Skip to content
/ Centra Public

A collection of sites to learn and practice cybersecurity.

License

Notifications You must be signed in to change notification settings

pwnlog/Centra

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Centra

A collection of sites related to cybersecurity.

Warning

The domains could be changed or compromised over time. You may visit the links at your own risk.

ToC

Practice Environments

Practice in vulnerable labs:

Learn about vulnerable code:

Vulnerabilities

Latest vulnerabilities:

0-day tags:

Receiving notifications of GitHub releases:

CNA List:

EoL references:

Exploit sites:

PoC collections (WARNING: Some "PoC" may have malware):

Vulnerability databases

CVE sites:

VPR:

CVSS:

Vulnerability references:

Vulnerability files:

Patching Vulnerabilities

Security Advisories and Update Guides:

Note: Security advisories and update guides can be used to find remediations, mitigations, and/or workarounds for specific products and/or software. It also details which products and/or software are affected by a specific vulnerability. It is recommended to review the advisories of a vendor when performing vulnerability assessments, penetration tests, red team engagements, or for reporting in general.

Microsoft Update Catalog:

Microsoft Update Definitions:

Microsoft KB (example):

Microsoft CU Updates (replaces previous KBs):

Screenshot of Update ID (879575bc-c874-401f-af6f-51bf373427b7):

Microsoft CU Update

Unix/Linux-based Updates:

Red Team

MITRE ATT&CK:

Red team tactics:

Practice Red Team Ops:

OPSEC:

OSINT:

Adversary emulation platforms:

C2 Matrixes:

Blue Team

MITRE D3FEND:

Blue team tactics:

Latest threats:

IP Information:

URL Information:

SIGMA:

Yara:

OSSEC:

Custom Rules:

XDR Rules:

Detection Sites:

Parkerian Hexad:

Logs references:

Sysmon references:

IANA:

Email:

DNS:

Certificates Information:

Website Information:

Hardening and Compliance

Hardening Papers:

Projects:

Implement hardening in infrastructure:

Zero trust:

Security Baselines:

Assessment and Auditing Tools:

Cybersecurity evaluation tools:

Compliance tools:

Compliance CSF references:

Compliance Frameworks:

NIST framework publications:

NIST Computer Security Resource Center (CSRC):

NIST CSRC FIPS:

NIST CSRC SP:

CIS:

SCuBA:

DISA STIG:

Compliance documents:

Risk Management:

Reverse Engineering

Reversing:

Secure Coding

Secure coding articles:

Development guides:

Web Security

Web General:

Certificates Information:

Exploit Development

Exploit development:

Evasion

Win32 API:

Syscalls:

Blinding Sysmon:

Shellcoding:

Hiding Stuff:

Malware Development Basics:

Bypass AV/EDR summary:

Shellcoding:

Windows API:

Bypass AMSI:

Process Hollowing:

Under Radar:

Shellcode Injection:

COFF Loader:

APC Injection:

DLL Injection:

DLL Sideloading:

ETW:

Function Hooking:

Kernel Callback:

Module Stomping:

Bypass AV/EDR/MDR/XDR software:

Bypass AV/EDR/MDR/XDR articles:

Bypass AV/EDR/MDR/XDR learning:

Living Off The Land

LOL:

Notes

Collection of notes:

Cheatsheets

Collection of cheat sheets:

Website Articles / Blogs

Nice websites to read:

Nice system administrator websites:

Recommended read documentations:

Websites about news:

Nice articles to read:

Mindmaps

Collection of mindmaps:

Whitepapers

Whitepapers:

Reporting

Reporting software:

Report templates:

Reporting tips:

Reporting Vulnerabilities

RFC 9116:

Vulnerability reporting:

CVE Process:

CNA:

About

A collection of sites to learn and practice cybersecurity.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published