Skip to content

Sharing our knowledge and resources in the field of cyber security.

Notifications You must be signed in to change notification settings

PwnLabMe-Project/Security-Resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Material Bread logo

PWNLAB.ME

PwnLab.Me Türkiyedeki Siber Güvenlik ekosistemini canlandırmak, ekosisteme yeni insanlar kazandırmak ve bu alanda edinilen bilgi ve tecrübeyi Siber Güvenlik meraklılarıyla paylaşmayı hedefleyen gönüllü bir Siber Güvenlik Topluluğudur.

Contact Us

PWNLAB SECURITY RESOURCES

Bu repo, Siber Güvenlik alanına ilgi duyan herkesin burada bulunan kaynaklardan faydalanması için PwnLab.Me Siber Güvenlik Topluluğu tarafından oluşturulup genel erişime açılmıştır.

Table of Contents

Archives

https://mega.nz/folder/1cgAAKTQ#TsXutcd8w6GKFVfAJ_owaQ

https://arsiv.kekikakademi.workers.dev/ → user:pass → @KekikAkademi:@KekikKitap

https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html

https://www.kgay4all.com/seioqueseiporleroqueleio/Security/

https://drive.google.com/drive/folders/1CdrveRU2iXGabR-nQ-G1o9GC4GusU-92?usp=sharing

https://predb.me/

https://github.com/LuNiZz/siber-guvenlik-sss

https://www.linode.com/docs/guides/

https://viperone.gitbook.io/pentest-everything/

https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

https://cloudflare.github.io/

https://www.microsoft.com/en-us/securityengineering

https://www.gnupg.org/documentation/manuals/gcrypt/

Blogs

https://www.hackingarticles.in/

https://0x00sec.org/

https://0xffsec.com/

https://medium.com/

https://pwnlab.me/

https://blog.shiftleft.io/

https://bishopfox.com/blog/

https://infosecwriteups.com/

https://www.schneier.com/

https://www.ericconrad.com/

https://danielmiessler.com/blog/

https://www.redtimmy.com/blog/

http://bc-security.org/blog

http://rastamouse.me/

https://hakluke.medium.com/

https://hausec.com/

https://inteltechniques.com/blog/

https://whitton.io/

https://tisiphone.net/

https://taosecurity.blogspot.com/

https://blog.zsec.uk/

https://grahamcluley.com/

https://benjaminstrick.com/blog/

https://blog.bushidotoken.net/

https://www.intelligencewithsteve.com/blog

https://keyfindings.blog/

https://www.osinteditor.com/

https://www.osintme.com/

https://www.osintcombine.com/blog

https://vvhack.org/

Telegram Channel

https://t.me/CyberSec_TR

https://t.me/library_Sec/1524

https://t.me/cloudandcybersecurity

https://t.me/parrotsecturkey

https://t.me/AdliBilisimTurkiye

https://t.me/KekikAkademi

YouTube Channel

[ Cover6 Solutions ] https://www.youtube.com/c/Cover6Solutions/

[ Hak5 ] https://www.youtube.com/user/Hak5Darren

[ DEFCONConference ] https://www.youtube.com/user/DEFCONConference

[ stacksmashing ] https://www.youtube.com/c/stacksmashing

[ Authentic8 ] https://www.youtube.com/user/Authentic8TV

[ conINT ] https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos

[ OSINT Dojo ] https://www.youtube.com/osintdojo

[ Mehmet D. INCE ] https://www.youtube.com/c/MehmetDursunInce/

[ Can Deger ] https://www.youtube.com/c/CanDeger/

[ Utku Sen ] https://www.youtube.com/c/UtkuSenYoutube/

[ Atil Samancioglu ] https://www.youtube.com/channel/UCnmAu7FF7LeoyTozrMVtTxQ/

[ Omer Citak ] https://www.youtube.com/user/Om3rCitak/

[ Z-winK University (ZU) - Bug Bounty Education ] https://www.youtube.com/channel/UCDl4jpAVAezUdzsDBDDTGsQ/videos

[ Jeremy's IT Lab ] https://www.youtube.com/c/JeremysITLab

CTF

https://tryhackme.com/

https://hackthebox.com/

https://www.vulnhub.com/

https://portswigger.net/web-security/all-labs

https://ctf.pwnlab.me/

https://ctftime.org/

https://hackmyvm.eu/

https://www.cyberseclabs.co.uk/

https://www.root-me.org/

https://www.hackerone.com/

https://pentesterlab.com/

https://www.revshells.com/

https://blueteamlabs.online/

https://anarplex.net/

https://www.wechall.net/active_sites

https://overthewire.org/wargames/

https://vulnmachines.com/

https://ctflearn.com/

https://247ctf.com/

https://cryptohack.org/

https://ctf.cybersoc.wales/

https://cryptohack.org/

Tools

Exploits Database

https://www.shodan.io/

http://www.exploit-db.com/

http://packetstormsecurity.com/

https://www.rapid7.com/db/

https://cxsecurity.com/

https://packetstormsecurity.com/

https://vuldb.com/

https://vulners.com/

https://sploitus.com/

https://www.vulnerability-lab.com/

https://en.0day.today/

Vulnerabilities Database

https://nvd.nist.gov/

http://www.secdocs.org/

https://cve.mitre.org/cve/

http://www.cvedetails.com/

https://www.kb.cert.org/vuls/

http://lwn.net/Vulnerabilities/

http://www.vulnerability-lab.com/

http://www.securityfocus.com/bid

https://secunia.com/community/advisories/search/

http://denimgroup.com/resources-threadfix/

SSL/TLS Checker

https://www.cdn77.com/tls-test

https://gf.dev/tls-test

https://www.wormly.com/test_ssl/

https://www.digicert.com/help/

https://crt.sh/

Hacking Tutorials

http://www.ehacking.net/

http://www.securitytube.net/

http://www.hacking-tutorial.com/

https://www.offensive-security.com/

http://breakthesecurity.cysecurity.org/

http://www.spacerogue.net/wordpress/

https://www.youtube.com/user/Hak5Darren

https://www.youtube.com/user/sansinstitute

https://vimeo.com/channels/fullscopesecurity

http://www.kalitutorials.net/2013/08/kali-linux.html

https://www.youtube.com/user/DEFCONConference

https://en.wikibooks.org/wiki/Metasploit/VideoTutorials

Virus Scan

http://fuckingscan.me/

http://v2.scan.majyx.net/

http://nodistribute.com/

http://www.file2scan.net/

http://anubis.iseclab.org/

https://anonscanner.com/

http://virusscan.jotti.org/it

https://www.virustotal.com/nl/

https://urlscan.io/

https://urlhaus.abuse.ch/browse/

https://otx.alienvault.com/

IOC Search

https://www.threatcrowd.org/listMalware.php?antivirus=Spook

https://otx.alienvault.com/pulse/617bc03687a50f0425bed393

http://www.covert.io/threat-intelligence/

Phishing Database

https://phishtank.org/

Tools Download

http://insecure.org/

http://www.kitploit.com/

http://www.toolswatch.org/

http://tools.kali.org/tools-listing

http://www.romhacking.net/utilities/

http://www.blackarch.org/tools.html

http://www.hackersonlineclub.com/hacking-tools

https://www.concise-courses.com/hacking-tools/

https://gexos.github.io/Hacking-Tools-Repository/

http://www.darknet.org.uk/category/hacking-tools/

https://pentest-tools.com/reconnaissance/google-hacking

Network Online Tools

https://dnslytics.com/

http://bgp.he.net/

http://www.dnswatch.info/

http://www.tcpiputils.com/

http://services.ce3c.be/ciprg/

http://www.yougetsignal.com/

http://www.coffer.com/mac_find/

http://www.nirsoft.net/countryip/

http://www.sockets.com/services.htm

https://mxtoolbox.com/

IP Lookup

http://ip-api.com/

http://ipaddress.com/

http://whatstheirip.com/

http://www.whatismyip.com/

http://www.ip2location.com/demo

http://www.my-ip-neighbors.com/

http://freegeoip.net/static/index.html

http://www.ip-adress.com/ipaddresstolocation/

Information Gathering & OSINT

https://projectdiscovery.io/#/

https://www.wappalyzer.com/

https://tweetfeed.live/

https://wheregoes.com/trace/2022349876/

https://hunter.io/

https://spyse.com/

https://pulsedive.com/

https://www.greynoise.io/

https://publicwww.com/

https://wigle.net/

https://reposify.com/

https://www.binaryedge.io/

https://fullhunt.io/

https://sploitus.com/

https://gephi.org/

https://intelx.io/

https://tinfoleak.com/

https://lookup.icann.org/

https://www.robtex.com/

https://www.whoxy.com/

https://censys.io/

https://reverseip.domaintools.com/

https://who.is/

https://domainbigdata.com/

https://zoomeye.org/

https://leakix.net/

https://analyze.intezer.com/

https://onyphe.io/

https://netlas.io/

https://dnsdumpster.com/

https://any.run/

Encrypt / Decrypt

http://crypo.in.ua/tools/

http://codebeautify.org/encrypt-decrypt

http://www.yellowpipe.com/yis/tools/encrypter/

http://www.tools4noobs.com/online_tools/decrypt/

http://textmechanic.com/Encryption-Generator.html

https://www.base64decode.org/

Online Hash Crackers

http://www.cmd5.org/

http://hashcrack.in/en

https://crackstation.net/

http://passcracking.com/

http://md5.rednoize.com/

http://www.hashkiller.co.uk/

http://www.md5online.org/

http://www.md5crack.com/

http://md5decryption.com/

http://www.cloudcracker.net/

https://hdb.insidepro.com/en

http://www.onlinehashcrack.com/

http://www.md5this.com/index.php

http://www.netmd5crack.com/cracker/

http://www.tydal.nu/article/md5-crack/

https://isc.sans.edu/tools/reversehash.html

Anonymous Test

https://ipleak.net/

https://www.dnsleaktest.com/

https://diafygi.github.io/webrtc-ips/

SMS

http://receive-sms-now.com/

http://www.receivesmsonline.net/

http://www.receive-sms-online.info/

Fake Identity

https://fakena.me/

http://www.fakenamegenerator.com/

http://names.igopaygo.com/people/fake_person

Steganography

http://exif.regex.info/exif.cgi

https://www.pic2map.com/

https://exiftool.org/

https://cleanup.pictures/

Forensics

https://29a.ch/photo-forensics/#forensic-magnifier

https://github.com/GuidoBartoli/sherloq

Documents

Linux Tutorial

https://www.comparitech.com/net-admin/kali-linux-cheat-sheet/

https://www.maketecheasier.com/guide-to-mastering-linux/

https://linoxide.com/linux-directory-structure/

Reverse Engineering & Malware Analysis

https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/

https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/?utm_medium=Social&utm_source=Twitter&utm_content=CM%20DFIR%20blog&utm_campaign=FOR610

https://storage.ey.md/Technology%20Related/Programming%20%26%20Reversing/Tuts4You%20Collection/Tutorials/

https://0x00sec.org/t/fileless-malware/26973

https://github.com/hasherezade/malware_training_vol1

https://zeltser.com/malware-analysis-webcast/

https://sechub.medium.com/blue-team-system-live-analysis-part-1-a-proactive-hunt-8258feb7cb14

https://sechub.medium.com/blue-team-system-live-analysis-part-2-windows-rules-and-tools-fc42be6c060d

https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/analyzing-pdf-malware-part-1/

https://soolidsnake.github.io/2021/07/17/hellokitty_linux.html

Digital Forensics & Steganography

https://www.meridiandiscovery.com/articles/word-forensic-analysis-compound-file-binary/

https://github.com/cugu/awesome-forensics

https://www.forensicfocus.com/articles/a-linux-forensics-starter-case-study/

Cyber Intelligence

https://chrome.google.com/webstore/detail/fake-profile-detector-dee/jbpcgcnnhmjmajjkgdaogpgefbnokpcc?hl=en-US

https://protectioncircle.org/2017/03/06/the-osint-connection-intelligence-in-executive-protection/

https://systemweakness.com/osint-on-gmail-accounts-fc60d785ff87

https://niiconsulting.com/checkmate/2020/09/passive-subdomain-enumeration-part-1/

https://niiconsulting.com/checkmate/2020/10/active-subdomain-enumeration-part-2/

https://medium.com/katies-five-cents/faqs-on-getting-started-in-cyber-threat-intelligence-f567f267348e

https://www.scythe.io/library/threat-thursday-top-ransomware-ttps

https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html

https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/

http://www.pentest-standard.org/index.php/Intelligence_Gathering

https://inteltechniques.com/osintbook/

http://www.securitysift.com/passive-reconnaissance/

https://www.youtube.com/user/irongeek/search

https://www.youtube.com/channel/UCjzceWf-OT3ImIKztzGkipA/videos

https://www.youtube.com/c/0x4rk%C3%98/videos

https://www.youtube.com/user/Authentic8TV

https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos

https://www.youtube.com/osintdojo

https://www.youtube.com/playlist?list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S

https://www.youtube.com/watch?v=p4JgIu1mceI

https://courses.thecyberinst.org/courses/osintmini

https://courses.thecyberinst.org/courses/osint-challenge

https://www.geoguessr.com/

https://www.tracelabs.org/initiatives/search-party

https://kit.exposingtheinvisible.org/en/

https://cyberdefenders.org/blueteam-ctf-challenges/38

https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence

https://www.osinttechniques.com/

https://www.phishlabs.com/blog/

Penetration Testing

https://attack.mitre.org/

https://application.security/

https://owasp.org/www-project-juice-shop/

https://portswigger.net/web-security

https://cheatsheetseries.owasp.org/

https://github.com/xdavidhu/awesome-google-vrp-writeups

https://wiki.owasp.org/index.php/OWASP_favicon_database

https://medium.com/@raymond-lind/ssrf-lfi-in-uploads-feature-321d83b93ec0

https://blog.shiftleft.io/node-js-vulnerability-cheatsheet-447b0c9bdb99

https://infosecwriteups.com/everything-you-need-to-know-about-clickjacking-a522b188f2fe

https://ozguralp.medium.com/bigquery-sql-injection-cheat-sheet-65ad70e11eac

https://github.com/TheKingOfDuck/fuzzDicts

https://github.com/danielmiessler/SecLists

Cryptography

https://www.youtube.com/c/CihangirTezcan/videos

https://github.com/mdisec/crpyto101-egitim

Network Security

https://mehmetdmrbg.medium.com/kablosuz-a%C4%9F-sizma-tekni%CC%87kleri%CC%87-nelerdi%CC%87r-ve-kablosuz-a%C4%9F-g%C3%BCvenli%CC%87%C4%9Fi%CC%87-nasil-sa%C4%9Flanir-22c492501d49

https://barisinceisci.wordpress.com/2022/01/29/kablosuz-aglarda-802-1x-ile-ag-guvenliginin-saglanmasi/

Wordlist

https://nordpass.com/most-common-passwords-list/

https://github.com/berzerk0/Probable-Wordlists

https://github.com/utkusen/turkce-wordlist

https://github.com/xajkep/wordlists

https://blog.g0tmi1k.com/2011/06/dictionaries-wordlists/

https://github.com/danielmiessler/SecLists

Siber Tehdit İstihbaratı Yayınları

https://AlienVault.com : Düşmanları profilleyen çoklu kaynaklar bulundurur.

https://Cyveilance.com : Benzersiz tehdit oyuncuları ile beslenir ve cezai yaptırımları belirtir.

https://EmergingThreats.net : Çeşitli yayınları bulunmaktadır.

https://FireEye.com : Dinamik Tehdit İstihbarat servisidir.

https://HackSurfer.com : İşinize uyarlanmış bilgiler sunar.

https://InternetIdentity.com : Tehdit, büyük veri çözümü ActiveTrust'ten beslenir.

https://RecordedFuture.com : Web'den gerçek zamanlı tehdit zekâsı verileri sunar

https://SecureWorks.com : Yayınlar ve ayrıca belgeler sağlar.

https://Symantec.com : DeepInsight da dahil olmak üzere çeşitli konularda yayınları vardır.

https://Spytales.com : Tehdit aktörlerinin geçmişi, bugünü ve geleceği hakkında bilmeniz gereken bilgiler sunar.

https://Team-Cymru.com : Tehdit istihbarat ve Bogon listeleri sunar.

https://TheCyberThreat : Kendi Twitter yayınlarını sunar . Üst düzey ve kapsamlı yayınlardır.

https://ThingsCyber.com : Günümüz savunmasıyla ilgili siber çatışma ve siber güvenlik konusundaki kritik noktaları belirtir.

https://ThreatConnect.com : Cyber Squared tarafından bilgi paylaşımına odaklanmış bir servistir.

https://ThreatGrid.com : Birleşik kötü amaçlı yazılım analizi üzerine çalışır.

https://ThreatIntelligenceReview.com : Tehdit istihbarat kaynaklarının incelemesi ve güncellenmesi üzerine çalışır.

https://ThreatStop.com : IP kaynağına göre Bontet’lerin engellenmesi üzerine çalışır.

https://ThreatStream.com

https://ThreatTrack.com : Kötü amaçlı URL'lerin, IP'lerin ve kötü amaçlı yazılım / kimlik avı ile ilgili verilerin akışı ile çalışmaktadır.

https://Verisigninc.com