A curated list of awesome forensic analysis tools and resources
Introduction to IT & Cybersecurity
syllabus pdf
-> download
- System Administrator
- Network Administrator
- Incident responder
- Penetration Tester/Ethical Hacker
- Cloud Engineer
- Cyber Security Manager
- Privacy Analyst
reading list pdf
->
- Basic Security
- The web application hacker
- Gray hat Python
- ocial Engineering
- The_Pentester_Blueprint
- bug-bounty-bootcamp
Penetration Testing and Ethical Hacking
Suppliment Materials | |
---|---|
download-->pdf | 100+ bounty tips |
download-->pdf | 2FA Bypass Techniques |
download-->pdf | 7h3pr0xy-The ShellCoders Handbook |
download-->pdf | Aragog Writeup Enc |
download-->pdf | Basic Security Testing with Kali Linux |
download-->pdf | Book of Tips by Aditya shende |
download-->pdf | Bounty Writeup Enc |
download-->pdf | bug bounty dorks |
download-->pdf | Bug bounty Essentials |
download-->pdf | Bug Bounty Hunting essentials |
download-->pdf | Bug bounty hunting for intermediates |
download-->pdf | bug hunting automation |
download-->pdf | bug-bounty-bootcamp-the-guide-to-finding-and-reporting-web-vulnerabilities-1nbsped-1718501544-9781718501546 |
download-->pdf | Bugbounty cheatsheet |
download-->pdf | Canape Writeup Enc |
download-->pdf | Car.Hackers.Handbook.Penetration.Tester.4376 |
download-->pdf | CASP__COURSE_REFERENCES |
download-->pdf | CASP__Syllabus_and_Outline__1_ |
download-->pdf | CASP_Study_Guide.docx__1_ |
download-->pdf | Celestial Writeup Enc |
download-->pdf | Chatterbox Writeup Enc |
download-->pdf | Cheatsheet_Metasploit |
download-->pdf | Cheatsheet_Python |
download-->pdf | Cheatsheet_WindowsCommandLine |
download-->pdf | CISSP_Flashcards__1___1_ |
download-->pdf | CISSP_Glossary_June_2019__4___1_ |
download-->pdf | CISSP_Review_Question_Answer_Key |
download-->pdf | CISSP_Review_Questions |
download-->pdf | CISSP_Study_Guide__1_ |
download-->pdf | CISSP_Syllabus_and_Outline__2___1_ |
download-->pdf | CompTIA_CASP__Study_Guide |
download-->pdf | CSRFZine |
download-->pdf | Cybrary_CASP__CompTIA_Course_Quiz_Questions.docx__1_ |
download-->pdf | Dafydd Stuttard, Marcus Pinto - The web application hacker's handbook_ finding and exploiting security flaws-Wiley_2011 |
download-->pdf | Dev0ops Writeup Enc |
download-->pdf | Ethical Hacking Mind Map |
download-->pdf | File Upload Restrictions Bypass |
download-->pdf | free Kali Linux 2_ Windows Penetration Testing |
download-->pdf | Frogy's Mindmap |
download-->pdf | Ftp-user-enum |
download-->pdf | Gaining Access Android Doc |
download-->pdf | Gray hat Python |
download-->pdf | Hack Metasploitable 2 Including Privilege Escalation |
download-->pdf | Hack Metasploitable 2 Including Privilege Escalation1 |
download-->pdf | Hack Metasploitable 2 Part 1 |
download-->pdf | Hack Metasploitable 2 Part 2 |
download-->pdf | Hacking Android |
download-->pdf | Hacking_tools_cheat_sheet_v2.0 |
download-->pdf | Hiren’s Bootcd Pe X64 (V1.0.1) – Iso Content |
download-->pdf | HolyBugx File Upload Checklist |
download-->pdf | How To Exploit Apache Struts Vulnerability Cve 2017 |
download-->pdf | How To Exploit Shellshock Vulnerability Cve 2014 |
download-->pdf | How To Use Sqlmap For Beginners |
download-->pdf | Html Injection |
download-->pdf | Ident-user-enum |
download-->pdf | Inger-user-enum |
download-->pdf | Jerry Writeup Enc |
download-->pdf | Jhaddix bug hunting methodology |
download-->pdf | Launch Venom |
download-->pdf | Linux Pocket Guide 3rd Edition |
download-->pdf | Linux+ Study Guide 2019 Exam XK0-004 |
download-->pdf | Mind Maps Collection |
download-->pdf | Netcease |
download-->pdf | Nibbles Writeup Enc |
download-->pdf | Olympus Writeup |
download-->pdf | OSCP Guide |
download-->pdf | OSCP Notes |
download-->pdf | p15_WPA-crack |
download-->pdf | Pentesting checklist by Tushar |
download-->pdf | Perl-reverse-shell |
download-->pdf | Php-findshock-shell |
download-->pdf | Php-reverse-shell |
download-->pdf | Poison Writeup Enc |
download-->pdf | PortSwigger XSS Cheatsheet |
download-->pdf | Python_Ethical_Hacking_from_Scratch_Think_like_an_ethical_hacker |
download-->pdf | Reverse Shell Cheat Sheet |
download-->pdf | Romhack 2018 - Andrea Pierini |
download-->pdf | Set-toolkit_user_manual |
download-->pdf | six2dez Pentest checklist |
download-->pdf | Smtp-user-enum |
download-->pdf | Social Engineering |
download-->pdf | SOPZine |
download-->pdf | SQL Zine |
download-->pdf | SSRF bible. Cheatsheet |
download-->pdf | SSRF Headers |
download-->pdf | Sunday Writeup Enc |
download-->pdf | The_Pentester_Blueprint |
download-->pdf | Valentine Writeup Enc |
download-->pdf | Waldo Writeup Enc |
download-->pdf | Web application penetration testing |
download-->pdf | WebAuthZine |
download-->pdf | workshop-material |
download-->pdf | XSS Cheatsheet 2020 |
download-->pdf | XSSZine |
download-->pdf | XXE notes |
download-->pdf | Zseano Methodology |
Netwrok Troubleshooting and Tools
syllabus and outline
->
download
study guide
->
download
glossary
->
download
Mobile App Security
syllabus and outline
->
download
study guide
->
download
glossary
->
download
Computer Hacking and Forensics
CHF Syllabus & Outline
->
download
CHF Course Notes
->
download
CHF Study Guide
->
download
CHF Glossary
->
download
CHF Tool Notes
->
download
CHF Cisco Router Log Information
->
download
CHF Recommended Labs
->
download
CHF Additional Tools to Know
->
download
CHF Module 1 | Analyze Photos Lab - Step by Step Guide
->
download
CHF Module 3 | Recovering Graphics Files Lab - Step by Step Guide
->
download
CHF Module 4 | Live Data Acquisition Lab - Step by Step Guide
->
download
Writeup PDF File
- Aragog Writeup Enc
- Bounty Writeup Enc
- Canape Writeup Enc
- Celestial Writeup Enc
- Chatterbox Writeup Enc
- Dev0ops Writeup Enc
- FTP-User-Enum
- Gaining Access Android Doc
- Hacking_Tools_Cheat_Sheet_V2.0
- Hack Metasploitable 2 Including Privilege Escalation1
- Hack Metasploitable 2 Including Privilege Escalation2
- Hack Metasploitable 2 Part 1
- Hack Metasploitable 2 Part 2
- Hiren’S Bootcd Pe X64 (V1.0.1) – Iso Content
- How To Exploit Shellshock Vulnerability Cve 14
- How To Exploit Apache Struts Vulnerability Cve 17
- How To Use Sqlmap For Beginners
- HTML Injection
- Ident-User-Enum
- Inger-User-Enum
- Jerry Writeup Enc
- Launch Venom
- NetCease
- Nibbles Writeup Enc
- Olympus Writeup
- Poison Writeup Enc
- Perl-Reverse-Shell
- PHP-Findshock-Shell
- PHP-Reverse-Shell
- Reverse Shell Cheat Sheet
- RomHack 18 - Andrea Pierini - Whoami Priv - Show Me Your Windows Privileges And I Will Lead You To System.pdf
- SET-Toolkit_user_manual
- SMTP-User-Enum
- Sunday Writeup Enc
- Valentine Writeup Enc
- Waldo Writeup Enc
Course outliine
syllabus pdf
->
Penetration_Testing_and_Ethical_Hacking_Syllabus_and_Outline__1___2_
Instructor Notes
notes pdf
->
CEH_Notes
List of Books to Read
- Social Engineering: The Art of Human Hacking
- Mind Wars: A History of Mind Control, Surveillance, and Social Engineering by the Government, Media, and Secret Societies
- Social Engineering: The Science of Human Hacking
- Tavistock Institute: Social Engineering the Masses