InfoSecurity-List
InfoSecurity & Penetration List
-
Awesome-Hacking: 一系列对于 Hack 安全资料的搜集
-
The Social-Engineer Toolkit: 一系列仅用于测试用途的社会工程工具
-
Probable-Wordlists: Wordlists sorted by probability originally created for password generation and testing.
-
PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Overview
-
How to systematically secure anything: How to systematically secure anything: a repository about security engineering.
-
Security 101 for SaaS startups: Things I wish my first boss had told me
-
2022-How to Secure Anything: How to systematically secure anything: a repository about security engineering
Resource
Book
-
《Reverse Engineering for Beginners》📚: 适合作为逆向入门书籍,而且里面覆盖的范围更广,包括了 x86/x64,arm 两三种 CPU 的指令集,而且囊括了 Linux 和 Windows 的 OS hack 等内容,各种逆向工具也都介绍了一番。
-
《兜哥系列丛书》📚: Web 安全之机器学习入门/Web 安全之深度学习实战/Web 安全之强化学习与 GAN 系列
-
2020-《应急响应实战笔记》📚 : 这是一个关于安全事件应急响应的项目,从系统入侵到事件处理,收集和整理了一些案例进行分析。
Collection
-
awesome penetration testing 🗃️: 一系列关于渗透测试相关的资料的搜集
-
List of resources about programming practices for writing safety-critical software. 🗃️
-
Awesome WebSecurity 🗃️: 🐶 A curated list of Web Security materials and resources.
-
jassics/security-study-plan : Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on…
Course
- Beginner Network Pentesting #Series#: Welcome to the Beginner Network Pentesting course. Previously, the course was delivered weekly on Twitch and built from lessons learned in the previous week.
HIDS
- 大型互联网企业入侵检测实战总结: 入侵检测是每一个大型互联网企业都要面对的一个难题。
Tutorial
-
2018-Kali Linux: Social Engineering Toolkit: In this post i am going to show you the simple scenario of how to implement Social Engineering Attack in daily life.
-
CTF Wiki #Series#: 作为一个自由的站点,围绕 CTF 近几年赛题,CTF Wiki 对 CTF 中的各个方向的知识和技术进行介绍,以便于初学者更好地学习 CTF 相关的知识。
-
2021-100 Red Team Projects for Pentesters and Network Managers #Series#: Red Teaming is one of the most attractive fields in offensive security or ethical hacking. Every day professionals and students are learning, creating and exploiting all types of systems. The internet is not only the most common means through which people interact and chat, but also a place where they are constantly exposed to a world where anyone can be monitored, exploited, tracked or scammed.
CheatSheet
- Penetration Testing/Security Cheatsheets: 渗透测试与安全 Cheatsheet