All Projects β†’ husnainfareed β†’ Awesome Ethical Hacking Resources

husnainfareed / Awesome Ethical Hacking Resources

Licence: mit
πŸ”— All the resources I could find for learning Ethical Hacking and Penetration Testing.

Projects that are alternatives of or similar to Awesome Ethical Hacking Resources

Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-78.67%)
Mutual labels:  hacking, penetration-testing, exploitation, owasp
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (-6.75%)
Mutual labels:  hacking, penetration-testing, exploitation
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+1020.15%)
Mutual labels:  hacking, penetration-testing, hackers
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+1128.94%)
Mutual labels:  hacking, penetration-testing, owasp
Phpvuln
Audit tool to find common vulnerabilities in PHP source code
Stars: ✭ 146 (-84.35%)
Mutual labels:  hacking, penetration-testing, owasp
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-57.02%)
Mutual labels:  hacking, penetration-testing, hackers
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+49.2%)
Mutual labels:  hacking, penetration-testing, exploitation
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-79.64%)
Mutual labels:  hacking, penetration-testing, exploitation
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-93.35%)
Mutual labels:  resources, hacking, penetration-testing
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+275.46%)
Mutual labels:  hacking, penetration-testing, owasp
Hacker Roadmap
πŸ“Œ Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+730.87%)
Mutual labels:  hacking, penetration-testing, exploitation
Damn Vulnerable Graphql Application
Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-39.23%)
Mutual labels:  penetration-testing, exploitation
Attifyos
Attify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-34.08%)
Mutual labels:  hacking, exploitation
Penetration Testing Tools
A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
Stars: ✭ 614 (-34.19%)
Mutual labels:  hacking, penetration-testing
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-31.83%)
Mutual labels:  hacking, penetration-testing
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-40.41%)
Mutual labels:  hacking, penetration-testing
Habu
Hacking Toolkit
Stars: ✭ 635 (-31.94%)
Mutual labels:  hacking, penetration-testing
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-3.86%)
Mutual labels:  hacking, exploitation
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+676.63%)
Mutual labels:  hacking, penetration-testing
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (-27.33%)
Mutual labels:  hacking, penetration-testing

Awesome Resources For Learning Hacking & Pentesting Awesome Hacking Awesome community

What I’m sharing here is a collection of some best resources about Hacking & Penetration Testing to make you learn faster! Let's make it the best resource repository for our community.

You are welcome to fork and contribute.

Also you can find my own writeups/tutorials on medium : @hussnainfareed :)

Books

  1. The Hacker Playbook 2: Practical Guide To Penetration Testing
  2. The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy
  3. Breaking into Information Security: Learning the Ropes 101
  4. Penetration Testing: A Hands-On Introduction to Hacking
  5. Social Engineering: The Art of Human Hacking
  6. Hacking: The Art of Exploitation, 2nd Edition
  7. Web Hacking 101
  8. OWASP Testing Guide (A must read for web application developers and penetration testers)
  9. The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  10. The Basics of Web Hacking: Tools and Techniques to Attack the Web

Learning Platforms to Sharpen Your Skills

Online

Name Description
CTF Hacker101 The Hacker101 CTF is a game designed to let you learn to hack in a safe, rewarding environment. Hacker101 is a free educational site for hackers.
Hack The Box :: Penetration Testing Labs An online platform to test and advance your skills in penetration testing and cyber security. Join today and start training in our online labs.
CTF365 An account based ctf site, awarded by Kaspersky, MIT, T-Mobile.
Backdoor Pen testing labs that have a space for beginners, a practice arena and various competitions, account required.
Hack.me Lets you build/host/attack vulnerable web apps.
CTFLearn An account-based ctf site, where users can go in and solve a range of challenges.
OWASP Vulnerable Web Applications Directory Project (Online) List of online available vulnerable applications for learning purposes.
Pentestit labs Hands-on Pentesting Labs (OSCP style)
Root-me.org Hundreds of challenges are available to train yourself in different and not simulated environments
Vulnhub.com Vulnerable By Design VMs for practical 'hands-on' experience in digital security
Windows / Linux Local Privilege Escalation Workshop Practice your Linux and Windows privilege escalation.
Hacking Articles CTF Breif Write up collection with a lot of screenshots good for beggainers.
Rafay Hacking Articles, a great blog Write up collections by Rafay Baloch.
PentesterLab 20$ signature, complete content basic to write exploits, web, android.
CyberSec WTF Emulated web pentesting challenges from bounty write-ups

Off-Line

Name Description
Damn Vulnerable Xebia Training Environment Docker Container including several vurnerable web applications (DVWA,DVWServices, DVWSockets, WebGoat, Juiceshop, Railsgoat, django.NV, Buggy Bank, Mutilidae II and more)
OWASP Vulnerable Web Applications Directory Project (Offline) List of offline available vulnerable applications for learning purposes

Vulnerable Machines/Websites

  1. FiringRange

Vulnerability Databases And Resources

Vulnerability Databases are the first place to start your day as a security professional. Any new vulnerability detection is generally available through the public vulnerability databases. These databases are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability.

Malware Analysis

Name Description
Malware traffic analysis list of traffic analysis exercises
Malware Analysis - CSCI 4976 another class from the folks at RPISEC, quality content
[Bad Binaries] (https://www.badbinaries.com/) walkthrough documents of malware traffic analysis exercises and some occasional malware analysis.

Linux Penetration Testing OS

Name Description
Kali the infamous pentesting distro from the folks at Offensive Security
Parrot Debian includes full portable lab for security, DFIR, and development
Android Tamer Android Tamer is a Virtual / Live Platform for Android Security professionals.
BlackArch Arch Linux based pentesting distro, compatible with Arch installs
LionSec Linux pentesting OS based on Ubuntu

Courses

  1. Computer Systems Security, MIT

For those who want to do CEH, the following links are for you. 2. CBT Nuggets CEH Training 3. CEH Books 4. Guide to Binary Exploitation

Workshops/Playlists

  1. Web Hacking
  2. Ethical Hacking, A Comprehensive Playlist covering almost everything

Security Talks and Conferences

  1. InfoCon - Hacking Conference Archive
  2. Curated list of Security Talks and Videos
  3. Blackhat
  4. Defcon
  5. Security Tube
  6. Kevin Mitnick: Live Hack at CeBIT
  7. Ghost in the Cloud, Kevin Mitnick
  8. Kevin Mitnick | Talks at Google
  9. Complete Free Hacking Course: Go from Beginner to Expert Hacker Today

YouTube Channels

Now let’s get Towards YouTube Channel Links... These Channels are Shared By Hackers where They Upload their Video POCs.. Watching them u can actually understand how to demonstrate these type of attacks...

  1. LiveOverflow
  2. Black Hat
  3. Injector Pca
  4. Hisham Mir
  5. Devil Killer
  6. Suleman Malik
  7. Dem0n
  8. Frans RosΓ©n
  9. HackerOne
  10. ak1t4 machine
  11. Shawar Khan
  12. vulnerability0lab
  13. Bugcrowd
  14. Vijay Kumar
  15. Web Development Tutorials
  16. Jan Wikholm
  17. Bhargav Tandel
  18. ErrOr SquaD
  19. SecurityIdiots
  20. Penetration Testing in Linux
  21. Hussnain Fareed
  22. Null Byte

Any Channel Link Missing? Kindly add it in Comments

Forums

Name Description
0x00sec hacker, malware, computer engineering, Reverse engineering
Antichat russian based forum
CODEBY.NET hacker, WAPT, malware, computer engineering, Reverse engineering, forensics - russian based forum
EAST Exploit database exploit DB for commercial exploits written for EAST Pentest Framework
Greysec hacking and security forum
Hackforums posting webstite for hacks/exploits/various discussion

Contribution

Your contributions and suggestions are heartily welcome.

NOTE:

All references taken from Internet and shared on internet xD Thanks to those who shared their opinion before that helped me learn πŸ˜‰ if you have any questions, please ask in the comments. If you know about any good resource for beginners, please share it here.

For more articles on hacking you can follow me on Medium:

medium.com/@hussnainfareed

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].