
Nmap
OSINT Framework
OpenVAS
Recon-Ng
Shodan
SpiderFoot
Spyse
theHarvester
Unicornscan
WebSha
ZoomEye
Engines
AlienVault
Binary Edge
CRT.sh
Censys
Dehashed
DorkSearch
DNSDumpster
ExploitDB
FullHunt
Fofa
Grep App
GreyNoise
GrayHatWarfare
Hunter
IntelligenceX
LeakIX
Netlas
Onyphe
PolySwarm
Packet Storm
Pulsedive
PublicWWW
Security Trails
SearchCode
Shodan
URL Scan
Vulners
Wigle
WayBackMachine
ZoomEye
Binary Edge
CRT.sh
Censys
Dehashed
DorkSearch
DNSDumpster
ExploitDB
FullHunt
Fofa
Grep App
GreyNoise
GrayHatWarfare
Hunter
IntelligenceX
LeakIX
Netlas
Onyphe
PolySwarm
Packet Storm
Pulsedive
PublicWWW
Security Trails
SearchCode
Shodan
URL Scan
Vulners
Wigle
WayBackMachine
ZoomEye
forensic tools
Autospy
AccessData(FTK)
Autopsy – iPhone
Axiom Cyber
Autopsy Browser
AIL
Autopsy Tools
Amcache Parser
Access FTK Imager
BlackLight
Belkasoft Evidence
Bulk Extractor
Bulk Extractor
CAINE
Creepy
Checkm8
CAINE Live
Cellebrite UFED
DFF
DEFT
DC3DD
DC3-MWCP
dcfldd
Dislocker
EnCase
EVTXtract
EnCase Imager
E01 Examiner
Extundelete
Email Collector
Foremost
Forensics(DFF)
Fibratus
Ghiro
Guymager
GRR Rapid Response
HXD
hfind
Hunchback
KAPE
Kali Linux
Live View
LRR
Magnet AXIOM
Maltego
Memoryze
Metagoofil
Ngrep
Nmap
NTFS-3G
NetworkMiner
OSINT FrameworkOxygen Detective
OSForensics Imager
OSForensics
Olefile
Pyew
PhotoRec
PyFlag
Paladin
Plaso (log2timeline)
Raptor
Redline
Recon-ng
Rekall
Rifiuti2
RegRipper
Snort
OSINT-SPY
Sleuth Kit
SSDeep
Shodan
SANS SIFT
Speedit
SniffPass
Scalpel
SpiderFoot
Scalpel
SIFT (SANS)
Tcpdump
The Hive
TestDisk
TSK (The Sleuth Kit)
TheHarvester
USBDeview
USB Write Blocker
VolDiff
Volatility
Volafox
Volatility Framework
WinHex
Wireshark
WindowsSCOPE
WinAudit
Xplico
X-Ways Imager
X-Ways Forensics
XRY (XAMN)
Yara
AccessData(FTK)
Autopsy – iPhone
Axiom Cyber
Autopsy Browser
AIL
Autopsy Tools
Amcache Parser
Access FTK Imager
BlackLight
Belkasoft Evidence
Bulk Extractor
Bulk Extractor
CAINE
Creepy
Checkm8
CAINE Live
Cellebrite UFED
DFF
DEFT
DC3DD
DC3-MWCP
dcfldd
Dislocker
EnCase
EVTXtract
EnCase Imager
E01 Examiner
Extundelete
Email Collector
Foremost
Forensics(DFF)
Fibratus
Ghiro
Guymager
GRR Rapid Response
HXD
hfind
Hunchback
KAPE
Kali Linux
Live View
LRR
Magnet AXIOM
Maltego
Memoryze
Metagoofil
Ngrep
Nmap
NTFS-3G
NetworkMiner
OSINT FrameworkOxygen Detective
OSForensics Imager
OSForensics
Olefile
Pyew
PhotoRec
PyFlag
Paladin
Plaso (log2timeline)
Raptor
Redline
Recon-ng
Rekall
Rifiuti2
RegRipper
Snort
OSINT-SPY
Sleuth Kit
SSDeep
Shodan
SANS SIFT
Speedit
SniffPass
Scalpel
SpiderFoot
Scalpel
SIFT (SANS)
Tcpdump
The Hive
TestDisk
TSK (The Sleuth Kit)
TheHarvester
USBDeview
USB Write Blocker
VolDiff
Volatility
Volafox
Volatility Framework
WinHex
Wireshark
WindowsSCOPE
WinAudit
Xplico
X-Ways Imager
X-Ways Forensics
XRY (XAMN)
Yara
LIST OF UDEMY COURSES WE HAVE WATCHED AND ENJOYED
1. COMPTIA SECURITY+ SYO 601 COMPLETE COURSE AND EXAM JASON DION
2. COMPTIA CYSA CS0 002 COMPLETE COURSE AND PRACTICE EXAM JASON DION
3. CASP STONE RIVER E LEARNING
4. COMPTIA PENTEST COURSE AND PRACTICE EXAM JASON DION
5. THE COMPLETE ETHICAL HACKING COURSE BEGINNER TO ADVANCED ERMIN KREPONIC AND
6. ALDIN OMERDIC
7. THE COMPLETE ETHICAL HACKER CERTIFICATION EXAM PREP TIM PIERSON
8. COMPLETE ETHICAL HACKING AND CYBERSECURITY MASTERCLASS COURSE JOE PARYS, ALEKSA TA9.
9. MURKOVSKI, JOE
10. JAVA PROGRAMMING MASTERCLASS UPDATED TO JAVA 17 TIM BUCHALKA
11. THE COMPELTE PYTHON BOOTCAMP FROM ZERO TO HERO JOSE PORTILLA
12. MACHINE LEARNING A-Z AI, PYTHON R + CHATGPT KIRILL EREMENKO
13. NEW CYBERSECURITY CISSP CERTIFICATION ALL IN ONE – THINKFORTY INC
14. HACKING TECNIQUES FOR IT PROFESSIONALS 2.0 COMPLETE COURSE = IT SECURITY ACADEMY, HACKING SCHOOL
15. CISM STONE RIVER E LEARNING
16. CISSP ALL DOMAINS – MUKESH SINGH
17. HACKING IN PRACTICE INTEISVE ETHNICAL HACKING MEGA COURWSE IT SECURITY ACADEMY HACKING SCHOOL
18. IT SURVEILLANCE AND COMPUTER FORENSICS FROM SCRATCH HACKING SCHOOL IT SECURITY ACADEMY
19. COMPLETE PYTHON 3 ETHICAL HACKING BEGINNER TO EXPERT – ALEKSA TAMBURKOVSKI AND JOE PARYS
20. PYTHONG ETHICAL HACKING BUILD TOOLS FOR ETHICAL HACKING – FAHAD SARWAR
21. COMPLETE ETHICASL HACKING BOOTCAMP 2023 ZERO TO HERO ANDREI NEAGOIE ALEKSA TAMBURKOVSKI
22. THE COMPLETE SOCIAL ENGINEERING, PHISHING, OSINT – MUHARREM AYDIN OAK ACADEMY TEAM
23. REVERSE ENGINEERING GHIDRA FOR BEGINEERS PAUL CHIN
24. REVERSE ENGINEERING AND MALWARE ANALYSIS PAUL CHIN
25. CCNA AND CCNP REAL WORLD LABS DATA CENTERS MARIOUS KURIATA
26. THE COMPLETE CYBERSECURITY COURSE NETWORK SECURITY NATHAN HOUSE
27. THE ULTIMATE DARK WEB ANONYMITY PRIVACY AND SECURITY ZAID SABIH Z SECURITY
28. IT NETWORK CABLING HOFMEYR DE VOS
29. THE COMPLETE MOBILE ETHICAL HACKING COURSE – CODESTARS
30. WIFI HACKING USING EVIL TWIN ATTACKS AND CAPTIVE PORTALS
31. XSS THE PRACTICAL GUIDE – CHRISTOPHE LIMPALAIR CYBR TRAINING
32. MALWARE DEVELOPMENT COURES 2023 FROM ZERO TH OER- ENGIN DEMIRBILEK
33. TACTICAL WEB EXPLOTATION FOR PENETRATION TESTERS – MOHAMMAD SA’ED KHALIL KAROUI
34. ADOBE PREIMERE PRO CC MASTERCLASS – PHIL EBINER
35. CASP CAS 004 COMPLETE COURSE JASON DION
2. COMPTIA CYSA CS0 002 COMPLETE COURSE AND PRACTICE EXAM JASON DION
3. CASP STONE RIVER E LEARNING
4. COMPTIA PENTEST COURSE AND PRACTICE EXAM JASON DION
5. THE COMPLETE ETHICAL HACKING COURSE BEGINNER TO ADVANCED ERMIN KREPONIC AND
6. ALDIN OMERDIC
7. THE COMPLETE ETHICAL HACKER CERTIFICATION EXAM PREP TIM PIERSON
8. COMPLETE ETHICAL HACKING AND CYBERSECURITY MASTERCLASS COURSE JOE PARYS, ALEKSA TA9.
9. MURKOVSKI, JOE
10. JAVA PROGRAMMING MASTERCLASS UPDATED TO JAVA 17 TIM BUCHALKA
11. THE COMPELTE PYTHON BOOTCAMP FROM ZERO TO HERO JOSE PORTILLA
12. MACHINE LEARNING A-Z AI, PYTHON R + CHATGPT KIRILL EREMENKO
13. NEW CYBERSECURITY CISSP CERTIFICATION ALL IN ONE – THINKFORTY INC
14. HACKING TECNIQUES FOR IT PROFESSIONALS 2.0 COMPLETE COURSE = IT SECURITY ACADEMY, HACKING SCHOOL
15. CISM STONE RIVER E LEARNING
16. CISSP ALL DOMAINS – MUKESH SINGH
17. HACKING IN PRACTICE INTEISVE ETHNICAL HACKING MEGA COURWSE IT SECURITY ACADEMY HACKING SCHOOL
18. IT SURVEILLANCE AND COMPUTER FORENSICS FROM SCRATCH HACKING SCHOOL IT SECURITY ACADEMY
19. COMPLETE PYTHON 3 ETHICAL HACKING BEGINNER TO EXPERT – ALEKSA TAMBURKOVSKI AND JOE PARYS
20. PYTHONG ETHICAL HACKING BUILD TOOLS FOR ETHICAL HACKING – FAHAD SARWAR
21. COMPLETE ETHICASL HACKING BOOTCAMP 2023 ZERO TO HERO ANDREI NEAGOIE ALEKSA TAMBURKOVSKI
22. THE COMPLETE SOCIAL ENGINEERING, PHISHING, OSINT – MUHARREM AYDIN OAK ACADEMY TEAM
23. REVERSE ENGINEERING GHIDRA FOR BEGINEERS PAUL CHIN
24. REVERSE ENGINEERING AND MALWARE ANALYSIS PAUL CHIN
25. CCNA AND CCNP REAL WORLD LABS DATA CENTERS MARIOUS KURIATA
26. THE COMPLETE CYBERSECURITY COURSE NETWORK SECURITY NATHAN HOUSE
27. THE ULTIMATE DARK WEB ANONYMITY PRIVACY AND SECURITY ZAID SABIH Z SECURITY
28. IT NETWORK CABLING HOFMEYR DE VOS
29. THE COMPLETE MOBILE ETHICAL HACKING COURSE – CODESTARS
30. WIFI HACKING USING EVIL TWIN ATTACKS AND CAPTIVE PORTALS
31. XSS THE PRACTICAL GUIDE – CHRISTOPHE LIMPALAIR CYBR TRAINING
32. MALWARE DEVELOPMENT COURES 2023 FROM ZERO TH OER- ENGIN DEMIRBILEK
33. TACTICAL WEB EXPLOTATION FOR PENETRATION TESTERS – MOHAMMAD SA’ED KHALIL KAROUI
34. ADOBE PREIMERE PRO CC MASTERCLASS – PHIL EBINER
35. CASP CAS 004 COMPLETE COURSE JASON DION
CTF SITES
1. PICOCTF.ORG (NOTES: The best beginner’s level CTF site, highly recommended!)
2. HACKTHEBOX.COM (NOTES: Platform that allows you to test your penetration testing skills.)
3. pwn.college
4. CYBERSKYLINE
5. TRYHACKME.COM (NOTES: Platform for learning and teaching cybersecurity.)
6. vulnhub.com (NOTES: Provides vulnerable virtual machines.
7. hackmyvm.eu (NOTES: Platform with boot2root VMs and online labs to test your hacking skills.
8. ringzer0ctf.com (NOTES: Jeopardy-style CTF platform, contains good challenges.
9. www.root-me.org/?lang=en (ROOT-ME.ORG) (NOTES: Jeopardy-style CTF platform.
10. overthewire.org/wargames/ (NOTES: Collection of wargames, start with Bandit
11. underthewire.tech (NOTES: Powershell challenges
12. w3challs.com (NOTES: Jeopardy-style CTF platform
13. cmdchallenge.com (NOTES: Linux commands challenges, its fun!)
14. ctf.hpandro.raviramesh.info (NOTES: Android CTF for beginners.)
15. ctf.hacker101.com
16. RINGZER0CTF
18. BUGCROWD UNIVERSITY
19. attackdefense.com
20. cryptohack.org
21. exploit.education
22. defendtheweb.net
23. Hacksplaining.com
24. ctf365.com
25. https://ethernaut.openzeppelin.com/
26. https://seela.io/en/battleh4ck/
27. ctf101.org
28. http://247ctf.com/
29. pentesterlab.com
30. www.vulnhub.com
31. practicalpentestlabs.com
32. labs.wizard-security.net
33. pentesterlab.com/
34. www.hackthis.co.uk
35. shellterlabs.com/pt/
36. www.zenk-security.com/epreuves.php
37. w3challs.com
38. www.newbiecontest.org/
39. cryptopals.com/
40. http://www.amanhardikar.com/mindmaps/Practice.html
41. alf.nu/alert1
42. www.hacksplaining.com/exercises
43. ctf.hacker101.com
44. academy.hackaflag.com.br/
45. lab.pentestit.ru
46. Pwntilldawn.com
47. capturetheflag.com.br
48. picoctf.com
49. https://www.wechall.net/active_sites
50. https://seela.io/en/battleh4ck/
51. https://ctftime.org/
52. exploit.education/
53. http://ctf.rootinjail.com
54. cmdchallenge.com
55. www.hacking-lab.com/index.html
56. pwnable.kr/play.php
57. https://34.73.111.210
58. capturetheflag.withgoogle.com/
59. immersivelabs.com
60. attackdefense.com/
61. www.holidayhackchallenge.com/
62. http://smashthestack.org/wargames.html
63. PWNABLE.KR (NOTES: Binary exploitation wargame with funny topics/images!
64. PWNABLE.TW (NOTES: Advanced binary exploitation wargame.
65. PWNABLE.XYZ (NOTES: Binary exploitation wargame.
66. PWN CHALLENGE (NOTES: Binary exploitation wargame.
67. PWN ADVENTURE (NOTES: Intentionally vulnerable MMORPG.
68. SMASH THE STACK (NOTES: Binary exploitation wargame
69. MICROCORRUPTION (NOTES: Learn to debug some programs in assembly!
70. REVERSING.KR (NOTES: Reverse engineering challenges.
71. CRACKMES (NOTES: Reverse engineering challenges.
72. WEBHACKING.KR (NOTES: Web exploitation challenges.
73. LORDOFSQLI (NOTES: SQLinjection challenges.
74. DEFENDTHEWEB (NOTES: Web exploitation challenges.
75. XSS GAME (NOTES: XSS challenges.
76. XSS GAME OTHER (NOTES: XSS challenges.
77. CRYPTOHACK (NOTES: Cryptography challenges.
78. CRYPTOPALS (NOTES: Cryptography challenges.
79. ID0-RSA (NOTES: Cryptography challenges.
80. TRYTODECRYPT (NOTES: Cryptography challenges.
81. ECHOCTF (NOTES: ONLINE CTF PLATFORM
82. EXPLOIT.EDUCATION (NOTES: PROVIDES VIRTUAL MACHINES TO LEARN ABOUT SECURITY ISSUES
83. HACKTHISSITE (NOTES: Jeopardy-style CTF platform.
84. HBH (NOTES: Jeopardy-style CTF platform.
85. MOD-X (NOTES: Jeopardy-style CTF platform.
86. PWN.TN (NOTES: Jeopardy-style CTF platform.
87. PROMPT RIDDLE (NOTES: Prompt-based jeopardy-style CTF platform.
88. HACKER GATEWAY (NOTES: Jeopardy-style CTF platform.
89. SUNINATAS (NOTES: KORAEN Jeopardy-style CTF platform.
90. Pentesterlab
91. Hacker 101
92. PentestIt Laboratories
93. Attack & Defense
94. CTF Antichat
95. Avatao
96. Capture The Flag At UCF
97. Exploit Education
98. CSAW 365
99. Practical Pentest Labs
100. Hack.Me\
101. Hackerdom
102. Forkbomb
103. FreeHackQuest
104. Hacking-Lab
105. Enigma Group
106. CTFlearn
107. CTF Komodo
108. RINGZER0 TEAM ONLINE
109. WeChall
110. Hack This Site
111. W3CHALLS
112. Game of Hacks
113. WebGoat Project
114. Sqli labb
115. Defend the web
116. Pwnable.tw
117. Command challenge
118. GOOGLE GRUYERE
119. CTFTIME
120. Mutillidae
121. Damn Vulnerable Web Application
122. bWAPP
123. Metasploitable 2
124. Metasploitable 3
125. ThreatGEN: Red vs. Blue
126. Hacknet
2. HACKTHEBOX.COM (NOTES: Platform that allows you to test your penetration testing skills.)
3. pwn.college
4. CYBERSKYLINE
5. TRYHACKME.COM (NOTES: Platform for learning and teaching cybersecurity.)
6. vulnhub.com (NOTES: Provides vulnerable virtual machines.
7. hackmyvm.eu (NOTES: Platform with boot2root VMs and online labs to test your hacking skills.
8. ringzer0ctf.com (NOTES: Jeopardy-style CTF platform, contains good challenges.
9. www.root-me.org/?lang=en (ROOT-ME.ORG) (NOTES: Jeopardy-style CTF platform.
10. overthewire.org/wargames/ (NOTES: Collection of wargames, start with Bandit
11. underthewire.tech (NOTES: Powershell challenges
12. w3challs.com (NOTES: Jeopardy-style CTF platform
13. cmdchallenge.com (NOTES: Linux commands challenges, its fun!)
14. ctf.hpandro.raviramesh.info (NOTES: Android CTF for beginners.)
15. ctf.hacker101.com
16. RINGZER0CTF
18. BUGCROWD UNIVERSITY
19. attackdefense.com
20. cryptohack.org
21. exploit.education
22. defendtheweb.net
23. Hacksplaining.com
24. ctf365.com
25. https://ethernaut.openzeppelin.com/
26. https://seela.io/en/battleh4ck/
27. ctf101.org
28. http://247ctf.com/
29. pentesterlab.com
30. www.vulnhub.com
31. practicalpentestlabs.com
32. labs.wizard-security.net
33. pentesterlab.com/
34. www.hackthis.co.uk
35. shellterlabs.com/pt/
36. www.zenk-security.com/epreuves.php
37. w3challs.com
38. www.newbiecontest.org/
39. cryptopals.com/
40. http://www.amanhardikar.com/mindmaps/Practice.html
41. alf.nu/alert1
42. www.hacksplaining.com/exercises
43. ctf.hacker101.com
44. academy.hackaflag.com.br/
45. lab.pentestit.ru
46. Pwntilldawn.com
47. capturetheflag.com.br
48. picoctf.com
49. https://www.wechall.net/active_sites
50. https://seela.io/en/battleh4ck/
51. https://ctftime.org/
52. exploit.education/
53. http://ctf.rootinjail.com
54. cmdchallenge.com
55. www.hacking-lab.com/index.html
56. pwnable.kr/play.php
57. https://34.73.111.210
58. capturetheflag.withgoogle.com/
59. immersivelabs.com
60. attackdefense.com/
61. www.holidayhackchallenge.com/
62. http://smashthestack.org/wargames.html
63. PWNABLE.KR (NOTES: Binary exploitation wargame with funny topics/images!
64. PWNABLE.TW (NOTES: Advanced binary exploitation wargame.
65. PWNABLE.XYZ (NOTES: Binary exploitation wargame.
66. PWN CHALLENGE (NOTES: Binary exploitation wargame.
67. PWN ADVENTURE (NOTES: Intentionally vulnerable MMORPG.
68. SMASH THE STACK (NOTES: Binary exploitation wargame
69. MICROCORRUPTION (NOTES: Learn to debug some programs in assembly!
70. REVERSING.KR (NOTES: Reverse engineering challenges.
71. CRACKMES (NOTES: Reverse engineering challenges.
72. WEBHACKING.KR (NOTES: Web exploitation challenges.
73. LORDOFSQLI (NOTES: SQLinjection challenges.
74. DEFENDTHEWEB (NOTES: Web exploitation challenges.
75. XSS GAME (NOTES: XSS challenges.
76. XSS GAME OTHER (NOTES: XSS challenges.
77. CRYPTOHACK (NOTES: Cryptography challenges.
78. CRYPTOPALS (NOTES: Cryptography challenges.
79. ID0-RSA (NOTES: Cryptography challenges.
80. TRYTODECRYPT (NOTES: Cryptography challenges.
81. ECHOCTF (NOTES: ONLINE CTF PLATFORM
82. EXPLOIT.EDUCATION (NOTES: PROVIDES VIRTUAL MACHINES TO LEARN ABOUT SECURITY ISSUES
83. HACKTHISSITE (NOTES: Jeopardy-style CTF platform.
84. HBH (NOTES: Jeopardy-style CTF platform.
85. MOD-X (NOTES: Jeopardy-style CTF platform.
86. PWN.TN (NOTES: Jeopardy-style CTF platform.
87. PROMPT RIDDLE (NOTES: Prompt-based jeopardy-style CTF platform.
88. HACKER GATEWAY (NOTES: Jeopardy-style CTF platform.
89. SUNINATAS (NOTES: KORAEN Jeopardy-style CTF platform.
90. Pentesterlab
91. Hacker 101
92. PentestIt Laboratories
93. Attack & Defense
94. CTF Antichat
95. Avatao
96. Capture The Flag At UCF
97. Exploit Education
98. CSAW 365
99. Practical Pentest Labs
100. Hack.Me\
101. Hackerdom
102. Forkbomb
103. FreeHackQuest
104. Hacking-Lab
105. Enigma Group
106. CTFlearn
107. CTF Komodo
108. RINGZER0 TEAM ONLINE
109. WeChall
110. Hack This Site
111. W3CHALLS
112. Game of Hacks
113. WebGoat Project
114. Sqli labb
115. Defend the web
116. Pwnable.tw
117. Command challenge
118. GOOGLE GRUYERE
119. CTFTIME
120. Mutillidae
121. Damn Vulnerable Web Application
122. bWAPP
123. Metasploitable 2
124. Metasploitable 3
125. ThreatGEN: Red vs. Blue
126. Hacknet
PRACTICE CYBERSECURITY
1. PICOCTF
2. ENIGMA GROUP
3. WECHALL
4. GOOGLE CTF
5. CTF.INFOSECINSTITUTE.COM
6. HACKING-LAB.COM
7. TRY2HACK.NL
8. DEFENDTHEWEB.NET
9. W3CHALLS/COM
10. RINGZER0CTF.COM
11. REVERSING.KR
12. MICROCORRUPTION.COM
13. SMASHTHESTACK.ORG
14. IO.NETGARAGE.ORG
15. GHOSTINTHESHELLCODE.COM
16. CODEGATE.ORG
17. GAMEOFHACKS.COM
18. CRACKMES.ONE
19. CHALLENGES.RE
20. ROOT-ME.ORG
21. EXPLOIT-EXERCISES.LAINS.SPACE COURSES AND LEARNING SITES FOR CYBERSECURITY
22. https://www.cybrary.it/
23. https://www.hacksplaining.com/lessons
24. https://www.hacker101.com/
25. https://www.opensecuritytraining.info/
26. https://www.sans.org/cyberaces/
27. https://portswigger.net/web-security
28. https://www.exploit-db.com/ (EXPLOIT DATABASE)
2. ENIGMA GROUP
3. WECHALL
4. GOOGLE CTF
5. CTF.INFOSECINSTITUTE.COM
6. HACKING-LAB.COM
7. TRY2HACK.NL
8. DEFENDTHEWEB.NET
9. W3CHALLS/COM
10. RINGZER0CTF.COM
11. REVERSING.KR
12. MICROCORRUPTION.COM
13. SMASHTHESTACK.ORG
14. IO.NETGARAGE.ORG
15. GHOSTINTHESHELLCODE.COM
16. CODEGATE.ORG
17. GAMEOFHACKS.COM
18. CRACKMES.ONE
19. CHALLENGES.RE
20. ROOT-ME.ORG
21. EXPLOIT-EXERCISES.LAINS.SPACE COURSES AND LEARNING SITES FOR CYBERSECURITY
22. https://www.cybrary.it/
23. https://www.hacksplaining.com/lessons
24. https://www.hacker101.com/
25. https://www.opensecuritytraining.info/
26. https://www.sans.org/cyberaces/
27. https://portswigger.net/web-security
28. https://www.exploit-db.com/ (EXPLOIT DATABASE)
CYBERSEC/LINUX/TECH YOUTUBERS I ENJOY
mental outlaw
junferno
distrotube
OpenSecurityTraining – helpful in tech
Lsecqt
THE LINUX EXPERIMENT
ChrisTitusTech
TechHut
NetworkChuck
THE CYBERE MENTOR
FREECODECAMP
HACKTHEBOX
BUGSWRITER
Brodie Robertson
Hackersploit
Huntress
crow
Gemini Cyber Security
Rick-Cen
Tibrius
LiveOverflow
Defconconference
PinkDraconion
Malfind labs
Hack in the box conference
Brian Douglas
json sec
Jason Ford {JSON:SEC}
Fuzzing Labs – Patrick Ventuzelo
Volkis
The PC Security Channel
Nahamsec
Reversing Hub
Tech
Hak
Thehackerish
I.T Security Labs
David Bombal
ActiveXSploit
Gerald Auger
perumal jegan
The OSINT Curious Project
Cutaway Security
DoingFedTime
RazviOverflow
null – The Open Security Community
Mossé Cyber Security Institute
Joas Antonio
Noah Axon
Ippsec
The cyber mentor
mitrecorp
Andy Li
Conda
DarkGhost
Sans offensive operations
Vinsloev Academy
Payatu
Hack Sudo
Mr Turvey
Ahmed alroky ( badbot )
NetworkChuck
Chris Powell
Jacob Sorber – C programming mainly
LufSec Cyber Security
Malfind Labs
tech
Cody Bernardy
Black Hills information security
EC Council
Cyber insight
ScurThsSht
Yaniv Hoffman
TheNotSoCivilEngr
Attack detect defend
Cybr
Trix
Grant Collins
DoingFedTime
Areyouor
Hacking Simplified
Infinite Logins
Pentest-Tools Com
Off By One Security
Dc cybersec
Cosmodium CyberSecurity
COURSE SINK
Black Hat
Cyber Attack & Defense
qphi
Unknown Artists – Cyber Threat Division
HaXeZ
ehacking
zSecurity
x
Michael sommer
RazviOverflow
Seytonic
Stacksmashing
Flashback Team
Offsec club
Raphael Mudge
Get Cyber
Varonis
Dark sec
Loi Liang Yang
Tactical Network Solutions
Sevagas
GetCyber
Farah Hawa
Hackwell Tech
The Exploiteers
Professor Messer
Cryptocat
Hacksplained
Red canary
Trellix
Infosec
Kevin Wallace Training, LLC
Stök
John Hammond
FlareXes
Cyber insecurity
Cyberlinx security
SANS ICS
Cubed
Ine training
CyberTech
The hated one
DAY[]
PwnFunction
Joe grand
SecurityFWD
Joas Antonio dos Santos
Daniel lowrie
The xss rat
Computerphile – helpful
thehackerish
CyberOffense
Elevate Cyber
Red team village
Sam Bowne
Hakin Media
Computerphile
Cyberspatial
Cyber Attack & Defense
CyberOffense
The Taggart Institute
Flashback Team
maker.moekoe
Null byte
Murmus CTF
junferno
distrotube
OpenSecurityTraining – helpful in tech
Lsecqt
THE LINUX EXPERIMENT
ChrisTitusTech
TechHut
NetworkChuck
THE CYBERE MENTOR
FREECODECAMP
HACKTHEBOX
BUGSWRITER
Brodie Robertson
Hackersploit
Huntress
crow
Gemini Cyber Security
Rick-Cen
Tibrius
LiveOverflow
Defconconference
PinkDraconion
Malfind labs
Hack in the box conference
Brian Douglas
json sec
Jason Ford {JSON:SEC}
Fuzzing Labs – Patrick Ventuzelo
Volkis
The PC Security Channel
Nahamsec
Reversing Hub
Tech
Hak
Thehackerish
I.T Security Labs
David Bombal
ActiveXSploit
Gerald Auger
perumal jegan
The OSINT Curious Project
Cutaway Security
DoingFedTime
RazviOverflow
null – The Open Security Community
Mossé Cyber Security Institute
Joas Antonio
Noah Axon
Ippsec
The cyber mentor
mitrecorp
Andy Li
Conda
DarkGhost
Sans offensive operations
Vinsloev Academy
Payatu
Hack Sudo
Mr Turvey
Ahmed alroky ( badbot )
NetworkChuck
Chris Powell
Jacob Sorber – C programming mainly
LufSec Cyber Security
Malfind Labs
tech
Cody Bernardy
Black Hills information security
EC Council
Cyber insight
ScurThsSht
Yaniv Hoffman
TheNotSoCivilEngr
Attack detect defend
Cybr
Trix
Grant Collins
DoingFedTime
Areyouor
Hacking Simplified
Infinite Logins
Pentest-Tools Com
Off By One Security
Dc cybersec
Cosmodium CyberSecurity
COURSE SINK
Black Hat
Cyber Attack & Defense
qphi
Unknown Artists – Cyber Threat Division
HaXeZ
ehacking
zSecurity
x
Michael sommer
RazviOverflow
Seytonic
Stacksmashing
Flashback Team
Offsec club
Raphael Mudge
Get Cyber
Varonis
Dark sec
Loi Liang Yang
Tactical Network Solutions
Sevagas
GetCyber
Farah Hawa
Hackwell Tech
The Exploiteers
Professor Messer
Cryptocat
Hacksplained
Red canary
Trellix
Infosec
Kevin Wallace Training, LLC
Stök
John Hammond
FlareXes
Cyber insecurity
Cyberlinx security
SANS ICS
Cubed
Ine training
CyberTech
The hated one
DAY[]
PwnFunction
Joe grand
SecurityFWD
Joas Antonio dos Santos
Daniel lowrie
The xss rat
Computerphile – helpful
thehackerish
CyberOffense
Elevate Cyber
Red team village
Sam Bowne
Hakin Media
Computerphile
Cyberspatial
Cyber Attack & Defense
CyberOffense
The Taggart Institute
Flashback Team
maker.moekoe
Null byte
Murmus CTF
STUFF TO EDIT AND SORT
https://pastebin.com/rqrLK6X0
Cybersecurity basics: https://wiki.installgentoo.com/wiki/Cybersecurity_-_/sec/_guide
and armory: https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armory
learning: https://wiki.installgentoo.com/wiki/Cybersecurity_-_Learning/News/CTFs
FREE CYBERSEC Reference books (PW: ABD52oM8T1fghmY0): https://mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF anti-surveillance: https://ssd.eff.org/
FREE CYBERSEC BOOKS/COURSES Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y
Cybersecurity basics: https://wiki.installgentoo.com/wiki/Cybersecurity_-_/sec/_guide
and armory: https://wiki.installgentoo.com/wiki/Cybersecurity_-_basics_and_armory
learning: https://wiki.installgentoo.com/wiki/Cybersecurity_-_Learning/News/CTFs
FREE CYBERSEC Reference books (PW: ABD52oM8T1fghmY0): https://mega.nz/#F!YigVhZCZ!RznVxTiA0iN-N6Ps01pEJw
/sec/ PDFs: https://mega.nz/#F!zGJT1QQQ!O-8yiH845GN26ajAvkoLkA
EFF anti-surveillance: https://ssd.eff.org/
FREE CYBERSEC BOOKS/COURSES Other library: https://mega.nz/file/UCgEGAjb#rwNcnMAQCUUbSp8supsFvn9QEHCWUW86eLcZa16ZG4Y
VM/CTFs:
http://overthewire.org/wargames/bandit/ – easy beginner
https://www.vulnhub.com/ – prebroken images
https://www.hackthebox.eu/ – super secret club
Huge info dump: https://pastebin.com/PDLdrsuq
https://www.vulnhub.com/ – prebroken images
https://www.hackthebox.eu/ – super secret club
Huge info dump: https://pastebin.com/PDLdrsuq
Recommended privacy tools
https://www.privacyguides.org/en/tools/
Operating systems
GNU/Linux or *BSD
Browser tests
https://www.deviceinfo.me
https://dnsleaktest.com
https://librespeed.org
https://privacytests.org
https://time.gov
https://dnsleaktest.com
https://librespeed.org
https://privacytests.org
https://time.gov
Frontends
https://wiki.installgentoo.com/wiki/Privacy_friendly_frontends
DNS resolvers
https://adguard-dns.io/en/welcome.html
https://nextdns.io
https://www.quad9.net
https://nextdns.io
https://www.quad9.net
Firmware
https://coreboot.org
https://libreboot.org
https://libreboot.org
ResourceS
https://anonymousplanet.org/guide.html
https://ssd.eff.org
https://ffprofile.com
https://ryf.fsf.org/products
https://github.com/gorhill/uBlock/wiki/
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://sizeof.cat/links
https://stallman.org/facebook.html
https://chromium.woolyss.com
https://ssd.eff.org
https://ffprofile.com
https://ryf.fsf.org/products
https://github.com/gorhill/uBlock/wiki/
https://haveibeenpwned.com
https://inteltechniques.com/workbook.html
https://sizeof.cat/links
https://stallman.org/facebook.html
https://chromium.woolyss.com