An Information Security Reference That Doesn't Suck
- Be an awesome Information Security Reference
- List of techinques, tools and tactics to learn from/reference.
- Rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches OR as a reference/recall method for stuff.
- Something like a "Yellow Pages" in the sense of you know something exists, but what was it called....
- 'If you give a man a fish, he is hungry again in an hour. If you teach him to catch a fish, you do him a good turn.'
- Always accepting more links/stuff. Feel free to make a pull request or a complaint through a pull request or filing a bug
- Why Do You Care?
- Don't have to constantly google for tools/reminder.
- Easily browsable list of tools, techniques, papers, and research in all sorts of areas.
- Want to read some good info.
- Why Do I Care?
- I do this as a resource for myself(to teach myself & others from) and offer it publicly as a way of giving back to the general community.
- To be clear, these aren't personal notes. I keep this repo maintained as a way of having pointers to information that I feel help build someone's skillset or increase understanding of attacks/methods/defenses. This is not meant to condone illegal or malicious activities.
- This page
- This page isn't
terriblethe best on mobile. Use https://rmusser.net/docst for better mobile formatting. - For latest content updates, check the git history.
- Contributions are encouraged/appreciated.
- If this resource has helped you in any way, please consider making a donation to Doctors Without Borders or Amnesty International.
- This page isn't
- Pre-ATT&CK
- ATT&CK Stuff
- Anonymity/OpSec/Privacy
- 🔰 Basic Security Information 🔰
- BIOS/UEFI/Firmware Attacks/Defense
- 🔨Building a Testing Lab🔨
- 🚗 Car hacking 🚗
- 💸Career💸
- Cheat Sheets
- 📹Conferences/Recordings📹
- 🍱Containers🍱
- ⭐Courses & Training⭐
- 🎲Cryptography & Encryption🎲
- 🏁 CTFs & Wargames 🏁
- Darknets
- Data Anaylsis & Visualization
- 🌅 Defense 🌅
- 📰 Documentation & Reporting 📰
- Embedded Device Security
- Exfiltration
- 🌈 Exploit Development 🌈
- Forensics & Incident Response
- 🐛 Fuzzing & Bug Hunting 🐛
- 🎮 Game Hacking 🎮
- 🍯Honeypots🍯
- Interesting Things & Useful Information
- 💀Malware💀
⚠️ Network Attacks & Defense⚠️ - 🚩Network Security Monitoring & Logging🚩
- 🔭Open Source Intelligence Gathering - OSINT🔭
- Passwords
- 🎣Phishing🎣
- 🚪Physical Security🚪
- Privilege Escalation and Post-Exploitation
- AppSec/Programming Stuff
- 🍋Rants & Writeups🍋
- 🏮 Red Teaming/Penetration Testing Stuff 🏮
- REMATH Reverse Engineering
- Reverse Engineering
- Rootkits
- 😃Social Engineering😃
- 🔩 System Internals (Linux/Windows) 🔩
- Threat Modeling
- 🔥UI/UX Design🔥
- 🌻 Web 🌻
- 📶 Wireless Networks and RF Devices 📶
- Notable Policy Docs