All Projects → fabionoth → Awesome Cyber Security

fabionoth / Awesome Cyber Security

A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.

Projects that are alternatives of or similar to Awesome Cyber Security

Cehv10 Notes
📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (-48.95%)
Mutual labels:  certification, hacking
Ctf Writeups Public
Writeups for infosec Capture the Flag events by team Galaxians
Stars: ✭ 331 (-0.6%)
Mutual labels:  hacking
Ctftools
Personal CTF Toolkit
Stars: ✭ 312 (-6.31%)
Mutual labels:  hacking
Osint tips
OSINT
Stars: ✭ 322 (-3.3%)
Mutual labels:  hacking
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (-5.41%)
Mutual labels:  hacking
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+1029.13%)
Mutual labels:  hacking
Ctf Notes
Everything needed for doing CTFs
Stars: ✭ 304 (-8.71%)
Mutual labels:  hacking
Ctf
CTF (Capture The Flag) writeups, code snippets, notes, scripts
Stars: ✭ 336 (+0.9%)
Mutual labels:  hacking
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-0.3%)
Mutual labels:  hacking
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+1050.15%)
Mutual labels:  hacking
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-19.22%)
Mutual labels:  hacking
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-6.31%)
Mutual labels:  hacking
Pivotsuite
Network Pivoting Toolkit
Stars: ✭ 329 (-1.2%)
Mutual labels:  hacking
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1630.63%)
Mutual labels:  hacking
Ckss Certified Kubernetes Security Specialist
This repository is a collection of resources to prepare for the Certified Kubernetes Security Specialist (CKSS) exam.
Stars: ✭ 333 (+0%)
Mutual labels:  certification
Awesome Sec Talks
A collected list of awesome security talks
Stars: ✭ 3,411 (+924.32%)
Mutual labels:  hacking
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-6.31%)
Mutual labels:  hacking
Langhost
👻 A LAN dropbox chatbot controllable via Telegram
Stars: ✭ 324 (-2.7%)
Mutual labels:  hacking
Ctf Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Stars: ✭ 338 (+1.5%)
Mutual labels:  hacking
Socialbox Termux
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By init__0 for termux on android
Stars: ✭ 324 (-2.7%)
Mutual labels:  hacking

Awesome Cyber Security

Awesome

A collection of awesome software, libraries, documents, books, resources and cool stuff about security.

Inspired by Awesome Security and Herman Slatman.

Thanks to all contributors, you're awesome and wouldn't be possible without you! The goal is to build a categorized community-driven collection of very well-known resources.

List links and description

CERT and alerts

Link Description
CERT-EU - Latest News (Latest News) Computer emergency response Tean for the EU (Europe Union) institutions, bodies and agencies
CERT-US - ALERTS (Alerts) US-CERT United States Computer Emergency Readiness Team
ICS-CERT-US - Alerts An ICS-CERT Alert is intended to provide timely notification to critical infrastructure owners and operators concerning threats or activity with the potential to impact critical infrastructure computing networks.

Certification

Link Description
CEH - Certified Ethical Hacker A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
CISSP - CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL The Certified Information Systems Security Professional (CISSP) is an information security certification for security analysts.
CompTIA Security + CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.
GPEN - GIAC Penetration Tester The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.
PWK - Penetration Testing Training with Kali Linux Penetration Testing with Kali (PWK) is a self-paced, online course that introduces students to the latest ethical hacking tools and techniques.
OSCP - Offensive Security Certified Professional The Offensive Security Certified Professional (OSCP) is the companion certification for our Penetration Testing with Kali Linux training course and is the world’s first completely hands-on offensive information security certification. The OSCP challenges the students to prove they have a clear and practical understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.

Organizations

Link Description
CIS Centor for Internet Security CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.
CVE - Common Vulnerabilities and Exposures CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities.
No more ransomware Need Help unlocking your digital life without paying your attackers?
Owasp Open Web Application Security Project
ZeroDayInitiative (Alerts) Zero Day Iniciative

Informatives and blogs

Link Description
EffectHacking Blog
ICS Sans Sans Industrial Control Systems blog
GBHackers on Security Security blog
Google Security Blog Google Security Blog
g0tmi1k Blog Hacker blog
Hacker Security Hacker security News and Blog
HelpNetSecurity Help Net Security
Security Focus Security Focus
SecurityWeek Internet and Enterprise Security News, Insights e Analysis
Security art Work Security art Work
Security Affairs Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
The Hacker News The Hacker News Security in a Serius Way
Virus Guides Powered by Knowledge
Malwaretech News about Malware
WeLiveSecurity News, Views, and insight from the ESET security comunity
Virtual Dispersive Networking Virtual Dispersive Networking for Cyber Security Blog

CTF, Training [email protected] and [email protected]

Link Description
BetterMotherFucking CTF MotherfuckingCTF inspired platform. But better.
CTF365 CTF Praticing
FBCTF Facebook Capture the Flag
Hacker Experience Game of Hacker Experience
Hackflag Brazilian Hackflag
Hacking-LAB Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents.
HackTheBox Pen-testing Labs
Over The Wire The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
Open Security Training OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.
Pwnable.kr 'pwnable.kr' is a non-commercial wargame site which provides various pwn challenges regarding system exploitation.
Trailofbits Github CTF Field Guide
Shellter Social Network focused on information security

Non-legal Cyber activism

Link Description
Zone-H List of sites attacked by unethical Hackers
WikiLeaks WikiLeaks is a multi-national media organization and associated library.

IT Hacking list

Link Description
Google Hacking Database Google Hackgin Database
Metasploit Metasploit penetration testing software

AT Hacking list

Link Description
Shodan Open ports in A.T
Critifence Default Password database of A.T

Courses and Guides Sites

Link Description
Cybrary Free and Open Source Cyber Security Learning
O Tao do Desenvolvimento Seguro [PT-BR] Safe Development Guide
Guru99 Website with guides and a Free Ethical Hacking Course

OS - Operation Systens

Link Description
BackBoxLinux BackBox Linux is a penetration testing and security assessment oriented Linux distro..
BlackArckLinux BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 1925 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.
Kali Penetration Testing Destribution OS
ParrotSec Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.
QubesOS Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS).
Samurai Web Tester Framework Web Tester OS
PENTOOS Pentoo is a security-focused livecd based on Gentoo
Vulnhub OS with vulnerabilities for pentests

Tools

Link Description
Find Sec Bugs The FindBugs plugin for security audits of Java Web Applications.
Sonarqube Static Code Reviewer
PunkSPIDER A global web application vulnerability search engine.
Metasploit Framework Pentest Framework used by Kali Linux.
NMap Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing.
Netcat Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
Sonarqube Static Code Reviewer
TCPDump Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression;
OSSEC OSSEC is a multplatform, opensource and free HIDS
Wazuh Wazun is a open source enterprise-ready security monitoring solution for threat detection, integrity monitorying, incident response and compliance.
w3af Web Application Attack And Audit Framework
Wireshark Wireshark is the world’s foremost and widely-used network protocol analyzer
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].