From 987324ad97205eabd234c5291e295a0c4f0665b0 Mon Sep 17 00:00:00 2001 From: kaiiyer Date: Mon, 3 Oct 2022 20:32:53 +0530 Subject: [PATCH] Rearranging the structure 001 --- README.md | 28 +++----- explore/README.md | 31 ++++++++ {learning-path => explore}/books.md | 10 +-- {learning-path => explore}/career.md | 8 +-- .../conf-pod.md => explore/conf_pod.md | 70 +++++++++++++------ {learning-path => explore}/starter-pack.md | 10 ++- {learning-path => explore}/video.md | 15 +--- infosec/BlueTeam/README.md | 15 +++- infosec/RedTeam/README.md | 26 +++++-- infosec/RedTeam/bug_bounty.md | 14 +++- learning-path/blog.md | 39 ----------- learning-path/cheatsheets.md | 8 --- privacy/README.md | 7 ++ {learning-path => privacy}/guide-art.md | 0 {learning-path => privacy}/toolkits.md | 5 +- 15 files changed, 159 insertions(+), 127 deletions(-) create mode 100644 explore/README.md rename {learning-path => explore}/books.md (88%) rename {learning-path => explore}/career.md (82%) rename learning-path/conf-pod.md => explore/conf_pod.md (87%) rename {learning-path => explore}/starter-pack.md (52%) rename {learning-path => explore}/video.md (59%) delete mode 100644 learning-path/blog.md delete mode 100644 learning-path/cheatsheets.md rename {learning-path => privacy}/guide-art.md (100%) rename {learning-path => privacy}/toolkits.md (90%) diff --git a/README.md b/README.md index e368082..2f4d2f9 100644 --- a/README.md +++ b/README.md @@ -15,45 +15,39 @@ An All-In-One Digital Privacy Project. A STEP IN THE RIGHT DIRECTION TO A PRIVAT --------- -> Do you want to learn more about the Rajappan Project? Okay! We've got you covered. -Click on the links below to get started!!! +> Expand the topics below to dive in!!!
Infosec Resources for Red/Blue/Purple Teams
---> [**Red Team**](infosec/RedTeam) +--> [**Red Team**](infosec/RedTeam/README.md) ---> [**Blue Team**](infosec/BlueTeam) +--> [**Blue Team**](infosec/BlueTeam/README.md) --> [**Purple Team**](infosec/PurpleTeam/README.md) ---> [**OSINT**](infosec/OSINT/README.md) -
-Learning Path +Explore the Project
---> [**Blogs & Mailing Lists**](learning-path/blog.md) +[Dive In](explore/README.md) ---> [**Cheatsheets**](learning-path/cheatsheets.md) +--> [**Cyber Starter Pack**](explore/starter-pack.md) ---> [**Cyber Careers**](learning-path/career.md) +--> [**Security Books**](explore/books.md) ---> [**Cyber Starter Pack**](learning-path/starter-pack.md) +--> [**Cyber Careers**](explore/career.md) ---> [**Privacy Guide and Digital Security Articles**](learning-path/guide-art.md) +--> [**Security Conferences and Podcasts**](explore/conf-pod.md) ---> [**Security Conferences and Podcasts**](learning-path/conf-pod.md) +--> [**Security YT Channels**](explore/video.md) ---> [**Security Books**](learning-path/books.md) +
---> [**Powerful Toolkits**](learning-path/toolkits.md) ---> [**Youtube Channels**](learning-path/video.md) -
Privacy diff --git a/explore/README.md b/explore/README.md new file mode 100644 index 0000000..c968624 --- /dev/null +++ b/explore/README.md @@ -0,0 +1,31 @@ +# Explore + +
+Dive In +
+ +--> [**Cyber Starter Pack**](starter-pack.md) + +--> [**Security Books**](books.md) + +--> [**Cyber Careers**](career.md) + +--> [**Security Conferences and Podcasts**](conf-pod.md) + +--> [**Youtube Channels**](video.md) +
+ + +Personal Favourites to stay updated (_I use feedly in Mobile to track em all_) + +- [Hackernoon](https://hackernoon.com/tagged/security) - HackerNoon reflects the technology industry with insightful, educational, and timely stories written by real tech professionals + +- [Packet Storm](https://packetstormsecurity.com/) - Information security website offering current and historical computer security tools, exploits, and security advisories + +- [Dark Reading](https://www.darkreading.com/) - Long one of the most widely read cybersecurity news sites, It is also the most trusted online community for security professionals + +- [Bleeping Computer](https://www.bleepingcomputer.com/) - A website covering technology news and offering free computer help via its forums + +--------- +Thanks for Reading + diff --git a/learning-path/books.md b/explore/books.md similarity index 88% rename from learning-path/books.md rename to explore/books.md index 5434071..4809fdc 100644 --- a/learning-path/books.md +++ b/explore/books.md @@ -47,23 +47,23 @@ - [The Shallows](https://www.nytimes.com/2010/06/06/books/review/Lehrer-t.html) by Nicholas Carr -- [Tangled Web](https://www.nostarch.com/tangledweb) by By Michal Zalewski +- [Tangled Web](https://www.nostarch.com/tangledweb) by By Michal Zalewski - [The Art of Invisibility](https://www.wired.com/2017/02/famed-hacker-kevin-mitnick-shows-go-invisible-online/) by Kevin Mitnick - [Little Brother](https://craphound.com/littlebrother/about/) by Cory Doctorow -- [Advanced Penetration Testing for Highly-Secured Environments](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu) by By Lee Allen, 2012 +- [Advanced Penetration Testing for Highly-Secured Environments](http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu) by By Lee Allen, 2012 - [Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks](https://www.nostarch.com/silence.htm) by Michal Zalewski - [Master or Slave? The Fight for the Soul of Our Information Civilization](http://www.shoshanazuboff.com/new/about/) by Shoshana Zuboff -- [Crypto 101](https://www.crypto101.io/) by By Laurens Van Houtven +- [Crypto 101](https://www.crypto101.io/) by By Laurens Van Houtven -- [Web Hacking 101](https://leanpub.com/web-hacking-101) by By Peter Yaworski +- [Web Hacking 101](https://leanpub.com/web-hacking-101) by By Peter Yaworski -- [iOS Application Security: The Definitive Guide for Hackers and Developers](https://www.nostarch.com/iossecurity) by By David Thiel +- [iOS Application Security: The Definitive Guide for Hackers and Developers](https://www.nostarch.com/iossecurity) by By David Thiel - [Digital Disconnect: How Capitalism Is Turning the Internet Against Democracy](https://thenewpress.com/books/digital-disconnect) by Robert W. McChesney diff --git a/learning-path/career.md b/explore/career.md similarity index 82% rename from learning-path/career.md rename to explore/career.md index 1197575..060cc15 100644 --- a/learning-path/career.md +++ b/explore/career.md @@ -1,12 +1,12 @@ ## Career in Cyber -- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform. +--- To be Updated --- -- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats. +- [SANS Cybersecurity Career](https://www.sans.org/cybertalent/cybersecurity-career/seekers) - SANS CyberTalent Immersion Academies are 100% scholarship-based and no cost to participants. Academies are offered throughout the year in a variety of learning formats -- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent. +- [CyberCareers.gov](https://www.cybercareers.gov/) - We worked closely with agencies and the cybersecurity communities to identify existing and forward-leaning strategies that will help the Federal Government build a cybersecurity workforce pipeline; and recruit, hire, develop, and retain top talent -- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries. +- [National Security Agency](https://www.intelligencecareers.gov/NSA/nsacyber.html) - The National Security Agency employs a wide variety of cyber professionals to help protect and defend U.S. government IT systems, and to help exploit the intelligence of adversaries --------- Thanks for Reading diff --git a/learning-path/conf-pod.md b/explore/conf_pod.md similarity index 87% rename from learning-path/conf-pod.md rename to explore/conf_pod.md index 29ad1b1..877cced 100644 --- a/learning-path/conf-pod.md +++ b/explore/conf_pod.md @@ -1,39 +1,63 @@ ## Conferences -- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants. -- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals. -- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might. -- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world. +- [OWASP Seasides](https://www.owaspseasides.com/) Aim to provide free of cost premium workshops and talks to all the participants + +- [OWASP Global Appsec](https://www.globalappsec.org/) The premier application security conference for European developers and security experts. Designed for private and public sector infosec professionals + +- [DEF CON](https://defcon.org/) DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might + +- [H.O.P.E.](https://hope.net/) Hackers On Planet Earth, one of the most creative and diverse hacker events in the world + - [Toor Camp](http://toorcamp.toorcon.net/) An American hacker camp where you can show off your crazy projects and brilliant ideas + - [CyberSec Summit](https://cybersummitusa.com/2017-boston/) Connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts -- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences. + +- [ENIGMA](https://www.usenix.org/conference/enigma2017#main%5C) Focusses on current and emerging threats and defenses in the growing intersection of society and technology. To foster an intelligent and informed conversation with the community and with the world, including a wide variety of perspectives, backgrounds, and experiences + - [CyberSec Manchester](https://infosec-conferences.com/events-in-2019/cyber-security-manchester/) Aid people working in data analytics, AI and software development as well as anyone working on IOT or Blockchain projects -- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified. -- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry. -- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated. -- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. -- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. -- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems. + +- [SANS](https://www.sans.org/event/miami-2019) Cyber security training on cutting edge. Chance to learn from the best and get certified + +- [RSA Conf](https://www.rsaconference.com/events/us19) Enables the security community to come together and present the latest approaches, technologies and strategies that drive progress in the industry + +- [HITB SecConf](https://conference.hitb.org/) A place where ideas are exchanged, talent discovered and genius celebrated + +- [IEEE Security](https://www.ieee-security.org/TC/SP2019/) It's a symposium on Security and Privacy with a forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field + +- [**BlackHat**](https://blackhat.com/) Inspire professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors + +- [USENIX CONFS](https://www.usenix.org/conferences) Each year, USENIX hosts more than a dozen conferences and workshops on topics in advanced computing systems + ## Webinars -- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals. -- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts. +- [The Ethical Hacker Network](https://ethicalhacker.net/) - Online magazine and community for security professionals + +- [Bright Talk](https://www.brighttalk.com/topic/cyber-security/) - Discover the latest collection of talks and videos on Cyber Security from industry experts - - [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?". + - [Do We Need a New Internet?](http://www.bbc.co.uk/programmes/p05y10x8) BBC Tomorrow's World episode entitled "Do We Need a New Internet?" + +- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security -- [EC Council Webinar](https://ciso.eccouncil.org/webinars/) - EC Council brings together the best and brightest of the information security leaders via educational resources, and highly successful CISO events in order to advance the cause of information security. ## Podcasts -- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network. -- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates. -- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more. -- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide. -- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages. -- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries. -- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security. -- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis. +- [**Darknet Diaries**](https://darknetdiaries.com/) True stories from the dark side of the Internet. This is a podcast about hackers, breaches, APTs, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network + +- [Daily Stormcasts by SANS Internet Stormcasts](https://isc.sans.edu/podcast.html#stormcast) provide regular information security threat updates + +- [Crypto Gram Security Podcasts](https://crypto-gram.libsyn.com/) discussions on issues such as security risks of work from home and more + +- [The Hated One](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q) importance of why privacy matters to you even if you have nothing to hide + +- [The Cyberwire](https://www.thecyberwire.com/podcasts/) cybersecurity-focused news service and a trusted delivery of concise, accessible, and relevant content, separating the signal from the noise in a burgeoning industry, overloaded with information and competing messages + +- [Risky Business](http://risky.biz/netcasts/risky-business) Weekly information security podcast featuring news and in-depth interviews with industry luminaries + +- [Security Now with Steve Gibson](https://twit.tv/shows/security-now) Discusses the hot topics in security + +- [Down the Security Rabbit Hole](http://podcast.wh1t3rabbit.net/) Podcast alternates between interesting interviews and news analysis + --------- Thanks for Reading diff --git a/learning-path/starter-pack.md b/explore/starter-pack.md similarity index 52% rename from learning-path/starter-pack.md rename to explore/starter-pack.md index 107440f..886c11c 100644 --- a/learning-path/starter-pack.md +++ b/explore/starter-pack.md @@ -1,11 +1,15 @@ ## Starter Packs for Beginners - [How To Become A Hacker](http://www.catb.org/~esr/faqs/hacker-howto.html) How To Become A Hacker FAQ & Pointers by Eric Steven Raymond + - [Should I Use Kali Linux?](https://www.kali.org/docs/introduction/should-i-use-kali-linux/) What’s Different About Kali Linux? Is Kali Linux Right For You? + - [Learn how to hack](https://www.hackerone.com/blog/resources-for-new-hackers) Useful Online Resources for New Hackers from HackerOne -- [Bug Bounty Guide](https://blog.dunicot.com/getting-started-in-bug-bounty-hunting-complete-guide/) Complete guide for getting started in Bug-bounty hunting -- [Metasploit](https://www.metasploit.com/get-started) The world’s most used penetration testing framework. Helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness -- [Overthewire](https://overthewire.org/) The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games + +- [Overthewire](https://overthewire.org/) The wargames offered by them can help you to learn and practice security concepts in the form of fun-filled games + +- [Cybrary](https://www.cybrary.it/) - The Cybersecurity and IT Career Development Platform + --------- Thanks for Reading diff --git a/learning-path/video.md b/explore/video.md similarity index 59% rename from learning-path/video.md rename to explore/video.md index 0f62b01..a2e2a1c 100644 --- a/learning-path/video.md +++ b/explore/video.md @@ -1,7 +1,5 @@ ## YouTube Channels -Channels shared by Security Pros where they upload their Video POCs - - [BlackHat](https://www.youtube.com/user/BlackHatOfficialYT/about) - [John Hammond](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw) @@ -14,25 +12,16 @@ Channels shared by Security Pros where they upload their Video POCs - [LiveOverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) -- [Suleman Malik](https://www.youtube.com/channel/UC59IHQcCmgNw4GIvsXeLnDQ) - - [HackerOne](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw) -- [vulnerability0lab](https://www.youtube.com/channel/UC4QJ7X4nnkAYXsnFQpdytcA) - - [Bugcrowd ](https://www.youtube.com/channel/UCo1NHk_bgbAbDBc4JinrXww) - [Web Hacking 101](https://www.youtube.com/channel/UCS0y5e-AMsZO8GEFtKBAzkA) -- [ErrOr SquaD](https://www.youtube.com/channel/UCou-7r8Mk4oQcBmazxp5uwg) - -- [Bhargav Tandel](https://www.youtube.com/user/bhargavtandel/videos) - -- [Devil Killer](https://www.youtube.com/channel/UCwfYw-C2xqemqrXq0IKF_Mg/about) - - [Bug Bounty Public Disclosure](https://www.youtube.com/channel/UCNRM4GH-SD85WCSqeSb4xUA) -- [Penetration Testing in Linux](https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA) +- [SANS Cloud Security](https://www.youtube.com/c/SANSCloudSecurity) + --------- Thanks for Reading diff --git a/infosec/BlueTeam/README.md b/infosec/BlueTeam/README.md index 70eede8..22c9ede 100644 --- a/infosec/BlueTeam/README.md +++ b/infosec/BlueTeam/README.md @@ -11,6 +11,9 @@ - [DevSecOps](https://www.devsecops.org/) An informational site for security and business practitioners looking for innovative ways to incorporate security at scale +- [Malware Archaeology CheatSheet](https://www.malwarearchaeology.com/cheat-sheets) - Cheat Sheets to help you in configuring your systems + +- [Detectify](https://blog.detectify.com/) - Security blog from Detectify, Automated security and asset monitoring for all teams. ------------- @@ -20,6 +23,7 @@ - [Intel Owl](https://github.com/intelowlproject/IntelOwl) - Analyze files, domains, IPs in multiple ways from a single API at scale + ## Incident Response - [Detecting Lateral Movement through Tracking Event Logs](https://www.jpcert.or.jp/english/pub/sr/20170612ac-ir_research_en.pdf) by JPCERT @@ -33,6 +37,7 @@ - [Boss of the SOC](https://www.splunk.com/en_us/blog/tag/boss-of-the-soc.html) - BOTS is a blue-team, jeopardy-style, capture-the-flag-esque (CTF) activity where participants leverage Splunk's Security Suite and other resources to answer a variety of questions about the type of real-world security incidents + ## Detection Engineering & Threat Hunting - [Sigma](https://github.com/SigmaHQ/sigma) - Generic Signature Format for SIEM Systems @@ -41,8 +46,6 @@ - [Emerging Threats](https://doc.emergingthreats.net/bin/view/Main/WebHome) - Emerging Threats Rule Documentation Wiki containing all current rules - - [fleet](fleetdm.com) - Open source device management, built on osquery - ## Log Management & Object Storage @@ -52,6 +55,7 @@ - [MinIO](https://min.io) - MinIO is the world's fastest object storage server. With READ/WRITE speeds of 183 GB/s and 171 GB/s on standard hardware + ## OSINT - [OSINT Framework](https://osintframework.com/) @@ -62,7 +66,12 @@ - [All in one OSINT resource you'll ever need](https://start.me/p/L1rEYQ/osint4all) -## Tools + +## DFIR - [Digital Forensics and Incident Response](https://www.dfir.training/tools) + +## Malware Analysis & Reverse Engineering +- [MalGamy](https://malgamy.github.io) - A blog for case study and in-depth analysis of malware + diff --git a/infosec/RedTeam/README.md b/infosec/RedTeam/README.md index b4a4449..a37cc09 100644 --- a/infosec/RedTeam/README.md +++ b/infosec/RedTeam/README.md @@ -14,17 +14,17 @@ - [Leaks](leakix.net/) -- [Bug Bounty Tips](https://www.infosecmatter.com/bug-bounty-tips-8-oct-14/) +- [HTML5 Security Cheatsheet](https://html5sec.org/): What your browser does when you look away -### HTTP proxy -[Fiddler: Web Debugging Proxy Tool](https://www.telerik.com/fiddler): Capture all HTTP(S) traffic between your computer and the Internet with Fiddler HTTP(S) proxy. Inspect traffic, set breakpoints, and fiddle with requests & responses -[Charles Proxy](https://www.charlesproxy.com/) : Charles is an HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet +### Exploits & Tools -### Exploits +- [EXPLOIT.EDUCATION](https://exploit.education/): exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues -[EXPLOIT.EDUCATION](https://exploit.education/): exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues +- [Sectools](https://sectools.org/) Top 125 Network Security Tools + +- [Fiddler: Web Debugging Proxy Tool](https://www.telerik.com/fiddler): Capture all HTTP(S) traffic between your computer and the Internet with Fiddler HTTP(S) proxy. Inspect traffic, set breakpoints, and fiddle with requests & responses ### Active Directory @@ -32,3 +32,17 @@ - [adsecurity](https://adsecurity.org/) - [dirkjanm.io](https://dirkjanm.io/) - [0xdf.gitlab.io](https://0xdf.gitlab.io/tags.html#active-directory) + +## Mail Lists for Pentesters +- [Full Disclosure Mailing List](https://seclists.org/fulldisclosure/): A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community +- [Bugtraq Mailing List](https://seclists.org/bugtraq/) - The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently! + +## Blog for Pentesters + +- [BruteLogic](https://brutelogic.com.br/blog/) Brute XSS: Master the art of Cross Site Scripting +- [Philippeharewood Blog](https://philippeharewood.com/) These aren't the access_tokens you're looking for +- [Tisiphone](https://tisiphone.net/) Blog by Lesley Carhart, Full Spectrum Cyber-Warrior Princess, 20+ year IT industry veteran,speaks and writes about digital forensics and incident response, Industrial Control System Security, OSINT, and information security careers +- [Hackaday](https://hackaday.com/) Hackaday serves up Fresh Hacks Every Day from around the Internet +- [Detectify Blog](https://labs.detectify.com/) Web Security blog from Detectify, Automated security and asset monitoring for all teams +- [Vulnerability-lab](https://vulnerability-lab.com/) Vulnerability research, bug bounties and vulnerability assessments + diff --git a/infosec/RedTeam/bug_bounty.md b/infosec/RedTeam/bug_bounty.md index a6a2172..61ba88a 100644 --- a/infosec/RedTeam/bug_bounty.md +++ b/infosec/RedTeam/bug_bounty.md @@ -1,5 +1,15 @@ -## Bug Bounty -- [Bugcrowd](https://forum.bugcrowd.com/) Bugcrowd's community forum of researchers and white-hat hackers discussing information security and bug bounty programs. +# Bug Bounty + +- [Bug Bounty Tips](https://www.infosecmatter.com/bug-bounty-tips-8-oct-14/) Bug Bounty Tips #8 + +- [Bug Bounty Guide](https://blog.dunicot.com/getting-started-in-bug-bounty-hunting-complete-guide/) Complete guide for getting started in Bug-bounty hunting + +- [Bug Bounty Cheatsheet](https://docs.google.com/spreadsheets/u/0/d/1TxNrvaIMRS_dmupcwjwJmXtaFk_lPGE1LzgxPu_7KqA/htmlview#): All you need resource bundle for Bug Bounty Programs + +## Blogs + +- [Bugcrowd](https://forum.bugcrowd.com/) Bugcrowd's community forum of researchers and white-hat hackers discussing information security and bug bounty programs +- [Hackerone](https://www.hackerone.com/blog) Security blog from Hackerone. Hack for Good - [Bug Bounty POC](https://bugbountypoc.com/) - All Bug Bounty POC write ups by Security Researchers - [Bug Bounty Findings by Meals](https://seanmelia.wordpress.com/) The blog- 'Bug Bounty Findings by Meals' by Seanmelia - [NahamSec](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters) A list of resources for those interested in getting started in bug bounties diff --git a/learning-path/blog.md b/learning-path/blog.md deleted file mode 100644 index 1ab4ca1..0000000 --- a/learning-path/blog.md +++ /dev/null @@ -1,39 +0,0 @@ -## Blog for Pentesters - -- [Securityguard Blog](https://blog.it-securityguard.com/) Security blog of Patrik Fehrenbach -- [BruteLogic](https://brutelogic.com.br/blog/) Brute XSS: Master the art of Cross Site Scripting -- [Philippeharewood Blog](https://philippeharewood.com/) These aren't the access_tokens you're looking for -- [Respect XSS](https://respectxss.blogspot.com/) The blog- 'Respect XSS' by Ashar Javed -- [Tisiphone](https://tisiphone.net/) Blog by Lesley Carhart, Full Spectrum Cyber-Warrior Princess, 20+ year IT industry veteran,speaks and writes about digital forensics and incident response, Industrial Control System Security, OSINT, and information security careers -- [Arneswinnen](https://www.arneswinnen.net/) Arne Swinnen's Security blog-Just Another Infosec Blog -- [Arbazhussain Medium](https://medium.com/@arbazhussain/) -Security blog by Arbaz Hussain -- [Detectify](https://blog.detectify.com/) - Security blog from Detectify, Automated security and asset monitoring for all teams. -- [Securitywall](https://securitywall.co/blog.html/) Security blog from Securitywall -- [Hackerone](https://www.hackerone.com/blog) Security blog from Hackerone. Hack for Good -- [My Experiments with Hacking](https://www.gangte.net/) A blog on hacking and cyber security -- [Mukarram Khalid Blog](https://mukarramkhalid.com/) Security blog by Mukarram Khalid -- [JubaerAlNazi Blog](https://jubaeralnaziwhitehat.wordpress.com/) JubaerAlNazi – Security Researcher & InfoSec Newbie: Exploiting Machines More Than Minds -- [Hackaday](https://hackaday.com/) Hackaday serves up Fresh Hacks Every Day from around the Internet -- [Securityfocus](https://www.securityfocus.com/) A place to come together and share its collected wisdom and knowledge -- [Packet Storm](https://packetstormsecurity.com/) Exploit the possibilities -- [Sectools](https://sectools.org/) CyberSecurity blog by Gordon Lyon a.k.a Fyodor -- [Detectify Blog](https://labs.detectify.com/) Web Security blog from Detectify, Automated security and asset monitoring for all teams -- [Rubidus](https://blog.rubidus.com/) Personal blog by Jonathan Claudius -- [Ak1T4 Medium](https://medium.com/@know.0nix) Blog by WhiteHat Hacker Zen Monk & Bounty Hunter -- [Security Idiots](https://www.securityidiots.com/) Security blog by Security Idiots -- [SQLi Basic](https://sqli-basic.blogspot.com/) This Blog Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual -- [Vulnerability-lab](https://vulnerability-lab.com/) Vulnerability research, bug bountiesand vulnerability assessments - -## Mail Lists for Pentesters -- [Full Disclosure Mailing List](https://seclists.org/fulldisclosure/): A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community -- [Bugtraq Mailing List](https://seclists.org/bugtraq/) - The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently! - -## Malware Analysis & Reverse Engineering -- [MalGamy](https://malgamy.github.io) - A blog for case study and in-depth analysis of malware - -## General Security -- [Hackernoon](https://hackernoon.com/tagged/security) According to technologists, "Privacy is a myth." but "Security is non-negotiable." - ---------- -Thanks for Reading - diff --git a/learning-path/cheatsheets.md b/learning-path/cheatsheets.md deleted file mode 100644 index c4777b0..0000000 --- a/learning-path/cheatsheets.md +++ /dev/null @@ -1,8 +0,0 @@ -## Cheatsheets - -- [HTML5 Security Cheatsheet](https://html5sec.org/): What your browser does when you look away - -- [Bug Bounty Cheatsheet](https://docs.google.com/spreadsheets/u/0/d/1TxNrvaIMRS_dmupcwjwJmXtaFk_lPGE1LzgxPu_7KqA/htmlview#): All you need resource bundle for Bug Bounty Programs - ---------- -Thanks for Reading diff --git a/privacy/README.md b/privacy/README.md index 55ef944..9e5e3e0 100644 --- a/privacy/README.md +++ b/privacy/README.md @@ -1,3 +1,10 @@ +# Privacy Starters + +--> [**Privacy Guides**](guide-art.md) + +--> [**Tool-kits**](toolkits.md) + + Here are some great links for websites and settings that you can enforce to enforce stringer Internet data privacy. Please spend some time becoming familiar with them. - [Restrict your Facebook ad settings](https://www.facebook.com/ads/preferences/?entry_product=ad_settings_screen) diff --git a/learning-path/guide-art.md b/privacy/guide-art.md similarity index 100% rename from learning-path/guide-art.md rename to privacy/guide-art.md diff --git a/learning-path/toolkits.md b/privacy/toolkits.md similarity index 90% rename from learning-path/toolkits.md rename to privacy/toolkits.md index a089bde..81251e3 100644 --- a/learning-path/toolkits.md +++ b/privacy/toolkits.md @@ -1,5 +1,5 @@ -### Powerful Tool-kits +## Powerful Tool-kits - [Securityplanner](https://securityplanner.org) an extremely easy to use and very informative website to help you improve your online safety. @@ -11,8 +11,6 @@ - [Webtap](https://webtap.princeton.edu) Princeton's Web Transparency and Accountability site. -- [Security Berkeley](https://security.berkeley.edu/resources) extremely valid Berkeley information security resources. Browse around. Start from the left menu. - - [The state of Privacy](http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/) FWIW, The state of privacy in post-Snowden America by the [Pew Research Center](https://en.wikipedia.org/wiki/Pew_Research_Center) - [Plato Stanford](https://plato.stanford.edu/entries/it-privacy/) Stanford informative page on IT and Privacy. @@ -43,7 +41,6 @@ - [Motherboard](https://motherboard.vice.com/en_us/article/4xby8g/how-to-give-a-digital-security-training) A Practical Checklist For Leading Your First Training. Do you want to teach people about infosec, opsec, and how to stay safe online? Here's where to start. -- [O&O ShutUp10](https://www.oo-software.com/en/shutup10) Free antispy tool for Windows 10. O&O ShutUp10 presents you with all important settings in one location – you need no previous IT knowledge and there is no need to manually change the Windows 10 system settings. --------- Thanks for Reading