Skip to content

RealSeraphina/Super_Cool_Links_By_Sera

Repository files navigation

Super_Cool_Links_By_Sera

A collection of awesome links I've compiled. please report any link rot, typoes, etc. Thanks!

Take a Break (Sort Of)

Youtube

Websites

Security Conferences

Career Exploration

Certification Exam Study πŸ“

What Do You Use?

I get asked frequently what software/programs I use on my computer(s). I main Windows 11 Pro; here's my must have software:

Cyber Range

Distros

Linux

Windows

Virtual Machine Hypervisors

Random

Tools/Utilities

CTF/Extra Practice 🏴

Security Basics

Linux 🐧

User Management πŸ‘₯

Text Editing πŸ“

File Compression 🀐

Linux Permissions

Package Management πŸ“¦

Credit For this section in (large) part goes to Networkmancer

apt (Advanced Package Tool)

Common uses:

  • apt update: Updates package lists from repositories.
  • apt upgrade: Upgrades all the installed packages.
  • apt install [package-name]: Installs a specified package.
  • apt remove [package-name]: Removes a package but retains its configuration files.
  • apt purge [package-name]: Removes a package including its configuration files.
  • apt search [package-name]: Searches repositories for a pacage matching the provided name.

dpkg (Debian Package)

Common uses:

  • dpkg -i [package-file.deb]: Installs/Upgrades a package from its .deb file.
  • dpkg -r [package-name]: Removes a package but retains configuration files.
  • dpkg -P [package-name]: Purges a package completely.
  • dpkg -l: Lists all packages installed.

Other Package Mangers

SSH

Bash Scripting πŸ§‘β€πŸ’»

Networking

Wireshark 🦈

Firwalls and Defense In Depth πŸ”₯🧱

WIFI πŸ“Ά

Git / Repositories

Python 🐍

Websites

YouTube

One-Liners

  • Python Webserver with logging - python3 -m http.server 80 2>&1 | tee -a access.log or a shorthand way to redirect STDERR python3 -m http.server 80 |& tee -a access.log Python uses STDERR to display the logs on screen.

Web and Protocols 🌐

Windows Administration πŸͺŸ

Infamous Hacks / Attacks πŸ§‘β€πŸ’»

Reconnaissance πŸ”­

Examples of Vulnerabilities

Software

Hardware

People

Web Vulnerabilities πŸ•ΈοΈ

Passwords and Password Cracking

Bind and Reverse Shells 🐚

Metasploit and Exploits πŸ’£

IDK Why I have it out for Bluetooth today

SIEMs (Splunk)

Forensics πŸ”

Useful Software

Cheat Sheets

Windows Forensics

How to write a Digital Forensics Report

Extra Practice

NIST Cybersecurity Framework and Risk Management Framework

NIST - Recover

Sera's Reading List πŸ“š

  • The Art of Memory Forensics, 1st Ed. by Ligh et al. ISBN: 978-1118825099.
  • Reference: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, 3rd Ed. by Casey. ISBN: 978-0123742681.
  • File System Forensic Analysis, 2nd th Ed. by Carrier. ISBN: 978-0321268174.
  • Windows Registry Forensics, 2nd Ed. by Carvey. ISBN: 978-0128032916.
  • Windows Forensic Analysis Toolkit, 4th Ed. by Carvey. ISBN: 978-0124171572.
  • Secrets & Lies Digital Security in a Networked World, by Bruce Schneier. ISBN: 978-1119092438.
  • The Mathmatics of Secrets Cryptography From Caesar Ciphers to Digital Encryption, by Joshua Holden. ISBN: 978-0691141756.
  • Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers, by Andy Greenberg. ISBN: 978-0385544405.
  • The Hundred-Page Machine Learning Book, by Andriy Burkov. ISBN: 978-1999579500.
  • The C Programming Language, 2nd Edition, by Brian W. Kernighan and Dennis M. Ritchie. ISBN: 978-0131103627.
  • Obfuscated C and Other Mysteries, by Don Libes. ISBN: 978-0471578055.

About

A collection of awesome links I've compiled that are related to cybersecurity.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published