Created
June 12, 2016 08:19
-
-
Save trietptm/3a95bac494c469c2a136a2cf4e54e117 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
By Tanguy Andreani | |
Twitter: @andreani_tanguy | |
Website: https://globalnewsys.wordpress.com/ | |
Date: 1 July 2014 | |
More than 1200 websites ! | |
Blogs on Computer Security: | |
https://antelox.blogspot.com/ | |
http://www.dumpanalysis.org/blog/ | |
http://www.abuse.ch/ | |
http://zairon.wordpress.com/ | |
http://androguard.blogspot.com/ | |
http://blog.w4kfu.com/ | |
http://akhenath0n.blogspot.com/ | |
http://diarrlf.wordpress.com/ | |
http://deobfuscated.blogspot.com/ | |
http://www.h-i-r.net/ | |
http://mysterie.fr/blog/ | |
http://www.skullsecurity.org/blog/ | |
http://www.wrgross.com/blogs/security/ | |
http://net-effects.blogspot.com/ | |
http://eiploader.wordpress.com/ | |
http://cyb3rsleuth.blogspot.com/ | |
http://0entropy.blogspot.com/ | |
http://siri-urz.blogspot.com/ | |
http://newsoft-tech.blogspot.com/ | |
http://www.ragestorm.net/blogs/ | |
http://codeexploration.blogspot.com/ | |
http://esploit.blogspot.com/ | |
http://thexploit.com/ | |
http://mysterie.fr/blog/ | |
http://bailey.st/blog/ | |
http://touchmymalware.blogspot.ru/ | |
http://blog.delroth.net/ | |
http://novahackers.blogspot.com/ | |
http://greatis.com/blog/ | |
http://mcdermottcybersecurity.com/ | |
http://grandstreamdreams.blogspot.de/ | |
http://binholic.blogspot.com/ | |
http://www.ikotler.org/ | |
http://alexmcgeorge.wordpress.com/ | |
http://xorl.wordpress.com/ | |
http://rcejunk.blogspot.com/ | |
http://jack-mannino.blogspot.com/ | |
http://www.shatter.fr/ | |
http://oberheimdmx.blogspot.com/ | |
http://x9090.blogspot.com/ | |
http://honeyblog.org/ | |
http://volatile-minds.blogspot.com/ | |
http://androidcracking.blogspot.com/ | |
http://x86overflow.blogspot.com/ | |
http://www.ivanlef0u.tuxfamily.org/ | |
http://kioresk.wordpress.com/ | |
http://uberskill.blogspot.com/ | |
http://jupiternd.blogspot.com/ | |
http://eternal-todo.com/ | |
http://blogs.technet.com/b/mmpc/ | |
http://www.sysforensics.org/ | |
http://mrbelyash.blogspot.com/ | |
http://www.hamza.ma/ | |
http://www.skidlist.com/ | |
http://synux.free.fr/ | |
http://crackinglandia.blogspot.com/ | |
http://blog.c22.cc/ | |
http://ariadne-project.blogspot.com/ | |
http://myne-us.blogspot.com/ | |
http://www.pentestgeek.com/ | |
http://rcelab.wordpress.com/ | |
http://blog.damballa.com/ | |
http://www.exploit-monday.com/ | |
http://websec.wordpress.com/ | |
http://addxorrol.blogspot.com/ | |
http://d0cs4vage.blogspot.com/ | |
http://blog.cr4.sh/ | |
http://numcodes.blogspot.com/ | |
http://prendreuncafe.com/blog/ | |
http://marcoramilli.blogspot.co.uk/ | |
http://blog.opensecurityresearch.com/ | |
http://majii.wordpress.com/ | |
http://l0uk0um.pagesperso-orange.fr/site/index.html | |
http://xylibox.blogspot.com/ | |
http://vrt-blog.snort.org/ | |
http://blog.codepainters.com/tags/android-2/ | |
http://cyb3rsleuth.blogspot.fr/ | |
http://crucialsecurityblog.harris.com/ | |
http://www.gotohack.org/ | |
http://xartrick.free.fr/index.php?page=home | |
http://auntitled.blogspot.com/ | |
http://kkrjunkyard.blogspot.com/ | |
http://malwrecon.blogspot.com/ | |
http://ho.ax/ | |
http://blog.icerbero.com/ | |
http://blog.rewolf.pl/blog/ | |
http://waleedassar.blogspot.com/ | |
http://evilfingers.blogspot.com/ | |
http://blog.zx2c4.com/ | |
http://blog.airesoft.co.uk/ | |
http://www.hexacorn.com/blog/ | |
http://blog.zeltser.com/ | |
http://deletemalware.blogspot.com/?m=1 | |
http://www.alex-ionescu.com/ | |
http://deceptive-room.blogspot.com/ | |
http://blog.pushebx.com/ | |
http://contagiodump.blogspot.com/ | |
http://blog.9bplus.com/ | |
http://0vercl0k.blogspot.com/ | |
http://cyberarms.wordpress.com/ | |
http://baboon.rce.free.fr/ | |
http://c0decstuff.blogspot.com/ | |
http://darklapu.blogspot.com/ | |
http://gdtr.wordpress.com/ | |
http://exploiting.wordpress.com/ | |
http://fluxius.handgrep.se/ | |
https://xorl.wordpress.com/ | |
http://securityblog.s21sec.com/ | |
http://www.cs.bham.ac.uk/~covam/ | |
http://joe-is-a-rocknroll-star.blogspot.com/ | |
http://malwageddon.blogspot.com/ | |
http://dreamofareverseengineer.blogspot.com/ | |
http://fz-corp.net/ | |
http://thisisudax.blogspot.com/ | |
http://0vercl0k.tuxfamily.org/bl0g/ | |
http://memo.labz.free.fr/blog/ | |
http://www.dodgycoder.net/ | |
https://kienmanowar.wordpress.com/ | |
http://secniche.blogspot.it/ | |
http://melzas.free.fr/ | |
http://sviehb.wordpress.com/ | |
http://extraexploit.blogspot.com/ | |
http://deletemalware.blogspot.com/ | |
http://research.zscaler.com/ | |
http://baboon.rce.free.fr/index.php | |
http://nagareshwar.securityxploded.com/ | |
http://blog.trendmicro.com/ | |
http://gynvael.coldwind.pl/?blog=1 | |
http://ondailybasis.com/blog/ | |
http://grey-corner.blogspot.com/ | |
http://milkmix.blogspot.com/ | |
http://dsecrg.blogspot.com/ | |
http://malwaremustdie.blogspot.jp/ | |
http://picturoku.blogspot.com/ | |
http://myownangle.blogspot.com/ | |
http://neil-hippiekiller.blogspot.com/ | |
http://r00tsec.blogspot.com/ | |
http://danyzatuchna.blogspot.com/ | |
http://1800sex.blogspot.com/ | |
http://alitarhini.wordpress.com/ | |
http://trustedsignal.blogspot.com/ | |
http://katzdm.blogspot.com/ | |
http://mnin.blogspot.com/ | |
http://aassfxxx.infos.st/ | |
http://pl4f0rd.blogspot.com/ | |
http://blog.scrt.ch/ | |
http://ardsec.blogspot.in/ | |
http://www.malanalysis.com/blog/ | |
http://www.seclist.us/ | |
http://blog.clamav.net/ | |
http://ardsec.blogspot.com/ | |
http://blog.oxff.net/#xwuqt3dgysac6jqbro5q | |
http://securityh4x.blogspot.com/ | |
http://recxltd.blogspot.com/ | |
http://home.comcast.net/~tom_forsyth/blog.wiki.html | |
http://trackingcybercrime.blogspot.com/ | |
http://blog.novirusthanks.org/ | |
http://www.horghsblog.blogspot.com/ | |
http://blog.nibblesec.org/ | |
http://horghsblog.blogspot.com/ | |
http://bernardodamele.blogspot.com/ | |
http://interestingmalware.blogspot.com/ | |
http://eromang.zataz.com/ | |
http://revpp.blogspot.com/ | |
http://blog.armorize.com/ | |
https://malwarereversing.wordpress.com/ | |
http://agentsil.blogspot.com/ | |
http://blogs.paretologic.com/malwarediaries/ | |
http://7h3ram.blogspot.com/ | |
http://mylifewithandroid.blogspot.com/ | |
http://resheth.wordpress.com/ | |
http://taosecurity.blogspot.com/ | |
http://marcoramilli.blogspot.com/ | |
http://000fff.blogspot.com/ | |
http://blog.stalkr.net/ | |
http://blog.nibbles.fr/ | |
http://lilxam.blogspot.com/ | |
http://hammackj.com/ | |
http://labs.bitdefender.com/blog/ | |
http://xsp21hd3r.blogspot.com/ | |
http://blog.s21sec.com/ | |
http://codelaughs.blogspot.com/ | |
http://internetopenurla.blogspot.com/ | |
http://kmkz-web-blog.blogspot.com/ | |
http://ossectools.blogspot.fr/ | |
http://malwarereversing.wordpress.com/ | |
http://malwareanalyser.blogspot.com/ | |
http://blog.cr0.org/ | |
http://eticanicomana.blogspot.com/ | |
http://www.hexblog.com/ | |
http://j00ru.vexillium.org/ | |
http://androidreversing.blogspot.com/ | |
http://blog.dkbza.org/ | |
http://curv3.wordpress.com/ | |
https://0xcd80.wordpress.com/ | |
http://ddanchev.blogspot.com/ | |
Reverse Engineering – Malware Analysis: | |
http://evilcodecave.blogspot.com | |
http://codejury.com/ | |
http://nezumi-lab.org/ | |
http://hypersecurity.blogspot.com/ | |
http://c-apt-ure.blogspot.fr/ | |
http://angelkillah.blogspot.com/ | |
http://interestingmalware.blogspot.fr/ | |
http://bartblaze.blogspot.com/ | |
http://www.hexacorn.com/blog/ | |
http://joe4security.blogspot.de/ | |
http://hiddenillusion.blogspot.fr/ | |
http://mariomalwareanalysis.blogspot.com/ | |
http://malware.dontneedcoffee.com/ | |
http://artemonsecurity.blogspot.com/ | |
http://www.lexsi-leblog.com/ | |
http://www.contextis.co.uk/research/blog/ | |
http://androidcracking.blogspot.in/ | |
http://5x5sec.blogspot.fr/ | |
http://technicalinfodotnet.blogspot.com/ | |
http://sluganalysislab.blogspot.com/ | |
http://www.codereversing.com/blog/ | |
http://migeel.sk/ | |
http://blog.didierstevens.com/ | |
http://reversingonwindows.blogspot.it/ | |
http://blog.praty.net/ | |
http://thelegendofrandom.com/blog/ | |
http://exploitshop.wordpress.com/ | |
http://spamalysis.wordpress.com/ | |
http://pwnhome.wordpress.com/ | |
http://oldblog.cmif.eu/ | |
http://andrewl.dreamhosters.com/ | |
http://anirudhsasikumar.net/blog/2011.12.15.html | |
http://archive.itee.uq.edu.au/~csmweb/decompilation/home.html | |
http://astral.tuxfamily.org/sys/ | |
http://beatrix2004.free.fr/index.html | |
http://bitblaze.cs.berkeley.edu/ | |
http://blip.tv/sourceboston2011/adding-another-level-of-hell-to-reverse-engineering-5890863 | |
http://blog.crowdstrike.com/ | |
http://blog.infosanity.co.uk/2009/04/12/honeypotting-with-nepenthes/ | |
http://blog.malwaretracker.com/ | |
http://blog.webroot.com/ | |
http://cci.cocolog-nifty.com/ | |
http://code.google.com/p/corkami/ | |
http://code.google.com/p/fuu/ | |
http://code.google.com/p/it-sec-catalog/ | |
http://code.google.com/p/malware-lu/ | |
http://comcrazy.net76.net/ | |
http://cracking.z0ro.com/ | |
http://cracklab.ru/ | |
http://crackmes.host.sk/ | |
http://cryptokg.cjb.net/ | |
http://cryptome.org/ | |
http://deroko.phearless.org/index.html | |
http://diablo2oo2.di.funpic.de/index.html | |
http://esec-lab.sogeti.com/ | |
http://exelab.ru/ | |
http://festouilles.free.fr/newffr/SMCrackMe_Kharneth/elooo/ | |
http://forum.security-x.fr/malwares-315/(fiches-malware)-roguescareware-et-ransomware/ | |
http://foundme.chez.com/crackmeSerial1.htm | |
http://fumalwareanalysis.blogspot.com/ | |
http://gem.intro.hu/ | |
http://hackitoergosum.org/ | |
http://handlers.sans.org/pbueno/ | |
http://holyview.site.free.fr/ | |
http://jardinezchezjb.free.fr/ | |
http://kharneth.free.fr/ | |
http://l0uk0um.pagesperso-orange.fr/site/dora/ | |
http://l0uk0um.pagesperso-orange.fr/site/dora/index.html | |
http://lkubaski.free.fr/reverse/reverse.html | |
http://mordor.in/ | |
http://myavscan.net/index.php | |
http://nepenthes.carnivore.it/ | |
http://old.honeynet.org/scans/scan33/nico/#0 | |
http://opensecuritytraining.info/Welcome.html | |
http://p4r4n0id.com/ | |
http://portal.b-at-s.net/download.php | |
http://portal.b-at-s.net/news.php | |
http://pumqara.i-nz.net/html/ | |
http://quequero.org/ | |
http://rammichael.com/ | |
http://rcecafe.net/ | |
http://re-xe.com/ | |
http://redcrew.astalavista.ms/home/ | |
http://redcrew.astalavista.ms/home/index.php?crk=releases&cracker=RED%20CReW | |
http://reverse.put.as/ | |
http://reversemode.com/ | |
http://reversengineering.wordpress.com/ | |
http://rogunix.com/ | |
http://sandsprite.com/CodeStuff/Build_your_own_executable_crypter.html | |
http://sandsprite.com/papers.html | |
http://scan4you.net/ | |
http://serials2007.do.sapo.pt/index.htm | |
http://shell-storm.org/ | |
http://sid.rstack.org/blog/index.php/ | |
http://silverstr.ufies.org/lotr0/ | |
http://silverstr.ufies.org/lotr0/index.html | |
http://tamaroth.eu/ | |
http://taz.newffr.com/ | |
http://threatpost.com/en_us/blogs/introduction-malware-analysis-042810 | |
http://travisaltman.com/ | |
http://tsrh.freeserials.com/ | |
http://volatility-labs.blogspot.com/ | |
http://www-igm.univ-mlv.fr/~dr/XPOSE2008/RCE_KG_IR3/index.html#introduction | |
http://www.aoreteam.com/vb/ | |
http://www.authsecu.com/honeypots-honeynet/honeypots-honeynet.php#Les_honeypots_en_vogue | |
http://www.binary-auditing.com/ | |
http://www.bleepingcomputer.com/ | |
http://www.catch22.net/tuts/vmware | |
http://www.codebreakers-journal.com/ | |
http://www.codereversing.com/blog/ | |
http://www.cryptokg.cjb.net/ | |
http://www.dagstuhl.de/mat/index.en.phtml?12051 | |
http://www.deamoncrack.host.sk/ | |
http://www.debugman.com/ | |
http://www.decalage.info/en | |
http://www.eresi-project.org/ | |
http://www.exetools.com/ | |
http://www.exposedbotnets.com/ | |
http://www.forensicswiki.org/wiki/Main_Page | |
http://www.fr33project.org/index.html | |
http://www.gonullyourself.org/main/index.php | |
http://www.infosecinstitute.com/ | |
http://www.irhoneynet.org/ | |
http://www.jespersaur.com/drupal/book/export/html/21 | |
http://www.kdsbest.com/ | |
http://www.kizhakkinan.com/ | |
http://www.labo-asso.com/php/travaux.php | |
http://www.larp64.com/ | |
http://www.malekal.com/category/windows/malwares/ | |
http://www.maliciousnetworks.org/ | |
http://www.malware.lu/ | |
http://www.malwarecookbook.com/?p=49 | |
http://www.malwaredomains.com/wordpress/ | |
http://www.mindkind.org/wiki/underground/ivanlefou | |
http://www.multiweb.cz/devilzcrack/main.html | |
http://www.mynooblife.org/ | |
http://www.netsecurity.com/training/malware_analysis_training.html | |
http://www.nynaeve.net/ | |
http://www.osix.net/modules/article/?id=760 | |
http://www.porcupine.org/forensics/forensic-discovery/chapter6.html | |
http://www.rcedir.com/ | |
http://www.reconstructer.org/ | |
http://www.revenge-crew.com/ | |
http://www.reverse-engineering.info/ | |
http://www.reversemode.com/ | |
http://www.reversing.be/ | |
http://www.reversing.be/index.php?topic=crackmes | |
http://www.reversinglabs.com/ | |
http://www.safengine.com/ | |
http://www.symantec.com/connect/articles/malware-analysis-administrators | |
http://www.symantec.com/connect/articles/using-nepenthes-honeypots-detect-common-malware | |
http://www.tcct.us/modlar/QuAdR/ | |
http://www.tdeig.ch/ | |
http://www.trapkit.de/index.html | |
http://www.uninformed.org/ | |
http://www.unpack.cn/ | |
http://www.unpack.cn/portal.php | |
http://www.usenix.org/event/hotdep08/tech/ | |
http://www.utdallas.edu/~zhiqiang.lin/spring2012.html#toc1 | |
http://www.virtualabs.fr/ | |
http://www.w00zl3.net/#rce | |
http://www.woodmann.com/crackz/index.html | |
http://www.woodmann.com/forum/index.php | |
http://www.woodmann.com/TiGa/ | |
http://xchg.info/wiki/index.php?title=Main_Page | |
http://xspider.free.fr/Site/ | |
http://xtx.free.fr/ | |
http://xylibox.blogspot.com/2011/04/malware-unpacking-xxxvideoexe-generic.html?spref=tw | |
http://zeltser.com/malware-analysis-toolkit/#isolate-laboratory-system | |
https://code.google.com/p/it-sec-catalog/ | |
https://noppa.aalto.fi/noppa/kurssi/t-110.6220/luennot | |
https://sites.google.com/site/erocarrera/code-projects | |
https://sites.google.com/site/erocarrera/home | |
https://www.botnets.fr/index.php/Accueil | |
https://www.cs.drexel.edu/~spiros/ | |
https://www.infosecisland.com/blogview/3044-Building-your-OWN-Malware-Lab-Part-1.html | |
Botnet Tracking: | |
http://exposebotnets.blogspot.com/ | |
http://tigzyrk.blogspot.com/ | |
http://www.shadowserver.org/wiki/ | |
http://mtc.sri.com/Conficker/P2P/index.html | |
http://practicalmalwareanalysis.com/2012/05/08/using-public-dns-servers-to-bypass-dns-filtering/ | |
http://www.honeynet.it/ | |
http://blog.praty.net/?p=315 | |
http://oberheimdmx.blogspot.com/ | |
http://blogs.orange-business.com/securite/2009/02/fast-flux-et-double-fast-flux-techniques-de-resiliencde-]]sites-douteux.html | |
http://botnet-tracker.blogspot.com/ | |
http://hphosts.blogspot.com/ | |
http://www.autoshun.org/ | |
http://monge.univ-mlv.fr/~dr/XPOSE2009/botnets/index.html | |
http://sempersecurus.blogspot.com/ | |
http://blog.fortiguard.com/tag/botnet/ | |
http://hphosts.blogspot.com/ | |
http://sempersecurus.blogspot.com/ | |
http://urlquery.net/ | |
http://www.malwaredomainlist.com/ | |
http://xylithreats.free.fr/ | |
http://blog.fireeye.com/research/malware_research/ | |
http://blog.fortiguard.com/tag/android/ | |
http://channel9.msdn.com/Events/TechEd/NorthAmerica/2012/SIA302 | |
http://code.google.com/p/androguard/ | |
http://cyb3rsleuth.blogspot.fr/ | |
http://internetpol.fr/ms/ | |
http://malwageddon.blogspot.com/ | |
http://malware-analyzer.blogspot.com/ | |
http://malwaremustdie.blogspot.jp/ | |
http://malwr.com/ | |
http://oberheimdmx.blogspot.com/ | |
http://oc.gtisc.gatech.edu:8080/ | |
http://openmalware.org/ | |
http://research.nq.com/ | |
http://secniche.blogspot.it/ | |
http://sempersecurus.blogspot.com/ | |
http://siri-urz.blogspot.com/ | |
http://syrianmalware.com/ | |
http://techsec.tumblr.com/ | |
http://toolsddos.blogspot.com/ | |
http://touchmymalware.blogspot.ru/ | |
http://trackingcybercrime.blogspot.com/ | |
http://virusshare.com/ | |
http://www.ccssforum.org/ | |
http://www.ccssforum.org/malware-certificates.php | |
http://www.csc.ncsu.edu/faculty/jiang/ | |
http://www.lastline.com/index.php | |
http://www.malgenomeproject.org/ | |
http://www.malwaredomainlist.com/ | |
http://www.malwaredomainlist.com/mdl.php | |
http://www.phishtank.com/ | |
http://www.skidlist.com/ | |
http://xylithreats.free.fr/ | |
https://www.malwaretracker.com/ | |
https://www.usenix.org/conference/usenixsecurity12/droidscope-seamlessly-reconstructing-os-and-dalvisemantic-]]views | |
Virus Research: | |
http://k_wismer.tripod.com/ | |
http://www.cryptovirology.com/ | |
http://62nds.com/ | |
http://amada.abuse.ch/ | |
http://blackip.ustc.edu.cn/ | |
http://blog.fireeye.com/research/ | |
http://blog.urlvoid.com/new-list-of-dangerous-websites-to-avoid/ | |
http://cert.at/index.html | |
http://code.google.com/p/jambi-pitek/ | |
http://code.google.com/p/jambono/ | |
http://crapfactory.free.fr/infecter_pe.php | |
http://ezine.vxnetw0rk.ws/ | |
http://hb.cryptologic.tk/ | |
http://hfactorx.org/ | |
http://honeywhales.com/malware_samples/list | |
http://infosthetics.com/archives/2008/01/malwarez_cyber_threats.html | |
http://iseclab.org/ | |
http://joineset.com/researcher_cv.html | |
http://lists.virus.org/ | |
http://malc0de.com/database/ | |
http://mtc.sri.com/ | |
http://mtc.sri.com/Conficker/ | |
http://secuboxlabs.fr/ | |
http://sitecheck.sucuri.net/scanner/ | |
http://softwarefindings.wordpress.com/ | |
http://spth.virii.lu/main.htm | |
http://support.clean-mx.de/clean-mx/viruses.php | |
http://technet.microsoft.com/en-us/security/cc165596.aspx | |
http://toku.es/ | |
http://uidzero.org.ua/ | |
http://vazonez.com/ | |
http://vx.org.ua/bernieevx/ | |
http://vxvault.siri-urz.net/URL_List.php | |
http://vxvault.siri-urz.net/ViriList.php | |
http://www.aavar.org/en/ | |
http://www.amtso.org/ | |
http://www.antiphishing.org/ | |
http://www.arcade-museum.com/vaps/ | |
http://www.av-comparatives.org/ | |
http://www.aved.net/ | |
http://www.avien.net/ | |
http://www.cexx.org/ | |
http://www.checkvir.com/ | |
http://www.cs.virginia.edu/~cs351-dada/lectures.html | |
http://www.csis.dk/en/ | |
http://www.damballa.com/ | |
http://www.eicar.org/ | |
http://www.f-secure.com/weblog/archives/00001421.html | |
http://www.first.org/ | |
http://www.fleitold.com/ | |
http://www.malwareinfo.org/ | |
http://www.malwareint.com/ | |
http://www.malwareurl.com/ | |
http://www.mandiant.com/ | |
http://www.noh.ro/craiu.com/papers/ | |
http://www.novirusthanks.org/ | |
http://www.offensivecomputing.net/ | |
http://www.scumware.org/ | |
http://www.securelist.com/en/ | |
http://www.securelist.com/en/analysis/204792172/The_Advertising_Botnet#3 | |
http://www.shadowserver.org/wiki/pmwiki.php | |
http://www.symantec.com/business/security_response/whitepapers.jsp | |
http://www.threatlog.com/ | |
http://www.tml.tkk.fi/Opinnot/T-110.6220/2008/ | |
http://www.uniteagainstmalware.com/schools.php | |
http://www.virus.org/ | |
http://www.wildlist.org/ | |
http://www.xs4all.nl/~harisha/frans/english/tbav.htm | |
http://z0mbie.host.sk/ | |
https://malwaretracker.com/index.php | |
https://spyeyetracker.abuse.ch/monitor.php?browse=binaries | |
https://www.honeynet.org/node/668 | |
https://zeustracker.abuse.ch/monitor.php?browse=binaries | |
Kernel, Rootkits, Windows Internals, Hypervisor, Virtualization: | |
http://theinvisiblethings.blogspot.com/ | |
http://codelaughs.blogspot.nl/ | |
http://www.wheaty.net/ | |
http://windowsir.blogspot.com/ | |
http://redplait.blogspot.ru/ | |
http://www.rootkitanalytics.com/ | |
http://amnesia.gtisc.gatech.edu/~moyix/tpcompare/withnums/ | |
http://blogs.msdn.com/b/ntdebugging/ | |
http://en.wikibooks.org/wiki/Windows_Programming | |
http://home.comcast.net/~supportcd/XPMyths.html | |
http://i-web.i.u-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/ | |
http://migeel.sk/ | |
http://poppopret.blogspot.com/ | |
http://syprog.blogspot.com/ | |
http://virtualdub.org/blog/pivot/entry.php?id=365 | |
http://win32.mvps.org/ | |
http://wn.com/Kernel_debugger | |
http://www.codemachine.com/ | |
http://www.codeproject.com/Articles/9504/Driver-Development-Part-1-Introduction-to-Drivers | |
http://www.cs.berkeley.edu/~lorch/vtrace/ | |
http://www.itknowledge24.com/ | |
http://www.kernelmode.info/forum/index.php | |
http://www.labri.fr/perso/betrema/winnt/ | |
http://www.memorymanagement.org/ | |
http://www.netspi.com/blog/2009/10/05/windows-privilege-escalation-part-1-local-administratoprivileges/]] | |
http://www.osronline.com/ | |
http://www.relisoft.com/win32/index.htm | |
http://www.winprog.org/tutorial/ | |
Exploitation, Vulnerability Analysis, Bug Hunting: | |
http://en.wikibooks.org/wiki/Metasploit | |
http://aluigi.altervista.org/ | |
http://nvd.nist.gov/ | |
http://www.offensive-security.com/ | |
http://www.phreedom.org/ | |
http://0xdabbad00.com/ | |
http://blackbox.smashthestack.org:85/ | |
http://blog.beefproject.com/ | |
http://carnal0wnage.attackresearch.com/ | |
http://exploitability.blogspot.fr/ | |
http://fr.wikipedia.org/wiki/Portail:Informatique | |
http://g0tmi1k.blogspot.com/ | |
http://isisblogs.poly.edu/ | |
http://nullsecurity.net/ | |
http://phreedom.org/ | |
http://skypher.com/ | |
http://smashthestack.org/ | |
http://spareclockcycles.org/ | |
http://theamazingking.com/exploit.php | |
http://turkeyland.net/projects/overflow/index.php | |
http://w00t.pro/ | |
http://www.1337day.com/ | |
http://www.chroot.org/ | |
http://www.commonexploits.com/ | |
http://www.creativeo.net/ | |
http://www.enderunix.org/?lng=en | |
http://www.exploit-exercises.com/ | |
http://www.exploitsearch.net/ | |
http://www.infond.fr/ | |
http://www.linuxrocket.net/9184-Exploit_writing_tutorials.htm?utm_source=twitterfeed&utm_medium=twitter | |
http://www.linuxsecurity.com.br/info/exploit/remotexploit.php | |
http://www.lsd-pl.net/ | |
http://www.madpowah.org/textes/srs/index.html | |
http://www.room362.com/ | |
http://www.safemode.org/ | |
http://www.tenouk.com/cncplusplusbufferoverflow.html | |
http://www.whitephosphorus.org/ | |
http://www.cc.gatech.edu/~blee303/ | |
http://g.oswego.edu/dl/html/malloc.html | |
http://p0wnlabs.com/ | |
http://io.smashthestack.org:84/ | |
https://www.alternativ-testing.fr/ | |
http://vulnfactory.org/ | |
http://www.zeroscience.mk/en/ | |
http://www.vulnerability-lab.com/ | |
http://nvd.nist.gov/ | |
http://www.matasano.com/#overview | |
http://sectools.org/tag/vuln-scanners/ | |
http://seclab.cs.ucdavis.edu/projects/testing/ | |
http://www.cve.mitre.org/index.html | |
http://www.mendeley.com/research/vulnerability-analysis-x86-executables-using-genetic-algorithfuzzing/]] | |
http://www.mitre.org/ | |
http://retrogod.altervista.org/ | |
http://www.offensive-security.com/vulndev/ | |
http://pax.grsecurity.net/docs/ | |
http://www.gossamer-threads.com/lists/fulldisc/full-disclosure/ | |
http://secunia.com/products/ | |
http://blog.infostretch.com/vulnerability-assessment-iv | |
http://www.bullseye.com/coverage.html | |
http://cve.mitre.org/index.html | |
http://www.codenomicon.com/ | |
http://www.zerodayinitiative.com/ | |
http://www.cvedetails.com/ | |
http://www.inshell.net/index.php/2011/11/30/buffer-overflow-a-real-world-example/ | |
http://sf-freedom.blogspot.com/ | |
http://www.us-cert.gov/reading_room/ | |
http://www.exploit-db.com/papers/12965/ | |
http://lsd-pl.net/ | |
http://research.cs.wisc.edu/mist/includes/tutorials.html | |
http://www.securityspace.com/sspace/index.html | |
http://census-labs.com/ | |
http://www.mattandreko.com/ | |
http://www.xssed.com/ | |
http://aluigi.altervista.org/ | |
http://penturalabs.wordpress.com/ | |
Shellcoding: | |
http://dvlabs.tippingpoint.com/blog/2011/12/05/shellcode-detection-python?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+dvlabsblog+(TippingPoint+DVLabs+Blog)&utm_content=Google+Reader | |
http://goodfellas.shellcode.com.ar/docz/bof/Writing_shellcode.html | |
http://joxeankoret.com/blog/2012/05/06/embedding-a-shellcode-in-a-pe-file/ | |
http://projectshellcode.com/ | |
http://projectshellcode.com/?q=node/12 | |
http://www.codeproject.com/Articles/325776/The-Art-of-Win32-Shellcoding | |
http://www.hick.org/code/skape/shellcode/ | |
http://www.projectshellcode.com/ | |
http://www.vividmachines.com/shellcode/shellcode.html | |
Forensic Analysis: | |
http://dfsforensics.blogspot.com/ | |
http://www.forensicfocus.com/index.php?name=News&file=article&sid=1766 | |
http://www.porcupine.org/forensics/ | |
http://www.williballenthin.com/projects.html | |
http://www.deer-run.com | |
Fuzzing: | |
http://louppen.wordpress.com/ | |
http://msdn.microsoft.com/en-us/library/cc162782.aspx | |
http://pages.cs.wisc.edu/~bart/fuzz/ | |
http://peachfuzzer.com/ | |
http://phed.org/ | |
http://securityadventures.wordpress.com/tag/fuzzing/ | |
http://softwareflaws.blogspot.com/2011/08/vulnerability-introduction-to-fuzzing.html | |
http://wn.com/fuzzer | |
http://www.flinkd.org/ | |
http://www.fuzz-test.com/ | |
http://www.harmonysecurity.com/ | |
http://www.nullthreat.net/ | |
http://www.squarefree.com/2007/08/02/fuzzing-for-correctness/ | |
http://www.squarefree.com/2008/12/23/fuzzing-tracemonkey/ | |
http://www.thespanner.co.uk/2012/01/12/introducing-shazzer-a-shared-online-fuzzer/ | |
http://www.voipplanet.com/backgrounders/article.php/3775186 | |
http://www.voipsa.org/Resources/tools.php#VoIP%20Fuzzing%20Tools | |
https://www.ee.oulu.fi/research/ouspg/Protos | |
https://www.owasp.org/index.php/Fuzzing | |
https://www.squarefree.com/index.php?s=fuzzing | |
Security Conferences / Magazines: | |
http://www.dodcybercrime.com/ | |
https://secore.info/ | |
http://0x375.org/ | |
http://hakin9.org/ | |
http://conference.hitb.org/ | |
http://www.hackerzvoice.net/ | |
http://www.chmag.in/ | |
Antivirus Bypass: | |
http://thehackernews.com/2011/12/fully-undetectable-backdoor-generator.html | |
http://www.garage4hackers.com/tags/antivirus%20evasion.html | |
http://pastebin.com/DpzMj1Qe | |
http://funoverip.net/2011/04/100pc-anti-virus-evasion-with-metasploit-browser-exploits-from-ms11-003/ | |
http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html | |
http://www.shellguardians.com/2011/05/remote-dll-injection-and-antivirus.html | |
http://astr0baby.wordpress.com/2011/11/09/bypassing-antivirus-somehow/ | |
http://exploit.co.il/hacking/kav-bloopers/ | |
http://malwareint.blogspot.com/2010/01/crimeware-as-service-and-antivirus.html | |
http://www.scribd.com/doc/50392984/1742440193-CEH-Hac | |
http://www.disc0nnected.com/?p=271 | |
http://dangertux.wordpress.com/2011/12/09/silly-set-tricks-part-2-bypassing-windows-av/ | |
http://www.fathercrypter.com/ | |
http://schierlm.users.sourceforge.net/avevasion.html | |
http://www.vbfrance.com/tutoriaux/OBFUSCATION-NET_304.aspx | |
http://athackx.wordpress.com/tag/crytper/ | |
http://pen-testing.sans.org/blog/2011/10/13/tips-for-evading-anti-virus-during-pen-testing | |
Assembly: | |
http://thestarman.pcministry.com/asm/win32/index.html | |
http://www.4shared.com/dir/5978930/3a42c85f/assembly_books.html#dir=5978930 | |
http://pdos.csail.mit.edu/6.828/2009/reference.html | |
http://eji.com/a86/ | |
http://savannah.nongnu.org/projects/aasm/ | |
http://www.agner.org/ | |
http://www.x86-64.org/index.html | |
http://www.abreojosensamblador.net/Productos/AOE/Index_en.html | |
http://www.irisa.fr/caps/people/truong/Enseignement/ENSSAT_97-98/Asm6809.html | |
http://venom630.free.fr/geo/tutz/programmation/asm/ | |
http://www.heyrick.co.uk/assembler/ | |
http://webspace.webring.com/people/sv/vpol_54296/index.html | |
http://asmhighlighter.codeplex.com/ | |
http://code.google.com/p/asmjit/ | |
http://asmsource.8k.com/ | |
http://www.asmsource.8k.com/source32.htm | |
http://wiki.xenoinc.org/index.php?title=ASM | |
https://sites.google.com/site/askeroama/assembler | |
http://asm.inightmare.org/ | |
http://armassemblylanguage.blogspot.com/ | |
http://www.oocities.org/gotcomputer/ | |
http://www.madwizard.org/programming/snippets | |
http://www.asmcommunity.net/ | |
http://www.beroset.com/index.html | |
http://www.mark.masmcode.com/ | |
http://mattst88.com/programming/?page=APJ | |
http://skullsecurity.org/wiki/index.php/Assembly | |
http://www.avr-asm-tutorial.net/avr_en/ | |
http://www.real-asm.tk/ | |
https://github.com/rrbranco/blackhat2012/tree/master/ASMsrc | |
http://flint.cs.yale.edu/cs422/precepts/bochs.html | |
http://www.cs.tufts.edu/comp/40/ | |
http://corewar.co.uk/ | |
http://xcotton.pagesperso-orange.fr/electron/coursetdocs.htm#Microprocesseurs | |
http://www.cs.usfca.edu/~cruse/cs210s06/ | |
http://www.deinmeister.de/e_index.html | |
http://luce.yves.pagesperso-orange.fr/ | |
http://www.swtpcemu.com/ | |
http://www.massmind.org/images/www/asmedit/AsmMain.html | |
http://www.massmind.org/images/www/asmedit/AsmLinks.html | |
http://wiki.osdev.org/Main_Page | |
http://flatassembler.net/ | |
http://board.flatassembler.net/index.php | |
http://www.ibiblio.org/gferg/ldp/GCC-Inline-Assembly-HOWTO.html | |
http://www.cs.uaf.edu/2005/fall/cs301/support/x86/index.html | |
http://www.gunnerinc.com/melt.htm | |
http://www.madwizard.org/ | |
http://help-site.com/local/ASMTUT.TXT | |
http://oopweb.com/Assembly/Documents/asm/Volume/asm.htm | |
http://rs1.szif.hu/~tomcat/win32/win32asm.txt | |
http://www.cs.virginia.edu/~evans/cs216/guides/x86.html | |
http://www.df.lth.se/~john_e/gems.html | |
http://www.japheth.de/dwnload2.html | |
http://www.movsd.com/ | |
http://hxc2001.free.fr/ | |
http://files.assemblercode.com/ | |
http://www.purebasic.com/documentation/reference/inlinedasm.html | |
http://www.int80h.org/ | |
http://www.intel-assembler.it/portale/indice.asp | |
http://www.infernodevelopment.com/introduction-masm32 | |
http://www.c-jump.com/CIS77/ASM/Assembly/lecture.html | |
http://www.godevtool.com/ | |
http://ladsoft.tripod.com/ | |
http://www.znsoft.fr/Developpement/Asm/ | |
http://patzawa.perso.sfr.fr/Programation/Assembleur/AssembleurPartie1.htm | |
http://luce.yves.pagesperso-orange.fr/liens.htm#MASM | |
http://asm.sourceforge.net/ | |
http://tldp.org/HOWTO/Assembly-HOWTO/index.html | |
http://www.tldp.org/HOWTO/Assembly-HOWTO/ | |
http://www.webalice.it/jj2006/Masm32_Tips_Tricks_and_Traps.htm | |
http://www.masmforum.com/ | |
http://curv3.wordpress.com/tag/masm/ | |
http://objasm32.tripod.com/ | |
http://tldp.org/HOWTO/Assembly-HOWTO/other.html | |
http://www.azillionmonkeys.com/qed/asm.html | |
http://penberg.blogspot.com/2010/04/short-introduction-to-x86-instruction.html | |
http://www.youtube.com/playlist?list=PL0C5C980A28FEE68D&feature=plcp | |
http://nooptax.free.fr/ | |
http://www.iprezo.org/index.php?page=asm | |
http://a-os.teria.org/sam86/asmmm.htm | |
http://radasm.cherrytree.at/ | |
http://www.ragestorm.net/ | |
http://www.cs.cmu.edu/afs/cs.cmu.edu/user/ralf/pub/WWW/files.html | |
http://www.ray.masmcode.com/ | |
http://rosasm.freeforums.org/portal.php | |
http://roticv.rantx.com/codes.html | |
http://a-os.teria.org/sam86/index.html | |
http://sandpile.org/ | |
http://www.sandpile.org/ | |
http://www.cs.arizona.edu/~debray/Publications/ | |
http://www.scrontsoft.com/scrontsoft.asp | |
http://scriptbucket.wordpress.com/2011/10/19/setting-up-visual-studio-10-for-masm32-programming/ | |
http://www.agner.org/optimize/ | |
http://www.movsd.com/source.htm | |
http://asmedit.sourceforge.net/ | |
http://www.jaymoseley.com/hercules/compilers/spasm.htm | |
http://homepages.ius.edu/jfdoyle/C335/syllabusc335spring2012.htm | |
http://www.subhashdasyam.com/search/label/MASM | |
http://webspace.webring.com/people/kt/t80codebase/win32asm.html | |
http://webspace.webring.com/people/kt/t80codebase/ | |
http://www.penguin.cz/~niki/tdasm/ | |
http://pbrennick.freehosting.net/ | |
http://www.masm32.com/board/index.php | |
http://www.nasm.us/ | |
http://thestarman.pcministry.com/index.html | |
http://www.tortall.net/projects/yasm/ | |
http://yasm.tortall.net/ | |
http://www.opferman.com/ | |
http://www.opferman.com/Source/ | |
http://www.opferman.com/Tutorials/ | |
http://www.real-asm.tk/tutoriels/ | |
http://davidjwalling.com/pro_os_002.html | |
http://www.eggwall.com/ | |
http://www.vortex.masmcode.com/ | |
http://www.exploit-db.com/papers/13136/ | |
http://www.exploit-db.com/papers/13219/ | |
http://www.exploit-db.com/papers/13220/ | |
http://www.exploit-db.com/papers/13221/ | |
http://www.exploit-db.com/papers/13225/ | |
http://www.exploit-db.com/papers/17746/ | |
http://www.chip-architect.com/mid_home.html | |
http://wiki.real-asm.tk/doku.php?id=wiki:asm | |
http://techref.massmind.org/techref/language/asm/win32asm.htm | |
http://www.piclist.com/techref/language/asm/win32asm.htm | |
http://mathimaaran.angelfire.com/helloworld_tutorial.htm | |
http://rs1.szif.hu/~tomcat/win32/ | |
http://oopweb.com/Assembly/Documents/Win32ASM/Volume/win32asm.htm | |
http://www.winasm.net/ | |
http://static.patater.com/gbaguy/x86asm.htm | |
http://en.wikibooks.org/wiki/X86_Assembly/Bootloaders | |
http://wiki.prgmr.com/mediawiki/index.php/X86_Assembly_Code_Resources | |
http://vanilla47.com/Link%20Collections%20Pages/Computer%20Link%20Collections/X86AssemblyLanguage.html | |
http://jolio.tripod.com/asm/a86.htm | |
http://en.wikipedia.org/wiki/X86_assembly_language | |
http://www.intelligentfirm.com/ | |
http://staff.ustc.edu.cn/~xlanchen/cailiao/x86%20Assembly%20Programming.htm | |
http://en.wikibooks.org/wiki/X86_Assembly | |
http://en.wikibooks.org/wiki/X86_Disassembly | |
http://thestarman.pcministry.com/asm/index.html | |
http://www.strchr.com/x86_machine_code_statistics | |
http://ref.x86asm.net/ | |
http://www.softools.com/sasmzilog.htm | |
http://zet.aluzina.org/index.php/Zet_processor | |
C / C++ language: | |
http://www.cs.cf.ac.uk/Dave/C/ | |
http://www.acm.uiuc.edu/webmonkeys/book/c_guide/ | |
http://ioccc.org/index.html#goals | |
http://www.eskimo.com/~scs/ | |
http://open-tube.com/10-code-coverage-tools-c-c/ | |
http://mainisusuallyafunction.blogspot.com/2011/11/self-modifying-code-for-debug-tracing.html | |
http://www.sgi.com/tech/stl/ | |
http://andrewl.dreamhosters.com/archive/60094446.txt | |
http://www.catch22.net/tuts/reducing-executable-size | |
http://in4k.untergrund.net/various%20web%20articles/Creating_Small_Win32_Executables_-_Fast_Builds.htm | |
http://original.jamesthornton.com/eckel/TICPP-2nd-ed-Vol-one/Frames.html | |
http://bonelli.antifork.org/cpp_class | |
http://guideme.itgo.com/atozofc/ | |
http://developers.sun.com/solaris/articles/multiproc/multiproc.html | |
http://www.hoard.org/ | |
http://original.jamesthornton.com/eckel/TICPP-2nd-ed-Vol-two/Frames.html | |
Source Codes: | |
http://www.java2s.com/ | |
http://www.builder.cz/art/asembler/anti_procdump.html | |
http://sandsprite.com/openSource.html | |
http://code.entersources.com/C-Sharp_1_92_1.aspx | |
http://pscode.com/PlanetSourceCode/default.asp | |
http://www.4shared.com/dir/nu5HeQiG/PlanetSourceCodeCD.htm | |
Coding: | |
http://1100f.free.fr/Batchs/index.htm | |
http://andreipb.free.fr/cours_xml_web/ | |
http://bellard.org/ | |
http://cl-cookbook.sourceforge.net/clos-tutorial/index.html | |
http://code.google.com/p/zebui/ | |
http://doublesvsoop.sourceforge.net/ | |
http://gee.cs.oswego.edu/dl/ | |
http://gynvael.coldwind.pl/ | |
http://kaimi.ru/ | |
http://koders.com/ | |
http://lukescode.com/ | |
http://perso.telecom-paristech.fr/~charon/coursJava/index.html | |
http://rdist.root.org/2011/02/08/old-programming-habits-die-hard/ | |
http://www.ai.univ-paris8.fr/~fb/Cours/cours.html | |
http://www.aiai.ed.ac.uk/~jeff/clos-guide.html | |
http://www.cliki.net/CLOS | |
http://www.codecademy.com/#!/exercise/0 | |
http://www.codeguru.com/ | |
http://www.codeinitiative.org/ | |
http://www.codeproject.com/ | |
http://www.cs.gmu.edu/~sean/lisp/LispTutorial.html | |
http://www.cs.sfu.ca/CC/310/pwfong/Lisp/1/tutorial1.html | |
http://www.daniweb.com/ | |
http://www.dreamincode.net/ | |
http://www.dreamsongs.com/CLOS.html | |
http://www.ioccc.org/years.html | |
http://www.lirmm.fr/~ferber/Java/index.html | |
http://www.lispworks.com/documentation/HyperSpec/Front/index.htm | |
http://www.ltam.lu/cours-c/ | |
http://www.programmersheaven.com/ | |
http://www.rohitab.com/ | |
http://www.scoopshot.com/hiring-developer/ | |
http://www.vbforums.com/index.php | |
http://www.codecademy.com/#!/exercises/ | |
http://www.fysnet.net/index.htm” | |
Win32APIs: | |
http://www.oehive.org/book/export/html/385 | |
http://vcpptips.wordpress.com/category/windows-apis/ | |
Compression: | |
http://code.google.com/p/lz4/ | |
http://code.google.com/p/snappy/ | |
http://compression.ca/act/act-summary.html | |
http://compressionratings.com/ | |
http://crinkler.net/ | |
http://hem.bredband.net/magli143/exo/ | |
http://ibsensoftware.com/products_aPLib.html | |
http://liblzg.bitsnbites.eu/ | |
http://lloyd.github.io/easylzma/ | |
http://sourceforge.net/projects/sepacker/ | |
http://www.bzip.org/ | |
http://www.oberhumer.com/opensource/ | |
http://www.quicklz.com/download.html | |
http://www.rosseaux.net/page40_BeRoEXEPacker.html | |
http://www.winimage.com/zLibDll/minizip.html | |
http://www.zlib.net/ | |
https://github.com/farbrausch/fr_public/tree/master/kkrunchy | |
Computer Science: | |
http://computer-forensics.sans.org/blog/2010/11/12/get-started-with-malware-analysis/ | |
http://en.wikibooks.org/wiki/Category:Computer_science | |
http://en.wikibooks.org/wiki/Wikibooks:Computer_science_bookshelf | |
http://forums.techarena.in/ | |
http://hapax.qc.ca/ | |
http://jc.bellamy.free.fr/ | |
http://kwarc.info/teaching/ | |
http://matt.might.net/#blog | |
http://mitpress.mit.edu/main/home/default.asp | |
http://nptel.iitm.ac.in/index.php | |
http://ocw.mit.edu/index.htm | |
http://pc-history.org/ | |
http://scholarsmine.mst.edu/ | |
http://turbanoff.narod.ru/4.html | |
http://utopiie.com/blog/2010/07/19/insultes-de-developpeurs/ | |
http://www-inst.eecs.berkeley.edu/classes-eecs.html | |
http://www.agner.org/?e=0#0 | |
http://www.ai.mit.edu/projects/aries/course/ | |
http://www.catch22.net/ | |
http://www.cs.arizona.edu/~debray/ | |
http://www.cs.purdue.edu/homes/dxu/ | |
http://www.cs.ucla.edu/~rennels/ | |
http://www.dwheeler.com/ | |
http://www.ecsl.cs.sunysb.edu/ | |
http://www.ics.forth.gr/dcs/Activities/Publications/dcs_publications-timelist.html | |
http://www.massmind.org/techref/index.htm | |
http://www.math.tau.ac.il/~haimk/ | |
http://www.math.uaa.alaska.edu/~afkjm/ | |
http://www.ncl.ucar.edu/index.shtml | |
http://www.normalesup.org/~ramanana/ | |
http://www.pcastuces.com/pratique/windows/xp/xp_usb/page1.htm | |
http://www.porcupine.org/forensics/ | |
http://www.videos-formation.org/ | |
http://www.zap.org.au/elec2041-cdrom/README.html | |
https://ensiwiki.ensimag.fr/index.php/Accueil | |
Cryptology: | |
http://3564020356.org/ | |
http://blog.sei.cmu.edu/post.cfm/fuzzy-hashing-techniques-in-applied-malware-analysis | |
http://blog.cryptographyengineering.com/ | |
http://eprint.iacr.org/ | |
http://goog.li/ | |
http://pages.cs.wisc.edu/~bart/fuzz/fuzz.html | |
http://rumkin.com/tools/cipher/ | |
http://thedigitalstandard.blogspot.com/2009/11/why-fuzzy-hashing-is-really-cool.html | |
http://www.cayrel.net/ | |
http://www.crypto-class.org/ | |
http://www.findmyhash.com/ | |
C/C++/Assemby/Delphi/Web Coding: | |
http://www.cprogramming.com/ | |
http://www.delphibasics.info/ | |
http://www.webresourcesdepot.com/ | |
Algorithms: | |
http://www.prologin.org/ | |
http://www.france-ioi.org/ | |
http://projecteuler.net/ | |
http://xlinux.nist.gov/dads/ | |
http://www.ntnu.edu.tw/acm/ProblemSetArchive.html | |
http://orac.amt.edu.au/fario/ | |
http://orac.amt.edu.au/ | |
http://www.college-de-france.fr/default/EN/all/inn_tec2007/ | |
ROM Hacking: | |
http://www.romhacking.net/ | |
http://datacrystal.romhacking.net/ | |
General Security: | |
http://pauldotcom.com/ | |
http://security-sh3ll.blogspot.com/ | |
http://0x736563.org/ | |
http://2010.hack.lu/index.php/Main_Page | |
http://2011.hack.lu/index.php/Main_Page | |
http://2012.hackitoergosum.org/blog/ | |
http://actes.sstic.org/ | |
http://analysis.seclab.tuwien.ac.at/index.html | |
http://chrissanders.org/ | |
http://code.google.com/p/pentest-bookmarks/wiki/BookmarksList | |
http://community.websense.com/blogs/securitylabs/ | |
http://computercrimeinfo.com/index.html | |
http://defcon.org/ | |
http://dionaea.carnivore.it/ | |
http://events.ccc.de/ | |
http://freeworld.thc.org/ | |
http://hackaday.com/ | |
http://infosecinstitute.com/ | |
http://isc.sans.edu/presentations/ | |
http://leetmore.ctf.su/ | |
http://news0ft.blogspot.com/2009/07/lechec-de-la-securite-francaise.html | |
http://nullsecurity.net/index.html | |
http://packetstormsecurity.org/ | |
http://pauldotcom.com/wiki/index.php/Main_Page | |
http://pentester.fr/ | |
http://projects.wsj.com/surveillance-catalog/#/ | |
http://r00tsecurity.org/ | |
http://recon.cx/ | |
http://recon.cx/2010/index.html | |
http://rmccurdy.com/ | |
http://seclists.org/ | |
http://securinets.com/ | |
http://security.stackexchange.com/ | |
http://securityaffairs.co/wordpress/ | |
http://securityerrata.org/ | |
http://securitylabs.websense.com/ | |
http://securityoverride.org/news.php | |
http://securitytube.net/Default.aspx | |
http://securityxploded.com/ | |
http://sid.rstack.org/blog/index.php/356-de-la-securite-informatique-a-la-francaise | |
http://unremote.org/ | |
http://weis2007.econinfosec.org/ | |
http://www.acissi.net/ | |
http://www.alternativ-testing.fr/ | |
http://www.astalavista.com/ | |
http://www.athcon.org/index.php | |
http://www.blackhat.com/html/archives.html | |
http://www.blackhat.com/index.html | |
http://www.ccc.de/en/?language=en | |
http://www.csoonline.com/ | |
http://www.darknet.org.uk/ | |
http://www.defcon.org/ | |
http://www.elite-hackers.com/ | |
http://www.enisa.europa.eu/ | |
http://www.exploit-db.com/ | |
http://www.foo.be/ | |
http://www.fuzzysecurity.com/index.html | |
http://www.hackinparis.com/home | |
http://www.ibm.com/developerworks/ | |
http://www.insomniasec.com/ | |
http://www.mcherifi.org/ | |
http://www.nologin.org/ | |
http://www.nullcon.net/website/ | |
http://www.offensive-security.com/ | |
http://www.openwall.com/ | |
http://www.phillips321.co.uk/ | |
http://www.phrack.com/ | |
http://www.phrack.org/ | |
http://www.quarkslab.com/en-index | |
http://www.ruxcon.org.au/ | |
http://www.sans.org/20coolestcareers/ | |
http://www.sans.org/reading_room/ | |
http://www.scoop.it/t/frishit | |
http://www.scriptjunkie.us/ | |
http://www.seclist.us/ | |
http://www.secureviewmag.com/ | |
http://www.security-labs.org/ | |
http://www.securityfocus.com/ | |
http://www.skullsecurity.org/wiki/index.php/Main_Page | |
http://www.sstic.org/2010/news/ | |
http://www.sstic.org/2011/programme/ | |
http://www.sysdream.com/ | |
http://www.vupen.com/english/ | |
http://www.wawaseb.com/lutile/wsl7.php | |
http://www.websense.com/content/home.aspx | |
http://zeronights.org/ | |
https://www.eff.org/ | |
https://www.escrypt.com/home/ | |
https://www.owasp.org/index.php/Main_Page | |
https://www.securityninja.co.uk/ | |
IT News: | |
http://www.crazyws.fr | |
http://d4n3ws.polux-hosting.com/ | |
CTF: | |
http://blog.big-daddy.fr/ | |
http://k3ys3c.blogspot.com/ | |
http://www.net-force.nl/ | |
http://www.overthewire.org/wargames/ | |
Social Engineering: | |
http://www.social-engineer.org/ | |
Forum: | |
http://forums.spybot.info/index.php | |
http://forum.reverse4you.org/ | |
http://arabteam2000-forum.com/ | |
http://back2hack.cc/ | |
http://brutezone.ru/ | |
http://cardingmasters.biz/forum.php | |
http://cardingplanet.biz/forum.php | |
http://certcollection.org/forum/ | |
http://cheatingnetwork.net/forums/ | |
http://cl-security.net/foro/index.php | |
http://cryptr.org/index.php | |
http://cyberterrorists.net/forum/ | |
http://darkspot.info/forum.php | |
http://encode.ru/forum.php | |
http://evilzone.org/ | |
http://exelab.ru/f/ | |
http://forum.antichat.ru/ | |
http://forum.codecall.net/ | |
http://forum.exetools.com/ | |
http://forum.sysinternals.com/ | |
http://forums.overclockers.co.uk/ | |
http://fuckav.ru/ | |
http://hacktivisme.eu/index.php | |
http://happy-hack.ru/ | |
http://lyonnais92.aceboard.fr/ | |
http://overhaul.c0rrupt.net/ | |
http://r00tsecurity.org/forums/ | |
http://snd.astalavista.ms/board/ | |
http://t4c.ic.cz/forum/ | |
http://thebotnet.com/ | |
http://vctools.net/forum/ | |
http://www.asmforum.net/ | |
http://www.bitshacking.com/forum/ | |
http://www.blackhatmoneymaker.com/ | |
http://www.blackhatworld.com/blackhat-seo/ | |
http://www.criticalsecurity.net/index.php/index | |
http://www.debugman.com/forum.php | |
http://www.elitepvpers.com/forum/ | |
http://www.emoneyspace.com/ | |
http://www.garage4hackers.com/forum.php | |
http://www.go4expert.com/ | |
http://www.governmentsecurity.org/forum/ | |
http://www.hack-free.net/index.php | |
http://www.ic0de.org/forum.php | |
http://www.kernelmode.info/forum/ | |
http://www.l33thackers.com/index.php | |
http://www.leakforums.org/index.php | |
http://www.malwareup.org/index.php | |
http://www.moneymakerdiscussion.com/forum/forum.php | |
http://www.moneymakergroup.com/forums.html | |
http://www.opensc.ws/forum.php | |
http://www.reaonline.net/ | |
http://www.rohitab.com/discuss/ | |
http://www.secret-zone.net/forum.php | |
http://www.v4-team.com/cc/index.php | |
http://www.wareziens.info/forum/index.html | |
http://www.webacard.com/index.php | |
http://www.wilderssecurity.com/index.php?s=b2c7cafc35f91b845e16d005a11fa2ed | |
https://rstforums.com/forum/forum.php | |
http://hackhound.org/forums/ | |
Tools of the trade: | |
http://anubis.iseclab.org/ | |
http://anubis.iseclab.org/?action=home | |
http://bsa.isoftware.nl/ | |
http://bugchecker.com/ | |
http://cgdb.sourceforge.net/ | |
http://cintruder.sourceforge.net/ | |
http://code.google.com/p/aadp/ | |
http://mitmproxy.org/ | |
http://code.google.com/p/codesearch/ | |
http://code.google.com/p/gui2exe/ | |
http://code.google.com/p/ospy/ | |
https://code.google.com/p/bletchley/ | |
http://code.google.com/p/paimei/ | |
http://code.google.com/p/powertool-google/downloads/detail?name=PowerToolV4.2_en.zip | |
http://code.google.com/p/pywebfuzz/ | |
http://code.google.com/p/rapier/ | |
http://code.google.com/p/rfcat/downloads/list | |
http://code.google.com/p/vdebug/ | |
http://code.google.com/p/wfuzz/ | |
http://code.google.com/p/windbgshark/ | |
http://code.mwcollect.org/ | |
http://code.mwcollect.org/projects/cuckoo | |
http://cygwin.com/index.html | |
http://dirk-loss.de/python-tools.htm | |
http://dprobes.sourceforge.net/ | |
http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis#C.2FC.2B.2B | |
http://eureka.cyber-ta.org/ | |
http://fire.dmzs.com/ | |
http://forensiccontrol.com/resources/free-software/ | |
http://freecode.com/projects/fuzzled | |
http://hotfuzz.sourceforge.net/ | |
http://issuemakerslab.com/ | |
http://jc.bellamy.free.fr/fr/scanbin.html | |
http://kavtest.over-blog.com/ | |
http://lcamtuf.coredump.cx/p0f3/ | |
http://linux.die.net/man/1/objdump | |
http://malzilla.sourceforge.net/ | |
http://mark0.net/index-e.html | |
http://mwanalysis.org/ | |
http://mwanalysis.org/?page=submit | |
http://pedump.me/ | |
http://pelp.sourceforge.net/ | |
http://philip.helger.com/gt/index.php | |
http://pmelson.blogspot.com/2008/05/list-of-malware-analysis-tools.html | |
http://reversingtools.blogspot.com/ | |
http://sourceforge.net/p/pjscan/home/Home/ | |
http://sourceforge.net/projects/ddd/ | |
http://sourceforge.net/projects/taof/ | |
http://ssdeep.sourceforge.net/ | |
http://technet.microsoft.com/en-us/sysinternals/ff700229 | |
http://udpcast.linux.lu/index.html | |
http://urlquery.net/ | |
http://virusscan.jotti.org/en | |
http://virustracker.info/ | |
http://volatility.tumblr.com/ | |
http://waste.sourceforge.net/index.php?id=downloads | |
http://wepawet.iseclab.org/changelog.php | |
http://wepawet.iseclab.org/index.php | |
http://www.0100101110101101.org/home/biennale_py/index.html | |
http://www.aircrack-ng.org/ | |
http://www.avira.com/en/support-virus-lab | |
http://www.backerstreet.com/rec/rec.htm | |
http://www.blackducksoftware.com/ | |
http://www.blade-defender.org/eval-lab/ | |
http://www.blisstonia.com/software/WinMD5/ | |
http://www.bothunter.net/ | |
http://www.cjmweb.net/vbindiff/ | |
http://www.colonywest.us/index.php?option=com_remository&func=startdown&id=7 | |
http://www.commscorner.com/2011/11/top-50-new-social-media-tools-of-2011.html | |
http://www.darungrim.org/ | |
http://www.decalage.info/rescan | |
http://www.dependencywalker.com/ | |
http://www.digitalforensicssolutions.com/ | |
http://www.filerepair.ca/downloads/p/pe/pedump.exe-DLL-EXE-Download-pedump.exe.html | |
http://www.first.org/conference/2006/program/rapier_-_a_1st_responders_info_collection_tool.html | |
http://www.jakstab.org/ | |
http://www.jetbrains.com/decompiler/ | |
http://www.joesecurity.org/index.php | |
http://www.lancs.ac.uk/people/steveb/cpaap/pfe/default.htm | |
http://www.linklogger.com/vm_capture.htm | |
http://www.mitec.cz/index.html | |
http://www.mitec.cz/ssv.html | |
http://www.netresec.com/?page=Blog | |
http://www.norman.com/products/sandbox_malware_analyzers/fr | |
http://www.pdfunlock.com/ | |
http://www.pmcma.org/ | |
http://www.qtrac.eu/diffpdf.html | |
http://www.reddit.com/tb/niij8 | |
http://www.sac.sk/ | |
http://www.samba.org/ | |
http://www.securiteam.com/tools/5BP0H0U7PQ.html | |
http://www.snort.org/ | |
http://www.sunbeltsecurity.com/ | |
http://www.sunbeltsecurity.com/sandbox/ | |
http://www.sur-la-toile.com/RogueKiller/ | |
http://www.symcod.com/sniffers/ | |
http://www.thesofthelp.com/2011/11/7-best-free-system-security-tools-for.html | |
http://www.threatexpert.com/submit.aspx | |
http://www.udpcast.linux.lu/ | |
http://www.virustotal.com/ | |
http://www.virustotal.com/index.html | |
http://www.viva64.com/en/pvs-studio/ | |
http://www.wilsonc.demon.co.uk/d10resourceeditor.htm | |
http://www.wiul.org/ | |
http://www.zmatt.net/ | |
https://bitbucket.org/haypo/hachoir/wiki/Home | |
https://code.google.com/p/dharma/ | |
https://code.google.com/p/netusse/ | |
https://github.com/strazzere/APKfuscator | |
https://minemu.org/mediawiki/index.php?title=Main_Page | |
https://www.cloudcracker.com/ | |
https://www.dan.me.uk/ | |
Anonymity: | |
http://www.makeuseof.com/tag/find-active-onion-sites/ | |
Android: | |
http://androidreversing.blogspot.com/ | |
http://blog.codepainters.com/tags/android-2/ | |
http://blog.fortinet.com/ | |
http://blog.just2us.com/2009/07/tutorial-obfuscate-an-android-application/ | |
http://code.google.com/p/androguard/ | |
http://code.google.com/p/apps-for-android/ | |
http://jack-mannino.blogspot.com/ | |
http://redmine.honeynet.org/projects/are/wiki | |
http://research.nq.com/ | |
http://sudarmuthu.com/blog/10-open-source-android-apps-which-every-android-developer-must-look-into | |
http://threatpost.com/en_us/blogs/android-reverse-engineering-toolset-debuts-110111 | |
http://tricksnew.info/2011/11/secret-hacking-codes-android-mobiles/ | |
http://wikisec.free.fr/papers/papers.html | |
http://www.csc.ncsu.edu/faculty/jiang/ | |
http://www.dexlabs.org/blog/btdetect | |
http://www.dijit.fr/10-applications-android-open-source/ | |
http://www.java2s.com/Code/Android/CatalogAndroid.htm | |
http://www.malgenomeproject.org/ | |
http://www.readwriteweb.com/archives/android_developers_heres_some_sample_code_tutorial.php | |
http://www.spy-mobile-phone.com/ | |
https://www.usenix.org/conference/usenixsecurity12/droidscope-seamlessly-reconstructing-os-and-dalvisemantic-]]views | |
http://andmob.wikidot.com/samplecode | |
http://androidcracking.blogspot.com/ | |
Hacking: | |
http://anish.at.preempted.net/ | |
http://arsouyes.org/index.php?id=5 | |
http://ascii.textfiles.com/ | |
http://blog.andrewcantino.com/blog/2011/12/14/hacking-google-for-fun-and-profit/ | |
http://breaking-security.net/ | |
http://hackeracademy.com/library | |
http://c-skills.blogspot.com/ | |
http://clubhack.com/2011/ | |
http://dazzlepod.com/uniqpass/ | |
http://dhayananthan.onsugar.com/ | |
http://en.wikipedia.org/wiki/Hacker_(hobbyist) | |
http://hakipedia.com/index.php/Hakipedia | |
http://inj3ct0r.com/ | |
http://marcellmajor.com/ | |
http://my.opera.com/taviso/blog/ | |
http://powerofcommunity.net/ | |
http://scarybeastsecurity.blogspot.com/ | |
http://secdocs.lonerunners.net/ | |
http://securithib.com/ | |
http://spagiari.blogspot.com/2006/05/profiling-hacker.html | |
http://unixfreaxjp.blogspot.com/ | |
http://www.badstore.net/ | |
http://www.big-daddy.fr/ | |
http://www.dvara.net/ | |
http://www.fr33project.org/ | |
http://www.ghostsinthestack.org/ | |
http://www.hackerzvoice.net/ | |
http://www.hackinglab.org/ | |
http://www.hackthissite.org/ | |
http://www.happy-security.de/ | |
http://www.msuiche.net/ | |
http://www.nerdworldnj.com/hall-of-fame.htm | |
http://www.nuitduhack.com/ | |
http://www.ouah.org/ | |
http://www.root-me.org/ | |
http://www.spiritofhack.net/ | |
http://www.try2hack.nl/ | |
http://www.win.tue.nl/~aeb/linux/hh/hh.html#toc12 | |
https://www.corelan.be/ | |
https://www.defcon.org/ | |
https://www.hackerschool.com/ | |
https://www.hacking-lab.com/ | |
https://www.hacktivity.com/en/ | |
Web Hacking: | |
http://delicious.com/inquis/sqlinjection | |
http://evuln.com/ | |
http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/ | |
http://hakipedia.com/index.php/SQL_Injection | |
http://migeel.sk/programming/pe-inject/ | |
http://www.phpsecure.info/v2/article/InjSql.php | |
http://www.unixwiz.net/techtips/sql-injection.html | |
http://www.websec.ca/kb/sql_injection | |
https://github.com/gbmaster/loadLibrary | |
Repository: | |
http://baboon.rce.free.fr/haiklrnas/repo/ | |
http://cracking.z0ro.com/ | |
http://cryptohub.nl/zines/ | |
http://database.th3-0utl4ws.com/index.php | |
http://doc.hackbbs.org/ | |
http://docs.webmx.fr/ | |
http://down.52pojie.cn/LCG/ | |
http://mysterie.fr/ | |
http://n8on.free.fr/hackzines/ | |
http://psych0pat.alwaysdata.net/ | |
http://repo.meh.or.id/ | |
http://repo.mynooblife.org/ | |
http://repo.zenk-security.com/ | |
http://xylirepo.free.fr/ | |
Cracking: | |
http://cyclops.ueuo.com/ | |
http://mysterie.fr/ | |
http://baboon.rce.free.fr/haiklrnas/repo/ | |
Unsorted: | |
https://sites.google.com/site/robertoperdisci/useful-links | |
http://www.wotsit.org/ | |
http://www.bekkoame.ne.jp/~s_ita/port/port1-99.html | |
http://issuu.com/ | |
http://findanyone.com/ | |
http://www.dosjo.com/ | |
http://bugmenot.com/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment