Skip to content

Commit

Permalink
Rearranging the structure 001
Browse files Browse the repository at this point in the history
  • Loading branch information
kaiiyer committed Oct 3, 2022
1 parent 9e8d3fb commit 987324a
Show file tree
Hide file tree
Showing 15 changed files with 159 additions and 127 deletions.
28 changes: 11 additions & 17 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,45 +15,39 @@ An All-In-One Digital Privacy Project. A STEP IN THE RIGHT DIRECTION TO A PRIVAT

---------

> Do you want to learn more about the Rajappan Project? Okay! We've got you covered.
Click on the links below to get started!!!
> Expand the topics below to dive in!!!
<details open>
<summary>Infosec Resources for Red/Blue/Purple Teams</summary>
<br>

--> [**Red Team**](infosec/RedTeam)
--> [**Red Team**](infosec/RedTeam/README.md)

--> [**Blue Team**](infosec/BlueTeam)
--> [**Blue Team**](infosec/BlueTeam/README.md)

--> [**Purple Team**](infosec/PurpleTeam/README.md)

--> [**OSINT**](infosec/OSINT/README.md)

</details>

<details>
<summary>Learning Path</summary>
<summary>Explore the Project</summary>
<br>

--> [**Blogs & Mailing Lists**](learning-path/blog.md)
[Dive In](explore/README.md)

--> [**Cheatsheets**](learning-path/cheatsheets.md)
--> [**Cyber Starter Pack**](explore/starter-pack.md)

--> [**Cyber Careers**](learning-path/career.md)
--> [**Security Books**](explore/books.md)

--> [**Cyber Starter Pack**](learning-path/starter-pack.md)
--> [**Cyber Careers**](explore/career.md)

--> [**Privacy Guide and Digital Security Articles**](learning-path/guide-art.md)
--> [**Security Conferences and Podcasts**](explore/conf-pod.md)

--> [**Security Conferences and Podcasts**](learning-path/conf-pod.md)
--> [**Security YT Channels**](explore/video.md)

--> [**Security Books**](learning-path/books.md)
</details>

--> [**Powerful Toolkits**](learning-path/toolkits.md)

--> [**Youtube Channels**](learning-path/video.md)
</details>

<details>
<summary>Privacy</summary>
Expand Down
31 changes: 31 additions & 0 deletions explore/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
# Explore

<details open>
<summary>Dive In</summary>
<br>

--> [**Cyber Starter Pack**](starter-pack.md)

--> [**Security Books**](books.md)

--> [**Cyber Careers**](career.md)

--> [**Security Conferences and Podcasts**](conf-pod.md)

--> [**Youtube Channels**](video.md)
</details>


Personal Favourites to stay updated (_I use feedly in Mobile to track em all_)

- [Hackernoon](https://hackernoon.com/tagged/security) - HackerNoon reflects the technology industry with insightful, educational, and timely stories written by real tech professionals

- [Packet Storm](https://packetstormsecurity.com/) - Information security website offering current and historical computer security tools, exploits, and security advisories

- [Dark Reading](https://www.darkreading.com/) - Long one of the most widely read cybersecurity news sites, It is also the most trusted online community for security professionals

- [Bleeping Computer](https://www.bleepingcomputer.com/) - A website covering technology news and offering free computer help via its forums

---------
Thanks for Reading

10 changes: 5 additions & 5 deletions learning-path/books.md → explore/books.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,23 +47,23 @@

- [The Shallows](https://www.nytimes.com/2010/06/06/books/review/Lehrer-t.html) by Nicholas Carr

- [Tangled Web](https://www.nostarch.com/tangledweb) by By Michal Zalewski
- [Tangled Web](https://www.nostarch.com/tangledweb) by By Michal Zalewski

- [The Art of Invisibility](https://www.wired.com/2017/02/famed-hacker-kevin-mitnick-shows-go-invisible-online/) by Kevin Mitnick

- [Little Brother](https://craphound.com/littlebrother/about/) by Cory Doctorow

- [Advanced Penetration Testing for Highly-Secured Environments](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu) by By Lee Allen, 2012
- [Advanced Penetration Testing for Highly-Secured Environments](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu) by By Lee Allen, 2012

- [Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks](https://www.nostarch.com/silence.htm) by Michal Zalewski

- [Master or Slave? The Fight for the Soul of Our Information Civilization](http://www.shoshanazuboff.com/new/about/) by Shoshana Zuboff

- [Crypto 101](https://www.crypto101.io/) by By Laurens Van Houtven
- [Crypto 101](https://www.crypto101.io/) by By Laurens Van Houtven

- [Web Hacking 101](https://leanpub.com/web-hacking-101) by By Peter Yaworski
- [Web Hacking 101](https://leanpub.com/web-hacking-101) by By Peter Yaworski

- [iOS Application Security: The Definitive Guide for Hackers and Developers](https://www.nostarch.com/iossecurity) by By David Thiel
- [iOS Application Security: The Definitive Guide for Hackers and Developers](https://www.nostarch.com/iossecurity) by By David Thiel

- [Digital Disconnect: How Capitalism Is Turning the Internet Against Democracy](https://thenewpress.com/books/digital-disconnect) by Robert W. McChesney

Expand Down
8 changes: 4 additions & 4 deletions learning-path/career.md → explore/career.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
## Career in Cyber

- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform.
--- To be Updated ---

- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats.
- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats

- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent.
- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent

- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries.
- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries

---------
Thanks for Reading
70 changes: 47 additions & 23 deletions learning-path/conf-pod.md → explore/conf_pod.md
Original file line number Diff line number Diff line change
@@ -1,39 +1,63 @@
## Conferences

- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants.
- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals.
- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might.
- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world.
- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants

- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals

- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might

- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world

- [Toor Camp](http://toorcamp.toorcon.net/) An American hacker camp where you can show off your crazy projects and brilliant ideas

- [CyberSec Summit](https://cybersummitusa.com/2017-boston/) Connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts
- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences.

- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences

- [CyberSec Manchester](https://infosec-conferences.com/events-in-2019/cyber-security-manchester/) Aid people working in data analytics, AI and software development as well as anyone working on IOT or Blockchain projects
- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified.
- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry.
- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated.
- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.
- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems.

- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified

- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry

- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated

- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field

- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors

- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems


## Webinars
- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals.

- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts.
- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals

- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts

- [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?".
- [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?"

- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security

- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security.

## Podcasts

- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network.
- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates.
- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more.
- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide.
- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages.
- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries.
- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security.
- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis.
- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network

- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates

- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more

- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide

- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages

- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries

- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security

- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis


---------
Thanks for Reading
10 changes: 7 additions & 3 deletions learning-path/starter-pack.md → explore/starter-pack.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,15 @@
## Starter Packs for Beginners

- [How To Become A Hacker](http://www.catb.org/~esr/faqs/hacker-howto.html) How To Become A Hacker FAQ & Pointers by Eric Steven Raymond

- [Should I Use Kali Linux?](https://www.kali.org/docs/introduction/should-i-use-kali-linux/) What’s Different About Kali Linux? Is Kali Linux Right For You?

- [Learn how to hack](https://www.hackerone.com/blog/resources-for-new-hackers) Useful Online Resources for New Hackers from HackerOne
- [Bug Bounty Guide](https://blog.dunicot.com/getting-started-in-bug-bounty-hunting-complete-guide/) Complete guide for getting started in Bug-bounty hunting
- [Metasploit](https://www.metasploit.com/get-started) The world’s most used penetration testing framework. Helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness
- [Overthewire](https://overthewire.org/) The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games

- [Overthewire](https://overthewire.org/) The wargames offered by them can help you to learn and practice security concepts in the form of fun-filled games

- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform


---------
Thanks for Reading
15 changes: 2 additions & 13 deletions learning-path/video.md → explore/video.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,5 @@
## YouTube Channels

Channels shared by Security Pros where they upload their Video POCs

- [BlackHat](https://www.youtube.com/user/BlackHatOfficialYT/about)

- [John Hammond](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw)
Expand All @@ -14,25 +12,16 @@ Channels shared by Security Pros where they upload their Video POCs

- [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)

- [Suleman Malik](https://www.youtube.com/channel/UC59IHQcCmgNw4GIvsXeLnDQ)

- [HackerOne](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw)

- [vulnerability0lab](https://www.youtube.com/channel/UC4QJ7X4nnkAYXsnFQpdytcA)

- [Bugcrowd ](https://www.youtube.com/channel/UCo1NHk_bgbAbDBc4JinrXww)

- [Web Hacking 101](https://www.youtube.com/channel/UCS0y5e-AMsZO8GEFtKBAzkA)

- [ErrOr SquaD](https://www.youtube.com/channel/UCou-7r8Mk4oQcBmazxp5uwg)

- [Bhargav Tandel](https://www.youtube.com/user/bhargavtandel/videos)

- [Devil Killer](https://www.youtube.com/channel/UCwfYw-C2xqemqrXq0IKF_Mg/about)

- [Bug Bounty Public Disclosure](https://www.youtube.com/channel/UCNRM4GH-SD85WCSqeSb4xUA)

- [Penetration Testing in Linux](https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA)
- [SANS Cloud Security](https://www.youtube.com/c/SANSCloudSecurity)


---------
Thanks for Reading
Loading

0 comments on commit 987324a

Please sign in to comment.