Created
March 25, 2018 05:08
-
-
Save wtf-yodhha/788ecf07bf280b3d83db4965e9e9ac34 to your computer and use it in GitHub Desktop.
HACKER'S STARTUP PACK
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
For Start...... | |
http://teamultimate.in/ | |
http://cybertron.co.in/ | |
http://teamultimate.in/start-here/ | |
http://null-byte.wonderhowto.com/ | |
http://www.hackingarticles.in/ | |
https://www.cybrary.it/ | |
https://www.computersecuritystudent.com/ | |
http://breakthesecurity.cysecurity.org/p/hacking-tutorials-for-beginners.html | |
http://www.guru99.com/learn-penetration-testing.html | |
http://back-track-linux.blogspot.in/2012/11/backtrack-penetration-testing-tutorial.html | |
https://community.rapid7.com/docs/DOC-2248 | |
https://www.soldierx.com/tutorials/Pentesting-Tutorial-1-Information-Gathering-Part-1-Nmap | |
https://www.owasp.org/index.php/Category:How_To | |
http://www.ranum.com/security/computer_security/editorials/dumb/index.html | |
http://www.developer.com/java/data/article.php/10932_3667601_1 | |
https://dzone.com/articles/10-steps-to-secure-software | |
Cryptography Related Tutorials : | |
https://developer.mozilla.org/en-US/docs/Archive/Security/Introduction_to_Public-Key_Cryptography | |
https://www.cs.auckland.ac.nz/~pgut001/tutorial/ | |
https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography | |
http://www.garykessler.net/library/crypto.html | |
http://www.herongyang.com/Cryptography/ | |
http://www.ti89.com/cryptotut/ | |
https://www.ibm.com/developerworks/tivoli/tutorials/s-crypto/s-crypto.html | |
EBooks and Whitepapers: | |
http://cacr.uwaterloo.ca/hac/ | |
http://searchnetworking.techtarget.com/tutorial/Network-penetration-testing-guide | |
http://media.blackhat.com/bh-us-10/whitepapers/Dabirsiaghi/BlackHat-USA-2010-Dabirsiaghi-JavaSnoop-wp.pdf | |
https://www.mcafee.com/us/resources/white-papers/foundstone/wp-pen-testing-iphone-ipad-apps.pdf | |
https://packetstormsecurity.com/files/tags/paper/ | |
http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf | |
http://web.mit.edu/Saltzer/www/publications/protection/Basic.html | |
https://www.owasp.org/index.php/Category:Principle | |
Videos: | |
https://www.coursera.org/course/crypto | |
https://www.youtube.com/playlist?list=PLwP_SiAcdui1MAr7lYamd67kFU8sye4nw | |
https://www.youtube.com/watch?v=66rR4WHJeP0&list=PLwP_SiAcdui2-GTGkMG1W5_onK9gUdoLZ | |
https://www.youtube.com/watch?v=fEmO7wQKCMw&list=PLqmh7e11V6OwLHo67aWkrdJ8vC37-JJMY | |
https://www.youtube.com/watch?v=U4oB28ksiIo | |
https://www.youtube.com/watch?v=Hk-21p2m8YY | |
https://www.youtube.com/watch?v=3QnD2c4Xovk | |
http://www.irongeek.com/i.php?page=videos/web-application-pen-testing-tutorials-with-mutillidae | |
https://www.youtube.com/watch?v=RMC84O1Lm2M | |
Websites for News: | |
http://securityshots.com/ | |
http://www.astalavista.com/ | |
http://packetstormsecurity.com/ | |
http://www.blackhat.com/ | |
http://www.metasploit.com/ | |
http://sectools.org/ | |
http://www.2600.com/ | |
www.defcon.org | |
http://www.breakthesecurity.com/ | |
http://www.hacking-tutorial.com/ | |
http://www.evilzone.org/ | |
http://hackaday.com/ | |
http://www.hitb.org/ | |
http://www.hackthissite.org/ | |
http://pentestmag.com | |
http://www.securitytube.net/ | |
https://www.ssllabs.com/ | |
Forums: | |
https://security.stackexchange.com/ | |
http://darksat.x47.net/ | |
https://forums.securityinfowatch.com/ | |
https://www.cnet.com/forums/spyware-viruses-security/ | |
http://www.hackforums.net/forumdisplay.php?fid=47 | |
Hackbb : http://jv7aqstbyhd5hqki.onion | |
Thehubforum : http://thehub7dnl5nmcz5.onion/ | |
Torumforum : | |
cruelonion : http://cruel2ijkqggizy5.onion/forum/ | |
darknewsforum : | |
intelexchangeforum : http://rrcc5uuudhh4oz3c.onion/ | |
0day : | |
Vulerability Database and Resources: | |
http://www.exploit-db.com/ | |
http://1337day.com/ | |
http://securityvulns.com/ | |
http://www.securityfocus.com/ | |
http://www.osvdb.org/ | |
http://www.securiteam.com/ | |
http://secunia.com/advisories/ | |
http://insecure.org/sploits_all.html | |
http://zerodayinitiative.com/advisories/published/ | |
http://nmrc.org/pub/index.html | |
http://web.nvd.nist.gov/view/vuln/search?execution=e2s1 | |
http://www.vupen.com/english/security-advisories/ | |
http://www.vupen.com/blog/ | |
http://cvedetails.com/ | |
http://www.rapid7.com/vulndb/index.jsp | |
http://oval.mitre.org/ | |
Specific vulerability: | |
https://access.redhat.com/security/updates/active/ | |
http://technet.microsoft.com/en-us/security/bulletin | |
http://httpd.apache.org/security_report.html | |
http://people.canonical.com/~ubuntu-security/cve/ | |
http://lwn.net/Security/ | |
Tools: | |
http://nmap.org/ | |
https://developer.mozilla.org/en-US/docs/NSS | |
http://www.hping.org/ | |
http://www.tcpdump.org/ | |
http://www.metasploit.com/ | |
http://www.wireshark.org/ | |
http://jacquelin.potier.free.fr/networkstuff/ | |
http://www.cirt.net/nikto2 | |
Resources for OSCP: | |
http://www.securityfocus.com/ | |
http://www.exploit-db.com/ | |
http://www.offensive-security.com/metasploit-unleashed/ | |
http://g0tmi1k.blogspot.in/ Special mention to his priv escalation post - | |
http://g0tmi1k.blogspot.in/2011/08/basic-linux-privilege-escalation.html | |
http://nmap.org/nsedoc/ | |
http://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ | |
http://carnal0wnage.attackresearch.com/ | |
CEH V9 PDF: https://www.mediafire.com/folder/0wjcevofwkxe7/CEH_V9 | |
Tools Review :http://kitploit.com/ | |
http://0x00sec.org/ | |
For More Resource | |
https://github.com/r00tb3/SECURITY-RESOURCES |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment