InfoSec Resources
Collection of resources
Information security covers a wide array of spaces and skills. My typical process for approaching a new problem area is to look at all the links I have collected over the years and see whether or not I favorited a tutorial or introduction series on a blog. This has lead to many resources across many computers/browsers and it is something I would like to share in case anyone else will find it useful. Below is a list of resources I have compiled over the years that I will do my best to update.
Note: Some of these resources fit into multiple categories.
Learning Programming
Online Security Capture the Flags/Wargames
- RingZer0 Team Challenges
- Smash The Stack Wargames
- Over the wire Wargames
- CTF Time
- Hack this site
- Hellbound Hackers
- PicoCTF
- Microcurruption
- Exploit Exercises
CTF Tools
CTF Write-Ups
Reverse Engineering (WARNING: some of this will be listed as malware, use at your own risk)
Reverse Engineering Tools
Malware RE
Exploit Development
- Use after free vulnerability intro
- Corelan Exploit Writing Tutorials
- Windows Exploit Development Introduction
- Mozilla: Crash course in Memory Management
- Windows Exploitation in 2016
Web Application Security
- Hack.me
- Damn Vulnerable Web Application
- OWASP Broken Web Apps
- Multillidae Web Application
- Google Gruyere
- Burp Suite Quick Summary
- Tough SQLi with sqlmap
Network Security
Pentration Testing
Incident Response
Bug Bounties
Penetration Testing Certifications
Exploit Development Certifications
Web Application Security Certifications
Network Certifications
Online Security Training
Containers and Container Security
Kernel Security
Updated: June 18, 2017