CRLJ
CtrlK
  • README
  • Blue Team & SOC Analyst
    • Cybersecurity Fundamentals
    • Advanced Persistent Threat
    • Frameworks
    • Network Security Monitoring & Continuous Security Monitoring
    • Security Information and Event Management
    • Cyber Threat Intelligence
    • Security Operations Center
    • 08 Threat Hunting
    • Digital Forensics and Incident Response
    • Advanced Techniques for Evasive Malware Detection and Prevention
    • Blue Team
    • Hardware Security
    • Kerberos TGT Tickets
    • Mastering SELinux
    • Passwordless Authentication
    • Secure Coding Practices
  • Cryptography
    • Key Concepts
    • Cryptographic Tools & Decoders
    • Digital Certificates and Signatures
    • SSL-TLS and Encryption Algorithms
  • GRC
    • Governance, Risk Management, and Compliance
    • ISO 27001 Lead Implementer
    • Key Performance Indicators (KPIs)
    • PCI DSS Implementer
  • Miscellaneous
    • Books
    • Cybersecurity Learning Roadmap
    • Cybersecurity
    • Islam and Cybersecurity
    • MISC
    • Passwords and Wordlists Resources
    • What You Need to Know
  • Mobile
    • Mobile
    • Mobile Security
      • 1. Android OS and Penetration Testing
      • 10. Reverse Engineering
      • Signing the APK
      • 2. Android Architecture
      • 3. Application Journey
      • 4. Android Security Model
      • 5. Android File Structure
      • 6. Android Application Components
      • 7. APK Structure
      • What is ADB (Android Debug Bridge)?
      • 9. Static Analysis VS Dynamic Analysis
  • Network
    • Cloud
    • DDoS Resources
    • ICS & SCADA
    • Network
    • Radio-Frequency Identification (RFID) & Software Defined Radio (SDR)
    • Basics
      • DHCP
      • DNS
      • Email
      • IPv4 Packet Header vs. IPv6 Packet Header
      • Managed Network Switch Functions
      • Network Devices
      • Remote Access and File Transfer
      • SNMP
      • Subnetting
      • Comparing Synchronization Protocols: IRIG vs. NTP vs. PTP
      • USB and Cable Types
      • Web
  • RE - MA - ED
    • Exploit Development & Privilege Escalation & Exploitation Resources
    • Reverse Engineering
    • Malware
      • Malware Development
      • Malware Samples
      • Obfuscation
      • Malware Analysis
        • 1. Introduction
        • 2. Creating VM for Malware Analysis
        • 3. Malware Analysis Tools
      • The Beginning
        • 1. Introduction to x86 Assembly
        • 2. Introduction to Shellcode
        • 3. Introduction to Python
        • 4. Introduction to C
        • 5. So You Want to Write Malware
        • 6. Introduction to Exploit Development
      • The Journey
        • 1. Windows PE File Structure
        • 2. ELF Structures
  • Red Team & Penetration Testing
    • Active Directory & Windows
    • Browser Attack Surface
    • Bug Bounty & Web
    • Documenting Vulnerabilities
    • MITM Attacks
    • OSINT
    • Penetration Testing
    • Phishing
    • Red Team
    • Social Engineering
    • The Art Of Hiding In Windows
    • The Art Of Infection In MacOS
    • The Art Of Linux Persistence
    • The Art of Post-Exploitation
    • The Art of Windows Persistence
    • Web LLM Attacks
    • Wireless and Wi-Fi
      • A Red Teamer’s Guide to Wi-Fi Exploits
      • OSWP PEN-210
      • Red Teamer Gadgets
      • SIM Swap attacks
Powered by GitBook
On this page
  • Mindmaps, Methodology, and Secret Knowledge
  • Comprehensive Red Team and Blue Team Tools
  • Curated OSINT and Cybersecurity Resources (Start.me Pages)
  1. Miscellaneous

MISC

Mindmaps, Methodology, and Secret Knowledge

  • Mindmap - Ignitetechnologies

  • MindMap - eMVee-NL

  • Methodology - lutzenfried

  • The Book of Secret Knowledge

Comprehensive Red Team and Blue Team Tools

  • Rawsec's CyberSecurity Inventory

  • Exploit Notes

  • OffSec Tools

  • TLDR.run

  • KitPloit

  • Linux Security Expert - Security Tools

  • Black Hills InfoSec - Projects

  • SecTools

  • RedTeam Tools

  • BlueTeam Tools

  • Project Discovery - Security Tools

  • Cisco Talos Intelligence - Software

  • Active Countermeasures - Free Tools

  • FireEye Market

  • Awesome GPTs (Agents) for Cybersecurity

  • Aerospace Hacking Tools

Curated OSINT and Cybersecurity Resources (Start.me Pages)

  • Cyber Threat Intelligence

  • Sighlent

  • Mobile OSINT

  • OSINT4ALL

  • OSINT

  • Forensics

  • HUN OSINT

  • Osint Darkweb Russia

  • The Ultimate OSINT Collection

  • V3NARI Bookmarks

  • Nixintel's OSINT Resource List

  • AML Toolbox

  • Toolkit

  • CTI

  • Main Tools

  • Addons

  • ASINT Collection

  • OPSEC Online Privacy

  • Photo OSINT

PreviousIslam and CybersecurityNextPasswords and Wordlists Resources

Last updated 1 year ago