Bibliography / Tutorials / Conferences
Bug bounty
Articles
- tbhm: The Bug Hunters Methodology.
Books
Conferences
- DEF CON Safe Mode Red Team Village - Jason Haddix - The Bug Hunters Methodology
- Bugbounty en Español, todo lo que debes saber (Spanish)
Certifications
CEH (Certified Ethical Hacker)
- CEHV9 - PRACTICE EXAM QUESTIONS WITH ANSWERS
- CEHv10 official course
- Ethical Hacking Labs: This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the materials of CEH v10 content.
- Notes for CEH v10 exam (source code)
- Exam simulator
Books
Miscellaneous
- skillset: Practice questions for different certifications.
Forensics
Books
Hacking web
Books
Hacking wireless
Papers
Internet of Things (IoT)
Articles
Malwares / Reverse Engineering
Articles
- Anatomy of a .NET Assembly – PE Headers
- An In-Depth Look into the Win32 Portable Executable File Format
- An In-Depth Look into the Win32 Portable Executable File Format - Part 1
- An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities
- Antivirus-Artifacts: Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
- APTnotes: Various public documents, whitepapers and articles about APT campaigns.
- Axial - Community Papers: Papers about malwares and reverse engineering.
- Basics of Windows shellcode writing
- 'CRYPTERS': PRACTICANDO LA TÉCNICA DSPLIT/AVFUCKER (Spanish)
- corkami: Abusing File Formats, CharSets, Initial registers values under Windows, Initial registers values under Windows,...
- Introducing the TypeRefHash (TRH) (.NET)
- Machine Learning for Malware Detection by Kaspersky
- MalwareAnalysis.co Publications
- Malware-analysis-and-Reverse-engineering: Some of my publicly available Malware analysis and Reverse engineering.
- Macro Malware Again
- Malware researcher’s handbook (demystifying PE file)
- PeStudio Standard
- Reverse Engineering Malicious Macros for Fun & Profit
- Reverse engineering tools for .NET applications
- richprint: Print compiler information stored in Rich Header of PE executables.
- Shikata Ga Nai Encoder Still Going Strong
- The .NET File Format
- Todo lo que quisiste saber sobre las DLL y no te atreviste a preguntar (Spanish)
- vx-underground papers
- Win64/Expiro: virus multiplataforma altamente versátil e infeccioso (Spanish)
- windows-syscalls: Windows System Call Tables (NT/2000/XP/2003/Vista/2008/7/2012/8/10).
Books
- Expert .NET 2.0 IL Assembler
- Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
- MalwareAnalysis.co Books
- Malware Data Science: Attack, Detection, and Attribution
- Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- Practical Malware Analysis. The Hands-On Guide to Dissecting
- Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
- The Art Of Mac Malware: Books about macOS malware, written by patrick wardle.
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Wile05)
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular
Cheat sheets and posters
- MalwareAnalysis.co Cheat Sheets
- PE Format Poster
- PE Format Poster
- Intel 80x86 Assembler Code Table (Spanish)
Documentation
Magazines
Papers
- Leveraging the PE Rich Header for Static Malware Detection and Linking
- PE Header Analysis for Malware Detection
Tutorials
- Assembly Programming Tutorial
- Debugging TLS Callbacks
- Code Survival: Debug a Compiled DLL
- malware_training_vol1: Materials for Windows Malware Analysis training (volume 1)
- Malware Analysis - Wannacry
- pestudio references
- Reverse Engineering Analysis Lab STRRAT
- Reverse Engineering tutorials by Ricardo Narvaja (Spanish)
- The malware analyst’s guide to aPLib decompression
Videotutorials
- Analyzing Ransomware - Beginner Static Analysis
- Análisis Dinámico de Malware Parte 1 (Spanish)
- Ange Albertini: Funky File Formats
- Building a Malware Lab - Software, Hardware, Tools and Tips for Effective Malware Analysis
- CppCon 2017: James McNellis "Todo lo que siempre quisiste saber sobre las DLL"
- CursoReversing (Spanish): YouTube channel about reverse engineering.
- CursoReversing desde cero (Ricardo Narvaja 2020) (Spanish)
- How does PDF malware work? | Malicious PDF’s Explained – What is a malicious pdf?
- JNLP Dangers - Java Malware Detection & Analysis
- Malware Analysis Bootcamp - Analyzing The PE Header
- Process Injection (Spanish)
- Reverse Engineering desde 0 (Spanish)
Miscellaneous
Articles
- Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
- index-of.es
- PDF Tricks
- What Actually is Threat Hunting?
Cheat sheets
Conferences
- Cybersecurity Conferences: Listing All Virtual Cybersecurity Conferences And Virtual Hacking Events (Worldwide).
Networks
Articles
Cheat sheets
Programming
Books
- Clean Code
- Design Patterns: Elements of Reusable Object-Oriented Software
- Head First Design Patterns (A Brain Friendly Guide)
- Introduction to Algorithms
- JavaScript - The Definitive Guide: Master the World's Most-Used
- Mythical Man-Month, The: Essays on Software Engineering
- Patterns of Enterprise Application Architecture
- Pragmatic Programmer, The: From Journeyman to Master
- Refactoring: Improving the Design of Existing Code
- Refactoring JavaScript: Turning Bad Code Into Good Code
- The Linux Programming Interface: A Linux and UNIX System
- Threat Modeling: Designing for Security
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Protection
Articles
- Awesome-CobaltStrike-Defence: Defences against Cobalt Strike.
Salesforce
Articles
Conferences
- Become a Salesforce security Superman! with Alba Azcona Rivas
- Lightning Web Components - Episode 4 : Security and Testing
Documentation
- AppExchange Security Review
- Checkmarx: Setting Up the Visual Studio Code Extension Plugin
- Salesforce Security Basics
- Salesforce Security Guide
Trailheads
Social engineering
Articles
Books
- Ingeniería social. El arte del hacking personal (Spanish)
- Social Engineering: The Science of Human Hacking
Conferences
System hacking
Articles
- CTFs. Otra perspectiva del hacking. (Spanish)
- Identifying Named Pipe Impersonation and Other Malicious Privilege Escalation Techniques
- Learning Linux Kernel Exploitation - Part 1