| Article | Description |
|---|---|
| Explore Hidden Networks With Double Pivoting | Good article for understanding network pivoting during penetration tests with multiple networks. |
| So You Want To Be A Hacker: 2021 Edition | Great guide on how to become an hacker/pentester. |
| Book | Description |
|---|---|
| A Bug Hunter's Diary | A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software. |
| Ghost In The Wires | Kevin's Mitnick account when he was on the run from the FBI. |
| Hacking: The Art of Exploitation | A bit outdated but definitely should be in any hackers aresnal, with working examples and tutorials on hacking. |
| Penetration Testing – A Hands-On Introduction to Hacking | Book about core skills and techniques that all hackers should have. |
| Red Team Field Manual | It is very handy and cheap but very effective and informative as well. It contains 90 pages of commands for Windows, Linux, Nmap, SQLMAP, VPN and more. |
| Serious Cryptography | This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography. |
| The Art of Software Security Assessment | The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. |
| The Cuckoo's Egg | It is his first-person account of the hunt for a computer hacker who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL). |
| The Hacker Playbook 3 | This book is for those stepping up their penetration testing game or understand how advanced adversaries think and act. |
| The Shellcoder's Handbook | In a nutshell, this book is about code and data and what happens when the two become confused. |
| The Web Application Hacker′s Handbook | This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. |
| Certificates | Description |
|---|---|
| Certification Road Map | A chart attempts to classify and rank security certifications based on reputation, difficulty, and usefulness of the material covered. |
| Certified Ethical Hacking V11 | Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems. |
| CompTIA Security+ | CompTIA Security+ is a entry level certification that validates you have a good baseline of skills in security operations, assessing security posture, laws and regulations. |
| CompTIA Pentest+ | CompTIA Pentest+ is a new certification which is a good mid-point between Security+ and OSCP. Focus on tools and methodologies for conducting pentests. |
| CREST Registered Penetration Tester | The CREST Registered Penetration Tester examination is recognised by the NCSC as providing the minimum standard for CHECK Team Member status and is designed to assess a candidate’s ability to carry out basic vulnerability assessment and penetration testing tasks. |
| Offensive Security Certified Professional - OSCP | The OSCP is a foundational penetration testing certification, intended for those seeking a step up in their skills and career. PEN-200 and time in the practice labs prepare you for the certification exam. |
| Professor Messer | Well-known channel with quality courses preparing you for A+, Network+ and Security+ certifications. |
| Course | Description |
|---|---|
| Cybrary | Cybersecurity Professional Development Platform - contains many quality courses with hands-on labs e.g. for Pentest+ certification. Subscription based. 3 day free trial. |
| Learn Ethical Hacking From Scratch | Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts. |
| Linux Heap Exploitation - Part 1 | An hands-on course, students will learn new techniques and developing their own exploits based on what they've learned. |
| Metasploit unleashed | Metasploit Unleashed (MSFU) course is provided free of charge by Offensive Security focusing on Metasploit framework. |
| Pluralsight | Wealth of online courses in all things IT. Subscription based. 200 minutes watching free trial. |
| Practical Ethical Hacking | The Cyber Mentor ethical hacking course. |
| Website | Description |
|---|---|
| BoxenTriq | Free tools and resources to help you solve code-breaking challenges and ciphers with some automation support. |
| Bugcrowd bug bounty list | The most comprehensive, up to date crowdsourced list of bug bounty and security disclosure programs from across the web curated by the hacker community. |
| CTFtime | CTF archive with a rating system as well. |
| CyberChef | CyberChef is a free service that you may use locally or online to convert, parse or carry out well over 100 different operations. |
| dcode.fr | dCode has a huge library of scripts for decoding or encoding messages with standard cryptography techniques. |
| explainshell | Command-line to see the help text that matches each argument |
| GTFOBins | GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems. |
| HackerOne | HackerOne is a vulnerability coordination and bug bounty platform. |
| HackTheBox Academy | Cyber security training with hands-on exercises and labs made by Hack The Box. |
| HackTheBox | HTB is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field. |
| HackThisSite | HackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills. |
| HighOn.Coffee | Penetration Testing && Security Research Blog. A lot of various cheatsheets, pentest tools. |
| Kali linux tools | List of all hacking tools included in the most popular hacking operating system. |
| Khaotic Developments | A collection of links to other high quality pentest resources, cheatsheets, guides etc. |
| OpenSecuirtyTraining | OpenSecurityTraining.info is dedicated to sharing training material for computer security classes. |
| OverTheWire | The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. |
| Pentest Monkey | |
| PicoCTF | PicoCTF is the largest cybersecurity hacking contest for middle and high school students. |
| Portswigger-Web Security | Website dedicated to showing indepth points of web security. |
| SecJuice | Secjuice is the only non-profit, independent and volunteer led publication in the information security space. |
| Steganography Online | Online Steganography tool with basic encode/decode functionality. |
| TryHackMe | TryHackMe is an online platform for learning cyber security, using hands-on exercises and labs. |
| StegOnline | A web-based, enhanced and open-source port of StegSolve. Upload any image file, and the relevant options will be displayed. View a live demo or download the offline version here |
| Vulnhub | To provide materials that allows anyone to gain practical 'hands-on' experience in digital security, computer software & network administration. |
| Virtual Card Reader | The Virtual Card Reader” scans and parses any punch card images generated by “The Virtual Keypunch. |
| We Chall.net | Site with challenges mainly focussed on computer-related problems. UI is bad but there's a huge amount of specialised sites linked. Also can track our progress with the linked sites. |
| Channel | Description |
|---|---|
| Andy | Developing intermediate-level skills. |
| DAY0 | Podcasts as well as other reverse engineering / exploit development-related media. |
| IppSec | Walkthroughs on retired machines on the HackTheBox website. |
| John Hammond | Tutorials on programming languages and other hacking related subjects. |
| LiveOverFlow | Capture the Flag write up's and hardware security research channel. |
| Nahamsec | Educational hacking videos for anyone with an interest in web application hacking with a focus on bug bounties. |
| NetworkChuck | Everything IT related, this channel is involved in. |
| STÖK | Content related to Cyber Security, Hacking, Penetration testing and Bug Bounties. |
| The Cyber Mentor | Helpful guides and tutorials that include indepth knowledge on certain subject matters. |
