A curated list of awesome information security resources, inspired by the 'awesome-*' trend on GitHub and my previous Coderwall Post.
The goal is to build a categorized community-driven collection of free resources focused on information security skill sets like Penetration Testing, Hardening, Computer Forensics, Malware Analysis, Reverse Engineering, Vulnerability Assessment and Research, Cryptography, Network Security, Honeypot Deployment and Anonimity.
Those resources and tools are intended only for cybersecurity professional and educational use in a controlled environment.
- MOOC's and Academic Courses
- Methodologies and Standards
- Distros
- Penetration Testing Laboratories
- Penetration Testing Challenges
- Reverse Engineering
- CSCI 4968 - Modern Binary Exploitation
- CSCI 4974/6974 - Hardware Reverse Engineering
- CSCI 4972/6963 - Malware Analysis
- CNIT 120 - Network Security
- CNIT 121 - Computer Forensics
- CNIT 123 - Ethical Hacking and Network Defense
- CNIT 126 - Practical Malware Analysis
- CNIT 128 - Hacking Mobile Devices
- Violent Python and Exploit Development
- Cryptography I - Stanford
- Cryptography II - Stanford
- Computer Security - Stanford
- Computer Networks - University of Washington
- Designing and Executing Information Security Strategies - University of Washington
- Software Security - University of Maryland
- Hardware Security - University of Maryland
- Usable Security - University of Maryland
- Penetration Testing Execution Standard
- Open Source Security Testing Methodology Manual (OSSTMM)
- OWASP - Open Web Application Security Project
- Arch Assault
- Black Arch
- Parrot Security OS
- Kali Linux
- Backbox
- Cyborg Hawk
- Pentoo
- WEAKERTHAN
- Matriux
- Bugtraq
This work is licensed under a Creative Commons Attribution 4.0 International License