- Coding Books & Courses
- Linux resources
- Pentesting Resources
- Defensive Security Books
- Technical Resources
- Computer Forensics Resources
- Networking Resources
- Cybersec Story Style Books
- Cryptocurrency Books
- Online Learning Resources
- Hardware Resources
- Mobile Security Resources
- Reverse Engineering - Malware Analysis Included
- Privacy-Oriented Alternatives to Software
- Misc.
- Windows resources
- Social Engineering Resources
- Python Data Science Handbook
- Python Machine Learning
- Python for Finance
- Think like a Programmer (Anton Spraul)
- Windows Powershell in Action
- Learn Windows Powershell in a Month of Lunches
- Data Science from Scratch
- Perl One-Liners: 130 Programs That Get Things Done
- Wicked Cool Shell Scripts: 101 Scripts for Linux, OS X, & Unix Systems
- Javascript the Definitive Guid
- Designing Data Intensive Applications
- Developing 2D Games with Unity: Independent Game Programming with C#
- Learning React Native: Building Native Mobile Apps with JavaScript
- NSA Python course
- Free full stack dev course
- List of free coding books
- Various python concepts
- How to solve it, get you thinking in terms of alogrithms
- C programming manual Kerninghan & Ritchie
- Linux Firewalls: Attack Detection & Response w/iptables, psad, & fwsnort
- How Linux Works: What Every Superuser Should Know
- Absolute FreeBSD: The Complete Guide to FreeBSD
- Modern Operating Systems
- AT&T archives - Unix OS
- Explain Shell - explains different shell cmds
- Linux journey
- Operating systems: 3 easy pieces
- How Linux Works
- The Linux Bible
- Unix & Linux sysadmin
- Linux Programming Interface
- Build Linux distro from scratch
- Linux internals simplified
- Hands on Pentesting w/Python
- Kali Linux Revealed
- CEH Certification books
- Understanding Network Hacks: Attack & Defenses w/Python
- Web Application Hacker's Handbook: Finding & Exploiting Security Flaws
- Hands on Penetration Testing
- Kali Linux Web Penetration Testing
- Hands on Red Team Tactics
- Hands on AWS Penetration Testing w/Kali Linux
- Learning Windows Penetration Testing using Kali Linux
- Mobile Application Hacker's Handbook
- Pentest blog
- Exploit-db
- CVE details
- Cyberchef
- https://www.immuniweb.com/websec/#latest
- https://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php
- https://github.com/hfiref0x/UACME
- privesc exploits pack
- awesome pentest
- malware development
- Kontra appsec training
- Breaking & pwning AWS & Azure apps & servers
- Red team blog
- Bugcrowd university webapp course
- Onlycybersecurity, ethical hacking tutorials/readings
- Computer Security [art & science]
- Cybersecurity for Beginners 2nd Edition
- Practical Cyber Intelligence
- Security Operations Analyst
- Blue Team Field Manual
- Defensive Security Handbook
- Practical Malware Analysis
- 2014 CTF writeups
- Learning Exploit dev
- https://philippeharewood.com/
- https://docs.splunk.com/Documentation/Splunk/8.0.1/Data/Configuredatetimexml
- Network engineer certs
- https://community.turgensec.com/ssh-hacking-guide/
- https://objective-see.com/blog/blog_0x52.html
- https://securityaffairs.co/wordpress/77442/hacking/weaponized-microsoft-office-documents.html
- github.com/rednaga/training
- github.com/strazzere/android-unpacker/blob/master/AHPL0.pdf
- github.com/strazzere/anti-emulator/tree/master/slides
- droidsec.org/wiki/#whitepapers
- androidcracking.blogspot.com
- unicorn-engine.org
- Exploiting AV software
- Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts
- Osint investigation: Cerberus & the INPS
- Tearing down Android Stalkerware
- Notwannasigh CTF Writeup
- [images to analyze](https://aboutdfir.com/resources/tool-testing/]
- more images to analyze
- Linux forensics material by Hal Pomeranz, 32gb, contains lab VM
- File system forensics
- HTB Shocker walkthrough
- linux forensics course
- The Art of Network Architecture: Business* Driven Design (Networking Technology) 1st Edition
- The Practice of network security monitoring
- At War - Shane Harris
- Tribe of Hackers
- Dark Territory
- Hacker's Heroes of the Computer Revolution
- Cyberwar The Next Threat to National Security & What to do About It
- Hackers & Painters: The Ideas From the Digital Age
- Cuckoo's egg
- Neuromancer
- Hacking: The Art of Exploitation
- POC | GTFO
- The Tangled Web
- The Cybersecurity canon - "hall of fame" for cybersec books
- Bitcoin & Cryptocurrency Technologies
- https://www.classcentral.com/
- https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#
- https://github.com/sushilshinde/ebooks
- https://tutorials.cyberaces.org/tutorials.html
- https://github.com/bugcrowd/bugcrowd_university
- https://github.com/bkimminich/juice* shop
- https://explainshell.com/
- https://www.reddit.com/r/netsec/wiki/start#wiki_full_online_courses
- https://clark.center/
- https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational
- https://open.edu/openlearn/
- Discrete mathematics study guide
- Cambridge CS books
- Linear algebra done right
- Cloud security engineering w/AWS for beginners
- Learn about security logs
- How to rob a bank
- https://github.com/virtualabs/btlejack
- https://www.fcc.gov/oet/ea/fccid
- https://samy.pl/
- https://www.simform.com/iot-bluetooth-security-vulnerabilities/
- Black Hat Physical Device Security: Exploiting Hardware and Software
- Windbg cmds cheatsheet
- NY RE slides part 1
- NY RE slides part 2
- Getting started
- Exploit dev learning roadmap
- Malware unicorn resources
- online IDE with assembly output & C side-by-side
- Helpful RE related videos
- RE youtube vids
- REing IOS apps
- GDB cheatsheet
- RE blog
- Guide to disassemble
- Assembly Tutorial
- MIPS Assembly Playlist
- ARM Assembly Tutorial
- Practical Reverse Engineering: x86, 64, ARM by Bruce Dang
- Rootkits & Bootkits (Nostarch)
- The Art of Memory Forensics
- Practical Binary Analysis
- The Antivirus Hacker's Handbook
- Binary deobfuscation
- Malware analysis resource dump
- Reverse engineering resource dump
- Malware analysis course-Cincinati Uni 2020
- Malware analysis course-Cincinati Uni 2019
- Ghidra course
- REing blog
- Malware Analysis tools set up
- Malware Analysis VM set up
- Practical malware analysis course
- RE book 1k pages
- Malware samples zetsler
- Assembly course - text
- RE book 1k pages
- Open security training
- Practical malware analysis
- Malware analyst's cookbook
- Windows malware analysis essentials
- Malware unicorn workshop
- Malware analysis - RPISEC
- theZoo malware samples
- Fireeye yearly REing CTF
- Learn to program with C
- REing resources
- Getting started w/REing
- The self-organizing Computer course
- Attacking network protocols
- Reverse engineering protocols
- Binary deobfuscation
- Intro to assembly
- Configuring inetsim - should configure this with apateDNS
- objective-see - live malware samples
- malshare - live malware samples
- malware writeups + samples
- Malware writeups
- dasmalwrk - live malware samples
- Different cybersec learning pathways
- https://www.gnu.org/software/pspp/ (IBM SPSS's Alternative)
- https://digitaldefynd.com/best-it-support-courses-certification-training/
- https://openlibrary.org/
- https://application.security/free-application-security-training
- https://www.wikihow.com/Move-from-Windows-to-Linux
- http://the-gi-diet.org/lowgifoods/
- https://www.examtopics.com/exams/comptia/
- Lecture notes for diff courses
- University notes CS-centered
- Wiki's Educational Resource Corner
- Open source books
- Open source degrees
- Google resource doc by netsecfocus
- Udemy courses
- College books
- Awesome Note Taking Software
- Hacking Resources
- MIT Open Courseware
- OSINT related podcasts
- Beginner probability book
- Probability & statistics
- College textbooks
- List of cybersec resources
- Oracle certification
- Windows 7 ISO
- Old school OS imgs
- University Lecture Notes
- Book - No Tech Hacking
- Book - Social Engineering: The Art of Human Hacking
- Framework - Social Engineering Framework