Coder Social home page Coder Social logo

resources's Introduction

ZYRON

BugBounty
  • Hacksplaining*
  • Pwning OWASP Juice Shop
  • Bugcrowd University*
  • Free-application-security-training
  • OWASP NodeGoat Tutorial
  • Resources-for-Beginner-Bug-Bounty-Hunters
  • Awesome Web Security
  • Info Sec Write Ups
  • Mehmet İnce Web Security & Hacking*
  • Hacker101 Resources
  • Owasp Top10
  • Owasp Cheatsheet Series*
  • PortSwigger Research*
  • PortSwigger All learning materials*
  • PortSwigger All Learning labs*
  • PortSwigger Issues
  • ExploitDb Papers.
  • Netsparker BLog
  • PortSwigger Daily-Swig
  • Acunetix Articles
  • Acunetix|What is SSRF?
  • PortSwigger Prototype Pollution
  • Command-injection-the-good-the-bad-and-the-blind
  • Analysis and Exploitation of Prototype Pollution attacks
  • Security Idiots
  • JavaScript queries
  • Hacker's Grimoire
  • Bug Bounty Reports
  • The Bug Hunter's Methodology (TBHM)
  • Defend The Web
  • Bug Bounty Cheatsheet m0chan
  • Bug bounty platforms and programs
  • Payload All Things
  • Web Security course by Stanford University
  • Owasp Testing Guide
  • Collection of "BugBounty" Tips tweeted
  • InfosecBookmarks
  • Priv Escalate
  • Privilege Escalation Archives - Hacking Articles
  • A guide to Linux Privilege Escalation
  • Privilege Escalation
  • Linux Commands Cheat Sheet
  • Basic Linux Privilege Escalation
  • Windows & Linux Hak Yükseltme
  • Linux Exploit Suggester ile Yetki Yükseltme Zafiyeti Tespiti
  • Privilege Escalation in Windows
  • Derinlemesine Windows Priv Esc
  • Windows Privilege Escalation Fundamentals
  • Windows Privilege Escalation Scripts & Techniques
  • Linux Privilege Escalation
  • Linux Privilege Escalation using Capabilities
  • Empire: A PowerShell Post-Exploitation Tool
  • Windows Privilege Escalation Methods for Pentesters
  • Some Good Rescoures
  • HackTricks
  • IncognitJoe
  • Penetration Testing && Security Research Blog
  • Info Sec Write Ups
  • g0tm1k
  • 0xsp
  • Penetration Testing
  • InfoSec Resources
  • PentestBlog
  • Pentester Land
  • Hacking Articles
  • Gracefulsecurity
  • Awesome Hacking
  • Awesome Security
  • Null Byte Blog
  • The Cyber Mentor Blog
  • Sushant Total OSCP
  • Hackersploit Blog
  • HackerRank
  • NightMare
  • Reverse engineering for beginners
  • Buffer Overflows Made Easy
  • Pentesting Tools
  • Reddit TRsec
  • KitPloit
  • PentestLab Blog
  • Drhack Blog
  • SecuriTeam>
  • HakingPassion
  • HacksLand
  • The Hacker Blog
  • Ethical Hacking Guru
  • AnonHack
  • Linux Dersleri
  • m0chan Blog
  • vvHack
  • Youtube Channels
  • John Hammond
  • Ippsec
  • Mehmet D.İnce
  • VbScrub
  • Hak5
  • Naham Sec
  • GynvaelEN
  • Loi Liang Yang
  • Weastie
  • Atil Samancioglu
  • Cyber Mentor
  • HackerSploit
  • Can Deger
  • Null Bytes
  • LiveOverflow
  • Stephen Chapman
  • Fireship
  • commaai archive
  • /dev/null
  • STÖK
  • Ceos3c
  • Seytonic
  • Gökhan Muharremoğlu
  • krypt0mux
  • Jake Wright
  • Kris Occhipinti
  • Murmus CTF
  • PwnFunction
  • BugCrowd
  • HakcerOne
  • Computerphile
  • CTF
  • Tryhackme
  • Hackthebox
  • Ctflearn
  • Crackmes
  • Vulnhub
  • Overthewhire
  • Pwnable
  • Root-me
  • Enigma Group
  • RingZer0
  • PicoCtf
  • practice-hacking-with-vulnerable-systems
  • CapCtf
  • Online CTF Websites
  • Practice CTF List
  • Insecure Systems to Pratice (WebApp)
  • DAMN VULNERABLE WEB APPLICATION
  • Owasp Node Goat
  • WebGoat 8: A deliberately insecure Web Application
  • OWASP Mutillidae II
  • XVWA is a badly coded web application written in PHP/MySQL
  • Owasp Juice Shop
  • List Of Vulnerable Web Apps
  • Owasp Bricks
  • Vulnerable-Node
  • Damn Vulnerable NodeJS Application (DVNA)
  • Books
  • Real-World Bug Hunting: A Field Guide to Web Hacking
  • Bug Bounty Hunting Essentials
  • The Web Application Hacker's Handbook
  • The Basics of Web Hacking: Tools and Techniques to Attack the Web
  • Penetration Testing: A Hands-on Introduction to Hacking
  • The Hacker Playbook 1,2,3
  • Black Hat Python: Python Programming for Hackers and Pentesters
  • Metasploit: The Penetration Tester's Guide
  • Violent Python: A Cookbook for Hackers
  • Hacking: The Art of Exploitation, 2nd Edition
  • Kali Linux Revealed: Mastering the Penetration Testing Distribution
  • Rtfm: Red Team Field Manual
  • Social Engineering: The Art of Human Hacking
  • Şifreleme ve Şifre Çözme Yöntemleri
  • Ethical Hacking Offensive ve Defensive
  • Web Uygulama Güvenliği ve Hacking Yöntemleri
  • Exploit Geliştirme 101
  • Python - Mustafa Başer
  • Uygulamalı Siber Güvenlik ve Hacking
  • Web Hacking 101
  • resources's People

    Contributors

    zyr1on avatar

    Recommend Projects

    • React photo React

      A declarative, efficient, and flexible JavaScript library for building user interfaces.

    • Vue.js photo Vue.js

      🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

    • Typescript photo Typescript

      TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

    • TensorFlow photo TensorFlow

      An Open Source Machine Learning Framework for Everyone

    • Django photo Django

      The Web framework for perfectionists with deadlines.

    • D3 photo D3

      Bring data to life with SVG, Canvas and HTML. 📊📈🎉

    Recommend Topics

    • javascript

      JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

    • web

      Some thing interesting about web. New door for the world.

    • server

      A server is a program made to process requests and deliver data to clients.

    • Machine learning

      Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

    • Game

      Some thing interesting about game, make everyone happy.

    Recommend Org

    • Facebook photo Facebook

      We are working to build community through open source technology. NB: members must have two-factor auth.

    • Microsoft photo Microsoft

      Open source projects and samples from Microsoft.

    • Google photo Google

      Google ❤️ Open Source for everyone.

    • D3 photo D3

      Data-Driven Documents codes.