Info

This page for purpose share the idea, community, skillset, technical about Cyber Security and Information Security. How we can improve the skillset via LAB and CTF contest

General

InfoSec Blog page

Technical and Technologies for hacking

Awesome repository

  • awesome-pentest : A collection of awesome penetration testing resources, tools and other shiny things
  • awesome-infosec : A curated list of awesome infosec courses and training resources.
  • the-book-of-secret-knowledge : A collection of inspiring lists, manuals, cheat-sheets, blogs, hacks, one-liners, cli/web tools and more.
  • Awesome-Hacking : A collection of various awesome lists for hackers, pentesters and security researchers
  • awesome-hacker-search-engines : A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
  • h4cker : About ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
  • GO Simple Tunnel: A simple security tunnel written in golang
  • awesome-ctf : A curated list of CTF frameworks, libraries, resources and softwares
  • Awesome-Cybersecurity-Handbooks : A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.
  • awesome-privilege-escalation : A curated list of awesome privilege escalation

Programing Language

CVE Exploits Explorer

Container

OS and Computer architecture

InfoSec Research (Protocol, Malware, Vulnerables, โ€ฆ)

General Attacking + Defend skill

Privilege Escalation (RCE)

Cryptography

OSINT

Forensics

Web (Recon, Exploit)

Webhook

  • Webhook.site : Generates free, unique URLs and e-mail addresses and lets you see everything thatโ€™s sent there instantly. (Usage: Steal cookies, bypass authorized, โ€ฆ)
  • Mockoon: Locally mock API
  • Beeceptor : API Mocking

Reverse Engineer (RE)

Vulnerables Search Engine

Networking

VPN

Give applause for Nyr for contributing a wonderful setup, with those script, you just need 1 minutes for creating your own VPN and safely connected remotely with your network

Tunnelling

  • awesome-tunneling : List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
  • wstunnel : Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available

IPS / IDS

Virtual Private LAN Service

Zero Trust Network Access (ZTNA)

Zero Trust Mesh

Training page (LAB)

Info

The collections of mine about what you need to learn, how to solve problem and figure out what you decide on hacking, doing security and have fun

Introduce

RE (Reverse Engineer)

  • Crackme : Place to improving the RE skill
  • Nightmare: Intro to binary exploitation / reverse engineering course based around ctf challenges

Misc + Lab Machine

Network + Forensics + Digital Forensics

HacktheBox/CTF solution, hacking technical and OSCP

CTF (Capture the flag)

Info

โ€œCTFs are gamified competitive cybersecurity events that are based on different challenges or aspects of information security. They are excellent for both beginners and experienced hackers looking to develop, test, and prove their skills because they gamify hacking concepts. Weโ€™re big believers in the power of gamification here at Hack The Box! Gamification makes learning about something like a video game. Because gamification is fun and makes you think creatively, itโ€™s one of the most effective ways to learn and develop skills.โ€

Introduce

Youtube Channel

  • Martin Carlisle: Super cool and bring you more knowledge about CTF, especially for newbie via PicoCTF
  • SloppyJoePirates CTF Writeups: Trust me, he is really rare CTF player with most of passion and helpful contents
  • Almond Force: He write about Web and Forensic CTF challenge, Supper cool guy
  • CryptoCat: InfoSec education channel: CTF walkthroughs, binary exploitation, pen-testing, bug bounty, malware analysis, programming/scripting etc.

Training page

Events

  • CTFTime : Place where you can find the next CTF events time.

Best Writeups ever

Cloud

Info

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. Source: Wikipedia

Awesome pages

  • T Wiki : Chinese page who talk about Security Cloud with multiple provider like Azure, AWS, GCP, โ€ฆ
  • Hacking the Cloud: An encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure.

Articles

Bug Bounty

Info

Aย bug bounty programย is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensationย for reportingย bugs, especially those pertaining toย securityย exploitsย andย vulnerabilities. You can become participant of Bounty program via

Hacking/InfoSec Youtube Channel

  • 13Cubed: Digital Forensics. Hacking. Home Labs.
  • Motasem Hamdan: HTB and THM resolution, creative guy who will guide you about security
  • John Hammond : Super dope and cool guy who teach you helpful things, cool stuff about hacking, cyber security
  • David Bombal : Networking Guy with hand on in physical network items, hacking conservation and guide you on hacking journey with cool contribute
  • LiveOverflow: Binary exploiting guy with guide you about that, more about IT security
  • NetworkChuck: Very Helpful, super dope and friendly guy with detailing explanation (Recommendation), guide you about network, cloud, linux and more about homelab
  • IppSec: Best ever on HTB Solution, Guide you pwn a box and learn about scenarios to reaching them
  • Loi Liang Yang: Super cool technic with hacking can explore
  • Computerphile: All about computers and computer stuff
  • The Cyber Mentor: TCM Security, Very clear contents for starters
  • Null Byte : Aspiring ethical hackers, computer scientists, and the infosec community
  • DC CyberSec: Freelance in Cybersecurity Guy
  • Grant Collins: Funny guy who guide you about Cybersecurity career, education, and the occasional deeboodah shenanigans.
  • Seytonic : Break down and dissect cyber security related tech news
  • STร–K: Bug Bounty sharing, explain and suggest a cool mindset prep for bug bounty
  • InsiderPhD: She is guiding about bug bounty for starter, cool contents and technics
  • SecurityFWD: SecurityFWD shows the latest security tools, amazing projects, and keeps you on the edge of whatโ€™s possible in security today.
  • zSecurity: Provide for guideline to becoming Ethical Hacker
  • Hak5
  • Zanidd: Hacker, Dev & Educator
  • HackerSploit : HackerSploit is the leading provider of free Infosec and cybersecurity training
  • NahamSec: Bug bounty guy with impressed technics, conversation hacking and moreover
  • DAY0: Previous DAY[0] podcasts as well as other reverse engineering / exploit development-related media
  • Cristi Vlad
  • LTN Labs