收集了一些安全公司的博客,用于安全情报
http://contagiodump.blogspot.com
https://mmd.sougaoqing.com/mmd/index.htm
http://researchcenter.paloaltonetworks.com
https://www.fireeye.com/blog.html
http://www.symantec.com/connect/blogs
http://cybersecurityminute.com/security-blogs/source/Trend+Micro+Blog/
https://securingtomorrow.mcafee.com
http://resources.infosecinstitute.com
https://www.offensive-security.com/blog/
https://community.rapid7.com/community/metasploit/blog/
https://blog.malwarebytes.com/
https://www.nowsecure.com/blog/
https://security.berkeley.edu/resources/phishing/phishing-examples-archive
http://malware-traffic-analysis.net/
http://www.vantagepoint.sg/blog
https://www.incapsula.com/blog/
https://crackinglandia.wordpress.com
https://www.pentestpartners.com/
https://www.binarydefense.com/
https://blogs.technet.microsoft.com/
https://astr0baby.wordpress.com/2017/07/
https://www.bonkersabouttech.com/security
https://www.christophertruncer.com/
https://www.offensive-security.com/blog/
https://pentestlab.wordpress.com
http://www.ws-attacks.org/Welcome_to_WS-Attacks
https://ramblingcookiemonster.github.io/
https://labs.mwrinfosecurity.com/
http://www.labofapenetrationtester.com/
http://subt0x10.blogspot.co.uk/
https://holidayhackchallenge.com/
https://www.arbornetworks.com/blog/asert/
http://blog.malwaremustdie.org
https://www.malware-traffic-analysis.net/
https://www.peppermalware.com/
http://www.powershellempire.com/?page_id=561
https://blog.cobaltstrike.com/
https://www.bleepingcomputer.com/
https://n0where.net/best-ida-plugins/
https://arstechnica.com/security/
http://www.devttys0.com
https://github.com/nebgnahz/awesome-iot-hacks
https://www.exploitee.rs/index.php/Main_Page
https://iot.sec-wiki.com/
https://github.com/Hack-with-Github/Awesome-Hacking
https://github.com/SecWiki/sec-chart
https://github.com/enaqx/awesome-pentest https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
https://superkieran.github.io/WooyunDrops/#!/
http://cb.drops.wiki/
https://github.com/tiancode/learn-hacking
http://www.hackfun.org/kali-tools/kali-tools-zh.html
https://pan.baidu.com/s/1clxaCA
https://www.owasp.org/index.php/Main_Page
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
https://vulnerablelife.wordpress.com/2017/05/13/python-for-penetration-testers/
https://github.com/SecWiki/ipot
https://ipot.sec-wiki.com/
https://sosly.me/index.php/2017/09/05/jymiguan2/
https://github.com/brannondorsey/wifi-cracking
http://www.freebuf.com/articles/wireless/137641.html
https://klionsec.github.io/2015/04/14/aircrack-hascat/
http://uknowsec.cn/posts/skill/Meatsploit-Framework-%E5%88%A9%E7%94%A8%E6%80%BB%E7%BB%93.html
http://uknowsec.cn/posts/skill/%E6%B5%85%E8%B0%88ddos%E7%9A%84%E6%B5%8B%E8%AF%95%E6%96%B9%E6%B3%95.html
http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/
http://www.hackingarticles.in/dos-attack-packet-crafting-using-colasoft/
http://www.hackingarticles.in/dos-attack-penetration-testing-part-2/
https://www.hybrid-analysis.com/
http://www.freebuf.com/sectool/121339.html
https://github.com/pwndbg/pwndbg
https://remnux.org/
https://r3mrum.wordpress.com/2017/06/29/analyzing-malicious-password-protected-office-documents/
https://dfir.it/blog/2015/06/17/analysts-handbook-analyzing-weaponized-documents/
https://github.com/CHYbeta/Software-Security-Learning
https://github.com/CHYbeta/Web-Security-Learning
https://segmentfault.com/p/1210000009117809/read
http://www.securitybsides.com/
https://events.ccc.de/congress/
http://www.infosecurityeurope.com/
https://www.rsaconference.com/
https://www.swisscyberstorm.com/
https://www.virusbulletin.com/conference/index
http://ddecode.com/phpdecoder/?home
http://www.fuzzysecurity.com/links.html
http://www.objectif-securite.ch/
https://www.megabeets.net/a-journey-into-radare-2-part-1/
https://www.megabeets.net/a-journey-into-radare-2-part-2/
REMnux: A Linux Toolkit for Reverse-Engineering and Analyzing Malware https://remnux.org/
https://zeltser.com/malware-analysis-cheat-sheet/
https://mp.weixin.qq.com/s/QdiI66ZDsHj7MaMB6c88Ug
https://zeltser.com/analyzing-malicious-documents/
https://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator
https://blog.fortinet.com/2017/09/19/rewriting-idapython-script-objc2-xrefs-helper-py-for-hopper
https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
http://www.jianshu.com/p/ee22367303d5
http://www.whitecell-club.org/?p=1524