Coder Social home page Coder Social logo

security-resources's Introduction

Security Resources

Forked from JohnHammond/security-resources

This is a living document to host and contain links and resources for online wargames, practice environments, and activities to learn new things in cybersecurity.

Operating Systems

Penetration testing and security lab Operating Systems*

Malware Analysis and Reverse Engineering Operating Systems:

  • Flare VM - Windows-based for malware analysis and reverse engineering.
  • REMnux - Debian-based for malware analysis and reverse engineering.

Collections of installer scripts, useful tools

  • CTF Tools - Collection of setup scripts to install various security research tools.
  • LazyKali - A 2016 refresh of LazyKali which simplifies install of tools and configuration.

Tutorials to learn how to play CTFs

General Wargames

  • HackerRank - Coding playground for practice.
  • PicoCTF - Capture The Flag challenges for beginners and experts.
  • TryHackMe - Platform to learn and practice hacking skills in a virtual environment.
  • HackTheBox - An online platform for real-world penetration testing and hacking challenges.
  • CTFLearn - A platform to improve your Capture The Flag skills.
  • Pentesterlab - Provides exercises and labs for learning penetration testing.
  • Hack This Site - Training ground for hackers.
  • Hacker101 - CTF from HackerOne.
  • Over The Wire - Wargame maintained by OvertheWire Community.
  • Pwnable.kr - Pwn Game.
  • Ringzer0Team - Ringzer0 Team Online CTF.
  • Root-Me - Hacking and Information Security learning platform.
  • VulnHub - Hosting various vulnerable virtual machines for hands-on experience, some of which may include malware analysis challenges.
  • Crackmes - Offers reverse engineering challenges for enthusiasts, which can include analyzing malware samples.
  • Microcorruption - Embedded security CTF with reverse engineering components, relevant for analyzing firmware-level malware.
  • PWN Challenge - Binary Exploitation Wargame with challenges that involve reverse engineering and analyzing vulnerable binaries.

Cryptography

  • CryptoPals - Cryptographic challenges for skill development.
  • CryptoHack - Fun cryptography challenges for learning and practice.

Tools

  • CyberChef - A web app for analyzing and decoding data.
  • FeatherDuster - An automated, modular cryptanalysis tool.
  • Hash Extender - A utility tool for performing hash length extension attacks.
  • padding-oracle-attacker - A CLI tool to execute padding oracle attacks.
  • PkCrack - A tool for breaking PkZip encryption.
  • QuipQuip - An online tool for breaking substitution ciphers or Vigenere ciphers (without the key).
  • RSACTFTool - A tool for recovering RSA private keys using various attacks.
  • RSATool - Generate a private key with knowledge of p and q.
  • XORTool - A tool to analyze multi-byte XOR ciphers.

Malware Analysis

Certainly, here's the list of malware analysis tools in a bullet-point format, prioritized by popularity, and including "Any.Run":

Tools

  • IDA Pro - A widely-used disassembler and debugger for analyzing binary code.
  • Wireshark - A network protocol analyzer for capturing and inspecting network traffic.
  • Cuckoo Sandbox - An open-source automated malware analysis system.
  • Volatility - A memory forensics framework for analyzing RAM dumps.
  • Procmon - A Windows tool for monitoring system activity and file system changes.
  • Ghidra - A free and open-source software reverse engineering suite developed by the NSA.
  • Sysinternals Suite - A collection of Windows utilities for troubleshooting and analysis.
  • RegShot - A tool for comparing system registry snapshots before and after an event.
  • Fiddler - A web debugging proxy for capturing and analyzing HTTP traffic.
  • Maltego - A popular open-source intelligence and forensics application for link analysis.
  • PEStudio - A tool for static analysis of Windows executables (PE files).
  • YARA - A pattern-matching swiss knife for malware researchers.
  • Anubis - An online sandbox environment for analyzing suspicious files and URLs.
  • OllyDbg - A 32-bit assembler level analyzing debugger for Windows.
  • Radare2 - An open-source framework for reverse engineering and binary analysis.
  • Hybrid Analysis - A service for analyzing and detecting malware using various engines.
  • REMnux - A Linux toolkit for reverse engineering and analyzing malicious software.
  • Z3 Solver - A theorem prover and SMT solver used in various security research tasks.
  • CAPE Sandbox - An open-source malware analysis platform.
  • Joe Sandbox - An automated dynamic malware analysis system.
  • FLOSS - A tool for extracting and analyzing obfuscated strings in malware samples.
  • Pyew - A Python tool for manipulation of executables.
  • Any.Run - A cloud-based malware analysis platform that provides dynamic analysis of suspicious files and URLs.

Reverse Engineering

  • Micro Corruption - A web-based game that teaches assembly language and reverse engineering by solving various challenges.
  • Crackmes.one - A collection of crackmes (reverse engineering challenges) for different skill levels.
  • Binary Auditing - A platform for learning reverse engineering through hands-on labs and challenges.
  • Exploit Exercises - A set of virtual machines and challenges designed to teach various aspects of exploit development and reverse engineering.
  • Crack the File - An online platform with reverse engineering challenges and tutorials.

Tools

  • IDA Pro - A widely-used disassembler and debugger for analyzing binary code.
  • Ghidra - A free and open-source software reverse engineering suite developed by the NSA.
  • OllyDbg - A 32-bit assembler level analyzing debugger for Windows.
  • Radare2 - An open-source framework for reverse engineering and binary analysis.
  • x64dbg - An open-source debugger for Windows, with a focus on dynamic analysis of malware.
  • IDA Pro Free - The free version of IDA Pro, which provides basic disassembly and debugging capabilities.

Forensics

Tools

  • Aircrack-Ng - Crack 802.11 WEP and WPA-PSK keys.
    • apt-get install aircrack-ng
  • Audacity - Analyze sound files (mp3, m4a, whatever).
    • apt-get install audacity
  • Bkhive and Samdump2 - Dump SYSTEM and SAM files.
    • apt-get install samdump2 bkhive
  • CFF Explorer - PE Editor.
  • Creddump - Dump windows credentials.
  • DVCS Ripper - Rips web accessible (distributed) version control systems.
  • Exif Tool - Read, write and edit file metadata.
  • Extundelete - Used for recovering lost data from mountable images.
  • Fibratus - Tool for exploration and tracing of the Windows kernel.
  • Foremost - Extract particular kind of files using headers.
  • apt-get install foremost
  • Fsck.ext4 - Used to fix corrupt filesystems.
  • Malzilla - Malware hunting tool.
  • NetworkMiner - Network Forensic Analysis Tool.
  • PDF Streams Inflater - Find and extract zlib files compressed in PDF files.
  • Pngcheck - Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form.
  • apt-get install pngcheck
  • ResourcesExtract - Extract various filetypes from exes.
  • Shellbags - Investigate NT_USER.dat files.
  • Snow - A Whitespace Steganography Tool.
  • USBRip - Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.
  • Volatility - To investigate memory dumps.
  • Wireshark - Used to analyze pcap or pcapng files

Steganography

Tools

  • AperiSolve - Aperi'Solve is a platform which performs layer analysis on image (open-source).
  • Convert - Convert images b/w formats and apply filters.
  • Exif - Shows EXIF information in JPEG files.
  • Exiftool - Read and write meta information in files.
  • Exiv2 - Image metadata manipulation tool.
  • Image Steganography - Embeds text and files in images with optional encryption. Easy-to-use UI.
  • Image Steganography Online - This is a client-side Javascript tool to steganographically hide images inside the lower "bits" of other images
  • ImageMagick - Tool for manipulating images.
  • Outguess - Universal steganographic tool.
  • Pngtools - For various analysis related to PNGs.
    • apt-get install pngtools
  • SmartDeblur - Used to deblur and fix defocused images.
  • Steganabara - Tool for stegano analysis written in Java.
  • SteganographyOnline - Online steganography encoder and decoder.
  • Stegbreak - Launches brute-force dictionary attacks on JPG image.
  • StegCracker - Steganography brute-force utility to uncover hidden data inside files.
  • stegextract - Detect hidden files and text in images.
  • Steghide - Hide data in various kind of images.
  • StegOnline - Conduct a wide range of image steganography operations, such as concealing/revealing files hidden within bits (open-source).
  • Stegsolve - Apply various steganography techniques to images.
  • Zsteg - PNG/BMP analysis.

Web Application Security

Binary Exploitation

  • Nightmare - Challenges and resources for binary exploitation.
  • pwnable.xyz - Binary exploitation challenges and learning materials.
  • pwnable.kr - Diverse binary exploitation challenges for skill development.
  • io.netgarage.org - Binary exploitation challenges and tutorials.
  • pwn.college - Education and challenges for binary exploitation enthusiasts.

Certainly, here's the content formatted nicely for your README.md:

Kernel Exploitation

Browser Exploitation

Tools

  • BurpSuite - A graphical tool for testing website security.
  • Commix - Automated All-in-One OS Command Injection and Exploitation Tool.
  • Hackbar - Firefox addon for easy web exploitation.
  • OWASP ZAP - Intercepting proxy to replay, debug, and fuzz HTTP requests and responses.
  • Postman - Add-on for Chrome for debugging network requests.
  • Raccoon - A high-performance offensive security tool for reconnaissance and vulnerability scanning.
  • SQLMap - Automatic SQL injection and database takeover tool.
  • W3af - Web Application Attack and Audit Framework.
  • XSSer - Automated XSS tester.

security-resources's People

Contributors

johnhammond avatar mehrn00 avatar rhazenz0 avatar 0z09e avatar ahanel13 avatar dustyjinx avatar es7evam avatar brootware avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.