PwnLab.Me Türkiyedeki Siber Güvenlik ekosistemini canlandırmak, ekosisteme yeni insanlar kazandırmak ve bu alanda edinilen bilgi ve tecrübeyi Siber Güvenlik meraklılarıyla paylaşmayı hedefleyen gönüllü bir Siber Güvenlik Topluluğudur.
Bu repo, Siber Güvenlik alanına ilgi duyan herkesin burada bulunan kaynaklardan faydalanması için PwnLab.Me Siber Güvenlik Topluluğu tarafından oluşturulup genel erişime açılmıştır.
https://mega.nz/folder/1cgAAKTQ#TsXutcd8w6GKFVfAJ_owaQ
https://arsiv.kekikakademi.workers.dev/ → user:pass → @KekikAkademi:@KekikKitap
https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
https://www.kgay4all.com/seioqueseiporleroqueleio/Security/
https://drive.google.com/drive/folders/1CdrveRU2iXGabR-nQ-G1o9GC4GusU-92?usp=sharing
https://github.com/LuNiZz/siber-guvenlik-sss
https://www.linode.com/docs/guides/
https://viperone.gitbook.io/pentest-everything/
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
https://www.microsoft.com/en-us/securityengineering
https://www.gnupg.org/documentation/manuals/gcrypt/
https://www.hackingarticles.in/
https://danielmiessler.com/blog/
https://www.redtimmy.com/blog/
https://inteltechniques.com/blog/
https://taosecurity.blogspot.com/
https://benjaminstrick.com/blog/
https://blog.bushidotoken.net/
https://www.intelligencewithsteve.com/blog
https://www.osintcombine.com/blog
https://t.me/cloudandcybersecurity
https://t.me/AdliBilisimTurkiye
[ Cover6 Solutions ] https://www.youtube.com/c/Cover6Solutions/
[ Hak5 ] https://www.youtube.com/user/Hak5Darren
[ DEFCONConference ] https://www.youtube.com/user/DEFCONConference
[ stacksmashing ] https://www.youtube.com/c/stacksmashing
[ Authentic8 ] https://www.youtube.com/user/Authentic8TV
[ conINT ] https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos
[ OSINT Dojo ] https://www.youtube.com/osintdojo
[ Mehmet D. INCE ] https://www.youtube.com/c/MehmetDursunInce/
[ Can Deger ] https://www.youtube.com/c/CanDeger/
[ Utku Sen ] https://www.youtube.com/c/UtkuSenYoutube/
[ Atil Samancioglu ] https://www.youtube.com/channel/UCnmAu7FF7LeoyTozrMVtTxQ/
[ Omer Citak ] https://www.youtube.com/user/Om3rCitak/
[ Z-winK University (ZU) - Bug Bounty Education ] https://www.youtube.com/channel/UCDl4jpAVAezUdzsDBDDTGsQ/videos
[ Jeremy's IT Lab ] https://www.youtube.com/c/JeremysITLab
https://portswigger.net/web-security/all-labs
https://www.cyberseclabs.co.uk/
https://www.wechall.net/active_sites
https://overthewire.org/wargames/
http://packetstormsecurity.com/
https://packetstormsecurity.com/
https://www.vulnerability-lab.com/
http://lwn.net/Vulnerabilities/
http://www.vulnerability-lab.com/
http://www.securityfocus.com/bid
https://secunia.com/community/advisories/search/
http://denimgroup.com/resources-threadfix/
https://www.cdn77.com/tls-test
https://www.wormly.com/test_ssl/
https://www.digicert.com/help/
http://www.hacking-tutorial.com/
https://www.offensive-security.com/
http://breakthesecurity.cysecurity.org/
http://www.spacerogue.net/wordpress/
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://vimeo.com/channels/fullscopesecurity
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
https://www.virustotal.com/nl/
https://urlhaus.abuse.ch/browse/
https://www.threatcrowd.org/listMalware.php?antivirus=Spook
https://otx.alienvault.com/pulse/617bc03687a50f0425bed393
http://www.covert.io/threat-intelligence/
http://tools.kali.org/tools-listing
http://www.romhacking.net/utilities/
http://www.blackarch.org/tools.html
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
https://gexos.github.io/Hacking-Tools-Repository/
http://www.darknet.org.uk/category/hacking-tools/
https://pentest-tools.com/reconnaissance/google-hacking
http://services.ce3c.be/ciprg/
http://www.coffer.com/mac_find/
http://www.nirsoft.net/countryip/
http://www.sockets.com/services.htm
http://www.ip2location.com/demo
http://www.my-ip-neighbors.com/
http://freegeoip.net/static/index.html
http://www.ip-adress.com/ipaddresstolocation/
https://projectdiscovery.io/#/
https://wheregoes.com/trace/2022349876/
https://reverseip.domaintools.com/
http://codebeautify.org/encrypt-decrypt
http://www.yellowpipe.com/yis/tools/encrypter/
http://www.tools4noobs.com/online_tools/decrypt/
http://textmechanic.com/Encryption-Generator.html
http://www.onlinehashcrack.com/
http://www.md5this.com/index.php
http://www.netmd5crack.com/cracker/
http://www.tydal.nu/article/md5-crack/
https://isc.sans.edu/tools/reversehash.html
https://diafygi.github.io/webrtc-ips/
http://www.receivesmsonline.net/
http://www.receive-sms-online.info/
http://www.fakenamegenerator.com/
http://names.igopaygo.com/people/fake_person
http://exif.regex.info/exif.cgi
https://29a.ch/photo-forensics/#forensic-magnifier
https://github.com/GuidoBartoli/sherloq
https://www.comparitech.com/net-admin/kali-linux-cheat-sheet/
https://www.maketecheasier.com/guide-to-mastering-linux/
https://linoxide.com/linux-directory-structure/
https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/
https://0x00sec.org/t/fileless-malware/26973
https://github.com/hasherezade/malware_training_vol1
https://zeltser.com/malware-analysis-webcast/
https://sechub.medium.com/blue-team-system-live-analysis-part-1-a-proactive-hunt-8258feb7cb14
https://sechub.medium.com/blue-team-system-live-analysis-part-2-windows-rules-and-tools-fc42be6c060d
https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/analyzing-pdf-malware-part-1/
https://soolidsnake.github.io/2021/07/17/hellokitty_linux.html
https://www.meridiandiscovery.com/articles/word-forensic-analysis-compound-file-binary/
https://github.com/cugu/awesome-forensics
https://www.forensicfocus.com/articles/a-linux-forensics-starter-case-study/
https://protectioncircle.org/2017/03/06/the-osint-connection-intelligence-in-executive-protection/
https://systemweakness.com/osint-on-gmail-accounts-fc60d785ff87
https://niiconsulting.com/checkmate/2020/09/passive-subdomain-enumeration-part-1/
https://niiconsulting.com/checkmate/2020/10/active-subdomain-enumeration-part-2/
https://www.scythe.io/library/threat-thursday-top-ransomware-ttps
https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html
https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/
http://www.pentest-standard.org/index.php/Intelligence_Gathering
https://inteltechniques.com/osintbook/
http://www.securitysift.com/passive-reconnaissance/
https://www.youtube.com/user/irongeek/search
https://www.youtube.com/channel/UCjzceWf-OT3ImIKztzGkipA/videos
https://www.youtube.com/c/0x4rk%C3%98/videos
https://www.youtube.com/user/Authentic8TV
https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos
https://www.youtube.com/osintdojo
https://www.youtube.com/playlist?list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S
https://www.youtube.com/watch?v=p4JgIu1mceI
https://courses.thecyberinst.org/courses/osintmini
https://courses.thecyberinst.org/courses/osint-challenge
https://www.tracelabs.org/initiatives/search-party
https://kit.exposingtheinvisible.org/en/
https://cyberdefenders.org/blueteam-ctf-challenges/38
https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence
https://www.osinttechniques.com/
https://www.phishlabs.com/blog/
https://owasp.org/www-project-juice-shop/
https://portswigger.net/web-security
https://cheatsheetseries.owasp.org/
https://github.com/xdavidhu/awesome-google-vrp-writeups
https://wiki.owasp.org/index.php/OWASP_favicon_database
https://medium.com/@raymond-lind/ssrf-lfi-in-uploads-feature-321d83b93ec0
https://blog.shiftleft.io/node-js-vulnerability-cheatsheet-447b0c9bdb99
https://infosecwriteups.com/everything-you-need-to-know-about-clickjacking-a522b188f2fe
https://ozguralp.medium.com/bigquery-sql-injection-cheat-sheet-65ad70e11eac
https://github.com/TheKingOfDuck/fuzzDicts
https://github.com/danielmiessler/SecLists
https://www.youtube.com/c/CihangirTezcan/videos
https://github.com/mdisec/crpyto101-egitim
https://nordpass.com/most-common-passwords-list/
https://github.com/berzerk0/Probable-Wordlists
https://github.com/utkusen/turkce-wordlist
https://github.com/xajkep/wordlists
https://blog.g0tmi1k.com/2011/06/dictionaries-wordlists/
https://github.com/danielmiessler/SecLists
https://AlienVault.com : Düşmanları profilleyen çoklu kaynaklar bulundurur.
https://Cyveilance.com : Benzersiz tehdit oyuncuları ile beslenir ve cezai yaptırımları belirtir.
https://EmergingThreats.net : Çeşitli yayınları bulunmaktadır.
https://FireEye.com : Dinamik Tehdit İstihbarat servisidir.
https://HackSurfer.com : İşinize uyarlanmış bilgiler sunar.
https://InternetIdentity.com : Tehdit, büyük veri çözümü ActiveTrust'ten beslenir.
https://RecordedFuture.com : Web'den gerçek zamanlı tehdit zekâsı verileri sunar
https://SecureWorks.com : Yayınlar ve ayrıca belgeler sağlar.
https://Symantec.com : DeepInsight da dahil olmak üzere çeşitli konularda yayınları vardır.
https://Spytales.com : Tehdit aktörlerinin geçmişi, bugünü ve geleceği hakkında bilmeniz gereken bilgiler sunar.
https://Team-Cymru.com : Tehdit istihbarat ve Bogon listeleri sunar.
https://TheCyberThreat : Kendi Twitter yayınlarını sunar . Üst düzey ve kapsamlı yayınlardır.
https://ThingsCyber.com : Günümüz savunmasıyla ilgili siber çatışma ve siber güvenlik konusundaki kritik noktaları belirtir.
https://ThreatConnect.com : Cyber Squared tarafından bilgi paylaşımına odaklanmış bir servistir.
https://ThreatGrid.com : Birleşik kötü amaçlı yazılım analizi üzerine çalışır.
https://ThreatIntelligenceReview.com : Tehdit istihbarat kaynaklarının incelemesi ve güncellenmesi üzerine çalışır.
https://ThreatStop.com : IP kaynağına göre Bontet’lerin engellenmesi üzerine çalışır.
https://ThreatTrack.com : Kötü amaçlı URL'lerin, IP'lerin ve kötü amaçlı yazılım / kimlik avı ile ilgili verilerin akışı ile çalışmaktadır.