---=== Navigation ===---
Home
|
Blogs and Ratings
|
L337 Sh1t
|
Appreciation Pages
|
Works of Fiction
Hacking Resources
Return to Homepage
Hacking Courses
PortSwigger Labs
TryHackMe
Proving Grounds
Offensive Security Labs
Locally Hosted Classes
CTF Learn
OverTheWire: Wargames
Binary Analysis Course
PenTesterLab
INE
Cybrary
Open Security Training 2
Hacking Forums
Ethical Hacking Tutorials, Tips, and Tricks
Hackaday, Fresh Hacks Everyday
Hackinthebox, Keeping Knowledge Free
Hellbound Hackers
.:: Phrack Magazine ::.
Capture The Flag
HackTheBox
HackThisSite
MicroCorruption
PicoCTF
pwnable.tw
pwnable.kr
Reversing.kr
Hax.tor
W3Challs
NetGarage
RingZer0
Hacker Challenges
VulnHub
Application Security Challenge
HackerOne
Hacking Resources
JSFuck
aaencode
CyberChef
XSS Filter Evasion Sheet
Pwnie Island
BeEF
CVSS
Reverse Shell Cheat Sheet
LOLBAS
VirusTotal
x0rb3l's Cyber Bookmarks
PowerView
0xffsec Handbook
GTFOBins
Security Certifications Roadmap
theZoo, malware library
CrackStation
Priv2Admin
Message Header Analyzer
Interactive Online Malware Analysis Sandbox
Hashcat example hashes
Hacking Databases
CVE
NVD
Seclists
Exploit Database
Hacker Database
Hacker Groups
MITRE ATT&CK
Open Source Intelligence
Shodan
Service Name and Transport Protocol Port Registry
License Plate Lookup
American Registry for Internet Numbers
YouTube Channels
IppSec
thehackerish
DeviantOllam
The Hated One
Hak5
HackerSploit
The Cyber Mentor
Practical Networking
Tib3rius
Shannon Morse
Red Team Village
Blue Team Village
Books
just books in my collection, "*" means i've read it
Countdown To Zero Day - Kim Zetter *
Sandworm - Andy Greenberg
breaking/_and/entering - Jeremy N. Smith
Ghost in the Wires - Kevin Mitnick *
The Art of Invisibility - Kevin Mitnick
The Art of Intrusion - Kevin Mitnick
Cult of the Dead Cow - Joseph Menn
Kingpin - Kevin Poulsen
Dark Territory - Fred Kaplan
Worm - Mark Bowden
We Are All Targets - Matt Potter
The Manga Guide to Cryptography - Mitani, Sato, Hinoki
The Art of Mac Malware
dthroner's PDF Collection