Please note, this list is not as up to date as the html that is in the repo. Please import the html bookmarks into your browser for the most up to date list. I will eventually get around to updating this list here.
edX | Free online courses from the world's best universities
Udacity - Free Online Classes & Nanodegrees | Udacity
Khan Academy | Free Online Courses, Lessons & Practice
3Blue1Brown - Teaches Hard Concepts Well!
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1 - YouTube
Modern Binary Exploitation - Spring 2015
GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC
Computer Systems Security | Electrical Engineering and Computer Science | MIT OpenCourseWare
Electrical Engineering and Computer Science | MIT OpenCourseWare | Free Online Course Materials
Network and Computer Security | Electrical Engineering and Computer Science | MIT OpenCourseWare
Live Overflow - Where to start with hacking
The Importance of Deep Work & The 30-Hour Method for Learning a New Skill | Azeria Labs
How to Build a Successful Career in Cybersecurity - Daniel Miessler
Good List of Practice Areas in CyberSecurity
So, you want to work in security? – freeCodeCamp
VeteranSec – A Veteran Cyber Security Community
Hackaday | Fresh hacks every day
NYU Tandon Vulnerability Research and Pen Test Course
CBT Nuggets - Awesome For Certs
Whitehatters Computer Security Club
Open Security Training - Lots of Beginner Stuff
Null Byte — Random Hacking Tutorials
Free Military Cyber Training - PCTC (Requires Invite?)
600 free online courses you can take from universities worldwide
Lynda.com (Requires Library Card) - Lots of Free Training On Various Subjects
ossu/computer-science: Path to a free self-taught education in Computer Science!
Teach Yourself Computer Science
Coding-interview-university: A complete computer science study plan to become a software engineer.
joyoyao/interviews: Everything you need to know to get the job.
CS Dojo - CS Stuff Explained Well!
Berkeley CS and EE Course Achives
Stevey's Blog Rants: Get that job at Google
ABC: Always Be Coding – Always Be Coding – Medium
List of free university courses for learning Computer Science!
awesome-courses/README.md at master · prakhar1989/awesome-courses
Computer Programming/Standards and Best Practices - Wikibooks, open books for an open world
Set (abstract data type) - Wikipedia
Library (computing) - Wikipedia
Chapter 22: Pointers to Pointers
Software Design Patterns - GeeksforGeeks
Refactoring: When and Why (Okay example in PERL)
"The Clean Code Talks -- Inheritance, Polymorphism, & Testing" - YouTube
C++ Tutorial 11 : Polymorphism - YouTube
java - Why is "2 * (i * i)" faster than "2 * i * i"? - Stack Overflow
Programming Pearls (2nd Edition): Jon Bentley: 0785342657883: Amazon.com: Books
Programming · isislab/Project-Ideas Wiki
Must Do Coding Questions for Companies like Amazon, Microsoft, Adobe, ... - GeeksforGeeks
LeetCode - The World's Leading Online Programming Learning Platform
CodinGame - Practice coding with fun programming challenges - CodinGame
HackerRank | Technical Recruiting | Hiring the Best Engineers
Explore 150+ Coding Challenges | edabit.com
/r/DailyProgrammer Challenges!
Coderbyte | Programming challenges and courses
Codewars | Train with Programming Challenges
Topcoder - Competitive Programming
Free Programming Books – GoalKicker.com
RegExr: Learn, Build, & Test RegEx
Atlassian Bitbucket Git Code Management Tool for Teams
OverAPI.com | Collecting all the cheat sheets
free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books
CS50's Introduction to Computer Science | edX
Practical Programming in C | MIT OpenCourseWare
Home | Lynda | Georgia Institute of Technology | Atlanta, GA
How Do I Declare A Function Pointer in C?
C Tutorial - Learn C - Cprogramming.com
Function Pointers in C and C++ - Cprogramming.com
Intro to OS - C Programming Q&A - YouTube
How to use Time and Date in C | CodingUnit Programming Tutorials
A Little C Primer/C String Function Library - Wikibooks, open books for an open world
Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online
C/C++ for Hackers « Null Byte :: WonderHowTo
How Do I Declare A Function Pointer in C?
C reference - cppreference.com
The rule of three/five/zero - cppreference.com
C++ reference - cppreference.com
Data Structures and Algorithms in C++, Second Edition: Safari Books Online - Premium
Introduction to Computer Science and Programming in Python - MIT
The Python Tutorial — Python 3.7.0 documentation
Welcome to Python 101! — Python 101 1.0 documentation
MIT - Introduction to Computer Science and Programming Using Python
How to Learn Python Tutorial - Easy & simple! Learn How to Learn Python! - YouTube
Python's Class Development Toolkit - YouTube
Transforming Code into Beautiful, Idiomatic Python - YouTube
What Does It Take To Be An Expert At Python? - YouTube
Python Network Programming - TCP/IP Socket Programming - YouTube
UsingAssertionsEffectively - Python Wiki
Data model (Dunder Methods, i.e., repr)
PEP 8 -- Style Guide for Python Code | Python.org
Popular Python recipes « ActiveState Code
oop - What is the difference between @staticmethod and @classmethod in Python? - Stack Overflow
Enriching Your Python Classes With Dunder (Magic, Special) Methods – dbader.org
Interfacing Python and C: Advanced “ctypes” Features – dbader.org
Serious Python | No Starch Press
Math Adventures with Python | No Starch Press
How to Write Perfect Python Command-line Interfaces — Learn by Example
Writing Python Command-Line Tools With Click – dbader.org
python - Permanently add a directory to PYTHONPATH - Stack Overflow
How do I find the location of Python module sources? - Stack Overflow
installation - How do I find the location of my Python site-packages directory? - Stack Overflow
Python Training by Dan Bader – dbader.org
10 Essential Python Tips And Tricks For Programmers - GeeksforGeeks
Understanding the underscore( _ ) of Python – Hacker Noon
Learn Shell Programming - Free Interactive Shell Programming Tutorial
The Linux Documentation Project: Guides
LinuxCommand.org: Learning the shell.
OverTheWire: Bandit - Wargame For Learning UNIX Shell Stuff
OverTheWire: Leviathan - Unix Wargame
Bash tips & tricks: good and not-so-good bash practices | Pragmatic Coders
Introduction to Object-oriented Programming - MIT OpenCourseWare
University of Helsinki - Object-Oriented programming with Java, part I
Object-Oriented Programming - MIT OpenCourseWare
Stanford - CS108: Object Oriented Programming
Encapsulation, Inheritance, Shadowing - MIT OpenCourseWare
USC - CSCI 104 – Data Structures and Object Oriented Design
VisuAlgo - visualising data structures and algorithms through animation
Introduction to Algorithms | Electrical Engineering and Computer Science | MIT OpenCourseWare
Algorithms, Part II | Coursera
Introduction to Graduate Algorithms | Lecture videos+notes: GT CS 8803 GA
Introduction to Graduate Algorithms - Udacity
Algorithms | Computer science | Computing | Khan Academy
Algorithms for Visual Learners | Hackaday
19. Dynamic Programming I: Fibonacci, Shortest Paths - YouTube
What is complexity theory? (P vs. NP explained visually) - YouTube
Big-O Algorithm Complexity Cheat Sheet (Know Thy Complexities!) @ericdrowell
A Gentle Introduction to Algorithm Complexity Analysis
Analysis of Algorithms | Set 4 (Analysis of Loops) - GeeksforGeeks
Dynamic Programming - GeeksforGeeks
Greedy Archives - GeeksforGeeks
Harvard - Advanced Algorithms (CS 224)
An Introduction to programming with threads
hessmjr/operating-systems: Georgia Tech OMSCS - Operating Systems
drharris/pretty-bonnie: Helps with Bonnie test output on Udacity.
Interactive map of Linux kernel
Linux source code: (v4.20) - Bootlin
GOOD - SystemProgramming Wiki · GitHub
Spring19-schedule.xlsx - Google Sheets
The Case For Architecture-Aware OS Kernel
Formal Requirements for Virtualizable Third Gen Architectures
Virtual Machine Monitors: Current Tech and Future Trends
Implementing Remote Procedure Calls
.net - What's the purpose of Thread.SpinWait method? - Stack Overflow
CppCon 2018: Greg Law “Debugging Linux C++” - YouTube
PRIMER - Unix and Internet Fundamentals
Operating Systems: Three Easy Pieces
AOSPrereq-and-Concepts-List.pdf
Advanced Operating Systems Readings - Udacity
CS 2200 An Introduction to Computer Systems and Networks
CS 2200 - Prof. Kishore Ramachandran - YouTube
Berkeley CS 162: Operating Systems and Programming
MikeOS - simple x86 assembly language operating system
Operating systems development for Dummies – Leo Whitehead – Medium
Writing a Tiny x86 Bootloader - Joe Bergeron
Bitwise, Day 0: Overview and Q&A - YouTube
os01 | Bootstrap yourself to write an OS from scratch. A book for self-learner.
The little book about OS development
Kernels 101 – Let’s write a Kernel - Arjun Sreedharan
Kernels 201 - Let’s write a Kernel with keyboard and screen support - Arjun Sreedharan
raspberry-pi-os: Learning operating system development using Linux kernel and Raspberry Pi
Berkeley Foundations of Software Engineering
UC Berkeley CS 169 Software Engineering
Allen Holub: Training/Consulting/Programming: Agile, Architecture, Swift, Java
Field Guide to Genetic Programming
Artificial Intelligence: A Modern Approach (3rd Edition)
Machine Learning Books : MachineLearning
Microsoft Word - EvolProg_Introduction.doc
awesome-machine-learning/books.md at master · josephmisiti/awesome-machine-learning · GitHub
https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/
Machine Learning & Artificial Intelligence: Crash Course Computer Science #34 - YouTube
Crash Course in Machine Learning – IoT For All – Medium
Machine Learning Crash Course 2015 - YouTube - YouTube
Prof. Lorenzo Rosasco (part 1) - Machine Learning: A basic toolkit - YouTube
awesome-machine-learning/courses.md at master · josephmisiti/awesome-machine-learning · GitHub
Artificial Intelligence | Electrical Engineering and Computer Science | MIT OpenCourseWare
13. Learning: Genetic Algorithms - YouTube
Deep Learning Summer School, Montreal 2015 - VideoLectures - VideoLectures.NET
Kaggle: Your Home for Data Science
Deep Learning Tutorials — DeepLearning 0.1 documentation
Creating a genetic algorithm for beginners
7 Steps to Mastering Machine Learning With Python
Top 10 Machine Learning Algorithms for Beginners
8 Fun Machine Learning Projects for Beginners
Andrew NG Intro to Machine Learning
scikit-learn: machine learning in Python — scikit-learn 0.19.1 documentation
Metacademy - Deep learning from the bottom up
Introduction To Genetic Algorithms | Codecademy
Collection: Getting started with machine learning · GitHub
Topic: evolutionary-computation · GitHub
Welcome — Theano 1.0.0 documentation
Start Here With Machine Learning - Machine Learning Mastery
Choosing the right estimator — scikit-learn 0.19.1 documentation
Geoffrey Hinton Neural Networks for Machine Learning
A curated list of adversarial machine learning resources
Machine Learning for Cyber Security Resources
[D] What is the best ML paper you read in 2018 and why? : MachineLearning
GitHub Learning Lab Teaches You GitHub by Using GitHub (Yes, Really)
Removing a remote - User Documentation
Git fails when pushing commit to github - Stack Overflow
Adding a new SSH key to your GitHub account - User Documentation
Learn Git- Git tutorials, workflows and commands | Atlassian Git Tutorial
Follow these simple rules and you’ll become a Git and GitHub master
How to save a puppy by creating a clean Git repo
Visual way to learn Git branching
Git Tutorial for Beginners: Command-Line Fundamentals - YouTube
Booting an Intel Architecture System, Part I: Early Initialization | Dr Dobb's
A list of events and fellowship opportunities for Computer Science students
Is it possible to be self taught and get a good job without a degree?
How do you get better at coding interviews? : learnprogramming
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Reversing: Secrets of Reverse Engineering: Eldad Eilam
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler: Chris Eagle
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
Reverse Engineering 101 - NYU Poly - 2009
Reverse Engineering 101 - NYU:Poly 2010
Reverse Engineering 102 - NYU:Poly 2010
Microcorruption - Interactive Intro to RE
RE for Beginners | Reverse Engineering
RPI - CSCI 4971 - Secure Software Principles (RE stuff)
RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec
[KEYGENME - EASY] Cracking Your First Program - Reverse Engineering / Challenges - 0x00sec
Malwarebytes CrackMe 2 by hasherazade
How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs
Reverse Engineering & Exploitation of a “Connected Alarm Clock” – Courk's Blog
2018 B-day Reverse Engineering Challenge
2018 Flare-On Challenge Solutions « 2018 Flare-On Challenge Solutions | FireEye Inc
2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions | FireEye Inc
Flareon 5 Challenge 6 - Magic (Walk through - Reverse Engineering) - YouTube
BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)
BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)
Getting ready for Assembly Programming – Anatomy of Intel Processor - Part 2
Getting ready for Assembly Language Programming – Part 1
Getting started with Assembly language programming - End of theory - Part 3
Assembly Language Programming and Shellcoding - Lab setup and some important things - Part 4
Assembly Language Programming and Shellcoding - Hello World - Part 5
Assembly Language Programming and Shellcoding - Important Functions - Part 6
Assembly Language Programming and Shellcoding – Important Functions – Part 7
Part 1 - Reverse Engineering Basics - Linux x64
Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64
Part 3 - Reverse Engineering Basics - Linux on ARM64
Part 3-2 - Reverse Engineering - Patching Binaries with Radare2 - ARM64 - ScriptDotSh
The Basics of IDA Pro - InfoSec Resources
Reversing Basics - A Practical Approach Using IDA Pro | www.SecurityXploded.com
ida pro tutorial for beginners - Google Search
Basic Dynamic Analysis with IDA Pro and WinDBG - YouTube
GitHub - patois/IDACyber: Data Visualization Plugin for IDA Pro
Real-world Decompilation with IDA Pro - Part 1: Introduction - YouTube
Real-world Decompilation with IDA Pro - Part 2: String Handling - YouTube
IDA series, part 2: debugging a .NET executable
IDA series, part 1: the Hex-Rays decompiler
Marco Ramilli's Blog: How to Patch Binary with IDA Pro
daniel_plohmann / simpliFiRE.IDAscope — Bitbucket
GitHub - onethawt/idaplugins-list: A list of IDA Plugins
GitHub - Maktm/FLIRTDB: A community driven collection of IDA FLIRT signature files
Binary Cracking & Byte Patching with IDA Pro - CodeProject
Free IDA Pro Reverse Code Engineering and Binary Auditing Training Material for University Lectures
Using Z3 with IDA to simplify arithmetic operations in functions | Shortjump!
RE for Beginners | Short Intro to IDA
IDA Shortcuts [PDF]
GitHub - ColdHeat/liil: Linear IL view for Binary Ninja
2000 cuts with Binary Ninja | Trail of Bits Blog
De-obfuscating Jump Chains with Binary Ninja - This is Security :: by Stormshield
GitHub - radare/radare2: unix-like reverse engineering framework and commandline tools
A journey into Radare 2 – Part 2: Exploitation – Megabeets
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2 - YouTube
Radare2: An Introduction to Visual Mode - MOVEAX.ME
Reverse Engineering Using Radare2 – Jacob Pimental – Medium
Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium
Crackme0x04 Dissected with Radare2 - MOVEAX.ME
Crackme0x03 Dissected with Radare2 - MOVEAX.ME
Crackme0x05 Dissected with Radare2 - MOVEAX.ME
Crackme0x06 Dissected with Radare2 - MOVEAX.ME
Crackme0x07 Dissected with Radare2 - MOVEAX.ME
Crackme0x08 Dissected with Radare2 - MOVEAX.ME
Debugging Using Radare2… and Windows! – Jacob Pimental – Medium
Crackme0x09 Dissected with Radare2 - MOVEAX.ME
Reversing a Self-Modifying Binary with radare2 – Megabeets
Reverse engineering a Gameboy ROM with radare2 – Megabeets
BombLab Dissected with Radare2 - MOVEAX.ME
Dr Von Noizeman's Nuclear Bomb defused with Radare2 - MOVEAX.ME
Crackme0x01 Dissected with Radare2 - MOVEAX.ME
Conditions and loops – Max Kersten
radare2 python scripting - r2wiki
radare2-extras/r2snowman at master · radare/radare2-extras
radareorg/radeco: radare decompiler tool based on radeco-lib
radareorg/cutter: A Qt and C++ GUI for radare2 reverse engineering framework
A journey into Radare 2 – Part 1: Simple crackme – Megabeets
Plugins · x64dbg/x64dbg Wiki · GitHub
GitHub - x64dbg/x64dbg: An open-source x64/x32 debugger for windows.
Debugging with GDB Introduction | Azeria Labs
longld/peda: PEDA - Python Exploit Development Assistance for GDB
Using GDB to Develop Exploits - A Basic Run Through
Compiler Explorer - Programming Language to Assembler Converter
x86 Disassembly/Disassemblers and Decompilers - Wikibooks, open books for an open world
Veles - Visual Binary Analysis Tool
Debuggex: Online visual regex tester. JavaScript, Python, and PCRE.
x86 Assembly - YouTube - YouTube
Breaking the x86 Instruction Set - YouTube
A Crash Course in x86 Assembly for Reverse Engineers
When and how to use an assembler. Assembly programming basics.
x86 In-Depth: CDECL Calling Convention Complete Tutorial - BONUS video - YouTube
What are the calling conventions for UNIX & Linux system calls on i386 and x86-64 - Stack Overflow
Executable and Linkable Format 101. Part 2: Symbols - Intezer
Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer
Automatic Reverse Engineering of Data Structures from Binary Execution [PDF]
Digging For Data Structures [PDF]
TIE: Principled Reverse Engineering of Types in Binary Programs [PDF]
MemPick: High-Level Data Structure Detection in C/C++ Binaries [PDF]
Howard: a dynamic excavator for reverse engineering data structures [PDF]
.NET Reverse Enginering - Part 1 – CodePool – Programming and a bit more
Getting Started with Windows Debugging - Windows 10 hardware dev
Debug Universal Drivers - Step by Step Lab (Echo Kernel-Mode) - Windows 10 hardware dev
Exploring Windows virtual memory management
An In-Depth Look into the Win32 Portable Executable File Format - Part 1 - DelphiBasics
An In-Depth Look into the Win32 Portable Executable File Format - Part 2 - DelphiBasics
Visual Studio Documentation | Microsoft Docs
An Introduction to Windows Kernel Debugging | Endgame
RPISEC - Malware Analysis 2013
RPISEC - Malware Analysis 2015
Open Security Training - Reverse Engineering Malware
How to start RE/malware analysis? | hasherezade's 1001 nights
Free Automated Malware Analysis Service - powered by Falcon Sandbox
REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware
ProcDump - Windows Sysinternals | Microsoft Docs
Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Daily Releases (February 14, 2018) : CrackWatch
CS.RIN.RU - Steam Underground Community • Index page
PwnAdventure3/re-mmorpg-troopers18.pdf at master · beaujeant/PwnAdventure3 · GitHub
You Have to Hack This Massively Multiplayer Game to Beat It | WIRED
GitHub - Vector35/PwnAdventureZ: NES zombie survival game made to be hacked
Getting Started With Game Hacking: The Definitive Guide (Part 1)
[Tutorial] Getting Started With Programming And Gamehacking
[Tutorial] Make your own dll hack | [1] | Memory patching & Editing
[Tutorial] CodeCave with OllyDbg
[Information] Useful C++/Gamehacking/Programming for beginners threads - Mega thread
Game Hacking: WinXP Minesweeper - Reverse Engineering - 0x00sec
Finding and exploiting hidden features of Animal Crossing’s NES emulator | jamchamb.github.io
Basics of Cryptography Part I: RSA Encryption and Decryption
jcryptool/doc: JCrypTool Documentation and Resources
Base64 Decode and Encode - Online
Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering
Build an 8-bit computer | Ben Eater
8-bit computer update - YouTube
Learning FPGA And Verilog A Beginner’s Guide Part 1 – Introduction | Numato Lab Help Center
Introduction to Firmware Reversing - YouTube
34C3 - Reverse engineering FPGAs - YouTube
The IoT Hacker's Toolkit · System Overlord
Analog Discovery 2 - National Instruments
Syonyk's Project Blog: DSO138 Scope, Acrylic Housing Assembly, and USB Power
Reverse Engineering Firmware: Linksys WAG120N – /dev/ttyS0
5-Min Tutorial: Lifting Firmware with the Bus Pirate – B-sides
ULN2003 - practical example of «reading» microchip schematic : ZeptoBars
How to crack open some computer chips and take your own die shots - ExtremeTech
fail0verflow :: ShofEL2, a Tegra X1 and Nintendo Switch exploit
fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia
fail0verflow :: PS4 Aux Hax 2: Syscon
fail0verflow :: PS4 Aux Hax 3: Dualshock4
Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP
Making a GameCube memory card editor with Raspberry Pi | jamchamb.github.io
Embedded Hardware Hacking 101 – The Belkin WeMo Link « Threat Research Blog | FireEye Inc
Reverse Engineering My Home Security System: Decompiling Firmware Updates
Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World
Heart of Darkness - exploring the uncharted backwaters of HID iCLASS RFID reader security
Hardware Hacking for Software People | Don't Stuff Beans Up Your Nose
Latest hacking topics - 0x00sec
Zero Day Initiative — VMware Exploitation through Uninitialized Buffers
In-Memory-Only ELF Execution (Without tmpfs) Mrs Quis Will Think of a Better Title
High-Level Approaches for Finding Vulnerabilities - @Jackson_T
How do I get started in vulnerability research? : ReverseEngineering
A bunch of Linux kernel exploitation resources
Travel blog of an evil transgirl: Reversing ALPC: Where are your windows bugs and sandbox escapes?
Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog
Vulnerability Discovery Against Apple Safari | Ret2 Systems Blog
Security Bulletins | Microsoft Docs
Null Byte Poisoning ~ The Magic Byte - Exploit Development - 0x00sec - The Home of the Hacker
Latest Exploit Development topics - 0x00sec - The Home of the Hacker
Cheat sheet - How Stack Pivots are used in Modern Exploits : ReverseEngineering
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Hacking: The Art of Exploitation, 2nd Edition
Amazon.com: Windows Internals, Part 2 (6th Edition) (Developer Reference)
RPISEC - Modern Binary Exploitation
Modern Binary Exploitation - Spring 2015
RPISEC INTROSEC - Command Line
RPISEC INTROSEC - Stegonography
CNIT 127: Exploit Development -- Sam Bowne
Violent Python and Exploit Development
Exploit-Exercises: Protostar (v2) ~ VulnHub
Exploit Education :: Andrew Griffiths' Exploit Education
OverTheWire: Narnia - Basic Exploitation
OverTheWire: Behemoth - Common Coding Mistakes
OverTheWire: Utumno - Intermediate Difficulty Wargame
OverTheWire: Maze - Exploitation/Programming/RE Wargame
OverTheWire: Semtex - Exploitation and RE
pwnable.kr - various pwn challenges regarding system exploitation
Installation — pwntools 3.12.0 documentation
Exploit Development with AFL, PEDA and PwnTools
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
Weaponization of Nessus Plugins
merrychap/shellen: Interactive shellcoding environment to easily craft shellcodes
0xdea/tactical-exploitation: Modern tactical exploitation toolkit.
Payload Generation using SharpShooter – MDSec
mdsecactivebreach/SharpShooter: Payload Generation Framework
Intermediate Level Linux Exploitation
Intro Binary Hacking Course - LiveOverflow
Open Security - Intro to Software Exploits for Linux
ExploitDev: Part 1 - Intro to Exploit Development
ExploitDev: Part 2 - Saved Return Pointer Overflowing
ExploitDev: Part 3 - Structured Exception Handler (SEH)
ExploitDev: Part 4 - Egg Hunters
ExploitDev: Part 6 - Win32 Shellcode
ExploitDev: Part 8 - Heap Spraying
ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)
ExploitDev: Part 10 - Kernal Exploitation - Stack Overflow
ExploitDev: Part 11 - Kernel Exploitation - Write-What-Where
ExploitDev: Part 12 - Kernel Exploitation - Null Pointer Dereference
ExploitDev: Part 13 - Kernel Exploitation - Uninitialized Stack Variable
ExploitDev: Part 14 - Kernel Exploitation - Integer Overflow
ExploitDev: Part 15 - Kernel Exploitation - Use After Free (UAF)
ExploitDev: Part 16 - Kernel Exploitation - Pool Overflow
ExploitDev: Part 17 - Kernel Exploitation - GDI Bitmap Abuse
ExploitDev: Part 18 - Kernel Exploitation - RS2 Bitmap Necromancy
ExploitDev: Part 19 - Kernel Exploitation - Logic bugs in Razer rzpnk.sys
A curated list of Windows Exploitation resources
Introduction to Windows Kernel Driver Exploitation (Pt. 1)
Starting with Windows Kernel Exploitation – part 1 – setting up the lab | hasherezade's 1001 nights
Shellcoding for Linux and Windows Tutorial
How to write a (Linux x86) egg hunter shellcode | Adventures in the programming jungle
Shellcode Injection - Dhaval Kapil
Writing ARM Shellcode | Azeria Labs
Linux Shellcoding (Part 1.0) - Exploit Development - 0x00sec - The Home of the Hacker
Best books, tutorials and courses to learn about exploit development
Ask HN: What's the prerequisite to become an exploit developer? | Hacker News
slimm609/checksec.sh: Checksec.sh
Corelan Team - Exploit Writing Tutorials
[Backdoor 101] Backdooring PE File by Adding New Section Header - Hack.Learn.Share
Memory Corruption 101 - NYU Poly 2011
Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team
Linux ExploitDev: Part 3 - Buffer Overflow
0x7 Exploit Tutorial: Bad Character Analysis
0x0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite
0×3 Exploit Tutorial: Buffer Overflow – SEH Bypass
Binary Exploitation ELI5– Part 1 –Stack/Buffer Overflow/Ret2Libc
Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations
SROP | Signals, you say? - Exploit Development - 0x00sec - The Home of the Hacker
Learn ROP through a short series of practical challenges : netsec
Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP
Notes/ret2libc.txt at master · Malformation/Notes
libc - offset - 64-bit Linux stack smashing tutorial: Part 3
Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray
Dive into ROP - a quick introduction to Return Oriented Programming
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
GitHub - shellphish/how2heap: A repository for learning various heap exploitation techniques.
ExploitDev: Part 8 - Heap Spraying
ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)
Finding and Understanding Bugs in C Compilers
Stateful Runtime Model Checking for Multithreaded Programs
funfuzz/src/funfuzz/js/jsfunfuzz at master · MozillaSecurity/funfuzz · GitHub
The Art of Fuzzing – Slides and Demos | SEC Consult
Automating Web Apps Input fuzzing via Burp Macros - SecureLayer7
Fuzzing: Brute Force Vulnerability Discovery
Fuzzing · isislab/Project-Ideas Wiki
Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878 – MDSec
HackerOne: Vulnerability Coordination and Bug Bounty Platform
How to Break Into Security, Miller Edition — Krebs on Security
Bug Bounty Toolkit – BugBountyHunting – Medium
Another list of bug bounty write-ups
How I could have stolen your photos from Google - my first 3 bug bounty writeups
Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations
aslur/offensivecon-talk.pdf at master · blackzert/aslur · GitHub
asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf
Exploitation Mitigation Techniques · isislab/Project-Ideas Wiki
Bypassing ASLR – Part I – sploitF-U-N
Writing a simple x86 emulator with IDAPython | Shortjump!
How to write an emulator (CHIP-8 interpreter) | Multigesture.net
pwnable.tw - wargame site for hackers to test and expand their binary exploiting skills.
Exploits Database by Offensive Security
CVE - Common Vulnerabilities and Exposures (CVE)
Recreating exploits - Disk Pulse Enterprise 9.9.16 - Remote Buffer Overflow (SEH) - Zero Aptitude
UMD - Intro to Ethical Hacking
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
Module 6 - Hacking Webservers - Free Ethical Hacking Course - en.gburu.net
Armitage - Metasploit Unleashed
Armitage | Penetration Testing Tools
Step by step Metasploit walkthrough
How to create metasploitable 3
How to setup Metasploitable 3 on Windows 10 - Hacking Tutorials
Metasploitable 2 Exploitability Guide
Home · rapid7/metasploitable3 Wiki · GitHub
Red Teaming and Pentesting Tips | synack.blog
Pen Testing Standard (READ FOR STUDYING)
Shared thoughts after 6+ years in Pentesting - Inspiration - 0x00sec - The Home of the Hacker
Where to start - 1st Line to Pen Testing : netsecstudents
Prep guide for Offsec’s PWK – Tulpa Security
offsec_pdfs: your offsec knowledge
abatchy's blog | How to prepare for PWK/OSCP, a noob-friendly guide
Offensive Security Training and Professional Services
Offensive Security – Godlike Security
Free Advanced Penetration Testing Training Class from Cybrary
Next Step After OSCP/OSCE? : netsecstudents
PWK Syllabus Scheduling Question For OSCP Holders : netsecstudents
Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks
Advice on Windows pentesting methodology (OSCP) : HowToHack
A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate
Exploit Writing Tutorials | Corelan Team - Part 2
Corelan Exploit Development Training
0x5 Course Review: Cracking The Perimeter (OSCE)
Cracking the Perimeter (CTP) + Offensive Security Certified Expert (OSCE)
Course Review: Offensive Security AWE (Advanced Windows Exploitation) - EH-Net Online Mag
abatchy's blog: OSCE Study Plan
31 days of OSCP Experience - ScriptDotSh
The OSCP: A Process Focused Review – Occult Sec
www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html
Zero to OSCP in 292 Days... or How I Accidentally the Whole Thing - Part 2
Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog
FindSubDomains.com — subdomains search service
Sublist3r: Fast subdomains enumeration tool
SubBrute: A DNS meta-query spider that enumerates DNS records, and subdomains.
A penetration tester’s guide to sub-domain enumeration
Domain Name Search | Domain Lookup
Gobuster: Directory/file & DNS busting tool written in Go
SANS - Foot Printing with WhoIS/DNS records
DNSdumpster.com - dns recon and research, find and lookup dns records
Information-Gathering Resources
Discover - Combination of Recon Tools
Th3Inspector 🕵️ best tool for Information Gathering 🔎
sullo/nikto: Nikto web server scanner
Google Dorks for finding Emails, Admin users etc.
SPARTA - scanning and enumeration phase tool
Exploitation Tools and Resources
Local File Inclusion (LFI) [Definitive Guide] - Aptive
PHP htaccess injection cheat sheet
A collection of web attack payloads.
Useful payloads and bypass for Web App
unicorn: PowerShell downgrade attack and inject shellcode straight into memory
Post-Exploitation Resources (Windows)
rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Post-Exploitation - NYU Poly 2011
Transferring files from Kali to Windows (post exploitation)
PowerSploit - A PowerShell Post-Exploitation Framework
Empire: A PowerShell and Python post-exploitation agent.
enum4Linux: is a Linux alternative to enum.exe
PwnWiki.io - TTPs (tools, tactics, and procedures) for what to do after access has been gained
Basic Linux Privilege Escalation
Linux_Exploit_Suggester: Linux Exploit Suggester; based on operating system release number
Linux-exploit-suggester-2: Next-Generation Linux Kernel Exploit Suggester
Checksec.sh - Check Securities on a file
Linux Privilege Escalation via Automated Script
A guide to Linux Privilege Escalation - payatu
Abusing SUDO (Linux Privilege Escalation)
Editing /etc/passwd File for Privilege Escalation
Linux Privilege Escalation Using PATH Variable
Linux Privilege Escalation using Misconfigured NFS
Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser
Privilege Escalation on Linux with Live examples
4 Ways to get Linux Privilege Escalation
Linux Privilege Escalation by Exploiting Cronjobs
Well, That Escalated Quickly… – To Shell And Back: Adventures In Pentesting
OSCP - Windows Priviledge Escalation
Checklists-Windows-Privilege-Escalation
Windows Privilege Escalation Fundamentals
Windows Privilege Escalation Guide
Windows Privilege Escalation Methods for Pentesters – Pentest Blog
A Virgil's Guide to Pentest: Escalation Time
BeRoot For Windows – Privilege Escalation Project – Haxf4rall
Elevating privileges by exploiting weak folder permissions | GreyHatHacker.NET
Windows / Linux Local Privilege Escalation Workshop
rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Reporting - The Penetration Testing Execution Standard
sample-penetration-testing-report.pdf
My First Go with BloodHound | Strategic Cyber LLC
Active Directory Pentesting Archives - ScriptDotSh
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)
Most Important Penetration Testing Cheat Sheet Linux Machine
SANS Penetration Testing Cheat Sheet: PowerShell
Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual
Network Security · isislab/Project-Ideas Wiki
Scapy: packet manipulation program & library
Online IP CIDR / VLSM Supernet Calculator
TCPDUMP/LIBPCAP public repository
GitHub - defuse/sockstress: Sockstress (TCP DoS) implementation.
hashcat - advanced password recovery
THC Hydra - brute force crack a remote authentication service
Patator: is a multi-purpose brute-forcer
Ophcrack - Windows Password Cracker
Nozzlr: Multithreaded Brute Forcer
Decrypt Google Chrome / Chromium passwords and credit cards on macOS / OS X.
A curated list of Threat Intelligence resources
List of Threat Intelligence Stuff
GitHub - x0rz/tweets_analyzer: Tweets metadata scraper & activity analyzer
Spiderfoot, an Open Source Intelligence Automation Tool
ꓘamerka — Build interactive map of cameras from Shodan
Open Source Intelligence Gathering 101 – Appsecco
Open Source Intelligence Gathering 201 (Covering 12 additional techniques)
Creepy: A geolocation OSINT tool
XRay - mapping and OSINT gathering from public networks.
Geotweet_GUI: Social engineering tool
DataSploit: An OSINT Framework to perform various recon techniques
Google Hacking Database, GHDB, Google Dorks
theHarvester: E-mails, subdomains and names Harvester
OSINT Search Tool by IntelTechniques | Open Source Intelligence
webGun - XSS Payload Build Tool
Unleashing an Ultimate XSS Polyglot · 0xSobky/HackVault Wiki
Browser's XSS Filter Bypass Cheat Sheet · masatokinugawa/filterbypass Wiki
Web Security · isislab/Project-Ideas Wiki
zseano | UK Security Researcher
High Performance Web Brute-Forcing 🕸🐏 – hiburn8
The Bug Hunter’s Methodology 2.0 – Jason Haddix
A list of web application security resources
A curated list of Web Security materials and resources.
A Methodical Approach to Browser Exploitation | Ret2 Systems Blog
ZAP - Zed Attack Proxy Project
Samurai 3.0 Branch - Web Pen Testing VM
Samurai - Course -Web Pen-testing VM
Red-Team-Infrastructure-Wiki/README.md at master · bluscreenofjeff/Red-Team-Infrastructure-Wiki
Red Team Laptop & Infrastructure (pt 1: Architecture) – Hacking & Coffee
Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike - CyberArk
Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.
writeups/icectf-2016 at master · WCSC/writeups · GitHub
CTFtime.org / IceCTF 2016 tasks and writeups
Hackover CTF 2015 – easy-shell - Writeup - f00ls bl0g
Google CTF 2017 Quals Write-up Winners - Google Drive
Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!
Zero Day Initiative — Testing for Truthiness: Exploiting Improper Checks
How To Hack - Episode 2: Use-After-Free Triple Bounce - YouTube
Building up from the Ethereum Bytecode | Ret2 Systems Blog
DEF CON® 26 Hacking Conference News
CSAW CTF 2015 - Alexander Taylor – OSIRIS Lab at NYU SOE
Practical case: Secura Grand Slam CTF “Easy Reverse” – Max Kersten
GitHub - antihorsey/ctf-writeups: Writeups of problems from past CTFs
write-ups-2015/seccon-quals-ctf-2015/stegano/steganography-2 at master · ctfs/write-ups-2015
How to Read JPG Height and Width from Binary/Hex data?
ctf-writeups/babypwn.md at master · VulnHub/ctf-writeups · GitHub
ctf-writeups/rop2libc.md at master · VulnHub/ctf-writeups · GitHub
ctf-challenges/pwn/stackoverflow/ret2libc at master · ctf-wiki/ctf-challenges · GitHub
33C3 CTF 2016 -- ESPR « Hacking Tube
write-ups-2016/hackcon-ctf-2016/pwn/easiest-pwn-not-250 at master · ctfs/write-ups-2016
pwntools — pwntools 3.3.4 documentation
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
GitHub - zardus/ctf-tools: Some setup scripts for security research tools.
PyCharm: Python IDE for Professional Developers by JetBrains
hugsy/gef: GEF - GDB Enhanced Features for exploit devs & reversers
Burp Suite for Web Challenges (cookies)
shell-storm | ROPgadget - Gadgets finder and auto-roper
zweisamkeit/RSHack: RSHack - Tool for RSA CTF's challenges
binary.ninja : a reverse engineering platform
Fzf: A fuzzy finder (large file ROPGadget search)
geohot/qira: QEMU Interactive Runtime Analyser
shell-storm | Shellcodes Database
Playing with rasm2 (for shellcoding)
Rasm2 · Radare2 Book (for shellcoding)
zardus/preeny: Some helpful preload libraries for pwning stuff.
dCode - Solvers, Crypto, Maths, Decoding, Online Tools
Boomerang Decompiler - Decompile x86 binaries to C
Angr: binary analysis platform!
Jadx: Dex to Java decompiler (Android)
Krakatau: Java decompiler, assembler, and disassembler
Pin - A Dynamic Binary Instrumentation Tool | Intel® Software
ExifTool - Read Write and Edit Meta Info
fsck - Fix Broken File Systems
NetworkMiner - Network Forensics Analysis Tool ⛏
Dump file analyzer - Memory Extraction
Binwalk: Firmware Analysis Tool (forensic) - Extracts Hidden Files
Exif - shows EXIF information in JPEG files
exiftool: Read/write meta info in files
Exiv2 - Image metadata library and tools
SmartDeblur: Restoration of defocused and blurred photos/images
stegbreak - brute force dictionary on JPEG
StegCracker: Steganography brute-force utility to uncover hidden data inside files
A curated list of awesome forensic analysis tools and resources
www.amanhardikar.com/mindmaps/ForensicChallenges.html
Software Assurance Reference Dataset
The FREE Secure Coding Training Course only at Cybrary
What to do with a Raspberry Pi? : netsecstudents
Pi-hole®: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash
The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need
LibreELEC – Just enough OS for KODI
RPi-youtube, smooth youtube videos on Chromium - Raspberry Pi Forums
How to Enable HDMI-CEC on Your TV, and Why You Should
Puffin Internet Terminal - Turning a tiny Raspberry Pi into a high-end PC
How to Set up an SSH Server on a Home Computer - DEV Community 👩💻👨💻
Know Your Network, Lesson 4: Access Your Home Computers from Anywhere
How to Control Your Linux PC with an Android Device
Get your geek on: Building a VMware home lab
Setting Up A Penetration Testing Lab
Infosec_Reference/Building A Pentest Lab.md at master · rmusser01/Infosec_Reference
Building a Home Lab for Offensive Security & Security Research · System Overlord
My semi-humble homelab! : homelab
Stumbled into /r/homelab? Start Here! : homelab
hardware/muffinsguide - homelab
My actual "mini-lab" : homelab
UniFi Home Setup - Page 4 - Ubiquiti Networks Community
Saw this in /r/oddlysatisfying, thought some people here might find it useful : homelab
E-Ink based status display : homelab
ESXi | Bare Metal Hypervisor | VMware
VMware Lab setup - A virtualized lab for testing HA and DRS - Simple Talk
The Windows Subsystem for Linux Guide! — Windows Subsystem for Linux Guide documentation
Using the VMware View Application - Like VMware Player on an Android Tablet!
Intel® Advanced Vector Extensions 512 (Intel® AVX-512) Overview
Amazon.com: Intel Xeon Phi 7120P Coprocessor: Computers & Accessories
How can I work on vulnhub VM's in virtualbox in a school setting? : netsecstudents
gnome - Freeze after login Ubuntu 18.04 - Ask Ubuntu
Ubuntu 18.04 stuck at shutdown - Ask Ubuntu
Ubuntu 18.04 Live boot leads to blank screen - Ask Ubuntu
filesystem - How to fix "sudo: unable to open ... Read-only file system"? - Ask Ubuntu
drivers - Is nomodeset still required? - Ask Ubuntu
Ubuntu ugrade 17.10 to 18.04 nvidia black screen - Ask Ubuntu
Black screen after boot on 18.04 with nvidia - Support & Help Requests - Ubuntu MATE Community
2 Ways to Install Nvidia Driver on Ubuntu 18.04 (GUI & Command Line)
Trying to install nvidia driver for ubuntu Desktop 18.04 LTS - Ask Ubuntu
boot - Ubuntu 18.04 stuck at purple screen after login - Ask Ubuntu
No GUI after Kubuntu 18.04 LTS upgrade from 17.10 - Ask Ubuntu
kali linux - VMware tools installed but not working - Unix & Linux Stack Exchange
How to Reset Lost Password of Kali Linux? - Technig
kali linux - proxy timeout, error - Unix & Linux Stack Exchange
[ubuntu] Ubuntu 18.04 LTS remains in Airplane mode and WIFI not works
Ubuntu 18.04 LTS remains in Airplane mode
[SOLVED] Laptop stuck in airplane mode after suspend
networking - Cannot disable Airplane Mode - Ask Ubuntu
Newest 'airplane-mode' Questions - Ask Ubuntu
How can I uninstall flight mode in Ubuntu 18.04 and turn on Wi-Fi? - Quora
Airplane mode won't turn off [SOLVED] - Linux Mint Forums
centos - Permanently disable airplane mode gnome 3.2 - Unix & Linux Stack Exchange
10.04 - Prevent wireless from turning off when lid goes down - Ask Ubuntu
Keep Ubuntu 17.10 / 18.04 Desktop Running when Laptop Lid is Closed | Website for Students
Ubuntu Wifi Hardware Disabled after Suspend : MSILaptops
Wifi Hard Blocked After Suspend in Ubuntu on GS65 : Ubuntu
wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu
Airplane mode on resume and no wireless · Issue #181 · linrunner/TLP
Kernel/MainlineBuilds - Ubuntu Wiki
wireless - How to know I have to blacklist acer_wmi? - Ask Ubuntu
linux - How to turn off Wireless power management permanently - Unix & Linux Stack Exchange
How to Update Ubuntu Kernel - wikiHow
wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu
SOLUTION: 18.04 MSI GS65 wifi hardware switch disabled after suspend - Ask Ubuntu
brndnmtthws/conky: Light-weight system monitor for X.
11 Things To Do After Installing Ubuntu 18.04 LTS 'Bionic Beaver' - OMG! Ubuntu!
How to Install Desktop Themes on Ubuntu 18.04 LTS
How To Install Numix Theme And Icons In Ubuntu 18.04 | Omgfoss.com
5 Of The Best Linux Desktop Themes Compared
GitHub - arcticicestudio/nord: An arctic, north-bluish color palette.
Where is the "Default Wallpaper" wallpaper stored - Ask Ubuntu
filesystem - How to make read-only file system writable?
tor - how to verify that proxychains is working - Super User
Inconsistent and erratic mouse wheel in Linux while moving the mouse pointer - Super User
How can I adjust the mouse scroll speed? - Ask Ubuntu
Generating a new SSH key and adding it to the ssh-agent - User Documentation
[SOLVED] Error: Unable to correct problems, you have held broken packages
Install VMware Workstation or VMware Player from a .bundle file | Linuxlookup
Could not get vmci driver version: The handle i... |VMware Communities
How to reinstall network manager without internet access? - Ask Ubuntu
live usb - How to install the MPEG-4 AAC decoder and the H.264 decoder? - Ask Ubuntu
Unable to forward search Bash history similarly as with CTRL-r - Stack Overflow
How to cycle through reverse-i-search in BASH? - Unix & Linux Stack Exchange
My Favorite Command-Line Shortcuts | Henrik Warne's blog
How to Install Deepin Desktop Environment on Ubuntu 18.04 - OMG! Ubuntu!
[ubuntu] How To: Setup DOD Common Access Card (CAC) for service portals
How to make a bootable USB on Windows
Rainmeter, desktop customization tool
Win10 Widgets - Widgets for Windows 10
Removing Debian Installation Prompt - Unix & Linux Stack Exchange
Download Windows Commands Reference from Official Microsoft Download Center
The fastest way to search your Chrome history or bookmarks - CNET
Parrot Project - The best choice for security experts, developers and crypto-addicted people.
20 Linux Command Tips and Tricks That Will Save You A Lot of Time - Tips and Tricks