Please note, this list is not as up to date as the html that is in the repo. Please import the html bookmarks into your browser for the most up to date list. I will eventually get around to updating this list here.
- [edX | Free online courses from the world's best universities](https://www.edx.org/)
- [Udacity - Free Online Classes & Nanodegrees | Udacity](https://www.udacity.com/)
- [Khan Academy | Free Online Courses, Lessons & Practice](https://www.khanacademy.org/)
- [3Blue1Brown - Teaches Hard Concepts Well!](https://www.youtube.com/channel/UCYO_jab_esuFRV4b17AJtAw)
- [LiveOverflow - Awesome to learn Computer Security](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
- [Welcome to SecurityTube.net](http://www.securitytube.net/)
- [Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1 - YouTube](https://www.youtube.com/watch?v=Pg8bmV9vcKg&feature=youtu.be)
- [Offensive Computer Security Home Page Spring 2014](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/)
- [Training for manipulating all kinds of things: Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html)
- [Modern Binary Exploitation - Spring 2015](http://security.cs.rpi.edu/courses/binexp-spring2015/)
- [GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC](https://github.com/RPISEC/MBE)
- [GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC](https://github.com/RPISEC/Malware)
- [security.cs.rpi.edu/courses/malware-spring2013/](http://security.cs.rpi.edu/courses/malware-spring2013/)
- [NSA_CSS-CNT-Prep-Guide.pdf](http://www.pearsonvue.com/wag/NSA_CSS-CNT-Prep-Guide.pdf)
- [Computer Systems Security | Electrical Engineering and Computer Science | MIT OpenCourseWare](http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/)
- [Electrical Engineering and Computer Science | MIT OpenCourseWare | Free Online Course Materials](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/)
- [Network and Computer Security | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-spring-2014/)
- [Home | Linux Journey](https://linuxjourney.com/)
- [Live Overflow - Where to start with hacking](https://www.youtube.com/watch?v=2TofunAI6fU)
- [The Importance of Deep Work & The 30-Hour Method for Learning a New Skill | Azeria Labs](https://azeria-labs.com/the-importance-of-deep-work-the-30-hour-method-for-learning-a-new-skill/)
- [How to Build a Successful Career in Cybersecurity - Daniel Miessler](https://danielmiessler.com/blog/build-successful-infosec-career/)
- [Good List of Practice Areas in CyberSecurity](https://blogs.sans.org/pen-testing/files/2018/01/PENT-PSTR-WHITEBOARD-V3-0118_web.pdf)
- [Hacker Manifesto - Wikipedia](https://en.wikipedia.org/wiki/Hacker_Manifesto)
- [So, you want to work in security? – freeCodeCamp](https://medium.freecodecamp.org/so-you-want-to-work-in-security-bc6c10157d23)
- [Getting Into Security Engineering](https://noncombatant.org/2016/06/20/get-into-security-engineering/)
- [Stuxnet](https://www.quora.com/What-is-the-most-sophisticated-piece-of-software-code-ever-written/answer/John-Byrd-2?share=98032397&srid=nfuR)
- [The Jargon File](http://www.catb.org/jargon/html/index.html)
- [How To Become A Hacker](http://www.catb.org/~esr/faqs/hacker-howto.html)
- [/r/netsecstudents](https://www.reddit.com/r/netsecstudents/)
- [/r/netsec](https://www.reddit.com/r/netsec/)
- [LiveOverflow - LiveOverflow](http://liveoverflow.com/)
- [VeteranSec – A Veteran Cyber Security Community](https://veteransec.com/)
- [Hackaday | Fresh hacks every day](http://hackaday.com/)
- [Infosec Courses Master List](https://github.com/onlurking/awesome-infosec)
- [NYU Tandon Vulnerability Research and Pen Test Course](https://github.com/isislab/Hack-Night)
- [CBT Nuggets - Awesome For Certs](https://www.cbtnuggets.com/solutions/government)
- [Whitehatters Computer Security Club](https://www.wcsc.usf.edu/noobs)
- [Open Security Training - Lots of Beginner Stuff](http://opensecuritytraining.info/Training.html)
- [Null Byte — Random Hacking Tutorials](https://null-byte.wonderhowto.com/)
- [Free Military Cyber Training - PCTC (Requires Invite?)](https://pctc.cert.org/lms)
- [600 free online courses you can take from universities worldwide](https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/)
- [Lynda.com (Requires Library Card) - Lots of Free Training On Various Subjects](https://www.lynda.com/)
- [CS50](https://cs50.harvard.edu/2018/fall/)
- [CS50's Introduction to Computer Science | edX](https://www.edx.org/course/cs50s-introduction-computer-science-harvardx-cs50x)
- [CS50 - Reference](https://reference.cs50.net/)
- [Introduction to Game Development](https://cs50.github.io/games/)
- [ossu/computer-science: Path to a free self-taught education in Computer Science!](https://github.com/ossu/computer-science)
- [Teach Yourself Computer Science](https://teachyourselfcs.com/)
- [Coding-interview-university: A complete computer science study plan to become a software engineer.](https://github.com/jwasham/coding-interview-university)
- [joyoyao/interviews: Everything you need to know to get the job.](https://github.com/joyoyao/interviews)
- [CS Dojo - CS Stuff Explained Well!](https://www.youtube.com/channel/UCxX9wt5FWQUAAz4UrysqK9A)
- [Berkeley CS and EE Course Achives](http://www-inst.eecs.berkeley.edu/classes-eecs.html)
- [Stevey's Blog Rants: Get that job at Google](http://steve-yegge.blogspot.com/2008/03/get-that-job-at-google.html)
- [ABC: Always Be Coding – Always Be Coding – Medium](https://medium.com/always-be-coding/abc-always-be-coding-d5f8051afce2)
- [List of free university courses for learning Computer Science!](https://github.com/prakhar1989/awesome-courses)
- [awesome-courses/README.md at master · prakhar1989/awesome-courses](https://github.com/prakhar1989/awesome-courses/blob/master/README.md)
- [MIT - Software Construction - How to write good code](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-005-software-construction-spring-2016/)
- [Googles CS Guide](https://techdevguide.withgoogle.com/)
- [Computer Science 61A, 001 - Spring 2011 : Free Movies : Free Download, Borrow and Streaming : Internet Archive](https://archive.org/details/ucberkeley-webcast-PL3E89002AA9B9879E?sort=titleSorter)
- [professional-programming github repo](https://github.com/charlax/professional-programming#professional-programming)
- [Must Read - Makefiles – Mrbook's Stuff](http://mrbook.org/blog/tutorials/make/)
- [Automatic make file generator](http://www.robertnz.net/genmake.htm)
- [GNU make](http://www.gnu.org/software/make/manual/make.html)
- [Advanced Programming Topics](https://github.com/ossu/computer-science#advanced-programming)
- [Computer Programming/Standards and Best Practices - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/Computer_Programming/Standards_and_Best_Practices)
- [Set (abstract data type) - Wikipedia](https://en.wikipedia.org/wiki/Set_(abstract_data_type))
- [Library (computing) - Wikipedia](https://en.wikipedia.org/wiki/Library_(computing))
- [Chapter 22: Pointers to Pointers](https://www.eskimo.com/~scs/cclass/int/sx8.html)
- [Software Design Patterns - GeeksforGeeks](https://www.geeksforgeeks.org/software-design-patterns/)
- [Code refactoring - Wikipedia](https://en.wikipedia.org/wiki/Code_refactoring)
- [Refactoring: When and Why (Okay example in PERL)](https://medium.com/@audi17.2/refactoring-when-and-why-b5262ae92fcb)
- [Code Review Stack Exchange](https://codereview.stackexchange.com/)
- [Polymorphism - C++ Tutorials](http://www.cplusplus.com/doc/tutorial/polymorphism/)
- ["The Clean Code Talks -- Inheritance, Polymorphism, & Testing" - YouTube](https://www.youtube.com/watch?v=4F72VULWFvc)
- [C++ Tutorial 11 : Polymorphism - YouTube](https://www.youtube.com/watch?v=k7O7AGfDI2c)
- [java - Why is "2 * (i * i)" faster than "2 * i * i"? - Stack Overflow](https://stackoverflow.com/questions/53452713/why-is-2-i-i-faster-than-2-i-i)
- [Programming Pearls (2nd Edition): Jon Bentley: 0785342657883: Amazon.com: Books](https://www.amazon.com/Programming-Pearls-2nd-Jon-Bentley/dp/0201657880)
- [Code Complete: A Practical Handbook of Software Construction, Second Edition: Steve McConnell: 0790145196705: Amazon.com: Books](https://www.amazon.com/Code-Complete-Practical-Handbook-Construction/dp/0735619670/ref=cm_cr_arp_d_product_top?ie=UTF8)
- [The Clean Coder: A Code of Conduct for Professional Programmers: Robert C. Martin: 4708364241379: Amazon.com: Books](https://www.amazon.com/Clean-Coder-Conduct-Professional-Programmers/dp/0137081073/ref=pd_sim_14_5?_encoding=UTF8&pd_rd_i=0137081073&pd_rd_r=979e48c3-f72a-11e8-b224-df517db04d31&pd_rd_w=kGnlx&pd_rd_wg=o4jpB&pf_rd_i=desktop-dp-sims&pf_rd_m=ATVPDKIKX0DER&pf_rd_p=18bb0b78-4200-49b9-ac91-f141d61a1780&pf_rd_r=TG9C9V8KNQE1XB4MAYQ5&pf_rd_s=desktop-dp-sims&pf_rd_t=40701&psc=1&refRID=TG9C9V8KNQE1XB4MAYQ5)
- [Double Pointers in C/C++ - DEV Community 👩💻👨💻](https://dev.to/noah11012/double-pointers-in-cc-2n96)
- [Programming · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Programming)
- [Must Do Coding Questions for Companies like Amazon, Microsoft, Adobe, ... - GeeksforGeeks](https://www.geeksforgeeks.org/must-do-coding-questions-for-companies-like-amazon-microsoft-adobe/)
- [LeetCode - The World's Leading Online Programming Learning Platform](https://leetcode.com/)
- [Codeforces](http://codeforces.com/)
- [Programming Tasks/Challenges](http://rosettacode.org/wiki/Category:Programming_Tasks)
- [CodinGame - Practice coding with fun programming challenges - CodinGame](https://www.codingame.com/start)
- [HackerRank | Technical Recruiting | Hiring the Best Engineers](https://www.hackerrank.com/)
- [Explore 150+ Coding Challenges | edabit.com](https://edabit.com/explore)
- [/r/DailyProgrammer Challenges!](https://www.reddit.com/r/dailyprogrammer/)
- [code challenge - Build a working game of Tetris in Conway's Game of Life - Programming Puzzles & Code Golf Stack Exchange](https://codegolf.stackexchange.com/questions/11880/build-a-working-game-of-tetris-in-conways-game-of-life)
- [Coderbyte | Programming challenges and courses](https://www.coderbyte.com/challenges)
- [Codewars | Train with Programming Challenges](https://www.codewars.com/)
- [Topcoder - Competitive Programming](https://www.topcoder.com/community/competitive-programming/)
- [Pluralsight - SkillIQ](https://www.pluralsight.com/)
- [Curated list of C/C++ project-based tutorials](https://github.com/tuvtran/project-based-learning?fbclid=IwAR230EL_HHEW_Vzx_auAcmFRdwsWm-l9YOOiCphHqDmPk9wjRuAxLbz7oLc#cc)
- [Explore · GitHub](https://github.com/explore)
- [78 Keyboard Shortcuts for VIM](http://www.keyxl.com/aaa8263/290/VIM-keyboard-shortcuts.htm)
- [PacVim - A Game That Teaches You Vim Commands](https://www.tecmint.com/learn-vi-commands-with-pacvim-game/)
- [Vim Cheat Sheet - English](https://vim.rtorr.com/)
- [Vi Vim frozen fix](https://stackoverflow.com/questions/3419820/sometimes-my-file-just-freezes-in-my-vi-vim-what-happened)
- [How do I change tab size in Vim? - Stack Overflow](https://stackoverflow.com/questions/2054627/how-do-i-change-tab-size-in-vim)
- [vscode text fix](microsoft/vscode#35901)
- [chriskempson/tomorrow-theme: Tomorrow Theme the precursor to Base16 Theme](https://github.com/chriskempson/tomorrow-theme)
- [Free Programming Books – GoalKicker.com](https://goalkicker.com/?fbclid=IwAR1oOo1DczRZygIUd2KQ31qWqVHucHtcY6ylYVcj7pzFKGrwKFbXE_icumw)
- [RegExr: Learn, Build, & Test RegEx](https://regexr.com/)
- [Atlassian Bitbucket Git Code Management Tool for Teams](https://www.atlassian.com/software/bitbucket)
- [CMake Tutorial | CMake](https://cmake.org/cmake-tutorial/)
- [OverAPI.com | Collecting all the cheat sheets](http://overapi.com/)
- [Code Quality Checker List](https://github.com/mre/awesome-static-analysis)
- [free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books](https://github.com/EbookFoundation/free-programming-books/blob/master/free-programming-books.md)
- [The Pragmatic Programmer: From Journeyman to Master: 8601404321023: Computer Science Books @ Amazon.com](https://www.amazon.com/The-Pragmatic-Programmer-Journeyman-Master/dp/020161622X)
- [CS50 - Reference](https://reference.cs50.net/)
- [CS50's Introduction to Computer Science | edX](https://www.edx.org/course/cs50s-introduction-computer-science-harvardx-cs50x)
- [CS50](https://cs50.harvard.edu/2018/fall/)
- [Practical Programming in C | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-087-practical-programming-in-c-january-iap-2010/lecture-notes/)
- [Learn C in Y Minutes](https://learnxinyminutes.com/docs/c/)
- [Home | Lynda | Georgia Institute of Technology | Atlanta, GA](http://lynda.gatech.edu/)
- [How Do I Declare A Function Pointer in C?](https://goshdarnfunctionpointers.com/)
- [C Tutorial - Learn C - Cprogramming.com](https://www.cprogramming.com/tutorial/c-tutorial.html)
- [Function Pointers in C and C++ - Cprogramming.com](https://www.cprogramming.com/tutorial/function-pointers.html)
- [C documentation — DevDocs](https://devdocs.io/c/)
- [Intro to OS - C Programming Q&A - YouTube](https://www.youtube.com/watch?v=UmLpG077DcU)
- [C Programming - Q&A.pptm - Google Slides](https://docs.google.com/presentation/d/1B7_q_FjpWau-1-A7NFKkDUHLHJMIDKSwCK4dM0nSlXg/edit#slide=id.p17)
- [Amazon.com: C Programming Language, 2nd Edition (8601410794231): Brian W. Kernighan, Dennis M. Ritchie: Books](https://www.amazon.com/Programming-Language-2nd-Brian-Kernighan/dp/0131103628)
- [The Linux Programming Interface [Book]](https://www.oreilly.com/library/view/the-linux-programming/9781593272203/)
- [How to use Time and Date in C | CodingUnit Programming Tutorials](https://www.codingunit.com/c-tutorial-how-to-use-time-and-date-in-c)
- [A Little C Primer/C String Function Library - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/A_Little_C_Primer/C_String_Function_Library)
- [C Storage Classes](https://www.tutorialspoint.com/cprogramming/c_storage_classes.htm)
- [C Linked List Data Structure Explained with an Example C Program](https://www.thegeekstuff.com/2012/08/c-linked-list-example/)
- [Become an embedded programmer in 5 months : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/a6hcbu/become_an_embedded_programmer_in_5_months/)
- [System Calls or Bust](https://beej.us/guide/bgnet/html/multi/syscalls.html)
- [Networking and Socket Programming Tutorial in C - CodeProject](https://www.codeproject.com/Articles/586000/Networking-and-Socket-programming-tutorial-in-C)
- [Socket programming in C on Linux – tutorial – BinaryTides](https://www.binarytides.com/socket-programming-c-linux-tutorial/)
- [How to C (as of 2016)](https://matt.sh/howto-c)
- [C Book Answers](https://github.com/lekkas/c-algorithms)
- [Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online](http://techbus.safaribooksonline.com/1565924533/id732826#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTEtNTY1OTItNDUzLTMlMkZpZDczMjgyNiZxdWVyeT0=)
- [Learn C The Hard Way](http://c.learncodethehardway.org/book/)
- [C/C++ for Hackers « Null Byte :: WonderHowTo](https://null-byte.wonderhowto.com/how-to/c-c-for-hackers/)
- [How Do I Declare A Function Pointer in C?](https://fuckingfunctionpointers.com/)
- [GitHub - fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.](https://github.com/fffaraz/awesome-cpp)
- [cdecl: C gibberish ↔ English](https://cdecl.org/?q=int+%28*f%29%28int%2C+int%29)
- [Berkeley C Course](http://www-inst.eecs.berkeley.edu/~selfpace/c/)
- [C reference - cppreference.com](https://en.cppreference.com/w/c)
- [The Definitive C Book Guide and List – seclab](https://seclab.skku.edu/the-definitive-c-book-guide-and-list/)
- [Learn C the Hard Way](https://learncodethehardway.org/c/)
- [Style Guide for C — CS50 Docs](https://cs50.readthedocs.io/style/c/)
- [Book for Prior Experience in Programming People](https://www.amazon.com/dp/0134997832/ref=cm_sw_r_cp_ep_dp_sibqBbB8M0P13)
- [Book if No Prior Experience in Programming](https://www.amazon.com/Programming-Principles-Practice-Using-2nd/dp/0321992784)
- [Learn C++ | Codecademy](https://www.codecademy.com/learn/learn-c-plus-plus)
- [The rule of three/five/zero - cppreference.com](https://en.cppreference.com/w/cpp/language/rule_of_three)
- [C++ reference - cppreference.com](https://en.cppreference.com/w/cpp)
- [C++ Core Guidelines](https://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines)
- [C++ Stuff from r/learnprogramming](https://www.reddit.com/r/learnprogramming/comments/a34sws/codecademy_finally_launched_learn_c/)
- [Effective Modern C++ [Book]](https://www.oreilly.com/library/view/effective-modern-c/9781491908419/)
- [RAII - cppreference.com](https://en.cppreference.com/w/cpp/language/raii)
- [proper resource management and exception safety in C++ through Resource Acquisition is Initialization (RAII) in addition to in-depth coverage of a variety of other topics including the pimpl idiom, name lookup, good class design, and the C++ memory model](https://www.amazon.com/dp/0201615622/?tag=stackoverflow17-20)
- [generic programming, optimization, and resource management; this book also has an excellent exposition of how to write modular code](https://www.amazon.com/dp/0201760428/?tag=stackoverflow17-20)
- [101 best practices, idioms, and common pitfalls that can help you to write correct, understandable, and efficient C++ code](https://www.amazon.com/dp/0321113586/?tag=stackoverflow17-20)
- [The C++ Compilation Process](https://github.com/green7ea/cpp-compilation/blob/master/README.md)
- [Berkeley C++ Course](http://www-inst.eecs.berkeley.edu/~selfpace/cpp/)
- [Data Structures and Algorithms in C++, Second Edition: Safari Books Online - Premium](http://techbus.safaribooksonline.com/book/programming/cplusplus/9780470383278)
- [Learn C++](http://www.learncpp.com/)
- [Teach Yourself C++ in 21 Days](http://101.lv/learn/C++/index.htm)
- [C++ Programming Language - GeeksforGeeks](http://www.geeksforgeeks.org/c-plus-plus/)
- [Storage Classes in C++](https://www.tutorialspoint.com/cplusplus/cpp_storage_classes.htm)
- [The Definitive C++ Book Guide and List - Stack Overflow](https://stackoverflow.com/questions/388242/the-definitive-c-book-guide-and-list)
- [GitHub - fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.](https://github.com/fffaraz/awesome-cpp)
- [Introduction to Computer Science and Programming in Python - MIT](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-videos/)
- [Berkeley Python Course](http://www-inst.eecs.berkeley.edu/~selfpace/python/)
- [Learn Python the Hard Way](https://learnpythonthehardway.org/book/preface.html)
- [The Python Tutorial — Python 3.7.0 documentation](https://docs.python.org/3/tutorial/)
- [Welcome to Python 101! — Python 101 1.0 documentation](https://python101.pythonlibrary.org/)
- [MIT - Introduction to Computer Science and Programming Using Python](https://www.edx.org/course/introduction-to-computer-science-and-programming-using-python-0)
- [Corey Schafer - YouTube](https://www.youtube.com/channel/UCCezIgC97PvUuR4_gbFUs5g)
- [How to Learn Python Tutorial - Easy & simple! Learn How to Learn Python! - YouTube](https://www.youtube.com/watch?v=5mJ_Qftw2_0&lc=UgyghnrmfblNHEhpqR54AaABAg)
- [Python Tutorials - YouTube](https://www.youtube.com/playlist?list=PL-osiE80TeTt2d9bfVyTiXJA-UTHn6WwU)
- [Python's Class Development Toolkit - YouTube](https://www.youtube.com/watch?v=HTLu2DFOdTg)
- [Raymond Hettinger - Beyond PEP 8 -- Best practices for beautiful intelligible code - PyCon 2015 - YouTube](https://www.youtube.com/watch?v=wf-BqAjZb8M)
- [Transforming Code into Beautiful, Idiomatic Python - YouTube](https://www.youtube.com/watch?v=OSGv2VnC0go)
- [What Does It Take To Be An Expert At Python? - YouTube](https://www.youtube.com/watch?v=7lmCu8wz8ro)
- [python_expert_notes](https://github.com/austin-taylor/code-vault/blob/master/python_expert_notebook.ipynb)
- [Python Network Programming - TCP/IP Socket Programming - YouTube](https://www.youtube.com/playlist?list=PLhTjy8cBISErYuLZUvVOYsR1giva2payF)
- [UsingAssertionsEffectively - Python Wiki](https://wiki.python.org/moin/UsingAssertionsEffectively)
- [Data model (Dunder Methods, i.e., __repr__)](https://docs.python.org/3/reference/datamodel.html)
- [PEP 8 -- Style Guide for Python Code | Python.org](https://www.python.org/dev/peps/pep-0008/)
- [Popular Python recipes « ActiveState Code](http://code.activestate.com/recipes/langs/python/)
- [oop - What is the difference between @staticmethod and @classmethod in Python? - Stack Overflow](https://stackoverflow.com/questions/136097/what-is-the-difference-between-staticmethod-and-classmethod-in-python?rq=1)
- [Enriching Your Python Classes With Dunder (Magic, Special) Methods – dbader.org](https://dbader.org/blog/python-dunder-methods)
- [Interfacing Python and C: Advanced “ctypes” Features – dbader.org](https://dbader.org/blog/python-ctypes-tutorial-part-2)
- [Serious Python | No Starch Press](https://nostarch.com/seriouspython)
- [Math Adventures with Python | No Starch Press](https://nostarch.com/mathadventures)
- [How to Write Perfect Python Command-line Interfaces — Learn by Example](https://blog.sicara.com/perfect-python-command-line-interfaces-7d5d4efad6a2)
- [Writing Python Command-Line Tools With Click – dbader.org](https://dbader.org/blog/python-commandline-tools-with-click)
- [Python - Multiple constructors](http://coding.derkeiler.com/Archive/Python/comp.lang.python/2005-02/1294.html)
- [Python 3 Patterns, Recipes and Idioms](https://python-3-patterns-idioms-test.readthedocs.io/en/latest/index.html#)
- [python - Permanently add a directory to PYTHONPATH - Stack Overflow](https://stackoverflow.com/questions/3402168/permanently-add-a-directory-to-pythonpath)
- [How do I find the location of Python module sources? - Stack Overflow](https://stackoverflow.com/questions/269795/how-do-i-find-the-location-of-python-module-sources)
- [installation - How do I find the location of my Python site-packages directory? - Stack Overflow](https://stackoverflow.com/questions/122327/how-do-i-find-the-location-of-my-python-site-packages-directory)
- [Python Training by Dan Bader – dbader.org](https://dbader.org/)
- [10 Essential Python Tips And Tricks For Programmers - GeeksforGeeks](https://www.geeksforgeeks.org/10-essential-python-tips-tricks-programmers/)
- [Understanding the underscore( _ ) of Python – Hacker Noon](https://hackernoon.com/understanding-the-underscore-of-python-309d1a029edc)
- [CMU - The Pythonic Way [PDF]](https://www.cs.cmu.edu/~srini/15-441/F11/lectures/r04-python.pdf)
- [Python Argparse Cookbook – mkaz.blog](https://mkaz.blog/code/python-argparse-cookbook/)
- [PyPI tutorial](https://packaging.python.org/)
- [grab/front-end-guide: 📚 Study guide and introduction to the modern front end stack.](https://github.com/grab/front-end-guide)
- [CSS Tutorial](https://www.w3schools.com/Css/)
- [JavaScript Style Guide](https://github.com/airbnb/javascript)
- [React – A JavaScript library for building user interfaces](https://reactjs.org/)
- [AngularJS — Superheroic JavaScript MVW Framework](https://angularjs.org/)
- [YouTube - Web Dev Stuff](https://www.youtube.com/channel/UC29ju8bIPH5as8OGnQzwJyA)
- [Courses | The Odin Project](https://www.theodinproject.com/courses)
- [A collection of full-stack resources for programmers.](https://github.com/charlax/professional-programming)
- [Berkeley UNIX Course](http://www-inst.eecs.berkeley.edu/~selfpace/unix/)
- [CSci 493.66 UNIX System Programming](http://compsci.hunter.cuny.edu/~sweiss/course_materials/csci493.66/csci493.66_spr12.php)
- [Learn Shell Programming - Free Interactive Shell Programming Tutorial](http://www.learnshell.org/)
- [The Bash Guide](https://guide.bash.academy/)
- [BashGuide - Greg's Wiki](http://mywiki.wooledge.org/BashGuide)
- [The Linux Documentation Project: Guides](http://tldp.org/guides.html)
- [#!/bin/bash](https://www.reddit.com/r/bash/)
- [Linux Command Line Tutorial](https://learnpythonthehardway.org/book/appendixa.html)
- [LinuxCommand.org: Learning the shell.](http://linuxcommand.org/lc3_learning_the_shell.php)
- [Bash Guide for Beginners](http://www.tldp.org/LDP/Bash-Beginners-Guide/html/)
- [The Bash Academy](http://www.bash.academy/)
- [A curated list of Shell Stuff](https://github.com/alebcay/awesome-shell)
- [OverTheWire: Bandit - Wargame For Learning UNIX Shell Stuff](http://overthewire.org/wargames/bandit/)
- [OverTheWire: Leviathan - Unix Wargame](http://overthewire.org/wargames/leviathan/)
- [Bash tips & tricks: good and not-so-good bash practices | Pragmatic Coders](https://pragmaticcoders.com/blog/bash-tips-and-tricks/)
- [Introduction to Object-oriented Programming - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00-introduction-to-computer-science-and-programming-fall-2008/video-lectures/lecture-14/)
- [University of Helsinki - Object-Oriented programming with Java, part I](http://moocfi.github.io/courses/2013/programming-part-1/)
- [Object-Oriented Programming - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-01sc-introduction-to-electrical-engineering-and-computer-science-i-spring-2011/unit-1-software-engineering/object-oriented-programming/)
- [Stanford - CS108: Object Oriented Programming](http://web.stanford.edu/class/archive/cs/cs108/cs108.1092/)
- [Encapsulation, Inheritance, Shadowing - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00-introduction-to-computer-science-and-programming-fall-2008/video-lectures/lecture-16/)
- [The Best Go To Book for Design Patterns](https://www.amazon.com/Design-Patterns-Elements-Reusable-Object-Oriented/dp/0201633612)
- [Refactoring: Improving the Design of Existing Code](https://www.amazon.com/Refactoring-Improving-Existing-Addison-Wesley-Signature-dp-0134757599/dp/0134757599/ref=mt_hardcover?_encoding=UTF8&me=&qid=)
- [Advanced Data Structures - GeeksforGeeks](https://www.geeksforgeeks.org/advanced-data-structures/)
- [USC - CSCI 104 – Data Structures and Object Oriented Design](http://www-scf.usc.edu/~csci104/20142/lectures/)
- [VisuAlgo - visualising data structures and algorithms through animation](https://visualgo.net/en)
- [Intro to Algorithms | Udacity](https://www.udacity.com/course/intro-to-algorithms--cs215)
- [Introduction to Algorithms | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-006-introduction-to-algorithms-fall-2011/)
- [Algorithms, Part I | Coursera](https://www.coursera.org/learn/algorithms-part1)
- [Algorithms, Part II | Coursera](https://www.coursera.org/learn/algorithms-part2)
- [Algorithms | Coursera](https://www.coursera.org/specializations/algorithms)
- [Introduction to Graduate Algorithms | Lecture videos+notes: GT CS 8803 GA](https://gt-algorithms.com/)
- [Introduction to Graduate Algorithms - Udacity](https://classroom.udacity.com/courses/ud401/lessons/9c7b3b0a-cf36-4d95-9a99-15bc3b3159f3/concepts/5a538a92-4c05-4f9f-a2e9-c92b3ab31bf8#)
- [Algorithms | Computer science | Computing | Khan Academy](https://www.khanacademy.org/computing/computer-science/algorithms/)
- [Algorithms for Visual Learners | Hackaday](https://hackaday.com/2018/05/06/algorithms-for-visual-learners/)
- [19\. Dynamic Programming I: Fibonacci, Shortest Paths - YouTube](https://www.youtube.com/watch?v=OQ5jsbhAv_M&vl=en)
- [What is complexity theory? (P vs. NP explained visually) - YouTube](https://www.youtube.com/watch?v=u2DLlNQiPB4)
- [Big-O Algorithm Complexity Cheat Sheet (Know Thy Complexities!) @ericdrowell](http://bigocheatsheet.com/)
- [A Gentle Introduction to Algorithm Complexity Analysis](http://discrete.gr/complexity/)
- [Analysis of Algorithms | Set 4 (Analysis of Loops) - GeeksforGeeks](https://www.geeksforgeeks.org/analysis-of-algorithms-set-4-analysis-of-loops/)
- [Dynamic Programming - GeeksforGeeks](https://www.geeksforgeeks.org/dynamic-programming/)
- [Greedy Archives - GeeksforGeeks](https://www.geeksforgeeks.org/category/greedy/)
- [Harvard - Advanced Algorithms (CS 224)](http://people.seas.harvard.edu/~minilek/cs224/fall14/index.html)
- [Algorithms by Jeff Erickson](http://jeffe.cs.illinois.edu/teaching/algorithms/)
- [JeffE-Algorithms Hw's, Labs, and Tests](http://jeffe.cs.illinois.edu/teaching/algorithms/hwex/s18-hwex.pdf)
- [JeffE - Algorithms - Lecture and Lab Schedule](https://courses.engr.illinois.edu/cs374/sp2018/A/schedule.html)
- [An Introduction to programming with threads](http://www.hpl.hp.com/techreports/Compaq-DEC/SRC-RR-35.pdf)
- [hessmjr/operating-systems: Georgia Tech OMSCS - Operating Systems](https://github.com/hessmjr/operating-systems)
- [drharris/pretty-bonnie: Helps with Bonnie test output on Udacity.](https://github.com/drharris/pretty-bonnie)
- [Interactive map of Linux kernel](http://www.makelinux.net/kernel_map/)
- [Linux source code: (v4.20) - Bootlin](https://elixir.bootlin.com/linux/latest/source)
- [GOOD - SystemProgramming Wiki · GitHub](https://github.com/angrave/SystemProgramming/wiki)
- [P1L1 - Course Overview - Google Docs](https://docs.google.com/document/d/15cdiV87GTM2UNHeOxp-eJ9yuug-GMvfgpW3qtD9ZDcE/edit)
- [Spring19-schedule.xlsx - Google Sheets](https://docs.google.com/spreadsheets/d/1dxPjroHZguFSTPW46atYX1t8QB1wqqi7tRRvI5V923k/edit#gid=1868198252)
- [ud923-birrell-paper.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-birrell-paper.pdf)
- [eykholt.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-eykholt-paper.pdf)
- [ud923-stein-shah-paper.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-stein-shah-paper.pdf)
- [paper.dvi](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-pai-paper.pdf)
- [The Case For Architecture-Aware OS Kernel](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-fedorova-paper.pdf)
- [The performance of spin lock alternatives for shared-money multiprocessors - Parallel and Distributed Systems, IEEE Transactions on](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-anderson-paper.pdf)
- [Formal Requirements for Virtualizable Third Gen Architectures](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-popek-goldberg-paper.pdf)
- [Virtual Machine Monitors: Current Tech and Future Trends](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-rosenblum-garfinkel-paper.pdf)
- [Implementing Remote Procedure Calls](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-birrell-nelson-paper.pdf)
- [Caching in the Sprite Network File System](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-nelson-paper.pdf)
- [Distributed Shared Memory: Concepts and Systems - IEEE Parallel & Distributed Technology: Systems & Applications](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-protic-paper.pdf)
- [.net - What's the purpose of Thread.SpinWait method? - Stack Overflow](https://stackoverflow.com/questions/1091135/whats-the-purpose-of-thread-spinwait-method)
- [CppCon 2018: Greg Law “Debugging Linux C++” - YouTube](https://www.youtube.com/watch?v=V1t6faOKjuQ)
- [P1L2 - Introduction to Operating Systems - Google Docs](https://docs.google.com/document/d/1DgYiNnnZiBIXcY_LGPZQTsk_PXEy9Fzx6RX11a6mnU0/edit)
- [The Linux Programming Interface: A Linux and UNIX System Programming Handbook: Michael Kerrisk: 9781593272203: Amazon.com: Books](https://www.amazon.com/The-Linux-Programming-Interface-Handbook/dp/1593272200)
- [PRIMER - Unix and Internet Fundamentals](http://en.tldp.org/HOWTO/Unix-and-Internet-Fundamentals-HOWTO/index.html)
- [Operating System Concepts: Abraham Silberschatz, Peter B. Galvin, Greg Gagne: 9781118063330: Amazon.com: Books](https://www.amazon.com/Operating-System-Concepts-Abraham-Silberschatz/dp/1118063333/ref=dp_ob_title_bk)
- [Operating System Concepts Essentials: Abraham Silberschatz, Peter B. Galvin, Greg Gagne: 9781118804926: Amazon.com: Books](https://www.amazon.com/Operating-Concepts-Essentials-Abraham-Silberschatz/dp/1118804929/ref=sr_1_1?s=books&ie=UTF8&qid=1415311059&sr=1-1&keywords=operating+system+concepts+essentials)
- [Modern Operating Systems (4th Edition): Andrew S. Tanenbaum, Herbert Bos: 9780133591620: Amazon.com: Books](https://www.amazon.com/Modern-Operating-Systems-4th-Edition/dp/013359162X/ref=dp_ob_title_bk)
- [Operating Systems: Three Easy Pieces](http://pages.cs.wisc.edu/~remzi/OSTEP/)
- [AOSPrereq-and-Concepts-List.pdf](https://www.omscs.gatech.edu/sites/default/files/images/AOSPrereq-and-Concepts-List.pdf)
- [Advanced Operating Systems Readings - Udacity](https://www.udacity.com/wiki/ud156-readings)
- [Computer Systems: An Integrated Approach to Architecture and Operating Systems: Umakishore Ramachandran, William D. Leahy Jr.: 9780321486134: Amazon.com: Books](https://www.amazon.com/Computer-Systems-Integrated-Architecture-Operating/dp/0321486137/ref=sr_1_1?ie=UTF8&s=books&qid=1278771624&sr=8-1:)
- [CS 2200 An Introduction to Computer Systems and Networks](https://www.cc.gatech.edu/~rama/CS2200-External/)
- [CS 2200 - Prof. Kishore Ramachandran - YouTube](https://www.youtube.com/playlist?list=PLl2dezBNo_Bkd8YmSkCX0M7AORHJXe5uG)
- [Berkeley CS 162: Operating Systems and Programming](http://www-inst.eecs.berkeley.edu/~cs162/fa17/)
- [MikeOS - simple x86 assembly language operating system](http://mikeos.sourceforge.net/)
- [The Art of Unix Programming](http://catb.org/~esr/writings/taoup/html/)
- [Operating systems development for Dummies – Leo Whitehead – Medium](https://medium.com/@lduck11007/operating-systems-development-for-dummies-3d4d786e8ac)
- [Writing a Tiny x86 Bootloader - Joe Bergeron](http://joebergeron.io/posts/post_two.html)
- [Bitwise, Day 0: Overview and Q&A - YouTube](https://www.youtube.com/watch?v=ZjwvMcP3Nf0&list=PLU94OURih-CiP4WxKSMt3UcwMSDM3aTtX)
- [os01 | Bootstrap yourself to write an OS from scratch. A book for self-learner.](https://tuhdo.github.io/os01/)
- [The little book about OS development](https://littleosbook.github.io/)
- [Kernels 101 – Let’s write a Kernel - Arjun Sreedharan](https://arjunsreedharan.org/post/82710718100/kernels-101-lets-write-a-kernel)
- [Kernels 201 - Let’s write a Kernel with keyboard and screen support - Arjun Sreedharan](https://arjunsreedharan.org/post/99370248137/kernels-201-lets-write-a-kernel-with-keyboard)
- [Malloc tutorial](https://danluu.com/malloc-tutorial/)
- [raspberry-pi-os: Learning operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os)
- [Write your own Operating System - YouTube](https://www.youtube.com/playlist?list=PLHh55M_Kq4OApWScZyPl5HhgsTJS9MZ6M)
- [Writing a Bootloader Part 1 | Alex Parker's Website](http://3zanders.co.uk/2017/10/13/writing-a-bootloader/)
- [UMD - CMSC430: Introduction to Compilers](http://www.cs.umd.edu/class/spring2015/cmsc430/)
- [Stanford - CS143: Compilers](https://web.stanford.edu/class/cs143/)
- [Berkeley Foundations of Software Engineering](https://www.mooc-list.com/university-entity/university-california-berkeley?title=software+engineer&field_start_date_value_op=between&field_start_date_value%5Bvalue%5D%5Bdate%5D=&field_start_date_value%5Bmin%5D%5Bdate%5D=&field_start_date_value%5Bmax%5D%5Bdate%5D=&sort_by=field_start_date_value&sort_order=DESC)
- [UC Berkeley CS 169 Software Engineering](http://cs169.saas-class.org/)
- [Allen Holub: Training/Consulting/Programming: Agile, Architecture, Swift, Java](https://www.holub.com/goodies/rules.html)
- [Pattern Recognition and Machine Learning (Information Science and Statistics): Christopher M. Bishop: 9780387310732: Amazon.com: Books](https://www.amazon.com/dp/0387310738?tag=inspiredalgor-20)
- [Machine Learning: The Art and Science of Algorithms that Make Sense of Data: Peter Flach: 9781107422223: Amazon.com: Books](https://www.amazon.com/dp/1107422221?tag=inspiredalgor-20)
- [Foundations of Machine Learning (Adaptive Computation and Machine Learning series): Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar: 9780262018258: Amazon.com: Books](https://www.amazon.com/dp/026201825X?tag=inspiredalgor-20)
- [Introduction to Evolutionary Computing (Natural Computing Series): Agoston E. Eiben, J.E. Smith: 9783642072857: Amazon.com: Books](https://www.amazon.com/Introduction-Evolutionary-Computing-Natural/dp/3642072852/ref=cm_cr_arp_d_product_top?ie=UTF8)
- [Field Guide to Genetic Programming](http://digitalcommons.morris.umn.edu/cgi/viewcontent.cgi?article=1001&context=cs_facpubs)
- [Artificial Intelligence: A Modern Approach (3rd Edition)](https://www.ics.uci.edu/~rickl/courses/cs-171/aima-resources/Artificial%20Intelligence%20A%20Modern%20Approach%20(3rd%20Edition).pdf)
- [Machine Learning Books : MachineLearning](https://www.reddit.com/r/MachineLearning/comments/1jeawf/machine_learning_books/)
- [Essentials.pdf](https://cs.gmu.edu/~sean/book/metaheuristics/Essentials.pdf)
- [An Introduction to Genetic Algorithms (Complex Adaptive Systems): Melanie Mitchell: 9780262631853: Amazon.com: Books](https://www.amazon.com/dp/0262631857/?tag=stackoverflow17-20)
- [Microsoft Word - EvolProg_Introduction.doc](http://www.cse.dmu.ac.uk/~mgongora/csci3405/EvolProg_Intro.pdf)
- [awesome-machine-learning/books.md at master · josephmisiti/awesome-machine-learning · GitHub](https://github.com/josephmisiti/awesome-machine-learning/blob/master/books.md)
- [https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/](https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/)
- [Machine Learning & Artificial Intelligence: Crash Course Computer Science #34 - YouTube](https://www.youtube.com/watch?v=z-EtmaFJieY)
- [Crash Course in Machine Learning – IoT For All – Medium](https://medium.com/iotforall/crash-course-in-machine-learning-4f410018b83)
- [Machine Learning Crash Course 2015 - YouTube - YouTube](https://www.youtube.com/playlist?list=PLbF0BXX_6CPJ4TgDuCDINRu8hOMw31gRj)
- [Prof. Lorenzo Rosasco (part 1) - Machine Learning: A basic toolkit - YouTube](https://www.youtube.com/watch?v=vxFNir9yavg&index=9&list=PLyGKBDfnk-iB_rPiS0BbSHefK1HJMrPK_)
- [awesome-machine-learning/courses.md at master · josephmisiti/awesome-machine-learning · GitHub](https://github.com/josephmisiti/awesome-machine-learning/blob/master/courses.md)
- [Artificial Intelligence | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-034-artificial-intelligence-fall-2010/)
- [13\. Learning: Genetic Algorithms - YouTube](https://www.youtube.com/watch?v=kHyNqSnzP8Y)
- [Deep Learning Summer School, Montreal 2015 - VideoLectures - VideoLectures.NET](http://videolectures.net/deeplearning2015_montreal/)
- [9.520/6.860, Fall 2017](http://www.mit.edu/~9.520/fall17/)
- [Kaggle: Your Home for Data Science](https://www.kaggle.com/)
- [Deep Learning](http://deeplearning.net/)
- [Tutorials « Deep Learning](http://deeplearning.net/reading-list/tutorials/)
- [Deep Learning Tutorials — DeepLearning 0.1 documentation](http://deeplearning.net/tutorial/)
- [Creating a genetic algorithm for beginners](http://www.theprojectspot.com/tutorial-post/creating-a-genetic-algorithm-for-beginners/3)
- [MarI/O - Machine Learning for Video Games - YouTube](https://www.youtube.com/watch?v=qv6UVOQ0F44)
- [NEATEvolve.lua - Pastebin.com](https://pastebin.com/ZZmSNaHX)
- [7 Steps to Mastering Machine Learning With Python](https://www.kdnuggets.com/2015/11/seven-steps-machine-learning-python.html)
- [Top 10 Machine Learning Algorithms for Beginners](https://www.kdnuggets.com/2017/10/top-10-machine-learning-algorithms-beginners.html)
- [8 Fun Machine Learning Projects for Beginners](https://elitedatascience.com/machine-learning-projects-for-beginners)
- [Andrew NG Intro to Machine Learning](https://www.coursera.org/learn/machine-learning/home/welcome)
- [scikit-learn: machine learning in Python — scikit-learn 0.19.1 documentation](http://scikit-learn.org/stable/)
- [Metacademy - Deep learning from the bottom up](https://metacademy.org/roadmaps/rgrosse/deep_learning)
- [Deep Learning For Coders—36 hours of lessons for free](http://course.fast.ai/start.html)
- [Machine Learning - complete course notes](http://www.holehouse.org/mlclass/)
- [Introduction To Genetic Algorithms | Codecademy](https://www.codecademy.com/courses/javascript-beginner-en-pqhEw/0/1)
- [index - MachineLearning](https://www.reddit.com/r/MachineLearning/wiki/index)
- [Collection: Getting started with machine learning · GitHub](https://github.com/collections/machine-learning)
- [GitHub - josephmisiti/awesome-machine-learning: A curated list of awesome Machine Learning frameworks, libraries and software.](https://github.com/josephmisiti/awesome-machine-learning#c)
- [Topic: evolutionary-computation · GitHub](https://github.com/topics/evolutionary-computation)
- [Welcome — Theano 1.0.0 documentation](http://deeplearning.net/software/theano/)
- [TensorFlow](https://www.tensorflow.org/)
- [Start Here With Machine Learning - Machine Learning Mastery](https://machinelearningmastery.com/start-here/#getstarted)
- [Choosing the right estimator — scikit-learn 0.19.1 documentation](http://scikit-learn.org/stable/tutorial/machine_learning_map/)
- [Geoffrey Hinton Neural Networks for Machine Learning](https://www.coursera.org/learn/neural-networks/home/welcome)
- [A curated list of adversarial machine learning resources](https://github.com/yenchenlin/awesome-adversarial-machine-learning)
- [AISecurity Resources](https://github.com/RandomAdversary/Awesome-AI-Security)
- [Machine Learning for Cyber Security Resources](https://github.com/jivoi/awesome-ml-for-cybersecurity)
- [[D] What is the best ML paper you read in 2018 and why? : MachineLearning](https://www.reddit.com/r/MachineLearning/comments/a6cbzm/d_what_is_the_best_ml_paper_you_read_in_2018_and/)
- [/r/Machine Learning](https://www.reddit.com/r/MachineLearning/)
- [jbhuang0604/awesome-computer-vision: A curated list of awesome computer vision resources](https://github.com/jbhuang0604/awesome-computer-vision)
- [Git - First-Time Git Setup](https://git-scm.com/book/en/v2/Getting-Started-First-Time-Git-Setup)
- [Git Tutorial - Try Git](https://try.github.io/levels/1/challenges/1)
- [Git - git-stash Documentation](https://git-scm.com/docs/git-stash)
- [GitHub Learning Lab Teaches You GitHub by Using GitHub (Yes, Really)](https://insights.dice.com/2018/04/23/github-learning-lab-teaches-tech-pros/?CMPID=SM_FB_PD_JS_US_OG_LAE&utm_source=Facebook&utm_medium=Social%2BMedia&utm_content&utm_campaign=Advocacy_Ongoing)
- [Removing a remote - User Documentation](https://help.github.com/articles/removing-a-remote/)
- [Git fails when pushing commit to github - Stack Overflow](https://stackoverflow.com/questions/2702731/git-fails-when-pushing-commit-to-github)
- [Adding a new SSH key to your GitHub account - User Documentation](https://help.github.com/articles/adding-a-new-ssh-key-to-your-github-account/)
- [GitHub Learning Lab](https://lab.github.com/)
- [Oh, shit, git!](http://ohshitgit.com/)
- [Learn Git- Git tutorials, workflows and commands | Atlassian Git Tutorial](https://www.atlassian.com/git)
- [Follow these simple rules and you’ll become a Git and GitHub master](https://medium.freecodecamp.org/follow-these-simple-rules-and-youll-become-a-git-and-github-master-e1045057468f)
- [How to save a puppy by creating a clean Git repo](https://blog.intracto.com/how-to-save-a-puppy-by-creating-a-clean-git-repo)
- [](http://www.giac.org/certification/gxpn)
- [Conventional Commits](https://www.conventionalcommits.org/en/v1.0.0-beta.2/)
- [Visual way to learn Git branching](https://learngitbranching.js.org/)
- [Git Tutorial](https://www.tutorialspoint.com/git/index.htm)
- [Git Tutorial for Beginners: Command-Line Fundamentals - YouTube](https://www.youtube.com/watch?v=HVsySz-h9r4)
- [github-git-cheat-sheet](https://services.github.com/on-demand/downloads/github-git-cheat-sheet.pdf)
- [AddressSanitizer · google/sanitizers Wiki](https://github.com/google/sanitizers/wiki/AddressSanitizer)
- [Electric Fence - eLinux.org](https://elinux.org/Electric_Fence)
- [GFlags and PageHeap - Windows drivers | Microsoft Docs](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/gflags-and-pageheap)
- [How to Stream Text Data from Twitch with Sockets in Python – LearnDataSci](https://learndatasci.com/tutorials/how-stream-text-data-twitch-sockets-python/)
- [/r/learnprogramming](https://www.reddit.com/r/learnprogramming/)
- [/r/csMajors](https://www.reddit.com/r/csMajors)
- [Golly Game of Life Home Page](http://golly.sourceforge.net/)
- [Linkers and Loaders](http://www.iecc.com/linker/)
- [Booting an Intel Architecture System, Part I: Early Initialization | Dr Dobb's](http://www.drdobbs.com/parallel/booting-an-intel-architecture-system-par/232300699)
- [A list of events and fellowship opportunities for Computer Science students](https://github.com/anu0012/awesome-computer-science-opportunities)
- [John Conway's Game of Life](https://bitstorm.org/gameoflife/)
- [tech-interview-handbook: Algorithms study materials, behavioral content and tips for rocking your coding interview](https://github.com/yangshun/tech-interview-handbook)
- [Is it possible to be self taught and get a good job without a degree?](https://www.reddit.com/r/learnprogramming/comments/ahucay/self_taught_programmers_of_reddit_is_it_possible/)
- [How do you get better at coding interviews? : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/ai4q1i/how_do_you_get_better_at_coding_interviews/eel4su9/)
- [Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation](https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315)
- [Reversing: Secrets of Reverse Engineering: Eldad Eilam](https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817)
- [The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler: Chris Eagle](https://www.amazon.com/IDA-Pro-Book-Unofficial-Disassembler/dp/1593272898)
- [The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory](https://www.amazon.com/gp/product/1118825098/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1118825098&linkId=9e9e956f54ee586491e2a9230b989df5)
- [Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition](https://www.amazon.com/Gray-Hat-Hacking-Ethical-Handbook/dp/1260108414/ref=dp_ob_title_bk)
- [The Antivirus Hacker's Handbook](https://www.amazon.com/gp/product/1119028752/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1119028752&linkId=5a831d9a67b3252aad91432dded4bb57)
- [Reverse Engineering for Beginners Book (REALLY LONG)](http://beginners.re/RE4B-EN.pdf)
- [Lenas Reversing for Newbies](https://tuts4you.com/e107_plugins/download/download.php?view.2876)
- [Tutorials « The Legend Of Random](http://octopuslabs.io/legend/blog/sample-page.html)
- [Cracking Sublime Text 3](http://blog.fernandodominguez.me/cracking-sublime-text-3/)
- [zerosum0x0: Removing Sublime Text Nag Window](https://zerosum0x0.blogspot.com/2016/09/removing-sublime-text-nag-window.html)
- [Tutorials « The Legend Of Random](https://legend.octopuslabs.io/sample-page.html)
- [Reverse Engineering 101 - NYU Poly - 2009](https://vimeo.com/6764570)
- [Reverse Engineering 101 - NYU:Poly 2010](https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/)
- [Reverse Engineering 102 - NYU:Poly 2010](https://prezi.com/e5a2tumdqocj/reverse-engineering-102-nyupoly-2010/)
- [Reverse Engineering 1 - NYU Poly 2011](https://vimeo.com/30076325)
- [Reverse Engineering 2 - NYU Poly 2011](https://vimeo.com/30594548)
- [Open Security Training - Introduction To Reverse Engineering](http://opensecuritytraining.info/IntroductionToReverseEngineering.html)
- [Open Security Training - Life Of Binaries](http://opensecuritytraining.info/LifeOfBinaries.html)
- [Microcorruption - Interactive Intro to RE](https://microcorruption.com/login)
- [RE for Beginners | Reverse Engineering](https://www.begin.re/)
- [RPI - CSCI 4971 - Secure Software Principles (RE stuff)](http://www.cs.rpi.edu/academics/courses/spring10/csci4971/)
- [RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec](https://0x00sec.org/t/re-guide-for-beginners-methodology-and-tools/2242)
- [Reverse Engineering 101 - Reverse Engineering - 0x00sec](https://0x00sec.org/t/reverse-engineering-101/1233)
- [[Tutorial] Reversing a multi stage binary step-by-step - Reverse Engineering - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/tutorial-reversing-a-multi-stage-binary-step-by-step/2692)
- [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/06_reverse_engineering.html#1)
- [RPI Bomb](http://www.cs.rpi.edu/academics/courses/spring10/csci4971/rev2/bomb)
- [Reversing and Exploiting a Nuclear Bomb ;) - Reverse Engineering - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412)
- [Crackmes.one](https://crackmes.one/)
- [[KEYGENME - EASY] Cracking Your First Program - Reverse Engineering / Challenges - 0x00sec](https://0x00sec.org/t/keygenme-easy-cracking-your-first-program/1075)
- [Malwarebytes CrackMe 2 by hasherazade](https://secrary.com/CrackMe/hasherezadeCrackme2/)
- [Mastermind crackme by Spider](https://secrary.com/CrackMe/mastermind_spider/)
- [How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs](https://blog.malwarebytes.com/malwarebytes-news/2017/11/how-to-solve-the-malwarebytes-crackme-a-step-by-step-tutorial/)
- [The Cryptopals Crypto Challenges](http://cryptopals.com/)
- [Reverse Engineering & Exploitation of a “Connected Alarm Clock” – Courk's Blog](https://courk.fr/index.php/2017/09/10/reverse-engineering-exploitation-connected-clock/)
- [2018 B-day Reverse Engineering Challenge](http://rikaard.io/post/2018-bday-reversing/)
- [CSAW_2009 RE Challenge](https://github.com/s7ephen/CSAW_2009)
- [2018 Flare-On Challenge Solutions « 2018 Flare-On Challenge Solutions | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/10/2018-flare-on-challenge-solutions.html)
- [2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions | FireEye Inc](https://www.fireeye.com/blog/threat-research/2017/10/2017-flare-on-challenge-solutions.html)
- [Flareon 5 Challenge 6 - Magic (Walk through - Reverse Engineering) - YouTube](https://www.youtube.com/watch?v=3iYlpYLTn-0)
- [Reverse Engineering challenges](https://challenges.re/)
- [pwnable.xyz](https://pwnable.xyz/challenges/)
- [BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)](https://medium.com/@danielabloom/bolo-reverse-engineering-part-1-basic-programming-concepts-f88b233c63b7)
- [BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)](https://medium.com/@danielabloom/bolo-reverse-engineering-part-2-advanced-programming-concepts-b4e292b2f3e)
- [Assembly Basics](https://platform.avatao.com/paths/a0dc20fc-f1b5-43c9-89fc-3a5fccfb5f0b/challenges/e63cb4dd-4777-4d2d-b81d-a822277983bc)
- [Getting ready for Assembly Programming – Anatomy of Intel Processor - Part 2](https://scriptdotsh.com/index.php/2018/05/13/anatomy-of-intel-processor/)
- [Getting ready for Assembly Language Programming – Part 1](https://scriptdotsh.com/index.php/2018/05/05/linux-asm-32bit-part-1/)
- [Getting started with Assembly language programming - End of theory - Part 3](https://scriptdotsh.com/index.php/2018/07/14/end-of-theory/)
- [Assembly Language Programming and Shellcoding - Lab setup and some important things - Part 4](https://scriptdotsh.com/index.php/2018/07/21/labsetup/)
- [Assembly Language Programming and Shellcoding - Hello World - Part 5](https://scriptdotsh.com/index.php/2018/07/29/hello-world/)
- [Assembly Language Programming and Shellcoding - Important Functions - Part 6](https://scriptdotsh.com/index.php/2018/10/12/rot1/)
- [Assembly Language Programming and Shellcoding – Important Functions – Part 7](https://scriptdotsh.com/index.php/2018/10/26/rot2/)
- [A crash course in x86 Assembly](https://x89k.tk/reverse%20engineering%20basics/2018/06/14/reb3.html)
- [Part 1 - Reverse Engineering Basics - Linux x64](https://scriptdotsh.com/index.php/2018/04/09/ground-zero-part-1-reverse-engineering-basics/)
- [Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64](https://scriptdotsh.com/index.php/2018/07/26/ground-zero-part-1-2-reverse-engineering-password-protected-reverse-shells-linux-x64/)
- [Part 3 - Reverse Engineering Basics - Linux on ARM64](https://scriptdotsh.com/index.php/2018/04/26/ground-zero-part-3-reverse-engineering-basics-linux-on-arm64/)
- [Part 3-2 - Reverse Engineering - Patching Binaries with Radare2 - ARM64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/08/13/reverse-engineering-patching-binaries-with-radare2-arm-aarch64/)
- [Part 2-2 – Reverse Engineering – XOR encryption – Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/05/09/ground-zero-part-2-2-reverse-engineering-xor-encryption-windows-x64/)
- [Part 2 - Reverse Engineering Basics - Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/16/ground-zero-part-2-reverse-engineering-basics/)
- [Part 2-3 – Reverse Engineering – Building Cracked Binaries – Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/06/09/ground-zero-part-2-3-reverse-engineering-building-cracked-binaries-windows-x64/)
- [OverTheWire: Maze - exploitation/programming/RE Wargame](http://overthewire.org/wargames/maze/)
- [OverTheWire: Semtex - Exploitation and RE](http://overthewire.org/wargames/semtex/)
- [The Basics of IDA Pro - InfoSec Resources](http://resources.infosecinstitute.com/basics-of-ida-pro-2/)
- [Reversing Basics - A Practical Approach Using IDA Pro | www.SecurityXploded.com](http://securityxploded.com/reversing-basics-ida-pro.php)
- [ida pro tutorial for beginners - Google Search](https://www.google.com/webhp?sourceid=chrome-instant&rlz=1C1AVNE_enUS658US663&ion=1&espv=2&ie=UTF-8#q=ida%20pro%20tutorial%20for%20beginners)
- [Basic Dynamic Analysis with IDA Pro and WinDBG - YouTube](https://www.youtube.com/watch?v=_ACDiW2I4ns)
- [GitHub - patois/IDACyber: Data Visualization Plugin for IDA Pro](https://github.com/patois/IDACyber)
- [Real-world Decompilation with IDA Pro - Part 1: Introduction - YouTube](https://www.youtube.com/watch?v=vb18UVF4a_o)
- [Real-world Decompilation with IDA Pro - Part 2: String Handling - YouTube](https://www.youtube.com/watch?v=tVvYsFStPTc)
- [IDA series, part 2: debugging a .NET executable](https://qmemcpy.github.io/post/ida-series-2-debugging-net)
- [IDA series, part 1: the Hex-Rays decompiler](https://qmemcpy.github.io/post/ida-series-1-hex-rays)
- [Marco Ramilli's Blog: How to Patch Binary with IDA Pro](http://marcoramilli.blogspot.com/2011/01/how-to-patch-binary-with-ida-pro.html)
- [daniel_plohmann / simpliFiRE.IDAscope — Bitbucket](https://bitbucket.org/daniel_plohmann/simplifire.idascope)
- [GitHub - onethawt/idaplugins-list: A list of IDA Plugins](https://github.com/onethawt/idaplugins-list)
- [GitHub - Maktm/FLIRTDB: A community driven collection of IDA FLIRT signature files](https://github.com/Maktm/FLIRTDB)
- [FLARE IDA Pro Script Series: Simplifying Graphs in IDA « FLARE IDA Pro Script Series: Simplifying Graphs in IDA | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/01/simplifying-graphs-in-ida.html)
- [Binary Cracking & Byte Patching with IDA Pro - CodeProject](https://www.codeproject.com/Articles/833955/Binary-Cracking-Byte-Patching-with-IDA-Pro)
- [Free IDA Pro Reverse Code Engineering and Binary Auditing Training Material for University Lectures](http://www.binary-auditing.com/)
- [Using Z3 with IDA to simplify arithmetic operations in functions | Shortjump!](http://0xeb.net/2018/03/using-z3-with-ida-to-simplify-arithmetic-operations-in-functions/)
- [Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and ... - James Forshaw - Google Books](https://books.google.com/books?id=kLgrDwAAQBAJ&pg=PT215&lpg=PT215&dq=how+to+find+debug+symbol+file+when+reverse+engineering&source=bl&ots=PWvn1aBqJi&sig=sgBk9yoWfZOqDaScAXEBnv16IXI&hl=en&sa=X&ved=0ahUKEwiXmKm3lpfcAhVyg-AKHTRsA64Q6AEIVTAE#v=onepage&q=how%20to%20find%20debug%20symbol%20file%20when%20reverse%20engineering&f=false)
- [TiGa's Video Tutorial Site](http://www.woodmann.com/TiGa/idaseries.html)
- [RE for Beginners | Short Intro to IDA](https://www.begin.re/short-intro-to-ida)
- [IDA Shortcuts [PDF]](file:///home/emtuls/Downloads/IDA_Pro_Shortcuts.pdf)
- [Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1 - YouTube](https://www.youtube.com/watch?v=LOrSbtNXBtg)
- [GitHub - ColdHeat/liil: Linear IL view for Binary Ninja](https://github.com/ColdHeat/liil)
- [Binary Ninja](https://www.trailofbits.com/research-and-development/binja/)
- [2000 cuts with Binary Ninja | Trail of Bits Blog](https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/)
- [binary ninja Defcon 2017](https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/)
- [De-obfuscating Jump Chains with Binary Ninja - This is Security :: by Stormshield](https://thisissecurity.stormshield.com/2018/03/20/de-obfuscating-jump-chains-with-binary-ninja/)
- [dukebarman/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2](https://github.com/dukebarman/awesome-radare2)
- [GitHub - radare/radare2: unix-like reverse engineering framework and commandline tools](https://github.com/radare/radare2)
- [A journey into Radare 2 – Part 2: Exploitation – Megabeets](https://www.megabeets.net/a-journey-into-radare-2-part-2/)
- [Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2 - YouTube](https://www.youtube.com/watch?v=y69uIxU0eI8)
- [Radare2: An Introduction to Visual Mode - MOVEAX.ME](https://moveax.me/radare2-visual-mode/)
- [Reverse Engineering Using Radare2 – Jacob Pimental – Medium](https://medium.com/@jacob16682/reverse-engineering-using-radare2-588775ea38d5)
- [Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium](https://medium.com/@jacob16682/reverse-engineering-with-radare2-part-2-83b71df7ffe4)
- [Crackme0x04 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x04/)
- [Crackme0x03 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x03/)
- [Crackme0x05 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x05/)
- [Crackme0x06 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x06/)
- [Crackme0x07 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x07/)
- [Crackme0x08 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x08/)
- [Debugging Using Radare2… and Windows! – Jacob Pimental – Medium](https://medium.com/@jacob16682/debugging-using-radare2-and-windows-5e58677bf943)
- [Crackme0x09 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x09/)
- [Reversing a Self-Modifying Binary with radare2 – Megabeets](https://www.megabeets.net/reversing-a-self-modifying-binary-with-radare2/)
- [Reverse engineering a Gameboy ROM with radare2 – Megabeets](https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2/)
- [BombLab Dissected with Radare2 - MOVEAX.ME](https://moveax.me/bomblab/)
- [Dr Von Noizeman's Nuclear Bomb defused with Radare2 - MOVEAX.ME](https://moveax.me/dr-von-noizemans-binary-bomb/)
- [Crackme0x01 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x01/)
- [Conditions and loops – Max Kersten](https://maxkersten.nl/binary-analysis-course/assembly-basics/conditions-and-loops/)
- [radare2 python scripting - r2wiki](https://r2wiki.readthedocs.io/en/latest/home/radare2-python-scripting/)
- [radare2-extras/r2snowman at master · radare/radare2-extras](https://github.com/radare/radare2-extras/tree/master/r2snowman)
- [radareorg/radeco: radare decompiler tool based on radeco-lib](https://github.com/radareorg/radeco)
- [radareorg/cutter: A Qt and C++ GUI for radare2 reverse engineering framework](https://github.com/radareorg/cutter)
- [A journey into Radare 2 – Part 1: Simple crackme – Megabeets](https://www.megabeets.net/a-journey-into-radare-2-part-1/)
- [Hopper - Linux and MacOS Disassembler](https://www.hopperapp.com/)
- [x64dbg](https://x64dbg.com/#start)
- [Plugins · x64dbg/x64dbg Wiki · GitHub](https://github.com/x64dbg/x64dbg/wiki/Plugins)
- [GitHub - x64dbg/x64dbg: An open-source x64/x32 debugger for windows.](https://github.com/x64dbg/x64dbg)
- [x64dbg - Tuts 4 You](https://forum.tuts4you.com/forum/139-x64dbg/)
- [GDB and Pwntools training](https://ocw.cs.pub.ro/courses/cns/labs/lab-01)
- [Debugging with GDB Introduction | Azeria Labs](https://azeria-labs.com/debugging-with-gdb-introduction/)
- [longld/peda: PEDA - Python Exploit Development Assistance for GDB](https://github.com/longld/peda)
- [Using GDB to Develop Exploits - A Basic Run Through](https://www.exploit-db.com/papers/13205/)
- [GDB Command Reference - x command](http://visualgdb.com/gdbreference/commands/x)
- [GDB Basics](https://platform.avatao.com/paths/a0dc20fc-f1b5-43c9-89fc-3a5fccfb5f0b/challenges/166366b3-2e89-49ee-86a3-023663d197b7)
- [Quick Gdb Guide](http://condor.depaul.edu/glancast/373class/docs/gdb.html)
- [Debugging with GDB: Memory](https://sourceware.org/gdb/onlinedocs/gdb/Memory.html)
- [GDB Tutorial - A Walkthrough with Examples](https://www.cs.umd.edu/~srhuang/teaching/cmsc212/gdb-tutorial-handout.pdf)
- [New WinDbg available in preview! – Debugging Tools for Windows](https://blogs.msdn.microsoft.com/windbg/2017/08/28/new-windbg-available-in-preview/)
- [Introduction to Windbg and debugging windows - YouTube](https://www.youtube.com/playlist?list=PLhx7-txsG6t6n_E2LgDGqgvJtCHPL7UFu)
- [Immunity Debugger Downloads / Downloads - Tuts 4 You](https://tuts4you.com/download.php?list.72)
- [OllyDbg 2.0](http://www.ollydbg.de/version2.html)
- [OllyDbg v1.10](http://www.ollydbg.de/)
- [danh3707/OllyDbgV1.10-plugins-and-Hlpfile: OllyDbg v1.10 with plugins and help32 file along with windows 10 help32 fix. With a dark color scheme.](https://github.com/danh3707/OllyDbgV1.10-plugins-and-Hlpfile)
- [010 Editor - Professional Text/Hex Editor with Binary Templates](https://www.sweetscape.com/010editor/)
- [List of Hex Editors](https://github.com/wtsxDev/reverse-engineering#hex-editors)
- [angr · GitHub](https://github.com/angr)
- [angr, a binary analysis framework](http://angr.io/)
- [Compiler Explorer - Programming Language to Assembler Converter](http://godbolt.org/)
- [x86 Disassembly/Disassemblers and Decompilers - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Disassembly/Disassemblers_and_Decompilers)
- [Veles - Visual Binary Analysis Tool](https://codisec.com/veles/)
- [Debuggex: Online visual regex tester. JavaScript, Python, and PCRE.](https://www.debuggex.com/)
- [Massive List Of Reverse-Engineering Tools](http://wiki.yobi.be/wiki/Reverse-Engineering)
- [Introduction to Debuggers](https://www.slideshare.net/saumilshah/introduction-to-debuggers)
- [Open Security Training - Intro to X86](http://www.opensecuritytraining.info/IntroX86.html)
- [Open Security Training - Intro to X86-64](http://opensecuritytraining.info/IntroX86-64.html)
- [Open Security Training - Intermediate X86](http://opensecuritytraining.info/IntermediateX86.html)
- [x86 Assembly - YouTube - YouTube](https://www.youtube.com/playlist?list=PLan2CeTAw3pFOq5qc9urw8w7R-kvAT8Yb)
- [Breaking the x86 Instruction Set - YouTube](https://www.youtube.com/watch?v=KrksBdWcZgQ)
- [A Crash Course in x86 Assembly for Reverse Engineers](https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf)
- [PC Assembly Language Book](http://pacman128.github.io/static/pcasm-book.pdf)
- [gcc x86 Assembly](https://www.cs.uaf.edu/2005/fall/cs301/support/x86/index.html)
- [x86 Assembly - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Assembly)
- [x86 Disassembly - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Disassembly)
- [Writing ARM Assembly (Part 1) | Azeria Labs](https://azeria-labs.com/writing-arm-assembly-part-1/)
- [Ring Ø Labs: The Wonderful World of MIPS](https://www.ringzerolabs.com/2018/03/the-wonderful-world-of-mips.html)
- [When and how to use an assembler. Assembly programming basics.](https://www.pelock.com/articles/when-and-how-to-use-an-assembler-assembly-programming-basics)
- [Assembly Programming Exercises](https://github.com/blankwall/asm_prog_ex)
- [Calling Conventions](https://msdn.microsoft.com/en-us/library/k2b2ssfy.aspx)
- [x86 In-Depth: CDECL Calling Convention Complete Tutorial - BONUS video - YouTube](https://www.youtube.com/watch?v=im09tdVnYwQ)
- [What are the calling conventions for UNIX & Linux system calls on i386 and x86-64 - Stack Overflow](https://stackoverflow.com/questions/2535989/what-are-the-calling-conventions-for-unix-linux-system-calls-on-i386-and-x86-6/2538212#2538212)
- [How Functions Work](https://www.slideshare.net/saumilshah/how-functions-work-7776073)
- [Executable and Linkable Format 101\. Part 2: Symbols - Intezer](http://www.intezer.com/executable-linkable-format-101-part-2-symbols/)
- [Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer](http://www.intezer.com/executable-linkable-format-101-part1-sections-segments/)
- [Introduction to the ELF Format : The ELF Header (Part I)](https://blog.k3170makan.com/2018/09/introduction-to-elf-format-elf-header.html)
- [ELF Tools](http://wiki.yobi.be/wiki/Reverse-Engineering#ELF)
- [Network Protocols – Programmer's Compendium](https://www.destroyallsoftware.com/compendium/network-protocols?share_key=97d3ba4c24d21147)
- [Sector 876: Backdooring PE Files - Part 1](http://sector876.blogspot.com/2013/03/backdooring-pe-files-part-1.html)
- [Automatic Reverse Engineering of Data Structures from Binary Execution [PDF]](https://www.isoc.org/isoc/conferences/ndss/10/pdf/23.pdf)
- [Digging For Data Structures [PDF]](http://ben.ransford.org/srg/papers/cozzie--digging.pdf)
- [TIE: Principled Reverse Engineering of Types in Binary Programs [PDF]](https://reverse.put.as/wp-content/uploads/2011/06/D1T2-Mark-Dowd-Tarjei-Mandt-iOS6-Security.pdf)
- [MemPick: High-Level Data Structure Detection in C/C++ Binaries [PDF]](http://www.cs.vu.nl/~herbertb/papers/mempick_wcre13.pdf)
- [Howard: a dynamic excavator for reverse engineering data structures [PDF]](http://www.isoc.org/isoc/conferences/ndss/11/pdf/5_1.pdf)
- [Windows API Index (Windows)](https://msdn.microsoft.com/en-us/library/windows/desktop/ff818516(v=vs.85).aspx)
- [.NET Reverse Enginering - Part 1 – CodePool – Programming and a bit more](http://codepool.me/NET-Reverse-Enginering-Part-1/)
- [Getting Started with Windows Debugging - Windows 10 hardware dev](https://msdn.microsoft.com/en-us/library/mt219729.aspx)
- [WinDbg](http://www.windbg.org/)
- [Debug Universal Drivers - Step by Step Lab (Echo Kernel-Mode) - Windows 10 hardware dev](https://msdn.microsoft.com/en-us/library/mt269367.aspx)
- [Exploring Windows virtual memory management](http://www.triplefault.io/2017/08/exploring-windows-virtual-memory.html)
- [An In-Depth Look into the Win32 Portable Executable File Format - Part 1 - DelphiBasics](http://www.delphibasics.info/home/delphibasicsarticles/anin-depthlookintothewin32portableexecutablefileformat-part1)
- [An In-Depth Look into the Win32 Portable Executable File Format - Part 2 - DelphiBasics](http://www.delphibasics.info/home/delphibasicsarticles/anin-depthlookintothewin32portableexecutablefileformat-part2)
- [Visual Studio Documentation | Microsoft Docs](https://docs.microsoft.com/en-us/visualstudio/)
- [An Introduction to Windows Kernel Debugging | Endgame](https://www.endgame.com/blog/technical-blog/introduction-windows-kernel-debugging)
- [ReactOS (open source Windows remake)](https://doxygen.reactos.org/)
- [Vergilius Project | Home](https://www.vergiliusproject.com/)
- [Terminus Project](http://terminus.rewolf.pl/terminus/)
- [Searchable Linux Syscall Table for x86 and x86_64 | PyTux](https://filippo.io/linux-syscall-table/)
- [How to Install macOS High Sierra 10.13.6 on VirtualBox on Windows - Techsviewer](https://techsviewer.com/install-macos-high-sierra-virtualbox-windows/)
- [Malware Unicorn Environment VM's](https://securedorg.github.io/RE101/section1/)
- [SIFT Workstation Download](https://digital-forensics.sans.org/community/downloads)
- [Creating a Simple Free Malware Analysis Environment - MalwareTech](https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html)
- [Creating the Ultimate Tor Virtual Network - MalwareTech](https://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html)
- [RPISEC - Malware Analysis 2013](http://security.cs.rpi.edu/courses/malware-spring2013/)
- [RPISEC - Malware Analysis 2015](https://github.com/RPISEC/Malware)
- [Malware Unicorn 101](https://securedorg.github.io/RE101/)
- [Malware Unicorn 102](https://securedorg.github.io/RE102/)
- [Intro to RE/Malware Analysis](https://www.youtube.com/watch?feature=youtu.be&v=-Ml04jPMH3U&app=desktop)
- [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/08_creepy_crawlies.html#1)
- [Open Security Training - Reverse Engineering Malware](http://opensecuritytraining.info/ReverseEngineeringMalware.html)
- [How to start RE/malware analysis? | hasherezade's 1001 nights](https://hshrzd.wordpress.com/how-to-start/)
- [Intro to Malware Analysis](http://www.thefengs.com/wuchang/courses/cs492/)
- [Free Automated Malware Analysis Service - powered by Falcon Sandbox](https://www.hybrid-analysis.com/)
- [REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware](https://remnux.org/)
- [ProcDump - Windows Sysinternals | Microsoft Docs](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump)
- [Overview - Process Hacker](https://processhacker.sourceforge.io/)
- [PE Tools](http://wiki.yobi.be/wiki/Reverse-Engineering#PE)
- [Dependency Walker (depends.exe) Home Page](http://www.dependencywalker.com/)
- [PEview](http://wjradburn.com/software/)
- [Resource Hacker](http://www.angusj.com/resourcehacker/)
- [Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software](https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901)
- [Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code](https://www.amazon.com/gp/product/0470613033/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0470613033&linkId=9d2a92127a925e343dca0bc51da20c62)
- [Malware Analysis - A Way to Learn Anti-Reversing Tricks - YouTube](https://www.youtube.com/watch?v=cbgZPCjYqcc)
- [Malware Theory - Basic Structure of PE Files - YouTube](https://www.youtube.com/watch?v=l6GjU8fm8sM&feature=youtu.be)
- [An Introduction to Dumping Malware with Process Dump - YouTube](https://www.youtube.com/watch?v=dCU7N-Oh3jg)
- [Colin Hardy - Lots of Malware Analysis Stuff](https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg)
- [Beginner Malware Reversing Challenges - MalwareTech](https://www.malwaretech.com/beginner-malware-reversing-challenges)
- [Encryption 101: a malware analyst's primer - Malwarebytes Labs | Malwarebytes Labs](https://blog.malwarebytes.com/threat-analysis/2018/02/encryption-101-malware-analysts-primer/)
- [SANS Malware Tips](https://digital-forensics.sans.org/media/SANS_Poster_2018_Hunt_Evil_FINAL.pdf)
- [malwaretech Cheatsheet.rtf](http://www.malwaretech.com/Cheatsheet.rtf)
- [MalwareTech - Guides to Reversing Malware](https://www.malwaretech.com/tag/malware)
- [MalwareTechBlog - Beginner Reverse Engineering - Twitch](https://www.twitch.tv/videos/325654484)
- [A curated list of malware analysis tools and resources.](https://github.com/rshipp/awesome-malware-analysis#readme)
- [CrackWatch](https://www.reddit.com/r/CrackWatch/)
- [Daily Releases (February 14, 2018) : CrackWatch](https://www.reddit.com/r/CrackWatch/comments/7xmnf1/daily_releases_february_14_2018/)
- [CS.RIN.RU - Steam Underground Community • Index page](https://cs.rin.ru/forum/)
- [[Crack Watch] Beginners Guide to Crack Watch : CrackWatch](https://www.reddit.com/r/CrackWatch/comments/7gyt85/crack_watch_beginners_guide_to_crack_watch/)
- [How the Dreamcast copy protection was defeated](http://fabiensanglard.net/dreamcast_hacking/)
- [PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks - KitPloit - PenTest Tools for your Security Arsenal ☣](https://www.kitploit.com/2018/06/pwnadventure3-game-open-world-mmorpg.html?m=1)
- [PwnAdventure3/re-mmorpg-troopers18.pdf at master · beaujeant/PwnAdventure3 · GitHub](https://github.com/beaujeant/PwnAdventure3/blob/master/Workshop/re-mmorpg-troopers18.pdf)
- [You Have to Hack This Massively Multiplayer Game to Beat It | WIRED](https://www.wired.com/2015/04/multiplayer-hack-to-win/)
- [GitHub - Vector35/PwnAdventureZ: NES zombie survival game made to be hacked](https://github.com/Vector35/PwnAdventureZ)
- [Pwn Adventure 3: Pwnie Island](http://www.pwnadventure.com/)
- [Intro to Game Hacking](https://drewkestell.us/)
- [Getting Started With Game Hacking: The Definitive Guide (Part 1)](https://www.unknowncheats.me/forum/programming-beginners/50841-getting-started-game-hacking-definitive-guide-part-1-a.html)
- [[Tutorial] Getting Started With Programming And Gamehacking](https://www.unknowncheats.me/forum/c-and-c/112372-getting-started-programming-and-gamehacking.html)
- [[Tutorial] Make your own dll hack | [1] | Memory patching & Editing](https://www.unknowncheats.me/forum/programming-beginners/118141-make-your-own-dll-hack-1-memory-patching-and-editing.html)
- [[Tutorial] CodeCave with OllyDbg](https://www.unknowncheats.me/forum/general-programming-and-reversing/72327-codecave-ollydbg.html)
- [[Information] Useful C++/Gamehacking/Programming for beginners threads - Mega thread](https://www.unknowncheats.me/forum/programming-beginners/115037-useful-c-gamehacking-programming-beginners-threads-mega-thread.html)
- [Game Hacking: WinXP Minesweeper - Reverse Engineering - 0x00sec](https://0x00sec.org/t/game-hacking-winxp-minesweeper/1266)
- [Finding and exploiting hidden features of Animal Crossing’s NES emulator | jamchamb.github.io](https://jamchamb.github.io/2018/07/11/animal-crossing-nes-emulator-hacks.html)
- [/r/REGames](https://www.reddit.com/r/REGames/)
- [Basics of Cryptography Part I: RSA Encryption and Decryption](https://sahandsaba.com/cryptography-rsa-part-1.html)
- [jcryptool/doc: JCrypTool Documentation and Resources](https://github.com/jcryptool/doc)
- [Base64 Decode and Encode - Online](https://www.base64decode.org/)
- [The Black Chamber - Chamber Guide](http://www.simonsingh.net/The_Black_Chamber/chamberguide.html)
- [PyCrypto API Documentation](https://www.dlitz.net/software/pycrypto/api/2.6/)
- [Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/8ivhcd/statically_rewriting_x86_binaries_without/)
- [Build an 8-bit computer | Ben Eater](https://eater.net/8bit)
- [8-bit computer update - YouTube](https://www.youtube.com/watch?v=HyznrdDSSGM&list=PLowKtXNTBypGqImE405J2565dvjafglHU)
- [Learning FPGA And Verilog A Beginner’s Guide Part 1 – Introduction | Numato Lab Help Center](https://numato.com/kb/learning-fpga-verilog-beginners-guide-part-1-introduction/)
- [Mojo V3 | Alchitry](https://alchitry.com/collections/all/products/mojo-v3)
- [Verilog | Alchitry](https://alchitry.com/pages/verilog)
- [Game for Hardware Design - Robot Odyssey Rewired](https://www.robotodyssey.online/)
- [Icarus Verilog](http://iverilog.icarus.com/)
- [GTKWave](http://gtkwave.sourceforge.net/)
- [Reddit comment about FPGA](https://www.reddit.com/r/programming/comments/actvsu/game_in_which_you_develop_your_own_cpu/edb3fd0/)
- [Hacking the Xbox: An Introduction to Reverse Engineering](https://www.amazon.com/gp/product/1593270291/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1593270291&linkId=581cb9fe9dee40110a1a283a5d240cbf)
- [Hardware Security | Coursera](https://www.coursera.org/learn/hardware-security)
- [RPI - Hardware Reverse Engineering](http://security.cs.rpi.edu/courses/hwre-spring2014/)
- [Introduction to Firmware Reversing - YouTube](https://m.youtube.com/watch?feature=youtu.be&v=GIU4yJn2-2A)
- [34C3 - Reverse engineering FPGAs - YouTube](https://www.youtube.com/watch?v=Y1Wwa8csFjk)
- [Reverse engineering a simple CMOS chip - YouTube](https://www.youtube.com/watch?v=FMdYuGpPicw)
- [Hackaday Supercon - Ken Shirriff : Studying Silicon: Reverse Engineering Integrated Circuits - YouTube](https://www.youtube.com/watch?v=TKi1xX7KKOI)
- [Hardware Hacking on Vimeo](https://vimeo.com/album/1632121)
- [The IoT Hacker's Toolkit · System Overlord](https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html)
- [Analog Discovery 2 - National Instruments](http://www.ni.com/en-us/shop/select/analog-discovery-2?skuId=162509)
- [Syonyk's Project Blog: DSO138 Scope, Acrylic Housing Assembly, and USB Power](https://syonyk.blogspot.com/2016/11/dso138-scope-acrylic-housing-assembly.html)
- [RFID Thief v2.0 - scund00r](https://scund00r.com/all/rfid/tutorial/2018/07/12/rfid-theif-v2.html)
- [newaetech/chipwhisperer: ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks](https://github.com/newaetech/chipwhisperer)
- [ChipWhisperer® – NewAE Technology Inc.](https://newae.com/tools/chipwhisperer/)
- [X-Ray Tool](https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-Cant-hide.pdf)
- [JTAG Explained (finally!): Why "IoT" Makers, Software Security Folks, and Device Manufacturers Should Care - Senrio](http://blog.senr.io/blog/jtag-explained)
- [Reverse Engineering Firmware: Linksys WAG120N – /dev/ttyS0](http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/)
- [5-Min Tutorial: Lifting Firmware with the Bus Pirate – B-sides](http://konukoii.com/blog/2018/02/13/lifting-firmware-with-the-bus-pirate/)
- [postmarketOS Low-Level: Tiny Steps Towards Liberating Bootloaders and Cellular Modem Firmware of MediaTek Phones](https://postmarketos.org/blog/2018/04/14/lowlevel/)
- [ULN2003 - practical example of «reading» microchip schematic : ZeptoBars](http://zeptobars.com/en/read/ULN2003-per-element-die-annotation)
- [How to crack open some computer chips and take your own die shots - ExtremeTech](http://www.extremetech.com/extreme/141077-how-to-crack-open-some-computer-chips-and-take-your-own-die-shots)
- [Universal asynchronous receiver-transmitter - Wikipedia](https://en.wikipedia.org/wiki/Universal_asynchronous_receiver-transmitter)
- [fail0verflow :: ShofEL2, a Tegra X1 and Nintendo Switch exploit](https://fail0verflow.com/blog/2018/shofel2/)
- [fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia](https://fail0verflow.com/blog/2018/ps4-aeolia/)
- [fail0verflow :: PS4 Aux Hax 2: Syscon](https://fail0verflow.com/blog/2018/ps4-syscon/)
- [fail0verflow :: PS4 Aux Hax 3: Dualshock4](https://fail0verflow.com/blog/2018/ps4-ds4/)
- [Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP](https://cturt.github.io/ps4.html)
- [Making a GameCube memory card editor with Raspberry Pi | jamchamb.github.io](https://jamchamb.github.io/2018/12/03/gamecube-memory-card-raspi.html)
- [Embedded Hardware Hacking 101 – The Belkin WeMo Link « Threat Research Blog | FireEye Inc](https://www.fireeye.com/blog/threat-research/2016/08/embedded_hardwareha.html)
- [Reverse Engineering My Home Security System: Decompiling Firmware Updates](https://markclayton.github.io/reverse-engineering-my-home-security-system-decompiling-firmware-updates.html)
- [Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World](http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/)
- [Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/05/rooting-logitech-harmony-hub-improving-iot-security.html)
- [Heart of Darkness - exploring the uncharted backwaters of HID iCLASS RFID reader security](https://www.openpcd.org/dl/HID-iCLASS-security.pdf)
- [Bus Pirate - DP](http://dangerousprototypes.com/docs/Bus_Pirate)
- [Syonyk's Project Blog: Reverse Engineering the TEC-06 Serial Protocol](https://syonyk.blogspot.com/2018/01/reverse-engineering-tec-06-serial.html)
- [Hardware Hacking for Software People | Don't Stuff Beans Up Your Nose](https://dontstuffbeansupyournose.com/2011/08/25/hardware-hacking-for-software-people/)
- [Methodologies For Hacking Embedded Security Appliances](https://media.blackhat.com/us-13/US-13-Bathurst-Methodologies-for-Hacking-Embdded-Security-Appliances-Slides.pdf)
- [bunnie's burrow](http://www.xenatera.com/bunnie/)
- [bunnie's blog](https://www.bunniestudios.com/)
- [Latest hacking topics - 0x00sec](https://0x00sec.org/tags/hacking)
- [Zero Day Initiative — VMware Exploitation through Uninitialized Buffers](https://www.zerodayinitiative.com/blog/2018/3/1/vmware-exploitation-through-uninitialized-buffers)
- [In-Memory-Only ELF Execution (Without tmpfs) Mrs Quis Will Think of a Better Title](https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html)
- [High-Level Approaches for Finding Vulnerabilities - @Jackson_T](http://jackson.thuraisamy.me/finding-vulnerabilities.html)
- [How do I get started in vulnerability research? : ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/f6f5s/how_do_i_get_started_in_vulnerability_research/)
- [A bunch of Linux kernel exploitation resources](https://github.com/xairy/linux-kernel-exploitation)
- [Project Zero - Monorail](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=&sort=-id&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary)
- [Travel blog of an evil transgirl: Reversing ALPC: Where are your windows bugs and sandbox escapes?](https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html)
- [Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog](http://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/)
- [Vulnerability Discovery Against Apple Safari | Ret2 Systems Blog](http://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/)
- [Security Bulletins | Microsoft Docs](https://docs.microsoft.com/en-us/security-updates/securitybulletins/securitybulletins)
- [Lexfo's security blog](https://blog.lexfo.fr/)
- [Null Byte Poisoning ~ The Magic Byte - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/null-byte-poisoning-the-magic-byte/3874)
- [Latest Exploit Development topics - 0x00sec - The Home of the Hacker](https://0x00sec.org/c/exploit-development)
- [Google Project Zero](https://github.com/googleprojectzero)
- [Cheat sheet - How Stack Pivots are used in Modern Exploits : ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/84ovyb/cheat_sheet_how_stack_pivots_are_used_in_modern/)
- [The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities](https://www.amazon.com/gp/product/0321444426/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0321444426&linkId=9be67ae2cf0ce1b4c8773811adb2b60e)
- [Hacking: The Art of Exploitation, 2nd Edition](https://www.amazon.com/gp/product/1593271441/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1593271441&linkId=960bf12ded172d8c205fb7f21dd4f4a8)
- [Amazon.com: Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)](https://www.amazon.com/Windows-Internals-Part-architecture-management/dp/0735684189/ref=dp_ob_title_bk)
- [Amazon.com: Windows Internals, Part 2 (6th Edition) (Developer Reference)](https://www.amazon.com/gp/product/0735665877/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0735665877&linkId=338efca921c2947251f10a72e80fb993)
- [Books to Learn Computer Security](https://www.defcon.org/html/links/book-list.html)
- [RPISEC - Modern Binary Exploitation](https://github.com/RPISEC/MBE)
- [Modern Binary Exploitation - Spring 2015](http://security.cs.rpi.edu/courses/binexp-spring2015/)
- [RPISEC INTROSEC - Command Line](https://introsec.backdrifting.net/lectures/2017fall/02_intro_to_command_line.html#1)
- [RPISEC INTROSEC - Stegonography](https://introsec.backdrifting.net/lectures/2017fall/04_steganography.html#1)
- [CNIT 127: Exploit Development -- Sam Bowne](https://samsclass.info/127/127_F15.shtml)
- [Violent Python and Exploit Development](https://samsclass.info/127/127_WWC_2014.shtml)
- [Exploits1](http://opensecuritytraining.info/Exploits1.html)
- [SEED Project](http://www.cis.syr.edu/~wedu/seed/Labs_16.04/Software/)
- [Basic General Vulnerability Course](http://www.cis.syr.edu/~wedu/seed/all_labs.html)
- [NYU Tandon VR and Pen Test Course](https://github.com/isislab/Hack-Night)
- [LiveOverflow - Binary Hacking (exploit exercises)](https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN)
- [How To Hack: Episode 1 - Trampoline Stack Smash - YouTube](https://www.youtube.com/watch?v=5--oQtTj5KQ)
- [Exploit-Exercises: Protostar (v2) ~ VulnHub](https://www.vulnhub.com/entry/exploit-exercises-protostar-v2,32/)
- [Exploit Education :: Andrew Griffiths' Exploit Education](https://exploit.education/)
- [OverTheWire: Narnia - Basic Exploitation](http://overthewire.org/wargames/narnia/)
- [OverTheWire: Behemoth - Common Coding Mistakes](http://overthewire.org/wargames/behemoth/)
- [OverTheWire: Utumno - Intermediate Difficulty Wargame](http://overthewire.org/wargames/utumno/)
- [OverTheWire: Maze - Exploitation/Programming/RE Wargame](http://overthewire.org/wargames/maze/)
- [OverTheWire: Vortex](http://overthewire.org/wargames/vortex/)
- [OverTheWire: Semtex - Exploitation and RE](http://overthewire.org/wargames/semtex/)
- [pwnable.kr - various pwn challenges regarding system exploitation](http://pwnable.kr/#)
- [io.netgarage.org](https://io.netgarage.org/)
- [SmashTheStack Wargaming Network](http://smashthestack.org/wargames.html)
- [CSAW 365](https://365.csaw.io/)
- [pwntools Documentation](https://media.readthedocs.org/pdf/pwntools/stable/pwntools.pdf)
- [Installation — pwntools 3.12.0 documentation](http://docs.pwntools.com/en/stable/install.html)
- [Exploit Development with AFL, PEDA and PwnTools](http://thecyberrecce.net/2017/07/28/exploit-development-with-afl-peda-and-pwntools/)
- [GitHub - Gallopsled/pwntools: CTF framework and exploit development library](https://github.com/Gallopsled/pwntools)
- [Weaponization of Nessus Plugins](https://depthsecurity.com/blog/weaponization-of-nessus-plugins)
- [merrychap/shellen: Interactive shellcoding environment to easily craft shellcodes](https://github.com/merrychap/shellen)
- [0xdea/tactical-exploitation: Modern tactical exploitation toolkit.](https://github.com/0xdea/tactical-exploitation)
- [Payload Generation using SharpShooter – MDSec](https://www.mdsec.co.uk/2018/03/payload-generation-using-sharpshooter/)
- [mdsecactivebreach/SharpShooter: Payload Generation Framework](https://github.com/mdsecactivebreach/SharpShooter)
- [Art of Anti Detection 3 – Shellcode Alchemy – Pentest Blog](https://pentest.blog/art-of-anti-detection-3-shellcode-alchemy/)
- [CNIT 127: Exploit Development -- Sam Bowne](https://samsclass.info/127/127_S18.shtml)
- [Offensive Computer Security 2014 - Lecture 02](https://www.youtube.com/watch?v=lbjS2mXyMEQ)
- [Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course)
- [Intro Binary Hacking Course - LiveOverflow](http://liveoverflow.com/binary_hacking/index.html)
- [Open Security - Intro to Software Exploits for Linux](http://www.opensecuritytraining.info/Exploits1.html)
- [Open Security - Intro to Software Exploits for Linux](https://www.youtube.com/playlist?list=PL96AB65DFCE02EE3E)
- [Linux (x86) Exploit Development Series – sploitF-U-N](https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/)
- [ExploitDev: Part 1 - Intro to Exploit Development](http://www.fuzzysecurity.com/tutorials/expDev/1.html)
- [ExploitDev: Part 2 - Saved Return Pointer Overflowing](http://www.fuzzysecurity.com/tutorials/expDev/2.html)
- [ExploitDev: Part 3 - Structured Exception Handler (SEH)](http://www.fuzzysecurity.com/tutorials/expDev/3.html)
- [ExploitDev: Part 4 - Egg Hunters](http://www.fuzzysecurity.com/tutorials/expDev/4.html)
- [ExploitDev: Part 5 - Unicode](http://www.fuzzysecurity.com/tutorials/expDev/5.html)
- [ExploitDev: Part 6 - Win32 Shellcode](http://www.fuzzysecurity.com/tutorials/expDev/6.html)
- [ExploitDev: Part 7 - ROP](http://www.fuzzysecurity.com/tutorials/expDev/7.html)
- [ExploitDev: Part 8 - Heap Spraying](http://www.fuzzysecurity.com/tutorials/expDev/8.html)
- [ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/11.html)
- [ExploitDev: Part 10 - Kernal Exploitation - Stack Overflow](http://www.fuzzysecurity.com/tutorials/expDev/14.html)
- [ExploitDev: Part 11 - Kernel Exploitation - Write-What-Where](http://www.fuzzysecurity.com/tutorials/expDev/15.html)
- [ExploitDev: Part 12 - Kernel Exploitation - Null Pointer Dereference](http://www.fuzzysecurity.com/tutorials/expDev/16.html)
- [ExploitDev: Part 13 - Kernel Exploitation - Uninitialized Stack Variable](http://www.fuzzysecurity.com/tutorials/expDev/17.html)
- [ExploitDev: Part 14 - Kernel Exploitation - Integer Overflow](http://www.fuzzysecurity.com/tutorials/expDev/18.html)
- [ExploitDev: Part 15 - Kernel Exploitation - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/19.html)
- [ExploitDev: Part 16 - Kernel Exploitation - Pool Overflow](http://www.fuzzysecurity.com/tutorials/expDev/20.html)
- [ExploitDev: Part 17 - Kernel Exploitation - GDI Bitmap Abuse](http://www.fuzzysecurity.com/tutorials/expDev/21.html)
- [ExploitDev: Part 18 - Kernel Exploitation - RS2 Bitmap Necromancy](http://www.fuzzysecurity.com/tutorials/expDev/22.html)
- [ExploitDev: Part 19 - Kernel Exploitation - Logic bugs in Razer rzpnk.sys](http://www.fuzzysecurity.com/tutorials/expDev/23.html)
- [A curated list of Windows Exploitation resources](https://github.com/enddo/awesome-windows-exploitation)
- [Introduction to Windows Kernel Driver Exploitation (Pt. 1)](https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/)
- [Starting with Windows Kernel Exploitation – part 1 – setting up the lab | hasherezade's 1001 nights](https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/)
- [Open Security Videos - Intro to Windows Exploits](https://www.youtube.com/playlist?list=PL9F9E52502327B1CA)
- [Open Security - Intro to Windows Exploits](http://www.opensecuritytraining.info/Exploits2.html)
- [The Shellcoder's Handbook: Discovering and Exploiting Security Holes](https://www.amazon.com/dp/047008023X/ref=cm_sw_r_cp_ep_dp_PWTuzbRYFST64?pldnSite=1)
- [Shellcoding for Linux and Windows Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)
- [How to write a (Linux x86) egg hunter shellcode | Adventures in the programming jungle](https://adriancitu.com/2015/10/05/how-to-write-an-egg-hunter-shellcode/)
- [Shellcode Injection - Dhaval Kapil](https://dhavalkapil.com/blogs/Shellcode-Injection/)
- [Writing ARM Shellcode | Azeria Labs](https://azeria-labs.com/writing-arm-shellcode/)
- [Linux Shellcoding (Part 1.0) - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/linux-shellcoding-part-1-0/289)
- [Best books, tutorials and courses to learn about exploit development](http://www.pentest.guru/index.php/2016/01/28/best-books-tutorials-and-courses-to-learn-about-exploit-development/)
- [Ask HN: What's the prerequisite to become an exploit developer? | Hacker News](https://news.ycombinator.com/item?id=14481686)
- [A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development](https://github.com/FabioBaroni/awesome-exploit-development)
- [slimm609/checksec.sh: Checksec.sh](https://github.com/slimm609/checksec.sh)
- [Corelan Team - Exploit Writing Tutorials](https://www.corelan.be/index.php/articles/#cat_exploit-writing-tutorials)
- [[Backdoor 101] Backdooring PE File by Adding New Section Header - Hack.Learn.Share](https://capt-meelo.github.io/exploitdev/osceprep/2018/07/16/backdoor101-part1.html)
- [The Beginners Guide to Codecaves - CodeProject](https://www.codeproject.com/Articles/20240/The-Beginners-Guide-to-Codecaves)
- [GOT and PLT for pwning. · System Overlord](https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html)
- [Memory Corruption 101 - NYU Poly 2011](https://vimeo.com/31348274)
- [Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
- [Linux ExploitDev: Part 3 - Buffer Overflow](http://www.fuzzysecurity.com/tutorials/expDev/12.html)
- [0x7 Exploit Tutorial: Bad Character Analysis](http://www.primalsecurity.net/0x7-exploit-tutorial-bad-character-analysis/)
- [0x0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite](http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/)
- [0×3 Exploit Tutorial: Buffer Overflow – SEH Bypass](http://www.primalsecurity.net/0x3-exploit-tutorial-buffer-overflow-seh-bypass/)
- [Binary Exploitation ELI5– Part 1 –Stack/Buffer Overflow/Ret2Libc](https://hackernoon.com/binary-exploitation-eli5-part-1-9bc23855a3d8)
- [Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations](https://medium.com/@danielabloom/binary-exploitation-eli5-part-2-8fd71bf214b9)
- [ROPgadget](https://github.com/JonathanSalwan/ROPgadget)
- [ExploitDev: Part 7 - ROP](http://www.fuzzysecurity.com/tutorials/expDev/7.html)
- [ROP Emporium](https://ropemporium.com/)
- [ropchain | @kvakil](http://www.kvakil.me/posts/ropchain/)
- [SROP | Signals, you say? - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/srop-signals-you-say/2890)
- [Learn ROP through a short series of practical challenges : netsec](https://www.reddit.com/r/netsec/comments/6x1gk4/learn_rop_through_a_short_series_of_practical/)
- [ROPping to Victory](https://jmpesp.me/rop-emporium-ret2win-with-radare-and-pwntools/)
- [Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP](https://cturt.github.io/ps4.html)
- [0vercl0k/rp: rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested on several OS: Debian / Windows 8.1 / Mac OSX Lion (10.7.3). Moreover, it is x64 compatible and supports](https://github.com/0vercl0k/rp/)
- [Notes/ret2libc.txt at master · Malformation/Notes](https://github.com/Malformation/Notes/blob/master/ret2libc.txt)
- [libc - offset - 64-bit Linux stack smashing tutorial: Part 3](https://blog.techorganic.com/2016/03/18/64-bit-linux-stack-smashing-tutorial-part-3/)
- [ret2libc.pdf](https://www.shellblade.net/docs/ret2libc.pdf)
- [Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray](https://medium.com/@danielabloom/binary-exploitation-eli5-part-3-d1872eef71b3)
- [rop emporium - callme64](https://tuonilabs.wordpress.com/tag/rop-emporium/)
- [Dive into ROP - a quick introduction to Return Oriented Programming](https://www.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming)
- [Introduction to format string exploits](http://codearcana.com/posts/2013/05/02/introduction-to-format-string-exploits.html)
- [Linux ExploitDev: Part 2 - Format String Exploit](http://www.fuzzysecurity.com/tutorials/expDev/10.html)
- [Heap Exploitation · GitBook](https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details)
- [Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit](https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/)
- [sec18-heelan.pdf](https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-heelan.pdf)
- [GitHub - shellphish/how2heap: A repository for learning various heap exploitation techniques.](https://github.com/shellphish/how2heap)
- [GitHub - DhavalKapil/heap-exploitation: This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure. https://heap-exploitation.dhavalkapil.com/](https://github.com/DhavalKapil/heap-exploitation)
- [ExploitDev: Part 8 - Heap Spraying](http://www.fuzzysecurity.com/tutorials/expDev/8.html)
- [ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/11.html)
- [Linux ExploitDev: Part 4 - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/13.html)
- [Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray](https://medium.com/@danielabloom/binary-exploitation-eli5-part-3-d1872eef71b3)
- [Finding and Understanding Bugs in C Compilers](http://www.cs.utah.edu/~regehr/papers/pldi11-preprint.pdf)
- [Stateful Runtime Model Checking for Multithreaded Programs](http://llvm.org/devmtg/2010-11/Yang-HardenLLVM.pdf)
- [Fuzzing with Code Fragments](https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final73.pdf)
- [funfuzz/src/funfuzz/js/jsfunfuzz at master · MozillaSecurity/funfuzz · GitHub](https://github.com/MozillaSecurity/funfuzz/tree/master/src/funfuzz/js/jsfunfuzz)
- [Csmith](https://embed.cs.utah.edu/csmith/)
- [american fuzzy lop](http://lcamtuf.coredump.cx/afl/)
- [issre13.pdf](http://www.cs.utah.edu/~regehr/papers/issre13.pdf)
- [The Art of Fuzzing – Slides and Demos | SEC Consult](https://sec-consult.com/en/blog/2017/11/the-art-of-fuzzing-slides-and-demos/index.html)
- [Automating Web Apps Input fuzzing via Burp Macros - SecureLayer7](http://blog.securelayer7.net/automating-web-apps-input-fuzzing-via-burp-macros/)
- [Fuzzing: Brute Force Vulnerability Discovery](http://www.fuzzing.org/)
- [Fuzzing · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Fuzzing)
- [Generating Software Tests](https://www.fuzzingbook.org/)
- [american fuzzy lop](http://lcamtuf.coredump.cx/afl/)
- [Scaling AFL to a 256 thread machine | Gamozo Labs Blog](https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html)
- [1803.01307.pdf](https://arxiv.org/pdf/1803.01307.pdf)
- [secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.](https://github.com/secfigo/Awesome-Fuzzing)
- [Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878 – MDSec](https://www.mdsec.co.uk/2018/02/adobe-flash-exploitation-then-and-now-from-cve-2015-5119-to-cve-2018-4878/)
- [Hackers Hut](http://www.win.tue.nl/~aeb/linux/hh/hh.html)
- [HackerOne: Vulnerability Coordination and Bug Bounty Platform](https://www.hackerone.com/)
- [GitHub - nashcontrol/bounty-monitor: Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains participating in bug bounty programs.](https://github.com/nashcontrol/bounty-monitor)
- [How to Break Into Security, Miller Edition — Krebs on Security](https://krebsonsecurity.com/2012/08/how-to-break-into-security-miller-edition/)
- [[lcamtuf.coredump.cx]](http://lcamtuf.coredump.cx/)
- [Home — Rode0day](https://rode0day.mit.edu/)
- [Bug Bounty Toolkit – BugBountyHunting – Medium](https://medium.com/bugbountyhunting/bug-bounty-toolkit-aa36f4365f3f)
- [djadmin/awesome-bug-bounty: A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.](https://github.com/djadmin/awesome-bug-bounty)
- [Another list of bug bounty write-ups](https://github.com/ngalongc/bug-bounty-reference)
- [How I could have stolen your photos from Google - my first 3 bug bounty writeups](https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/)
- [GitHub - jiayy/android_vuln_poc-exp: This project contains pocs and exploits for android vulneribilities](https://github.com/jiayy/android_vuln_poc-exp)
- [Android Internals](http://technologeeks.com/course.jl?course=AIRE)
- [Android Internals: A Confectioner's Cookbook](http://newandroidbook.com/)
- [Android Internals](http://cecs.wright.edu/~pmateti/Courses/4440/Lectures/Internals/)
- [AnSec2.0](http://technologeeks.com/files/AnSec2.0.pdf)
- [Android Internals](http://technologeeks.com/course.jl?course=Android%20Internals)
- [Android-Excerpt](http://technologeeks.com/Courses/Android-Excerpt.pdf)
- [M1Con CTF Write up](https://blog.manchestergreyhats.co.uk/2018/03/28/m1con-ctf-writeup/)
- [YouTube](https://m.youtube.com/watch?v=m9UZnWLLurY&feature=youtu.be)
- [codemetrix.net - Hacking Android apps with FRIDA I](https://www.codemetrix.net/hacking-android-apps-with-frida-1/)
- [How to start Reverse Engineering on Android Application by Ankit Mishra - network, host, download | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-ankit-mishra)
- [How to start Reverse Engineering on Android Application - Part 2 by Ankit Mishra - download, virtual machine, location | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-part-2-ankit-mishra)
- [How to start Reverse Engineering on Android Application – Part 3 by Ankit Mishra - credentials, vulnerable, knowledge | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-part-3-ankit-mishra)
- [ashishb/android-security-awesome: A collection of android security related resources](https://github.com/ashishb/android-security-awesome)
- [Android Hacker's Handbook](https://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X/ref=dp_rm_img_2)
- [The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.](https://github.com/OWASP/owasp-mstg)
- [Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations](https://medium.com/@danielabloom/binary-exploitation-eli5-part-2-8fd71bf214b9)
- [aslur/offensivecon-talk.pdf at master · blackzert/aslur · GitHub](https://github.com/blackzert/aslur/blob/master/offensivecon-talk.pdf)
- [asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf](https://www.blackhat.com/docs/asia-18/asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf)
- [Exploit Mitigation Techniques - Stack Canaries - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/exploit-mitigation-techniques-stack-canaries/5085)
- [Exploitation Mitigation Techniques · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Exploitation-Mitigation-Techniques)
- [Bypassing ASLR – Part I – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-i/)
- [Bypassing ASLR – Part II – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-ii/)
- [Bypassing ASLR – Part III – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-iii/)
- [jaredthecoder/awesome-vehicle-security: 🚗 A curated list of resources for learning about vehicle security and car hacking.](https://github.com/jaredthecoder/awesome-vehicle-security)
- [The Practical Guide to Hacking Bluetooth Low Energy](https://blog.attify.com/the-practical-guide-to-hacking-bluetooth-low-energy/)
- [Draft NIST SP 800-121 Rev. 2, Guide to Bluetooth Security](https://csrc.nist.gov/csrc/media/publications/sp/800-121/rev-2/draft/documents/sp800_121_r2_draft.pdf)
- [flAWS](http://flaws.cloud/)
- [AWS in Plain English](https://www.expeditedssl.com/aws-in-plain-english)
- [GitHub - toniblyx/my-arsenal-of-aws-security-tools: List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.](https://github.com/toniblyx/my-arsenal-of-aws-security-tools)
- [Writing a simple x86 emulator with IDAPython | Shortjump!](http://0xeb.net/2018/02/writing-a-simple-x86-emulator-with-idapython/)
- [How to write an emulator (CHIP-8 interpreter) | Multigesture.net](http://www.multigesture.net/articles/how-to-write-an-emulator-chip-8-interpreter/)
- [Smashing the ARM Stack: ARM Exploitation Part 1 — Mercked Security](https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1)
- [pwnable.tw - wargame site for hackers to test and expand their binary exploiting skills.](https://pwnable.tw/)
- [Exploits Database by Offensive Security](https://www.exploit-db.com/)
- [CVE - Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/index.html)
- [Recreating exploits - Disk Pulse Enterprise 9.9.16 - Remote Buffer Overflow (SEH) - Zero Aptitude](https://zeroaptitude.com/zerodetail/recreating-exploits-disk-pulse-enterprise-9-9-16-remote-buffer-overflow-seh/)
- [rowhammer + side channel via OS-supported memory deduplication to get arbitrary read+write using javascript in a browser](https://www.cs.vu.nl/~herbertb/download/papers/dedup-est-machina_sp16.pdf)
- [UMD - Intro to Ethical Hacking](https://github.com/UMD-CS-STICs/389Rfall18)
- [Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net](https://en.gburu.net/free-ethical-hacking-course-practice-5-system-hacking-with-examples/)
- [Module 6 - Hacking Webservers - Free Ethical Hacking Course - en.gburu.net](https://en.gburu.net/free-ethical-hacking-course-module-6-hacking-webservers/)
- [PowerShell for Penetration Testing: Nishang](https://n0where.net/powershell-penetration-testing-framework-nishang)
- [Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition](https://www.amazon.com/Gray-Hat-Hacking-Ethical-Handbook/dp/1260108414/ref=dp_ob_title_bk)
- [Kali Training Course](https://kali.training/introduction/abstract/)
- [Armitage - Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/armitage/)
- [Armitage | Penetration Testing Tools](https://tools.kali.org/exploitation-tools/armitage)
- [Step by step Metasploit walkthrough](https://zero-day.io/metasploitwalkthrough/)
- [How to create metasploitable 3](https://zero-day.io/metasploitable3/)
- [GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.](https://github.com/rapid7/metasploitable3)
- [How to setup Metasploitable 3 on Windows 10 - Hacking Tutorials](https://www.hackingtutorials.org/metasploit-tutorials/setup-metasploitable-3-windows-10/)
- [Metasploitable 2 Exploitability Guide](https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide)
- [Home · rapid7/metasploitable3 Wiki · GitHub](https://github.com/rapid7/metasploitable3/wiki)
- [Introduction-to-Metasploit.pdf](https://a.ndronic.us/guides/metasploit/Introduction-to-Metasploit.pdf)
- [Metasploit Unleashed - Free Online Ethical Hacking Course](https://www.offensive-security.com/metasploit-unleashed/)
- [Hack the Box Challenge: Tally Walkthrough](http://www.hackingarticles.in/hack-the-box-challenge-tally-walkthrough/)
- [Hack The Box :: Penetration Testing Labs](https://www.hackthebox.eu/)
- [IppSec - YouTube](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA/videos)
- [Virtual Hacking Labs | IT Security Training Labs & Courses](https://www.virtualhackinglabs.com/)
- [[PentesterLab] Learn Web Penetration Testing: The Right Way](https://pentesterlab.com/)
- [Vulnerable By Design ~ VulnHub](https://www.vulnhub.com/)
- [GitHub - cliffe/SecGen: Create randomly insecure VMs](https://github.com/cliffe/SecGen)
- [Vulnerable Web Apps - Home](http://www.vulnerablewebapps.org/)
- [Hacker101 CTF](https://ctf.hacker101.com/)
- [Red Teaming and Pentesting Tips | synack.blog](http://synack.blog/posts/red-teaming-and-pentesting-tips/index.html)
- [Pen Testing Standard (READ FOR STUDYING)](http://www.pentest-standard.org/index.php/Main_Page)
- [Penetration Testing Methodology - 0DAYsecurity.com](http://www.0daysecurity.com/penetration-testing/penetration.html)
- [Cyber Kill Chain® | Lockheed Martin](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html)
- [Shared thoughts after 6+ years in Pentesting - Inspiration - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492)
- [Where to start - 1st Line to Pen Testing : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/8bq83p/where_to_start_1st_line_to_pen_testing/)
- [Learning The Ropes 101 Posts](https://blog.zsec.uk/tag/ltr101/)
- [So You Want To Be a Pentester? - Jack Hacks](https://jhalon.github.io/becoming-a-pentester/)
- [Introduction to Pen Testing](https://xapax.gitbooks.io/security/)
- [wtsxDev/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things](https://github.com/wtsxDev/Penetration-Testing#windows-utils)
- [OSCP Goldmine](http://0xc0ffee.io/blog/OSCP-Goldmine)
- [Prep guide for Offsec’s PWK – Tulpa Security](https://tulpa-security.com/2016/09/19/prep-guide-for-offsecs-pwk/)
- [tulpa-pwk-prep-guide1.pdf](https://tulpasecurity.files.wordpress.com/2016/09/tulpa-pwk-prep-guide1.pdf)
- [offsec_pdfs: your offsec knowledge](https://github.com/jivoi/offsec_pdfs)
- [abatchy's blog | How to prepare for PWK/OSCP, a noob-friendly guide](https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob)
- [Offensive Security Training and Professional Services](https://www.offensive-security.com/)
- [Offensive Security Certified Professional (OSCP) Study Guide Links & Material | Computer Security.org - CyberSecurity News, Information, Education, Certifications, Vulnerabilities and Guides](http://www.computersecurity.org/computer-cyber-security-certifications-education-college-courses/offensive-security-certified-professional-oscp-study-guide-links-material/)
- [Offensive Security – Godlike Security](http://godlikesecurity.com/index.php/tag/offensive-security/)
- [Free Advanced Penetration Testing Training Class from Cybrary](https://www.cybrary.it/course/advanced-penetration-testing/)
- [Next Step After OSCP/OSCE? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/89eksz/next_step_after_oscposce/)
- [PWK Syllabus Scheduling Question For OSCP Holders : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/89ift6/pwk_syllabus_scheduling_question_for_oscp_holders/)
- [Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97)
- [Advice on Windows pentesting methodology (OSCP) : HowToHack](https://www.reddit.com/r/HowToHack/comments/8cuiol/advice_on_windows_pentesting_methodology_oscp/)
- [A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate](http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/)
- [xMilkPowderx/OSCP: OSCP cheet sheet](https://github.com/xMilkPowderx/OSCP)
- [x89k - OSCP survival guide](https://lduck11007.github.io/infosec/2018/11/03/oscpsurvivalguide.html)
- [Cheatsheet-God: Penetration Testing](https://github.com/OlivierLaflamme/Cheatsheet-God)
- [Exploit Writing Tutorials | Corelan Team - Part 2](https://www.corelan.be/index.php/category/security/exploit-writing-tutorials/page/2/)
- [Corelan Exploit Development Training](https://www.corelan-training.com/)
- [0x5 Course Review: Cracking The Perimeter (OSCE)](http://www.primalsecurity.net/course-review-osce/)
- [Cracking the Perimeter (CTP) + Offensive Security Certified Expert (OSCE)](https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/)
- [Course Review: Offensive Security AWE (Advanced Windows Exploitation) - EH-Net Online Mag](https://www.ethicalhacker.net/features/root/course-review-offensive-security-awe-advanced-windows-exploitation)
- [abatchy's blog: OSCE Study Plan](http://www.abatchy.com/2017/03/osce-study-plan.html?m=1)
- [My OSCE Review - The Coffeegist](https://coffeegist.com/security/my-osce-review/)
- [abatchy's blog | Posts Tagged “OSCE Prep”](http://www.abatchy.com/tag/OSCE%20Prep/)
- [OSCP Review](http://netsec.ws/?p=398)
- [31 days of OSCP Experience - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/)
- [The OSCP: A Process Focused Review – Occult Sec](https://occultsec.com/2018/04/27/the-oscp-a-process-focused-review/)
- [www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html](http://www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html)
- [Zero to OSCP in 292 Days... or How I Accidentally the Whole Thing - Part 2](https://blog.mallardlabs.com/zero-to-oscp-in-292-days-or-how-i-accidentally-the-whole-thing-part-2/)
- [Check out my review of the OSCP!! Comes with recommendations on how you too can pass the OSCP! I Tried Harder!! Hope this helps! : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/6m76h1/check_out_my_review_of_the_oscp_comes_with/)
- [Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog](https://www.jimwilbur.com/2017/07/oscp-review/)
- [Penetration Testing Tools Cheat Sheet](https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/)
- [Nmap Cheat Sheet](https://highon.coffee/blog/nmap-cheat-sheet/)
- [HighOn.Coffee • Security Research • Penetration Testing Blog](https://highon.coffee/)
- [Linux Commands Cheat Sheet](https://highon.coffee/blog/linux-commands-cheat-sheet/)
- [Compilation of commands, tips and scripts](https://github.com/adon90/pentest_compilation)
- [GoldenEye - New Vulnerable OSCP Style Machine - netsecstudents](https://www.reddit.com/r/netsecstudents/comments/8gdsaw/goldeneye_new_vulnerable_oscp_style_machine/?utm_source=reddit-android)
- [Wintermute OSCP Style Pivot Lab](https://www.reddit.com/r/netsecstudents/comments/8w4dm8/wintermute_new_vulnerable_oscp_style_lab/)
- [hackfest2016: Quaoar ~ VulnHub](https://www.vulnhub.com/entry/hackfest2016-quaoar%2C180/)
- [hackfest2016: Sedna ~ VulnHub](https://www.vulnhub.com/entry/hackfest2016-sedna%2C181/)
- [SecOS: 1 ~ VulnHub](https://www.vulnhub.com/entry/secos-1%2C88/)
- [SecTalks: BNE0x03 - Simple ~ VulnHub](https://www.vulnhub.com/entry/sectalks-bne0x03-simple%2C141/)
- [TopHatSec: Freshly ~ VulnHub](https://www.vulnhub.com/entry/tophatsec-freshly%2C118/)
- [TopHatSec: ZorZ ~ VulnHub](https://www.vulnhub.com/entry/tophatsec-zorz%2C117/)
- [abatchy's blog | OSCP-like Vulnhub VMs](https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms.html)
- [CTF Series : Vulnerable Machines](https://bitvijays.github.io/LFC-VulnerableMachines.html)
- [OSCP like boxes](https://pbs.twimg.com/media/DxeuRS6WoAAnnVm.jpg)
- [Nmap Cheat Sheet](https://www.stationx.net/nmap-cheat-sheet/)
- [Nmap Tutorial: from the Basics to Advanced Tips](https://hackertarget.com/nmap-tutorial/)
- [Nmap: the Network Mapper - Free Security Scanner](https://nmap.org/)
- [NMAP CHEAT-SHEET](https://www.peerlyst.com/posts/nmap-cheat-sheet-sanyam-chawla?trk=search_page_search_result)
- [FindSubDomains.com — subdomains search service](https://findsubdomains.com/)
- [Sublist3r: Fast subdomains enumeration tool](https://github.com/aboul3la/Sublist3r)
- [Another Subdomain List](https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS)
- [Subdomain Wordlist for Knock](https://gist.githubusercontent.com/cheetz/4d6a26bb122a942592ab9ac21894e57b/raw/f58e82c9abfa46a932eb92edbe6b18214141439b/all.txt)
- [SubBrute: A DNS meta-query spider that enumerates DNS records, and subdomains.](https://github.com/TheRook/subbrute)
- [Knock - Subdomain Scanning](https://github.com/guelfoweb/knock)
- [A penetration tester’s guide to sub-domain enumeration](https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6)
- [MassDNS: A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)](https://github.com/blechschmidt/massdns)
- [Domain Name Search | Domain Lookup](https://instantdomainsearch.com/)
- [Gobuster: Directory/file & DNS busting tool written in Go](https://github.com/OJ/gobuster)
- [SANS - Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/paper/956)
- [DNSdumpster.com - dns recon and research, find and lookup dns records](https://dnsdumpster.com/)
- [dnsrecon: DNS Enumeration Script](https://github.com/darkoperator/dnsrecon/)
- [Information-Gathering Resources](https://github.com/nixawk/pentest-wiki/tree/master/1.Information-Gathering)
- [Discover - Combination of Recon Tools](https://github.com/leebaird/discover)
- [Th3Inspector 🕵️ best tool for Information Gathering 🔎](https://github.com/Moham3dRiahi/Th3inspector)
- [sullo/nikto: Nikto web server scanner](https://github.com/sullo/nikto)
- [Google Dorks for finding Emails, Admin users etc.](https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/)
- [Recon-ng — Bitbucket](https://bitbucket.org/LaNMaSteR53/recon-ng)
- [EnumerationVisualized Wiki](https://github.com/DigitalAftermath/EnumerationVisualized/wiki)
- [SPARTA - scanning and enumeration phase tool](http://sparta.secforce.com/)
- [Reconnoitre: A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.](https://github.com/codingo/Reconnoitre)
- [Search - Public Database Directory - Public DB Host](https://databases.today/search.php)
- [Penetration Testing Methodology - 0DAYsecurity.com](http://www.0daysecurity.com/penetration-testing/enumeration.html)
- [Vulnerability-Assessment Resources](https://github.com/nixawk/pentest-wiki/tree/master/2.Vulnerability-Assessment)
- [A curated list of CVE PoCs.](https://github.com/qazbnm456/awesome-cve-poc)
- [OpenVAS - OpenVAS - Open Vulnerability Assessment System](http://www.openvas.org/)
- [Nessus Professional™ Vulnerability Scanner](https://www.tenable.com/products/nessus/nessus-professional)
- [Exploitation Tools and Resources](https://github.com/nixawk/pentest-wiki/tree/master/3.Exploitation-Tools)
- [Empire Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf)
- [LocalFileIncludes Cheat Sheet](https://highon.coffee/blog/lfi-cheat-sheet/)
- [Local File Inclusion (LFI) [Definitive Guide] - Aptive](https://www.aptive.co.uk/blog/local-file-inclusion-lfi-testing/)
- [PowerSploit Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/PowerSploit.pdf)
- [PowerView-2.0 tips and tricks](https://gist.github.com/HarmJ0y/3328d954607d71362e3c)
- [PowerView-3.0 tips and tricks](https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993)
- [PHP htaccess injection cheat sheet](https://github.com/sektioneins/pcc/wiki/PHP-htaccess-injection-cheat-sheet)
- [Reverse Shell Cheat Sheet](https://highon.coffee/blog/reverse-shell-cheat-sheet/)
- [SQL Injection Cheat Sheet](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)
- [SQLite3 Injection Cheat Sheet](http://atta.cked.me/home/sqlite3injectioncheatsheet)
- [A collection of web attack payloads.](https://github.com/foospidy/payloads)
- [Useful payloads and bypass for Web App](https://github.com/swisskyrepo/PayloadsAllTheThings)
- [unicorn: PowerShell downgrade attack and inject shellcode straight into memory](https://github.com/trustedsec/unicorn)
- [Post-Exploitation Resources (Windows)](https://github.com/nixawk/pentest-wiki/tree/master/4.Post-Exploitation)
- [rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks](https://github.com/rebootuser/LinEnum)
- [Post-Exploitation - NYU Poly 2011](https://vimeo.com/33344191)
- [Transferring files from Kali to Windows (post exploitation)](https://blog.ropnop.com/transferring-files-from-kali-to-windows/)
- [PowerSploit - A PowerShell Post-Exploitation Framework](https://github.com/PowerShellMafia/PowerSploit)
- [Empire: A PowerShell and Python post-exploitation agent.](https://github.com/EmpireProject/Empire)
- [Persistence Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-persistence)
- [Lateral Movement Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-lateral-movement)
- [enum4Linux: is a Linux alternative to enum.exe](https://github.com/portcullislabs/enum4linux)
- [enum4linux Cheat Sheet](https://highon.coffee/blog/enum4linux-cheat-sheet/)
- [PwnWiki.io - TTPs (tools, tactics, and procedures) for what to do after access has been gained](http://pwnwiki.io/#!index.md)
- [Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)
- [Linux_Exploit_Suggester: Linux Exploit Suggester; based on operating system release number](https://github.com/InteliSecureLabs/Linux_Exploit_Suggester)
- [Linux-exploit-suggester-2: Next-Generation Linux Kernel Exploit Suggester](https://github.com/jondonas/linux-exploit-suggester-2)
- [Checksec.sh - Check Securities on a file](https://github.com/slimm609/checksec.sh)
- [Linux Privilege Escalation via Automated Script](http://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/)
- [A guide to Linux Privilege Escalation - payatu](https://payatu.com/guide-linux-privilege-escalation/)
- [Abusing SUDO (Linux Privilege Escalation)](http://touhidshaikh.com/blog/?p=790)
- [Editing /etc/passwd File for Privilege Escalation](http://www.hackingarticles.in/editing-etc-passwd-file-for-privilege-escalation/)
- [Linuxprivchecker Script](https://github.com/sleventyeleven/linuxprivchecker/blob/master/linuxprivchecker.py)
- [Linux Privilege Escalation Using PATH Variable](http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/)
- [Linux Privilege Escalation using Misconfigured NFS](http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/)
- [Linux Privilege Escalation via Dynamically Linked Shared Object Library | Context Information Security EN](https://www.contextis.com/en/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library)
- [Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser](https://www.rebootuser.com/?p=1623)
- [Privilege-Escalation Scripts](https://github.com/AusJock/Privilege-Escalation/tree/master/Linux)
- [Privilege Escalation on Linux with Live examples](https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/)
- [4 Ways to get Linux Privilege Escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/)
- [Linux Privilege Escalation by Exploiting Cronjobs](http://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/)
- [Privilege Escalation - Linux · pentestbook](https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_-_linux.html)
- [Linux elevation of privileges](https://guif.re/linuxeop)
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc)
- [PowerUp Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/PowerUp.pdf)
- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester)
- [Sherlock: PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.](https://github.com/rasta-mouse/Sherlock)
- [WindowsExploits](https://github.com/abatchy17/WindowsExploits)
- [Windows-kernel-exploits](https://github.com/SecWiki/windows-kernel-exploits)
- [Metasploit Framework](https://github.com/rapid7/metasploit-framework)
- [Well, That Escalated Quickly… – To Shell And Back: Adventures In Pentesting](https://www.toshellandback.com/2015/11/24/ms-priv-esc/)
- [OSCP - Windows Priviledge Escalation](http://hackingandsecurity.blogspot.com/2017/09/oscp-windows-priviledge-escalation.html)
- [Privilege-Escalation Scripts](https://github.com/AusJock/Privilege-Escalation/tree/master/Windows)
- [Checklists-Windows-Privilege-Escalation](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md)
- [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html)
- [Windows Privilege Escalation Guide](https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/)
- [Windows Privilege Escalation Methods for Pentesters – Pentest Blog](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/)
- [A Virgil's Guide to Pentest: Escalation Time](http://virgil-cj.blogspot.com/2018/02/escalation-time.html)
- [BeRoot For Windows – Privilege Escalation Project – Haxf4rall](https://haxf4rall.com/2018/07/06/beroot-for-windows-privilege-escalation-project/)
- [Elevating privileges by exploiting weak folder permissions | GreyHatHacker.NET](http://www.greyhathacker.net/?p=738)
- [Windows Priv Esc Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-privilege-escalation)
- [icerbreaker - Priv Escalation - Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment](https://github.com/DanMcInerney/icebreaker)
- [Windows elevation of privileges](https://guif.re/windowseop)
- [OneTab shared tabs](https://www.one-tab.com/page/9tuXDg5gT8KBMsI-4fXLkQ)
- [Windows / Linux Local Privilege Escalation Workshop](https://github.com/sagishahar/lpeworkshop)
- [rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks](https://github.com/rebootuser/LinEnum)
- [sqlmap-cheatsheet](https://github.com/coreb1t/awesome-pentest-cheat-sheets/blob/master/docs/sqlmap-cheatsheet-1.0-SDB.pdf)
- [SQLMap Tamper Scripts (SQL Injection and WAF bypass)](https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423)
- [Reporting - The Penetration Testing Execution Standard](http://www.pentest-standard.org/index.php/Reporting)
- [sample-penetration-testing-report.pdf](https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf)
- [Curated list of public penetration test reports](https://github.com/juliocesarfort/public-pentesting-reports)
- [Cure53 – Fine penetration tests for fine websites](https://cure53.de/#publications)
- [Introducing BloodHound](https://wald0.com/?p=68)
- [My First Go with BloodHound | Strategic Cyber LLC](https://blog.cobaltstrike.com/2016/12/14/my-first-go-with-bloodhound/)
- [BloodHoundAD - reveal the hidden and often unintended relationships within an Active Directory environment](https://github.com/BloodHoundAD/BloodHound/wiki)
- [Active Directory Pentesting Archives - ScriptDotSh](https://scriptdotsh.com/index.php/category/active-directory-pentesting/)
- [Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…](https://adsecurity.org/)
- [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa)
- [harmj0y – security at the misfortune of others](https://blog.harmj0y.net/)
- [ATT&CK™ Navigator](https://mitre.github.io/attack-navigator/enterprise/#)
- [Most Important Penetration Testing Cheat Sheet Linux Machine](https://techincidents.com/important-penetration-testing-cheat-sheet/)
- [SANS Penetration Testing Cheat Sheet: PowerShell](https://pen-testing.sans.org/blog/2016/05/25/sans-powershell-cheat-sheet/)
- [Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual](https://github.com/droberson/rtfm)
- [Techniques: Enterprise - MITRE ATT&CK](https://attack.mitre.org/techniques/enterprise/)
- [Hacking with Netcat part 1: The Basics - Hacking Tutorials](https://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/)
- [Wireshark](https://www.wireshark.org/)
- [Wireshark_Display_Filters](https://github.com/coreb1t/awesome-pentest-cheat-sheets/blob/master/docs/Wireshark_Display_Filters.pdf)
- [Aircrack-ng - Wireless Pen Testing](http://www.aircrack-ng.org/)
- [Kismet Wireless Detector](https://kismetwireless.net/download.shtml)
- [WiFiJammer - Continuously jam all wifi clients/routers](https://n0where.net/wifijammer)
- [20 Popular Wireless Hacking Tools [updated for 2017]](http://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/#gref)
- [Bettercap 2.0 - MITM Tool](https://www.evilsocket.net/2018/02/27/All-hail-bettercap-2-0-one-tool-to-rule-them-all/)
- [My experience with OSWP/WiFu v3.2 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/30/my-experience-with-oswp-wifu-v3-2/)
- [Network Security · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Network-Security)
- [Scapy: packet manipulation program & library](https://github.com/secdev/scapy)
- [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/06_packet_sniffing.html#1)
- [Online IP CIDR / VLSM Supernet Calculator](http://www.subnet-calculator.com/cidr.php)
- [TCPDUMP/LIBPCAP public repository](http://www.tcpdump.org/)
- [GitHub - defuse/sockstress: Sockstress (TCP DoS) implementation.](https://github.com/defuse/sockstress)
- [OSI model - Wikipedia](https://en.wikipedia.org/wiki/OSI_model)
- [Recent 1.4 billion password breach compilation as wordlist : netsec](https://www.reddit.com/r/netsec/comments/7kqpx9/recent_14_billion_password_breach_compilation_as/)
- [philipperemy/tensorflow-1.4-billion-password-analysis: Deep Learning model to analyze a large corpus of clear text passwords.](https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis)
- [JohnTheRipper](https://github.com/magnumripper/JohnTheRipper)
- [hashcat - advanced password recovery](https://hashcat.net/hashcat/)
- [THC Hydra - brute force crack a remote authentication service](https://sectools.org/tool/hydra/)
- [Credential Access Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-credential-access)
- [Patator: is a multi-purpose brute-forcer](https://github.com/lanjelot/patator)
- [Ophcrack - Windows Password Cracker](http://ophcrack.sourceforge.net/)
- [Nozzlr: Multithreaded Brute Forcer](https://github.com/intrd/nozzlr)
- [Decrypt Google Chrome / Chromium passwords and credit cards on macOS / OS X.](https://github.com/manwhoami/OSXChromeDecrypt)
- [Chrome Password Decryptor : Free Tool to Recover Lost or Forgotten Website Password from Google Chrome Browser](http://securityxploded.com/chromepassworddecryptor.php)
- [How to Grab All the Passwords « Null Byte :: WonderHowTo](https://null-byte.wonderhowto.com/how-to/grab-all-passwords-0163301/)
- [A curated list of Threat Intelligence resources](https://github.com/hslatman/awesome-threat-intelligence)
- [List of Threat Intelligence Stuff](https://github.com/sbilly/awesome-security#threat-intelligence)
- [GitHub - x0rz/tweets_analyzer: Tweets metadata scraper & activity analyzer](https://github.com/x0rz/tweets_analyzer)
- [AsINT_Collection - start.me](https://start.me/p/b5Aow7/asint_collection)
- [Spiderfoot, an Open Source Intelligence Automation Tool](http://securitytrails.com/blog/spiderfoot-osint-automation-tool)
- [ꓘamerka — Build interactive map of cameras from Shodan](https://medium.com/@woj_ciech/%EA%93%98amerka-build-interactive-map-of-cameras-from-shodan-a0267849ec0a)
- [Open Source Intelligence Gathering 101 – Appsecco](https://blog.appsecco.com/open-source-intelligence-gathering-101-d2861d4429e3)
- [crt.sh | Certificate Search](https://crt.sh/)
- [Shodan](https://www.shodan.io/)
- [Domain Dossier - Investigate domains and IP addresses, get owner and registrar information, see whois and DNS records](https://centralops.net/co/domaindossier.aspx)
- [Censys (Discover new threats)](https://censys.io/)
- [Open Source Intelligence Gathering 201 (Covering 12 additional techniques)](https://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544)
- [Creepy: A geolocation OSINT tool](https://github.com/ilektrojohn/creepy)
- [XRay - mapping and OSINT gathering from public networks.](https://github.com/evilsocket/xray)
- [Geotweet_GUI: Social engineering tool](https://github.com/Pinperepette/Geotweet_GUI)
- [DataSploit: An OSINT Framework to perform various recon techniques](https://github.com/DataSploit/datasploit)
- [SpiderFoot](https://www.spiderfoot.net/)
- [Google Hacking Database, GHDB, Google Dorks](https://www.exploit-db.com/google-hacking-database/)
- [theHarvester: E-mails, subdomains and names Harvester](https://github.com/laramies/theHarvester)
- [OSINT Search Tool by IntelTechniques | Open Source Intelligence](https://inteltechniques.com/menu.html)
- [2019 OSINT Guide](https://www.randhome.io/blog/2019/01/05/2019-osint-guide/)
- [The Browser Hacker's Handbook](https://www.amazon.com/Browser-Hackers-Handbook-Wade-Alcorn/dp/1118662091/ref=dp_rm_img_4)
- [The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws](https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/ref=dp_rm_img_1)
- [Burp Intro](https://github.com/bugcrowd/bugcrowd_university/blob/master/An_introduction_to_Burp_Suite/Bugcrowd%20University%20-%20Burp%20Suite%20Introduction.pdf)
- [0x2 Exploit Tutorial: Web Hacking with Burp Suite](http://www.primalsecurity.net/0x2-exploit-tutorial-web-hacking-with-burp-suite/)
- [webGun - XSS Payload Build Tool](https://brutelogic.com.br/webgun/)
- [Unleashing an Ultimate XSS Polyglot · 0xSobky/HackVault Wiki](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot)
- [XSS Polyglot Challenge](http://polyglot.innerht.ml/)
- [Browser's XSS Filter Bypass Cheat Sheet · masatokinugawa/filterbypass Wiki](https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet)
- [0×1 Exploit Tutorial: XSS](http://www.primalsecurity.net/0x1-exploit-tutorial-xss/)
- [XSS Payloads](http://www.xss-payloads.com/)
- [$10k host header - Test](https://sites.google.com/site/testsitehacking/10k-host-header)
- [Web Security · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Web-Security)
- [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/03_web_exploitation.html#1)
- [Web Security - Webgoat](https://github.com/WebGoat/WebGoat)
- [zseano | UK Security Researcher](https://zseano.com/)
- [High Performance Web Brute-Forcing 🕸🐏 – hiburn8](http://hiburn8.org/index.php/2018/09/13/high-performance-web-brute-forcing/)
- [The Bug Hunter’s Methodology 2.0 – Jason Haddix](https://jasonhaddix.com/the-bug-hunters-methodology-2-0/)
- [The Bug Hunters Methodology](https://github.com/jhaddix/tbhm)
- [Web Hacking Tools List](https://github.com/carpedm20/awesome-hacking#web)
- [A list of web application security resources](https://github.com/infoslack/awesome-web-hacking)
- [A curated list of Web Security materials and resources.](https://github.com/qazbnm456/awesome-web-security)
- [A Methodical Approach to Browser Exploitation | Ret2 Systems Blog](http://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/)
- [ZAP - Zed Attack Proxy Project](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project)
- [Samurai 3.0 Branch - Web Pen Testing VM](https://sourceforge.net/projects/samurai/files/SamuraiWTF%203.0%20Branch/)
- [Samurai - Course -Web Pen-testing VM](https://sourceforge.net/projects/samurai/files/SamuraiWTF%20Course/)
- [OWASP Juice Shop Project - Web Pen Testing Challenge](https://www.owasp.org/index.php/OWASP_Juice_Shop_Project)
- [Vulnerable Web Applications Directory](https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps)
- [DigitalOcean](https://cloud.digitalocean.com/registrations/new)
- [AWS Management Console](https://us-east-2.console.aws.amazon.com/console/home?region=us-east-2)
- [Coalfire-Research/Red-Baron: Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.](https://github.com/Coalfire-Research/Red-Baron)
- [Red-Team-Infrastructure-Wiki/README.md at master · bluscreenofjeff/Red-Team-Infrastructure-Wiki](https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki/blob/master/README.md)
- [C2 Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-command-and-control)
- [Red Team Laptop & Infrastructure (pt 1: Architecture) – Hacking & Coffee](https://hackingand.coffee/2018/02/assessment-laptop-architecture/)
- [Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike - CyberArk](https://www.cyberark.com/threat-research-blog/red-team-insights-https-domain-fronting-google-hosts-using-cobalt-strike/)
- [List of Red Teaming Resources](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming)
- [Initial Access (Phishing/Social Engineering/etc)](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-initial-access)
- [Defense Evasion Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-defense-evasion)
- [A curated list of social engineering resources](https://github.com/v2-dev/awesome-social-engineering)
- [Geotweet_GUI: Social engineering tool](https://github.com/Pinperepette/Geotweet_GUI)
- [Social Engineering Books](https://github.com/enaqx/awesome-pentest#social-engineering-books)
- [A curated list of guides, tools, and other resources related to the security and compromise of locks, safes, and keys.](https://github.com/meitar/awesome-lockpicking)
- [Lock Picking Books](https://github.com/enaqx/awesome-pentest#lock-picking-books)
- [Super Bump Key Set](http://www.sparrowslockpicks.com/product_p/bkfull.htm)
- [Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.](http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html)
- [writeups/icectf-2016 at master · WCSC/writeups · GitHub](https://github.com/WCSC/writeups/tree/master/icectf-2016)
- [CTFtime.org / IceCTF 2016 tasks and writeups](https://ctftime.org/event/319/tasks/)
- [Hackover CTF 2015 – easy-shell - Writeup - f00ls bl0g](https://f00l.de/blog/hackover-ctf-2015-easy-shell/)
- [Google CTF 2017 Quals Write-up Winners - Google Drive](https://drive.google.com/drive/folders/0BwMPuUHZOj0nZ2dGZS1KbWNGN0E)
- [Notes - gynvael.coldwind//vx](http://gynvael.coldwind.pl/n/python_sandbox_escape)
- [Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!](http://0xeb.net/?p=34)
- [Zero Day Initiative — Testing for Truthiness: Exploiting Improper Checks](https://www.zerodayinitiative.com/blog/2018/3/9/testing-for-truthiness-exploiting-improper-checks)
- [How To Hack - Episode 2: Use-After-Free Triple Bounce - YouTube](https://www.youtube.com/watch?v=6LbMmRyrQpA&feature=youtu.be)
- [PlaidCTF Write-up: Shop](https://nickcano.com/plaidctf-shop/)
- [Building up from the Ethereum Bytecode | Ret2 Systems Blog](https://blog.ret2.io/2018/05/16/practical-eth-decompilation/)
- [DEF CON® 26 Hacking Conference News](https://www.defcon.org/html/defcon-26/dc-26-news.html#dc26ctfwriteups)
- [RPISEC Blog](https://blog.rpis.ec/)
- [CTFs](https://github.com/ctfs)
- [CSAW CTF 2015 - Alexander Taylor – OSIRIS Lab at NYU SOE](http://blog.isis.poly.edu/2015/09/21/csaw-ctf-alexander-taylor/)
- [Practical case: Secura Grand Slam CTF “Easy Reverse” – Max Kersten](https://maxkersten.nl/binary-analysis-course/introduction/secura-grand-slam-ctf-easy-reverse/)
- [Capture the Flag Challenges](http://www.hackingarticles.in/capture-flag-challenges/)
- [GitHub - antihorsey/ctf-writeups: Writeups of problems from past CTFs](https://github.com/antihorsey/ctf-writeups)
- [CTFs](https://github.com/ctfs/)
- [write-ups-2015/seccon-quals-ctf-2015/stegano/steganography-2 at master · ctfs/write-ups-2015](https://github.com/ctfs/write-ups-2015/tree/master/seccon-quals-ctf-2015/stegano/steganography-2)
- [How to Read JPG Height and Width from Binary/Hex data?](https://www.experts-exchange.com/questions/11416918/How-to-Read-JPG-Height-and-Width-from-Binary-Hex-data.html)
- [ctf-writeups/babypwn.md at master · VulnHub/ctf-writeups · GitHub](https://github.com/VulnHub/ctf-writeups/blob/master/2017/codegate-prequels/babypwn.md)
- [ctf-writeups/rop2libc.md at master · VulnHub/ctf-writeups · GitHub](https://github.com/VulnHub/ctf-writeups/blob/master/2016/angstrom-ctf/rop2libc.md)
- [ctf-challenges/pwn/stackoverflow/ret2libc at master · ctf-wiki/ctf-challenges · GitHub](https://github.com/ctf-wiki/ctf-challenges/tree/master/pwn/stackoverflow/ret2libc)
- [33C3 CTF 2016 -- ESPR « Hacking Tube](http://bruce30262.logdown.com/posts/1255979-33c3-ctf-2016-espr)
- [write-ups-2016/hackcon-ctf-2016/pwn/easiest-pwn-not-250 at master · ctfs/write-ups-2016](https://github.com/ctfs/write-ups-2016/tree/master/hackcon-ctf-2016/pwn/easiest-pwn-not-250)
- [google-ctf - solutions](https://github.com/google/google-ctf/blob/master/2018/finals/solutions.pdf)
- [csaw-ctf-2014 - S3 writeup](https://github.com/ctfs/write-ups-2014/tree/master/csaw-ctf-2014/s3)
- [ctfs - write-ups-2014](https://github.com/ctfs/write-ups-2014)
- [Metasploit Community CTF 2018: 2 of Diamonds Write-Up](https://ethicalhackers.club/metasploit-community-ctf-2018-2-of-diamonds-write-up/)
- [Metasploit Community CTF 2018](https://www.secjuice.com/metasploit-ctf/)
- [Play CTF! A Great Way to Learn Hacking - Fsec 2017 - YouTube](https://www.youtube.com/watch?v=rfjV8XukxO8)
- [KevOrr/ctf-training](https://github.com/KevOrr/ctf-training)
- [livectf - Twitch](https://www.twitch.tv/livectf)
- [GynvaelEN - YouTube](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg)
- [Murmus CTF - YouTube](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A)
- [pwntools — pwntools 3.3.4 documentation](https://docs.pwntools.com/en/stable/)
- [GitHub - Gallopsled/pwntools: CTF framework and exploit development library](https://github.com/Gallopsled/pwntools)
- [GitHub - zardus/ctf-tools: Some setup scripts for security research tools.](https://github.com/zardus/ctf-tools)
- [PyCharm: Python IDE for Professional Developers by JetBrains](https://www.jetbrains.com/pycharm/)
- [IDA Sig Database (FLIRT)](https://github.com/push0ebp/sig-database)
- [hugsy/gef: GEF - GDB Enhanced Features for exploit devs & reversers](https://github.com/hugsy/gef)
- [Burp Suite for Web Challenges (cookies)](https://portswigger.net/burp)
- [sashs/Ropper: Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC). For disassembly ropper uses the awesome Capstone Framework.](https://github.com/sashs/Ropper)
- [shell-storm | ROPgadget - Gadgets finder and auto-roper](http://shell-storm.org/project/ROPgadget/)
- [zweisamkeit/RSHack: RSHack - Tool for RSA CTF's challenges](https://github.com/zweisamkeit/RSHack)
- [binary.ninja : a reverse engineering platform](https://binary.ninja/)
- [Fzf: A fuzzy finder (large file ROPGadget search)](https://github.com/junegunn/fzf)
- [geohot/qira: QEMU Interactive Runtime Analyser](https://github.com/geohot/qira)
- [shell-storm | Shellcodes Database](http://shell-storm.org/shellcode/)
- [`](https://quipqiup.com/)
- [Playing with rasm2 (for shellcoding)](http://radare.today/posts/playing-with-rasm2/)
- [Rasm2 · Radare2 Book (for shellcoding)](https://radare.gitbooks.io/radare2book/content/rasm2/intro.html)
- [INTROSEC](https://introsec.backdrifting.net/Assets)
- [Download Postman](https://app.getpostman.com/app/download/linux64)
- [CyberChef](https://gchq.github.io/CyberChef/)
- [GCC and MSVC C++ Demangler](http://demangler.com/)
- [Pip installation](https://pip.pypa.io/en/stable/installing/)
- [zardus/preeny: Some helpful preload libraries for pwning stuff.](https://github.com/zardus/preeny)
- [dCode - Solvers, Crypto, Maths, Decoding, Online Tools](https://www.dcode.fr/)
- [Cipher Tools](http://rumkin.com/tools/cipher/)
- [The Enigma machine: Encrypt and decrypt online — Cryptii](https://cryptii.com/pipes/enigma-machine)
- [gcore(1) - Linux manual page](http://man7.org/linux/man-pages/man1/gcore.1.html)
- [Ook! - Esolang](https://esolangs.org/wiki/ook!)
- [example_hashes [hashcat wiki]](https://hashcat.net/wiki/doku.php?id=example_hashes)
- [How to Get Started in CTF | ENDGAME](https://www.endgame.com/blog/how-get-started-ctf)
- [Introduction | CTF Field Guide](https://trailofbits.github.io/ctf/)
- [Crypto Tools](https://github.com/apsdehal/awesome-ctf#crypto)
- [Base64 Decode and Encode - Online](https://www.base64decode.org/)
- [ROPgadget](https://github.com/JonathanSalwan/ROPgadget)
- [qira - timeless debugger](http://qira.me/)
- [Dllinjector: dll injection tool that implements various methods](https://github.com/OpenSecurityResearch/dllinjector)
- [Libformatstr: Simplify format string exploitation.](https://github.com/hellman/libformatstr)
- [Boomerang Decompiler - Decompile x86 binaries to C](https://github.com/BoomerangDecompiler/boomerang)
- [Angr: binary analysis platform!](https://github.com/angr/angr)
- [Jadx: Dex to Java decompiler (Android)](https://github.com/skylot/jadx)
- [Java decompiler online](http://www.javadecompilers.com/)
- [Krakatau: Java decompiler, assembler, and disassembler](https://github.com/Storyyeller/Krakatau)
- [Pin - A Dynamic Binary Instrumentation Tool | Intel® Software](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool)
- [Uncompyle: Python decompiler](https://github.com/gstarnberger/uncompyle)
- [Z3: The Z3 Theorem Prover](https://github.com/Z3Prover/z3)
- [Getting Started with Z3](https://github.com/Z3Prover/z3/wiki#background)
- [Dnscat - SkullSecurity](https://wiki.skullsecurity.org/Dnscat)
- [Audacity - Audio Files](https://sourceforge.net/projects/audacity/)
- [ExifTool - Read Write and Edit Meta Info](https://sno.phy.queensu.ca/~phil/exiftool/)
- [Foremost - File Recovery](http://foremost.sourceforge.net/)
- [fsck - Fix Broken File Systems](https://linux.die.net/man/8/fsck.ext3)
- [NetworkMiner - Network Forensics Analysis Tool ⛏](https://www.netresec.com/index.ashx?page=NetworkMiner)
- [Dump file analyzer - Memory Extraction](https://github.com/volatilityfoundation/volatility)
- [Binwalk: Firmware Analysis Tool (forensic) - Extracts Hidden Files](https://github.com/ReFirmLabs/binwalk)
- [Autopsy Tool](https://www.sleuthkit.org/autopsy/)
- [ImageMagick](http://www.imagemagick.org/script/convert.php)
- [Exif - shows EXIF information in JPEG files](http://manpages.ubuntu.com/manpages/trusty/man1/exif.1.html)
- [exiftool: Read/write meta info in files](https://linux.die.net/man/1/exiftool)
- [Exiv2 - Image metadata library and tools](http://www.exiv2.org/manpage.html)
- [outguess - universal tool](https://www.freebsd.org/cgi/man.cgi?query=outguess+&apropos=0&sektion=0&manpath=FreeBSD+Ports+5.1-RELEASE&format=html)
- [SmartDeblur: Restoration of defocused and blurred photos/images](https://github.com/Y-Vladimir/SmartDeblur)
- [stegbreak - brute force dictionary on JPEG](https://linux.die.net/man/1/stegbreak)
- [StegCracker: Steganography brute-force utility to uncover hidden data inside files](https://github.com/Paradoxis/StegCracker)
- [stegextract: Detect hidden files and text in images](https://github.com/evyatarmeged/stegextract)
- [Steghide](http://steghide.sourceforge.net/)
- [Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit](https://www.metasploit.com/)
- [CTFtime.org / All about CTF (Capture The Flag)](https://ctftime.org/)
- [CTF Beginner notes](https://github.com/jaybosamiya/security-notes)
- [defcon-challenges-vm](https://github.com/fuzyll/defcon-vm)
- [Hacker101 CTF](https://ctf.hacker101.com/howtoplay)
- [The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory](https://www.amazon.com/gp/product/1118825098/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1118825098&linkId=9e9e956f54ee586491e2a9230b989df5)
- [The Sleuth Kit (TSK) & Autopsy: Open Source Digital Forensics Tools](http://www.sleuthkit.org/index.php)
- [A curated list of awesome forensic analysis tools and resources](https://github.com/Cugu/awesome-forensics)
- [www.amanhardikar.com/mindmaps/ForensicChallenges.html](http://www.amanhardikar.com/mindmaps/ForensicChallenges.html)
- [Software Assurance Reference Dataset](https://samate.nist.gov/SRD/testsuite.php)
- [The FREE Secure Coding Training Course only at Cybrary](https://www.cybrary.it/course/secure-coding/)
- [Cyber Defense Presentation - SANS Institute](https://www.sans.org/cyber-security-summit/archives/cyber-defense)
- [13Cubed - YouTube](https://www.youtube.com/13cubed)
- [How to Build Your Own Mini SNES](http://gizmodo.com/how-to-build-your-own-mini-snes-1790156604)
- [How to Build a Raspberry Pi Retro Game Console](http://lifehacker.com/how-to-turn-your-raspberry-pi-into-a-retro-game-console-498561192)
- [RPCS3 - PlayStation 3 Emulator](https://rpcs3.net/)
- [What to do with a Raspberry Pi? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/ab9noe/what_to_do_with_a_raspberry_pi/)
- [dokuwiki [DokuWiki]](https://www.dokuwiki.org/dokuwiki)
- [Pi-hole®: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash](https://pi-hole.net/)
- [The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need](https://mediaexperience.com/raspberry-pi-xbmc-with-raspbmc/)
- [LibreELEC – Just enough OS for KODI](https://libreelec.tv/)
- [RPi-youtube, smooth youtube videos on Chromium - Raspberry Pi Forums](https://www.raspberrypi.org/forums/viewtopic.php?t=140985)
- [How to Enable HDMI-CEC on Your TV, and Why You Should](https://www.howtogeek.com/207186/how-to-enable-hdmi-cec-on-your-tv-and-why-you-should/)
- [HookTube](https://hooktube.com/)
- [Puffin Internet Terminal - Turning a tiny Raspberry Pi into a high-end PC](https://www.puffin.com/raspberry-pi/)
- [(☞゚∀゚)☞](https://www.reddit.com/r/homelab/)
- [How to Set up an SSH Server on a Home Computer - DEV Community 👩💻👨💻](https://dev.to/zduey/how-to-set-up-an-ssh-server-on-a-home-computer)
- [Know Your Network, Lesson 4: Access Your Home Computers from Anywhere](https://lifehacker.com/5831841/know-your-network-lesson-4-accessing-your-home-computers-from-anywhere)
- [How to Control Your Linux PC with an Android Device](https://news.softpedia.com/news/How-to-Control-Your-Linux-PC-with-an-Android-Device-396004.shtml)
- [Vagrant by HashiCorp](https://www.vagrantup.com/)
- [introduction - homelab](https://www.reddit.com/r/homelab/wiki/introduction)
- [Get your geek on: Building a VMware home lab](http://techgenix.com/vmware-home-lab/)
- [Setting Up A Penetration Testing Lab](https://kb.help.rapid7.com/docs/setting-up-a-penetration-testing-lab)
- [Infosec_Reference/Building A Pentest Lab.md at master · rmusser01/Infosec_Reference](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Building%20A%20Pentest%20Lab.md)
- [Building a Home Lab for Offensive Security & Security Research · System Overlord](https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html)
- [https://www.google.com/url?sa=t&source=web&rct=j&url=https://files.sans.org/summit/pen_test_hackfest_2016/PDFs/Building-Your-Own-Kickass-Home-Lab-Jeff-McJunkin.pdf&ved=0ahUKEwjbtb3Ax7PbAhXE6FMKHaOpAjwQFgg4MAM&usg=AOvVaw3aDf05SHxTRcXA0n462lUo](https://www.google.com/url?sa=t&source=web&rct=j&url=https://files.sans.org/summit/pen_test_hackfest_2016/PDFs/Building-Your-Own-Kickass-Home-Lab-Jeff-McJunkin.pdf&ved=0ahUKEwjbtb3Ax7PbAhXE6FMKHaOpAjwQFgg4MAM&usg=AOvVaw3aDf05SHxTRcXA0n462lUo)
- [My semi-humble homelab! : homelab](https://www.reddit.com/r/homelab/comments/91dedg/my_semihumble_homelab/)
- [Stumbled into /r/homelab? Start Here! : homelab](https://www.reddit.com/r/homelab/comments/5gz4yp/stumbled_into_rhomelab_start_here/)
- [hardware - homelab](https://www.reddit.com/r/homelab/wiki/hardware)
- [buyingguide - homelab](https://www.reddit.com/r/homelab/wiki/buyingguide)
- [hardware/muffinsguide - homelab](https://www.reddit.com/r/homelab/wiki/hardware/muffinsguide)
- [software - homelab](https://www.reddit.com/r/homelab/wiki/software)
- [Kickball/awesome-selfhosted: This is a list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.](https://github.com/Kickball/awesome-selfhosted)
- [resources - homelab](https://www.reddit.com/r/homelab/wiki/resources)
- [My actual "mini-lab" : homelab](https://www.reddit.com/r/homelab/comments/8d2g90/my_actual_minilab/)
- [UniFi Home Setup - Page 4 - Ubiquiti Networks Community](https://community.ubnt.com/t5/UniFi-Stories/UniFi-Home-Setup/cns-p/1973110/page/4#comments)
- [Saw this in /r/oddlysatisfying, thought some people here might find it useful : homelab](https://www.reddit.com/r/homelab/comments/664jj9/saw_this_in_roddlysatisfying_thought_some_people/)
- [E-Ink based status display : homelab](https://www.reddit.com/r/homelab/comments/857eux/eink_based_status_display/)
- [ESXi | Bare Metal Hypervisor | VMware](https://www.vmware.com/products/esxi-and-esx.html)
- [VMware Lab setup - A virtualized lab for testing HA and DRS - Simple Talk](https://www.red-gate.com/simple-talk/sysadmin/virtualization/vmware-lab-setup---a-virtualized-lab-for-testing-ha-and-drs/)
- [The Windows Subsystem for Linux Guide! — Windows Subsystem for Linux Guide documentation](http://wsl-guide.org/en/latest/)
- [Using the VMware View Application - Like VMware Player on an Android Tablet!](https://www.brighthub.com/computing/hardware/articles/123014.aspx)
- [Intel® Advanced Vector Extensions 512 (Intel® AVX-512) Overview](https://www.intel.com/content/www/us/en/architecture-and-technology/avx-512-overview.html)
- [Amazon.com: Intel Xeon Phi 7120P Coprocessor: Computers & Accessories](https://www.amazon.com/Intel-Xeon-Phi-7120P-Coprocessor/dp/B00FKG9R2Q)
- [How can I work on vulnhub VM's in virtualbox in a school setting? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/9t5831/how_can_i_work_on_vulnhub_vms_in_virtualbox_in_a/)
- [Open Source Server Virtualization Training for Proxmox VE](https://www.proxmox.com/en/training)
- [Windows Server Free Trial | Microsoft](https://www.microsoft.com/en-us/cloud-platform/windows-server-trial)
- [Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/)
- [Windows 10 App Dev VM](https://developer.microsoft.com/en-us/windows/downloads/virtual-machines)
- [gnome - Freeze after login Ubuntu 18.04 - Ask Ubuntu](https://askubuntu.com/questions/1030060/freeze-after-login-ubuntu-18-04)
- [Ubuntu 18.04 stuck at shutdown - Ask Ubuntu](https://askubuntu.com/questions/1029068/ubuntu-18-04-stuck-at-shutdown)
- [Ubuntu 18.04 Live boot leads to blank screen - Ask Ubuntu](https://askubuntu.com/questions/1029624/ubuntu-18-04-live-boot-leads-to-blank-screen)
- [filesystem - How to fix "sudo: unable to open ... Read-only file system"? - Ask Ubuntu](https://askubuntu.com/questions/197459/how-to-fix-sudo-unable-to-open-read-only-file-system)
- [dual boot - Cannot update to 18.04 on DualBoot - "EFI System Partition (ESP) not usable" - Ask Ubuntu](https://askubuntu.com/questions/1008974/cannot-update-to-18-04-on-dualboot-efi-system-partition-esp-not-usable)
- [drivers - Is nomodeset still required? - Ask Ubuntu](https://askubuntu.com/questions/747314/is-nomodeset-still-required)
- [Ubuntu ugrade 17.10 to 18.04 nvidia black screen - Ask Ubuntu](https://askubuntu.com/questions/1033784/ubuntu-ugrade-17-10-to-18-04-nvidia-black-screen)
- [Bug #1705369 “Ubuntu 17.10/18.04 boots to black screen when usin...” : Bugs : nvidia-graphics-drivers-384 package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/+bug/1705369)
- [Bug #1764005 “Black-screen on boot with nvidia 390 for Budgie, M...” : Bugs : nvidia-prime package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1764005)
- [Bug #1763774 “nvidia-driver-390 GDM black screen / hang after lo...” : Bugs : nvidia-graphics-drivers-390 package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/1763774)
- [Black screen after boot on 18.04 with nvidia - Support & Help Requests - Ubuntu MATE Community](https://ubuntu-mate.community/t/black-screen-after-boot-on-18-04-with-nvidia/16393/2)
- [2 Ways to Install Nvidia Driver on Ubuntu 18.04 (GUI & Command Line)](https://www.linuxbabe.com/ubuntu/install-nvidia-driver-ubuntu-18-04)
- [Trying to install nvidia driver for ubuntu Desktop 18.04 LTS - Ask Ubuntu](https://askubuntu.com/questions/1032938/trying-to-install-nvidia-driver-for-ubuntu-desktop-18-04-lts)
- [boot - Ubuntu 18.04 stuck at purple screen after login - Ask Ubuntu](https://askubuntu.com/questions/1028665/ubuntu-18-04-stuck-at-purple-screen-after-login)
- [No GUI after Kubuntu 18.04 LTS upgrade from 17.10 - Ask Ubuntu](https://askubuntu.com/questions/1029509/no-gui-after-kubuntu-18-04-lts-upgrade-from-17-10)
- [NVIDIA Driver 384.59 Not Installing - Can't load nvidia-drm, can't open display - NVIDIA Developer Forums](https://devtalk.nvidia.com/default/topic/1031159/linux/nvidia-driver-384-59-not-installing-can-t-load-nvidia-drm-can-t-open-display/)
- [kali linux - VMware tools installed but not working - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/258022/vmware-tools-installed-but-not-working)
- [How to Reset Lost Password of Kali Linux? - Technig](https://www.technig.com/reset-lost-password-of-kali-linux/)
- [kali linux - proxy timeout, error - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/244272/proxy-timeout-error)
- [Airplane mode stuck on??](https://ubuntuforums.org/showthread.php?t=2155906)
- [[ubuntu] Ubuntu 18.04 LTS remains in Airplane mode and WIFI not works](https://ubuntuforums.org/showthread.php?t=2392109)
- [Ubuntu 18.04 LTS remains in Airplane mode](https://ubuntuforums.org/showthread.php?t=2392030)
- [[SOLVED] Laptop stuck in airplane mode after suspend](https://ubuntuforums.org/showthread.php?t=2290765)
- [networking - Cannot disable Airplane Mode - Ask Ubuntu](https://askubuntu.com/questions/119195/cannot-disable-airplane-mode)
- [Newest 'airplane-mode' Questions - Ask Ubuntu](https://askubuntu.com/questions/tagged/airplane-mode)
- [How can I uninstall flight mode in Ubuntu 18.04 and turn on Wi-Fi? - Quora](https://www.quora.com/How-can-I-uninstall-flight-mode-in-Ubuntu-18-04-and-turn-on-Wi-Fi)
- [Airplane mode won't turn off [SOLVED] - Linux Mint Forums](https://forums.linuxmint.com/viewtopic.php?t=138459)
- [centos - Permanently disable airplane mode gnome 3.2 - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/350148/permanently-disable-airplane-mode-gnome-3-2)
- [10.04 - Prevent wireless from turning off when lid goes down - Ask Ubuntu](https://askubuntu.com/questions/100628/prevent-wireless-from-turning-off-when-lid-goes-down)
- [Keep Ubuntu 17.10 / 18.04 Desktop Running when Laptop Lid is Closed | Website for Students](https://websiteforstudents.com/keep-ubuntu-17-10-18-04-desktop-running-when-laptop-lid-is-closed/)
- [Ubuntu Wifi Hardware Disabled after Suspend : MSILaptops](https://www.reddit.com/r/MSILaptops/comments/8vk878/ubuntu_wifi_hardware_disabled_after_suspend/)
- [Wifi Hard Blocked After Suspend in Ubuntu on GS65 : Ubuntu](https://www.reddit.com/r/Ubuntu/comments/8oifqb/wifi_hard_blocked_after_suspend_in_ubuntu_on_gs65/)
- [wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu](https://askubuntu.com/questions/1043547/wifi-hard-blocked-after-suspend-in-ubuntu-on-gs65/1058248#1058248)
- [Airplane mode on resume and no wireless · Issue #181 · linrunner/TLP](linrunner/TLP#181)
- [linux - Lenovo E320 is in airplane mode, says toggle hardware switch, but has no hardware switch and WiFi is still hard locked - Super User](https://superuser.com/questions/1102652/lenovo-e320-is-in-airplane-mode-says-toggle-hardware-switch-but-has-no-hardwar)
- [Kernel/MainlineBuilds - Ubuntu Wiki](https://wiki.ubuntu.com/Kernel/MainlineBuilds?action=show&redirect=KernelMainlineBuilds)
- [MSI GS65 - ArchWiki](https://wiki.archlinux.org/index.php/MSI_GS65#Wifi_is_hardblocked_.28airplane_mode.29_after_waking_up_from_suspend)
- [wireless - How to know I have to blacklist acer_wmi? - Ask Ubuntu](https://askubuntu.com/questions/922140/how-to-know-i-have-to-blacklist-acer-wmi)
- [linux - How to turn off Wireless power management permanently - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/269661/how-to-turn-off-wireless-power-management-permanently)
- [How to Update Ubuntu Kernel - wikiHow](https://www.wikihow.com/Update-Ubuntu-Kernel)
- [wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu](https://askubuntu.com/questions/1043547/wifi-hard-blocked-after-suspend-in-ubuntu-on-gs65)
- [SOLUTION: 18.04 MSI GS65 wifi hardware switch disabled after suspend - Ask Ubuntu](https://askubuntu.com/questions/1068054/18-04-msi-gs65-wifi-hardware-switch-disabled-after-suspend?noredirect=1&lq=1)
- [brndnmtthws/conky: Light-weight system monitor for X.](https://github.com/brndnmtthws/conky)
- [Better audio for ubuntu](https://askubuntu.com/questions/864823/audio-conf-missing/864841#864841)
- [11 Things To Do After Installing Ubuntu 18.04 LTS 'Bionic Beaver' - OMG! Ubuntu!](https://www.omgubuntu.co.uk/2018/04/things-to-do-after-installing-ubuntu-18-04)
- [How to Install Desktop Themes on Ubuntu 18.04 LTS](https://www.howtogeek.com/358049/how-to-install-desktop-themes-on-ubuntu-18.04-lts/)
- [How To Install Numix Theme And Icons In Ubuntu 18.04 | Omgfoss.com](http://omgfoss.com/install-numix-theme-icons-ubuntu-18-04/)
- [5 Of The Best Linux Desktop Themes Compared](https://www.devpy.me/5-of-the-best-linux-desktop-themes-compared/)
- [GitHub - arcticicestudio/nord: An arctic, north-bluish color palette.](https://github.com/arcticicestudio/nord)
- [Where is the "Default Wallpaper" wallpaper stored - Ask Ubuntu](https://askubuntu.com/questions/455800/where-is-the-default-wallpaper-wallpaper-stored)
- [gnome - Why aren't my pictures appearing in the "pictures" section of the change wallpapers window? - Ask Ubuntu](https://askubuntu.com/questions/960601/why-arent-my-pictures-appearing-in-the-pictures-section-of-the-change-wallpap)
- [filesystem - How to make read-only file system writable?](https://askubuntu.com/questions/47538/how-to-make-read-only-file-system-writable)
- [tor - how to verify that proxychains is working - Super User](https://superuser.com/questions/1030559/how-to-verify-that-proxychains-is-working)
- [Inconsistent and erratic mouse wheel in Linux while moving the mouse pointer - Super User](https://superuser.com/questions/1270811/inconsistent-and-erratic-mouse-wheel-in-linux-while-moving-the-mouse-pointer)
- [How can I adjust the mouse scroll speed? - Ask Ubuntu](https://askubuntu.com/questions/255890/how-can-i-adjust-the-mouse-scroll-speed)
- [Generating a new SSH key and adding it to the ssh-agent - User Documentation](https://help.github.com/articles/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent/)
- [[SOLVED] Error: Unable to correct problems, you have held broken packages](https://ubuntuforums.org/showthread.php?t=2386369)
- [Install VMware Workstation or VMware Player from a .bundle file | Linuxlookup](http://www.linuxlookup.com/howto/install_vmware_workstation_or_vmware_player_bundle_file)
- [Could not get vmci driver version: The handle i... |VMware Communities](https://communities.vmware.com/thread/543606)
- [How to reinstall network manager without internet access? - Ask Ubuntu](https://askubuntu.com/questions/422928/how-to-reinstall-network-manager-without-internet-access)
- [TLDR pages](https://tldr.sh/)
- [live usb - How to install the MPEG-4 AAC decoder and the H.264 decoder? - Ask Ubuntu](https://askubuntu.com/questions/214421/how-to-install-the-mpeg-4-aac-decoder-and-the-h-264-decoder)
- [Unable to forward search Bash history similarly as with CTRL-r - Stack Overflow](https://stackoverflow.com/questions/791765/unable-to-forward-search-bash-history-similarly-as-with-ctrl-r/791800#791800)
- [How to cycle through reverse-i-search in BASH? - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/73498/how-to-cycle-through-reverse-i-search-in-bash)
- [My Favorite Command-Line Shortcuts | Henrik Warne's blog](https://henrikwarne.com/2018/08/11/my-favorite-command-line-shortcuts/)
- [How to Install Deepin Desktop Environment on Ubuntu 18.04 - OMG! Ubuntu!](https://www.omgubuntu.co.uk/2018/06/how-to-install-deepin-desktop-environment-on-ubuntu-18-04)
- [[ubuntu] How To: Setup DOD Common Access Card (CAC) for service portals](https://ubuntuforums.org/showthread.php?t=1221961)
- [Gnome Authentication Error When Logging in After Lock - Ask Fedora: Community Knowledge Base and Support Forum](https://ask.fedoraproject.org/en/question/115963/gnome-authentication-error-when-logging-in-after-lock/)
- [A Gentle Introduction to tmux – Hacker Noon](https://hackernoon.com/a-gentle-introduction-to-tmux-8d784c404340)
- [tmux/tmux: tmux source code](https://github.com/tmux/tmux)
- [Tmux not sourcing my .tmux.conf - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/66606/tmux-not-sourcing-my-tmux-conf)
- [Making tmux Pretty and Usable - A Guide to Customizing your tmux.conf](https://www.hamvocke.com/blog/a-guide-to-customizing-your-tmux-conf/)
- [tmux-plugins/tmux-logging: Easy logging and screen capturing for Tmux.](https://github.com/tmux-plugins/tmux-logging)
- [tmux shortcuts & cheatsheet](https://gist.github.com/MohamedAlaa/2961058)
- [tmux cheatsheet](https://gist.github.com/andreyvit/2921703)
- [Grep Stuff](https://i.redd.it/huwd7hn63nv01.jpg)
- [Process Killing](https://pbs.twimg.com/media/DcwearbXkAAnSzm.jpg:large)
- [Creating SSH keys - Atlassian Documentation](https://confluence.atlassian.com/bitbucketserver/creating-ssh-keys-776639788.html)
- [[SOLVED] merge pdf files with each file as a index entry in the big pdf](https://www.linuxquestions.org/questions/linux-general-1/merge-pdf-files-with-each-file-as-a-index-entry-in-the-big-pdf-4175453292/)
- [GouveaHeitor/nipe: Nipe is a script to make Tor Network your default gateway.](https://github.com/GouveaHeitor/nipe)
- [How to make a bootable USB on Windows](http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/)
- [Rainmeter, desktop customization tool](https://www.rainmeter.net/)
- [Touch Terminal. Months of work finally realized. Downloads and instructions in the comments : Rainmeter](https://www.reddit.com/r/Rainmeter/comments/3xog53/touch_terminal_months_of_work_finally_realized/)
- [Win10 Widgets - Widgets for Windows 10](https://win10widgets.com/)
- [Removing Debian Installation Prompt - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/62694/removing-debian-installation-prompt)
- [How to Install and Use the Linux Bash Shell on Windows 10](https://www.howtogeek.com/249966/how-to-install-and-use-the-linux-bash-shell-on-windows-10/)
- [Download Windows Commands Reference from Official Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=56846)
- [Installation Guide | Qubes OS](https://www.qubes-os.org/doc/installation-guide/)
- [The fastest way to search your Chrome history or bookmarks - CNET](https://www.cnet.com/how-to/the-fastest-way-to-search-your-chrome-history-or-bookmarks/)
- [Parrot Project - The best choice for security experts, developers and crypto-addicted people.](https://www.parrotsec.org/)
- [20 Linux Command Tips and Tricks That Will Save You A Lot of Time - Tips and Tricks](http://www.tipsandtricks.ga/2018/10/20-linux-command-tips-and-tricks-that.html)
- [how to close a tab in a browser and other things](https://www.google.com/search?q=how+to+close+a+tab+in+a+browser&oq=how+to+clos&aqs=chrome.0.69i59j69i60j69i65l2j69i57j0.1471j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8)