Cybersecurity is a rapidly growing field, and the market is booming.
It’s no wonder. Cybercrime is on the rise, and the stakes are higher than ever before. More and more people are being targeted by hackers every day, and there’s no telling how much money these criminals will make in the coming years. We’re not just talking about small-time crooks—we’re talking about people who want to destroy our economy and destabilize our society as we know it.
Luckily for you, you can find out everything you need to know about this subject in one place: [bookmark name]. In this book, you’ll learn how to protect yourself from hackers, what to do if your computer gets hacked, and how to prevent your identity from being stolen by stealing other person’s identities!
You’ll also find tips on how to keep your data safe so that if something does happen to your computer or smartphone, it won’t be able to be used against you. You’ll learn how to set up strong passwords so that hackers can’t steal any information off of your computer without getting caught themselves first!
Finally, there’s some great advice about staying safe online that will help keep criminals at bay when surfing the web!
Bookmarking is an important part of the process of discovering and exploring online content. Whether you’re a newbie or a veteran to the world of bookmarks, it’s crucial to keep track of what’s out there.
May the best cybersecurity bookmarks win.
A list of bookmarks that contains lists of resources/articles that will help bug bounty hunters with resources that are useful during their bug bounty journey.
Table of Contents
- Penetration Testing
- Reverse Engineering
- ExploitDev
- Qemu
- Microcontrollers and SDRs
- GNURadio
- Embedded Programming
Penetration Testing
OffSec
Penetration Testing with Kali – Online Security TrainingOffensive Security Student SupportOffensive Security ForumsExploits Database by Offensive Security
Windows Privilege Escalation
Checklists/Windows-Privilege-Escalation.md at master · netbiosX/ChecklistsWindows Privilege Escalation – a cheatsheet | Tim ArneaudOSCP – Windows Priviledge Escalation | Hacking and securityFuzzySecurity | Windows Privilege Escalation FundamentalsPrivilege Escalation | To Shell And Back: Adventures In Pentesting
Cheat Sheets
Spawning a TTY ShellMSFVennom cheat sheetMsfvenom Cheat Sheet – Security-GeekPath Traversal Cheat Sheet: Linux — GracefulSecurityPath Traversal Cheat Sheet: Windows — GracefulSecurityReverse Shell Cheat Sheet | pentestmonkeyHow to Bypassing Filter to Traversal Attacks ? | Hacking & TricksLocal Linux Enumeration & Privilege Escalation Cheatsheet – RebootuserEscape From SHELLcatraz – Breaking Out of Restricted Unix Shells – Speaker DeckCommon Web-services · Security – My notepadNmap Cheat SheetLuke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricksPenetration Testing Methodology – 0DAYsecurity.comOSCP-Survival-Guide.pdf
SQLinjection
Login Bypass Using SQL InjectionHacking website using SQL Injection -step by step guide – Ethical Hacking Tutorials | Learn How to Hack | Hacking Tricks | Penetration Testing LabVulnhub – Kioptrix: Level 1.2 (#3) – Guillermo CuraEnumeration Visualized Wiki
Guides
OSCP · Teck_k2Offensive Security’s Complete Guide to Alphahow-to-oscp-final.mdLoot and Enumerate · Security – My notepadOffensive Security’s PWB and OSCP – My Experience – Security SiftSecurity SiftJack HacksInteresting Local File Inclusion method | DiabloHornferreirasc/oscp: oscp studyOffensive Security Certified Professional (OSCP) Review – Jim Wilbur’s BlogPassing OSCP – scund00rBlackWinter Security | Code and Stuff
Linux Privilege Escalation
Linux Privilege Escalation by Exploiting CronjobsBasic Linux Privilege Escalation
Pentest Practice Links
Penetration test lab “Test lab” | PentestitCTF365 – Capture The Flag | Security Training Platform[PentesterLab] PentesterLab ProMainsequence – Exploit ExercisesOverTheWire: Natas Level 0Welcome [Root Me : Hacking and Information Security learning platform]Hack The Box :: Penetration Testing LabsHack The Box :: ForumsVulnerable By Design ~ VulnHub
PentesterAcademy
Pentester Academy: Learn Pentesting OnlineAttackDefense Labs: Pentester Academy
Bug Bounty
HackerOne
Hacker101 CTFHacker101 | HackerOne Platform Documentation
Synack
Synack – DashboardSynack OnboardingLearn to hack and collaborate with other security researchers on bug bounties | BugBountyNotes.comGitHub – jhaddix/tbhm: The Bug Hunters MethodologyTomnomnom Vim Tutorial – Knowledge BaseAssetnote WordlistsPenetration Testing with Kali – Online Security TrainingOffensive Security Student SupportOffensive Security – Purchase PageOffensive Security – Exam Scheduling LinkExploits Database by Offensive SecurityOffensive Security ForumsHack The Box :: Penetration Testing LabsHack The Box :: ForumsIppSec – YouTubeVulnerable By Design ~ VulnHubcodingo/Reconnoitre: A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.Scripts/Enumeration.py at master · MistSpark/Scripts · GitHub
Pentesting Links
Penetration test lab “Test lab” | PentestitCTF365 – Capture The Flag | Security Training Platform[PentesterLab] PentesterLab ProMainsequence – Exploit ExercisesOverTheWire: Natas Level 0Welcome [Root Me : Hacking and Information Security learning platform]Pentester Academy: Learn Pentesting OnlineAttackDefense Labs: Pentester AcademyAttify Store – Offensive IoT Exploitation | Attify StoreFlex Center // Infosec Skills :: Home
Reverse Engineering
GREM
IT and Information Security Cheat SheetsGIAC GREM Certification | Reverse Engineering MalwareCheat Sheet for Analyzing Malicious Software
Reading
The_Evolution_of_TDL.pdfDetecting DNS TunnelingTwo’s ComplementVirusTotalLearn to Develop with Microsoft Developer Network | MSDNGitHub – ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.MalwareTech – Life of a Malware AnalystThe “Ultimate”Anti-Debugging ReferenceDEF CON CHINAReverse Engineering challenges
ARM
Writing ARM Assembly (Part 1) | Azeria Labs
Hardware
FCC OET Authorization SearchIoT Firmware Exploitation OnlinePractical Reverse Engineering Part 1 – Hunting for Debug Ports · Hack The WorldIntro to Hardware Hacking – Dumping your First FirmwareIoT Hacking Tools | Attify StoreElectronics – /dev/ttyS0Extracting Flash Memory over SPI | GracefulSecurityNAND Flash Data Recovery CookbookCentrifuge Platform® | Firmware Security Analysis | ReFirm LabsBinwalk Pro
Network Protocols
Reverse Engineering Network Protocols – Jack Hackshasherezade (hasherezade)Hasherezade’s projects
SDR Hacking
Signal Identification WikiThe Cryptopals Crypto Challenges
ExploitDev
Corelan
..:: Corelan Team | Peter Van Eeckhoutte (corelanc0d3r) ::..Exploit writing tutorial part 1 : Stack Based Overflows | Corelan TeamExploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode | Corelan TeamExploit writing tutorial part 3 : SEH Based Exploits | Corelan TeamExploit writing tutorial part 3b : SEH Based Exploits – just another example | Corelan TeamExploit writing tutorial part 4 : From Exploit to Metasploit – The basics | Corelan TeamExploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development | Corelan TeamExploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR | Corelan TeamExploit writing tutorial part 7 : Unicode – from 0x00410041 to calc | Corelan TeamExploit writing tutorial part 8 : Win32 Egg Hunting | Corelan TeamExploit writing tutorial part 9 : Introduction to Win32 shellcoding | Corelan TeamReverse Engineering and Binary Exploitation Series | PWNTHEBOX!FuzzySecurity | Tutorials
ARM
ProductsGitHub – Billy-Ellis/Exploit-Challenges: A collection of vulnerable ARM binaries for practicing exploit developmentWriting ARM Assembly (Part 1) | Azeria LabsSearch [Root Me : Hacking and Information Security learning platform]Corelliumarm_exploitation/exploitation_on_arm_based_systems.pdf at master · sashs/arm_exploitation15/85 SecurityROP on ARM with radare2Microsoft Word – ARM paperF.docx
OSCE
Offensive Security’s CTP & OSCE Review – Jack HacksOSCE/CTP Prep Guide – Tulpa Securitymona.py – the manual | Corelan TeamResources for OSCECTP/OSCE Prep – Wrapping Up Our Prep – The Human Machine Interfaceh0mbre/CTP-OSCE: Scripts I used during CTPjtpereyda/boofuzz: A fork and successor of the Sulley Fuzzing FrameworkStudy Guide & Tips: Offensive Security Certified Expert (OSCE) / Cracking The Perimeter (CTP) – Amin Bohiophra’s blog ~ Technical posts about InfoSecabatchy’s blog | OSCE Study PlanUpgrade from LFI to RCE via PHP Sessions – RCE SecurityTaking_Back_Netcat.pdfOSCE Review (CTP Course) – Everything S3curityThe Human Machine Interfaceh0mbre/Learning-C: A series of mini-projects used to learn C for beginnersmetasploit-payloads/c/meterpreter/workspace at master · rapid7/metasploit-payloads
Linux Exploitation
xairy/linux-kernel-exploitation: A collection of links related to Linux kernel exploitation
OSEE
awe_syllabus_2018OSEE – AWEstralia 2018 preparations | www.jollyfrogs.comtimip/OSEE: OSEE PreparationCommon WinDbg Commands (Thematically Grouped)Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment – rootkitabatchy’s blog | Tutorials
IoT Hardware
IoT Firmware Exploitation Online | RegistrationThe best resources for learning exploit development – Fabio BaroniBackdooring PE Files with Shellcode – Red Teaming Experiments
Windows Exploitation
Ricerca Security: “I’ll ask your body”: SMBGhost…SMBleedingGhost Writeup: Chaining SMBleed (CVE-20…Windows Internals & Software Drivers – OSRWhat is this? – Red Teaming Experiments
Qemu
Installing Qemu for Windows [E-Maculation wiki]Qemu package and guide for Windows available • E-Maculation ForumIndex of /lubuntu/releases/16.04/releaseBuilding PPC Linux code using QEMU on Ubuntu 18.04 LTSDebian PortsQemu – Google Drivehugsy/cemu: Cheap EMUlator: lightweight multi-architecture assembly playground
Microcontrollers and SDRs
Nyan Sat – Satellite Communications Challenge – Chapter 0
GNURadio
GNU RadioTutorials – GNU Radio
Embedded Programming
FastBit Embedded Brain Academy | Works on Firmware and Embedded Engineering | Udemy