Table of contents

  1. Crack the Code
  2. Pentesting Tools
  3. Digital Footprint
  4. VPN
  5. Bootable USB
  6. Data Forensics
  7. Package Manager
  8. Operating System and Tools
  9. Exploits and Vulnerabilities
  10. Guides and Resources
  11. Podcasts, News and Videos
  12. Hacking Google

Crack the Code

Challenges and learning platforms about cyber security and ethical hacking.

Website Description Source
CTF 101 Introduction to CTFs (Capture The Flag). Website
42 CTF Cybersecurity challenges platform with various challenges from 42. Website
picoCTF Challenges beginners and experts alike to solve real-life cybersecurity problems. Website
Root Me Platform for testing and improving knowledge in computer security and hacking. Website
Sololearn Courses designed by experts with real-world practice. Website
LeetCode Auto-tests. Fast lane to practice coding for interviews. Website
GeeksforGeeks Explanatory articles for algorithms and techniques. Website
HackerRank Programming problems, math, AI, etc. Good website for problem-solving skills. Website
Codeforces Programming contests platform with archives and auto-tests. Website
Topcoder Platform for programming contests professionals. Website
Rosetta Code Implementation guide for X in language Y. Website
CodinGame Automated platform for writing game bots, improving coding, and math skills. Website
Codewars Platform for solving programming puzzles known as β€œkatas”. Website
Hacker101 Free class for web security. Website
HackerOne Web security classes. Website
TryHackMe Learn cyber security through hands-on exercises and labs. Website
Hack The Box Cybersecurity training platform to level up hacking skills. Website
Hack This Site Training ground for ethical hacking with challenges, CTFs, and more. Website
Cyberseek Explore career paths, skills, and certifications in cyber security. Website
Advent of Code Christmas-themed programming challenges following an Advent calendar. Website

Pentesting Tools

Collection of tools used to perform penetration testing or ethical hacking.

Website Description Source
Cybersecurity Stash Curated list of cybersecurity tools. Website
Wireshark Free and open-source packet analyzer. Website
Responder Penetration testing tool for various network protocol poisoning. Website
Hashcat Powerful tool for cracking password hashes. Website
Metasploit Security project providing vulnerability data and aiding penetration tests. Website
Shodan Search engine for Internet-connected devices. Website
ExifTool Reads and writes meta information in a wide variety of files. GitHub
Remote Admin Tool Allows full control of a tech device remotely. GitHub
DNScat2 Creates an encrypted command-and-control channel over DNS. GitHub
Social Engineer Toolkit Framework designed for social engineering in penetration testing. GitHub
VirusTotal Scans files, URLs, domains, and IPs for threats. Website
CyberChef Web app for encryption, encoding, compression, and data analysis. GitHub
dCode 800+ tools for games, riddles, cyphers, math, and puzzles. Website
Firefox DevTools Docs Set of web developer tools built into Firefox. Website
Burp Suite Integrated platform for security testing of web applications. Website
WiFi Map Locates nearby hotspots, displays passwords and enables connection. Website
Steganography Toolkit Docker image useful for solving Steganography challenges. GitHub
Medicat USB Toolkit to compile the latest computer diagnostic and recovery tools. GitHub
Wazuh Open source platform used for threat prevention, detection, and response. GitHub
OpenVAS Open source full-featured vulnerability scanner. Website

Digital Footprint

Discover the imprint left by your online activities.

Website Description Source
Firefox Monitor Checks if your data has been involved in an online breach. Website
Have I Been Pwned Scans multiple breaches for your compromised email or phone. Website
DeHashed Offers free deep-web scans and guards against credential leaks. Website
LeakCheck Engine to search for data breaches. Website
Intelligence X Searches across Tor, I2P, data leaks, and the web using diverse parameters. Website
Password Strenght Checks password strength. Website
OSINT Framework Gathers information from various free tools/resources. Website
sherlock Locates social media accounts via usernames on multiple platforms. GitHub
Password Game Engaging yet challenging password game. Website

VPN

Secure your internet connection with a Virtual Private Network.

Website Description Source
Proton Offers end-to-end encrypted VPN, mail, drive, and calendar services. Website
OpenVPN Enables secure point-to-point, site-to-site connections, and remote access facilities. Website
Tailscale Offers a zero-config VPN for constructing secure networks. Website

Bootable USB

Create portable storage to install or repair operating systems.

Website Description Source
Rufus Open-source portable app for Windows, creating bootable USB flash drives or Live USBs. Website
Ventoy Open-source tool for creating bootable USB drives supporting various file types. Website
Etcher Cross-platform tool for safely flashing OS images onto SD cards and USB drives. Website

Data Forensics

Information and tools for managing, recovering, or securely wiping data effectively.

Management Description Source
hdparm Set and view ATA hard disk drive hardware parameters and test performance. Website
sdparm Similar to hdparm but can be used on any device that uses a SCSI command set. Website
GParted Create, delete, resize, move, check, and copy disk partitions and their file systems. Website
DiskPart Command-line disk partitioning utility, replacing its predecessor, fdisk. Website
Recovery Description Source
Disk Drill Data recovery utility for Windows and macOS developed by Cleverfiles. Website
PhotoRec Free and open-source utility software for data recovery with text-based user interface. Website
TestDisk Data recovery tool that recovers lost partitions or repairs corrupted filesystems. Website
Recuva Undeletion program for Windows, developed by Piriform Software. Website
R-Studio Data recovery and file undelete solution for Windows, Mac and Linux OS. Website
ddrescue Data recovery tool for disk drives, DVDs, CDs, and other digital storage media. Website
Wiping Description Source
DBAN Erase a hard disk until its data is permanently removed and unrecoverable. Website
nwipe Erase the entire contents a single drive or multiple disks simultaneously. GitHub
ShredOS USB bootable (BIOS or UEFI) small linux distribution based on nwipe. GitHub
Eraser Security tool for complete removal of sensitive data from hard drives. Website
Erasing Methods Provides 16 types of critical data erasing methods. Website
Master Passwords List of master passwords for various hard disk drives. Website
FBI Disposal of media policy and procedures. PDF
CISA Disposing of devices safely. PDF
NIST Guidelines for media sanitization. PDF
Utility Description Source
Czkawka Multi functional app to find duplicates, empty folders, similar images, etc. GitHub
BleachBit Open-source disk space cleaner, privacy manager, and computer system optimizer. Website
CCleaner Clean potentially unwanted files and invalid windows registry entries from a computer. Website

Package Manager

Software tools that automate the process of installing, upgrading, configuring, and removing programs.

Website Description Source
Chocolatey Windows tool that wraps installers, executables, zips, and scripts into compiled packages. Website
Ninite Package management system that automatically install popular applications Website
FOSSHUB Platform to download for free many popular and clean software titles. Website
NirSoft Unique collection of small and useful freeware utilities. Website
NirLauncher Package of more than 200 portable freeware utilities for Windows. Website

Operating System and Tools

Operating systems for every occasion and tools to enhance them.

Website Description Source
Tails Privacy-focused Linux distro connecting exclusively through Tor for anonymity. Website
Kali Linux distro for penetration testing, security research, forensics, and reverse engineering. Website
Tiny11 Trimmed-down Windows 11 image available on GitHub. GitHub
Win Debloat Tools Scripts to debloat Windows 10 and 11. GitHub

Exploits and Vulnerabilities

Information and resources on how to learn/use exploits and vulnerabilities.

Website Description Source
Bugtraq Electronic mailing list dedicated to issues about computer security. Website
Mimikatz Windows exploit extracting passwords from memory. GitHub
BloodHound Identifies complex attack paths otherwise hard to spot. GitHub
EternalBlue NSA-developed exploit leaked by Shadow Brokers. Wikipedia
MouseJack Vulnerabilities in wireless, non-Bluetooth keyboards and mice. Website
Follina Exploits the MSDT tool in Microsoft Office. Youtube

Guides and Resources

Guides and resources about important topics that may help with cyber security or ethical hacking.

Website Description Source
CVE Reference for known information-security vulnerabilities and exposures. Website
OWASP Top Ten Developer’s guide for web application security. Website
Exploited Vulnerabilities Catalog of exploited vulnerabilities in the wild. Website
Privacy Network Repository offering privacy guidelines and tools. Website
EPSS Predictive system for potential vulnerabilities. Website
CVSS System to assess and prioritize vulnerabilities. Website
What is MD5? Explanation of MD5, a widely-used cryptographic hash function. Website
World of Reversing Article introducing reversing concepts. Medium
Exploring the Heap Article exploring the computing concept of the heap. Medium

Podcasts, News and Videos

Information intended to capture, preserve, and explain the culture around cyber security and ethical hacking.

Website Description Source
Jack Rhysider Podcast sharing true stories from the internet’s darker side. Youtube
SecurityWeek Premier hub for cybersecurity news, insights, and expert analysis. News
The Hacker News Trusted publication for breaking cybersecurity news and insights. News
Heartbleed Insightful review of the 2014 Heartbleed bug that shook the internet. Youtube
How to Get Someone’s Password Many possible ways they may be able to get your password. Youtube

Hacking Google

Five elite security teams. Six never-before-told stories.