A collection of inspiring lists, manuals, cheat sheets, blogs, hacks, one-liners, cli/web tools, and more.
NOTE: IF YOU ARE MOBILE USER ROTATE YOUR SCREEN FOR BETTER VIEW
CLI Tools
Shells
Managers
Text editors
Files and directories
Network
Network (DNS)
Network (HTTP)
SSL
Security
Auditing Tools
System Diagnostics/Debuggers
Log Analyzers
Databases
TOR
Messengers/IRC Clients
Other
GUI Tools
Terminal emulators
Network
Browsers
Password Managers
Messengers/IRC Clients
Messengers (end-to-end encryption)
Text editors
Web Tools
Browsers
SSL/Security
HTTP Headers & Web Linters
DNS
Encoders/Decoders and Regex testing
Net-tools
Privacy
Code parsers/playgrounds
Performance
Mass scanners (search engines)
Generators
Passwords
CVE/Exploits databases
Mobile apps scanners
Private Search Engines
Secure Webmail Providers
Crypto
PGP Keyservers
Systems/Services
Operating Systems
HTTP(s) Services
DNS Services
Other Services
Security/hardening
Networks
Tools
Labs
Other
Containers/Orchestration
CLI Tools
Web Tools
Manuals/Tutorials/Best Practices
Manuals/Howtos/Tutorials
Shell/Command line
Text Editors
Python
Sed & Awk & Other
F’Awk Yeah! - advanced sed and awk usage (Parsing for Pentesters 3).
*nix & Network
nixCraft - linux and unix tutorials for new and seasoned sysadmin.
TecMint - the ideal Linux blog for Sysadmins & Geeks.
Omnisecu - free Networking, System Administration and Security tutorials.
linux-cheat - Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.
Unix Toolbox - collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.
Linux Guide and Hints - tutorials on system administration in Fedora and CentOS.
strace-little-book - a little book which introduces strace.
http2-explained - a detailed document explaining and documenting HTTP/2.
http3-explained - a document describing the HTTP/3 and QUIC protocols.
HTTP/2 in Action - an excellent introduction to the new HTTP/2 standard.
Let's code a TCP/IP stack - great stuff to learn network and system programming at a deeper level.
Nginx Admin's Handbook - describes how to improve NGINX performance, security and other important things.
nginxconfig.io - NGINX config generator on steroids.
openssh guideline - is to help operational teams with the configuration of OpenSSH server and client.
PacketLife.net - a place to record notes while studying for Cisco's CCNP certification.
Microsoft
AD-Attack-Defense - attack and defend active directory using modern post exploitation adversary tradecraft activity.
Large-scale systems
The System Design Primer - learn how to design large-scale systems.
Awesome Scalability - best practices in building High Scalability, High Availability, High Stability and more.
Web Architecture 101 - the basic architecture concepts.
System hardening
CIS Benchmarks - are secure configuration settings for over 100 technologies, available as a free PDF download.
Security Harden CentOS 7 - this walks you through the steps required to security harden CentOS.
CentOS 7 Server Hardening Guide - great guide for hardening CentOS; familiar with OpenSCAP.
awesome-security-hardening - is a collection of security hardening guides, tools and other resources.
The Practical Linux Hardening Guide - provides a high-level overview of hardening GNU/Linux systems.
Security & Privacy
Hacking Articles - LRaj Chandel's Security & Hacking Blog.
AWS security tools - make your AWS cloud environment more secure.
Rawsec's CyberSecurity Inventory - an inventory of tools and resources about CyberSecurity.
The Illustrated TLS Connection - every byte of a TLS connection explained and reproduced.
SSL Research - SSL and TLS Deployment Best Practices by SSL Labs.
SELinux Game - learn SELinux by doing. Solve Puzzles, show skillz.
Certificates and PKI - everything you should know about certificates and PKI but are too afraid to ask.
The Art of Subdomain Enumeration - a reference for subdomain enumeration techniques.
Quitting Google - the comprehensive guide to quitting Google.
Web Apps
OWASP - worldwide not-for-profit charitable organization focused on improving the security of software.
OWASP ASVS 3.0.1 - OWASP Application Security Verification Standard Project.
OWASP ASVS 3.0.1 Web App - simple web app that helps developers understand the ASVS requirements.
OWASP ASVS 4.0 - is a list of application security requirements or tests.
OWASP Testing Guide v4 - includes a "best practice" penetration testing framework.
OWASP Dev Guide - this is the development version of the OWASP Developer Guide.
OWASP API Security Project - focuses specifically on the top ten vulnerabilities in API security.
Mozilla Web Security - help operational teams with creating secure web applications.
security-bulletins - security bulletins that relate to Netflix Open Source.
API-Security-Checklist - security countermeasures when designing, testing, and releasing your API.
Enable CORS - enable cross-origin resource sharing.
Application Security Wiki - is an initiative to provide all application security related resources at one place.
Weird Proxies - reverse proxy related attacks; it is a result of analysis of various reverse proxies, cache proxies, etc.
Webshells - great series about malicious payloads.
Practical Web Cache Poisoning - show you how to compromise websites by using esoteric web features.
Hidden directories and files - as a source of sensitive information about web application.
Explosive blog - great blog about cybersec and pentests.
Security Cookies - this paper will take a close look at cookie security.
APISecurityBestPractices - help you keep secrets (API keys, db credentials, certificates) out of source code.
All-in-one
LZone Cheat Sheets - all cheat sheets.
Dan’s Cheat Sheets’s - massive cheat sheets documentation.
Rico's cheatsheets - this is a modest collection of cheatsheets.
DevDocs API - combines multiple API documentations in a fast, organized, and searchable interface.
Other
CTF Series : Vulnerable Machines - the steps below could be followed to find vulnerabilities and exploits.
50M_CTF_Writeup - $50 million CTF from Hackerone - writeup.
ctf-tasks - an archive of low-level CTF challenges developed over the years.
How to start RE/malware analysis? - collection of some hints and useful links for the beginners.
The C10K problem - it's time for web servers to handle ten thousand clients simultaneously, don't you think?
poor man's profiler - sampling tools like dtrace's don't really provide methods to see what programs are blocking on.
HTTPS on Stack Overflow - this is the story of a long journey regarding the implementation of SSL.
Julia's Drawings - some drawings about programming and unix world, zines about systems & debugging tools.
Hash collisions - this great repository is focused on hash collisions exploitation.
BGP Meets Cat - after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.
bgp-battleships - playing battleships over BGP.
What happens when... - you type google.com into your browser and press enter?
how-web-works - based on the 'What happens when...' repository.
HTTPS in the real world - great tutorial explain how HTTPS works in the real world.
Gitlab and NFS bug - how we spent two weeks hunting an NFS bug in the Linux kernel.
Gitlab melts down - postmortem on the database outage of January 31 2017 with the lessons we learned.
How To Become A Hacker - if you want to be a hacker, keep reading.
Operation Costs in CPU - an infographics which should help to estimate costs of certain operations in CPU clocks.
Let's Build a Simple Database - writing a sqlite clone from scratch in C.
simple-computer - great resource to understand how computers work under the hood.
The story of "Have I been pwned?" - working with 154 million records on Azure Table Storage.
TOP500 Supercomputers - shows the 500 most powerful commercially available computer systems known to us.
How to build a 8 GPU password cracker - any "black magic" or hours of frustration like desktop components do.
CERN Data Centre - 3D visualizations of the CERN computing environments (and more).
How fucked is my database - evaluate how fucked your database is with this handy website.
Five Whys - you know what the problem is, but you cannot solve it?
howhttps.works - how HTTPS works ...in a comic!
howdns.works - a fun and colorful explanation of how DNS works.
Inspiring Lists
SysOps/DevOps
Awesome Sysadmin - amazingly awesome open source sysadmin resources.
Awesome Shell - awesome command-line frameworks, toolkits, guides and gizmos.
Command-line-text-processing - from finding text to search and replace, from sorting to beautifying text and more.
Awesome Pcaptools - collection of tools developed by other researchers to process network traces.
awesome-ebpf - a curated list of awesome projects related to eBPF.
Linux Network Performance - learn where some of the network sysctl variables fit into the Linux/Kernel network flow.
Awesome Postgres - list of awesome PostgreSQL software, libraries, tools and resources.
quick-SQL-cheatsheet - a quick reminder of all SQL queries and examples on how to use them.
Awesome-Selfhosted - list of Free Software network services and web applications which can be hosted locally.
List of applications - huge collection of applications sorted by category, as a reference for those looking for packages.
CS-Interview-Knowledge-Map - build the best interview map.
DevOps-Guide - DevOps Guide from basic to advanced with Interview Questions and Notes.
devops-interview-questions - contains interview questions on various DevOps and SRE related topics.
Developers
Web Developer Roadmap - roadmaps, articles and resources to help you choose your path, learn and improve.
Front-End-Checklist - the perfect Front-End Checklist for modern websites and meticulous developers.
Front-End-Performance-Checklist - the only Front-End Performance Checklist that runs faster than the others.
Python's Magic Methods - what are magic methods? They're everything in object-oriented Python.
wtfpython - a collection of surprising Python snippets and lesser-known features.
js-dev-reads - a list of books and articles for the discerning web developer to read.
Commit messages guide - a guide to understand the importance of commit messages.
Security/Pentesting
Awesome Web Security - a curated list of Web Security materials and resources.
awesome-cyber-skills - a curated list of hacking environments where you can train your cyber skills.
awesome-devsecops - an authoritative list of awesome devsecops tools.
awesome-osint - is a curated list of amazingly awesome OSINT.
awesome-threat-intelligence - a curated list of Awesome Threat Intelligence resources.
Red-Teaming-Toolkit - a collection of open source and commercial tools that aid in red team operations.
awesome-burp-extensions - a curated list of amazingly awesome Burp Extensions.
Free Security eBooks - list of a Free Security and Hacking eBooks.
Hacking-Security-Ebooks - top 100 Hacking & Security E-Books.
reverse-engineering - list of awesome reverse engineering resources.
linux-re-101 - a collection of resources for linux reverse engineering.
reverseengineering-reading-list - a list of Reverse Engineering articles, books, and papers.
Awesome-WAF - a curated list of awesome web-app firewall (WAF) stuff.
awesome-shodan-queries - interesting, funny, and depressing search queries to plug into shodan.io.
RobotsDisallowed - a curated list of the most common and most interesting robots.txt disallowed directories.
HackingNeuralNetworks - is a small course on exploiting and defending neural networks.
wildcard-certificates - why you probably shouldn't use a wildcard certificate.
Don't use VPN services - which is what every third-party "VPN provider" does.
awesome-yara - a curated list of awesome YARA rules, tools, and people.
macOS-Security-and-Privacy-Guide - guide to securing and improving privacy on macOS.
awesome-sec-talks - is a collected list of awesome security talks.
Movies for Hackers - list of movies every hacker & cyberpunk must watch.
Other
Cheatography - over 3,000 free cheat sheets, revision aids and quick references.
awesome-static-analysis - static analysis tools for all programming languages.
computer-science - path to a free self-taught education in Computer Science.
post-mortems - is a collection of postmortems (config errors, hardware failures, and more).
build-your-own-x - build your own (insert technology here).
Project-Based-Tutorials-in-C - is a curated list of project-based tutorials in C.
The-Documentation-Compendium - various README templates & tips on writing high-quality documentation.
awesome-python-applications - free software that works great, and also happens to be open-source Python.
Blogs/Podcasts/Videos
SysOps/DevOps
Varnish for PHP developers - very interesting presentation of Varnish by Mattias Geniar.
A Netflix Guide to Microservices - Josh Evans talks about the chaotic and vibrant world of microservices at Netflix.
Developers
Comparing C to machine language - compare a simple C program with the compiled machine code of that program.
Geeky Persons
Brendan Gregg's Blog - is an industry expert in computing performance and cloud computing.
Gynvael "GynDream" Coldwind - is a IT security engineer at Google.
Michał "lcamtuf" Zalewski - white hat hacker, computer security expert.
Mattias Geniar - developer, sysadmin, blogger, podcaster and public speaker.
Nick Craver - software developer and systems administrator for Stack Exchange.
Scott Helme - security researcher, international speaker and founder of securityheaders.com and report-uri.com.
Brian Krebs - The Washington Post and now an Independent investigative journalist.
Bruce Schneier - is an internationally renowned security technologist, called a "security guru".
Chrissy Morgan - advocate of practical learning, Chrissy also takes part in bug bounty programs.
Andy Gill - is a hacker at heart who works as a senior penetration tester.
Daniel Miessler - cybersecurity expert and writer.
Samy Kamkar - is an American privacy and security researcher, computer hacker.
Javvad Malik - is a security advocate at AlienVault, a blogger event speaker and industry commentator.
Graham Cluley - public speaker and independent computer security analyst.
Kacper Szurek - detection engineer at ESET.
Troy Hunt - web security expert known for public education and outreach on security topics.
raymii.org - sysadmin specializing in building high availability cloud environments.
Robert Penz - IT security expert.
Geeky Blogs
Linux Audit - the Linux security blog about auditing, hardening and compliance by Michael Boelen.
Linux Security Expert - trainings, howtos, checklists, security tools and more.
The Grymoire - collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.
PortSwigger Web Security Blog - about web app security vulns and top tips from our team of web security.
Secjuice - is the only non-profit, independent and volunteer led publication in the information security space.
Decipher - security news that informs and inspires.
Geeky Cybersecurity Podcasts
Risky Business - is a weekly information security podcast featuring news and in-depth interviews.
Cyber, by Motherboard - stories, and focus on the ideas about cybersecurity.
Tenable Podcast - conversations and interviews related to Cyber Exposure, and more.
Cybercrime Investigations - podcast by Geoff White about cybercrimes.
The many hats club - featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).
Darknet Diaries - true stories from the dark side of the Internet.
OSINTCurious Webcasts - is the investigative curiosity that helps people be successful in OSINT.
Security Weekly - the latest information security and hacking news.
Geeky Cybersecurity Video Blogs
rev3rse security - offensive, binary exploitation, web application security, vulnerability, hardening, red team, blue team.
LiveOverflow - a lot more advanced topics than what is typically offered in paid online courses - but for free.
J4vv4D - the important information regarding our internet security.
CyberTalks - talks, interviews, and article about cybersecurity.
Best Personal Twitter Accounts
@blackroomsec - a white-hat hacker/pentester. Intergalactic Minesweeper Champion 1990.
@MarcoCiappelli - Co-Founder @ITSPmagazine, at the intersection of IT security and society.
@binitamshah - Linux Evangelist. Malwares. Kernel Dev. Security Enthusiast.
@joe_carson - an InfoSec Professional and Tech Geek.
@mikko - CRO at F-Secure, Reverse Engineer, TED Speaker, Supervillain.
@esrtweet - often referred to as ESR, is an American software developer, and open-source software advocate.
@gynvael - security researcher/programmer, @DragonSectorCTF founder/player, technical streamer.
@x0rz - Security Researcher & Cyber Observer.
@hasherezade - programmer, malware analyst. Author of PEbear, PEsieve, libPeConv.
@TinkerSec - tinkerer, cypherpunk, hacker.
@alisaesage - independent hacker and researcher.
@SwiftOnSecurity - systems security, industrial safety, sysadmin, author of decentsecurity.com.
@dakami - chief scientist at White Ops, is one of just seven people with the authority to restore the DNS root keys.
@samykamkar - is a famous "grey hat" hacker, security researcher, creator of the MySpace "Samy" worm.
@securityweekly - founder & CTO of Security Weekly podcast network.
@jack_daniel - @SecurityBSides co-founder.
@thegrugq - Security Researcher.
@matthew_d_green - a cryptographer and professor at Johns Hopkins University.
Hacking/Penetration Testing
Pentesters arsenal tools
Sandcat Browser - a penetration-oriented browser with plenty of advanced functionality already built in.
Metasploit - tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit.
Burp Suite - tool for testing web application security, intercepting proxy to replay, inject, scan and fuzz HTTP requests.
OWASP Zed Attack Proxy - intercepting proxy to replay, inject, scan and fuzz HTTP requests.
w3af - is a Web Application Attack and Audit Framework.
mitmproxy - an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Nikto2 - web server scanner which performs comprehensive tests against web servers for multiple items.
sqlmap - tool that automates the process of detecting and exploiting SQL injection flaws.
Recon-ng - is a full-featured Web Reconnaissance framework written in Python.
AutoRecon - is a network reconnaissance tool which performs automated enumeration of services.
Faraday - an Integrated Multiuser Pentest Environment.
Photon - incredibly fast crawler designed for OSINT.
XSStrike - most advanced XSS detection suite.
Sn1per - automated pentest framework for offensive security experts.
vuls - is an agent-less vulnerability scanner for Linux, FreeBSD, and other.
aquatone - a tool for domain flyovers.
BillCipher - information gathering tool for a website or IP address.
WhatWaf - detect and bypass web application firewalls and protection systems.
Corsy - CORS misconfiguration scanner.
Raccoon - is a high performance offensive security tool for reconnaissance and vulnerability scanning.
dirhunt - find web directories without bruteforce.
John The Ripper - is a fast password cracker, currently available for many flavors of Unix, Windows, and other.
hashcat - world's fastest and most advanced password recovery utility.
p0f - is a tool to identify the players behind any incidental TCP/IP communications.
ssh_scan - a prototype SSH configuration and policy scanner.
LeakLooker - find open databases - powered by Binaryedge.io
exploitdb - searchable archive from The Exploit Database.
getsploit - is a command line utility for searching and downloading exploits.
ctf-tools - some setup scripts for security research tools.
pwntools - CTF framework and exploit development library.
security-tools - collection of small security tools created mostly in Python. CTFs, pentests and so on.
pentestpackage - is a package of Pentest scripts.
python-pentest-tools - python tools for penetration testers.
fuzzdb - dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
syzkaller - is an unsupervised, coverage-guided kernel fuzzer.
pwndbg - exploit development and reverse engineering with GDB made easy.
GDB PEDA - Python Exploit Development Assistance for GDB.
IDA - multi-processor disassembler and debugger useful for reverse engineering malware.
radare2 - framework for reverse-engineering and analyzing binaries.
routersploit - exploitation framework for embedded devices.
Ghidra - is a software reverse engineering (SRE) framework.
Vulnreport - open-source pentesting management and automation platform by Salesforce Product Security.
Mentalist - is a graphical tool for custom wordlist generation.
archerysec - vulnerability assessment and management helps to perform scans and manage vulnerabilities.
Osmedeus - fully automated offensive security tool for reconnaissance and vulnerability scanning.
beef - the browser exploitation framework project.
AutoSploit - automated mass exploiter.
SUDO_KILLER - is a tool to identify and exploit sudo rules' misconfigurations and vulnerabilities.
yara - the pattern matching swiss knife.
mimikatz - a little tool to play with Windows security.
Pentests bookmarks collection
Labs (ethical hacking platforms/trainings/CTFs)
Your daily knowledge and news
RSS Readers
IRC Channels
Security
Other/All-in-one
Other Cheat Sheets
Build your own DNS Servers
Unbound DNS Tutorial - a validating, recursive, and caching DNS server.Knot Resolver on Fedora - how to get faster and more secure DNS resolution with Knot Resolver on Fedora.
DNS-over-HTTPS - tutorial to setup your own DNS-over-HTTPS (DoH) server.
dns-over-https - a cartoon intro to DNS over HTTPS.
DNS-over-TLS - following to your DoH server, setup your DNS-over-TLS (DoT) server.
DNS Servers - how (and why) i run my own DNS Servers.
Build your own Certificate Authority
OpenSSL Certificate Authority - build your own certificate authority (CA) using the OpenSSL command-line tools.step-ca Certificate Authority - build your own certificate authority (CA) using open source step-ca.
Build your own System/Virtual Machine
os-tutorial - how to create an OS from scratch.Write your Own Virtual Machine - how to write your own virtual machine (VM).
x86 Bare Metal Examples - dozens of minimal operating systems to learn x86 system programming.
simple-computer - the scott CPU from "But How Do It Know?" by J. Clark Scott.
Code Contributors
This project exists thanks to all the people who contribute.https://github.com/trimstray/the-book-of-secret-knowledge/graphs/contributors?from=2018-06-17&to=2020-01-20&type=d
Thank you @velraj for your feedback
ReplyDeleteIt's is all about problem solving if any query we are happy to help
I really like your post. I found it very helpful. Please keep posting such kind of valuable post.
ReplyDeleteC++ Course in Delhi
Thank you sir for your valuable feedback we are working hard to provide quality content if you have any suggestions let me know
ReplyDeleteReport
Admin
Great job for publishing such a nice article. Your article isn’t only useful but it is additionally really informative. Thank you because you have been willing to share information with us. codingbytes offers the Best C++ Course In Delhi.
ReplyDelete