Table of contents
- Crack the Code
- Pentesting Tools
- VPN
- Bootable USB
- Data Forensics
- Package Manager
- Operating System and Tools
- Exploits and Vulnerabilities
- Guides and Resources
- Podcasts, News and Videos
- Hacking Google
Crack the Code
Challenges and learning platforms about cyber security and ethical hacking.
Website | Description | Source |
CTF 101 | Introduction to CTFs (Capture The Flag). | Website |
42 CTF | Cybersecurity challenges platform with various challenges from 42. | Website |
picoCTF | Challenges beginners and experts alike to solve real-life cybersecurity problems. | Website |
Root Me | Platform for testing and improving knowledge in computer security and hacking. | Website |
Sololearn | Courses designed by experts with real-world practice. | Website |
LeetCode | Auto-tests. Fast lane to practice coding for interviews. | Website |
GeeksforGeeks | Explanatory articles for algorithms and techniques. | Website |
HackerRank | Programming problems, math, AI, etc. Good website for problem-solving skills. | Website |
Codeforces | Programming contests platform with archives and auto-tests. | Website |
Topcoder | Platform for programming contests professionals. | Website |
Rosetta Code | Implementation guide for X in language Y. | Website |
CodinGame | Automated platform for writing game bots, improving coding, and math skills. | Website |
Codewars | Platform for solving programming puzzles known as βkatasβ. | Website |
Hacker101 | Free class for web security. | Website |
HackerOne | Web security classes. | Website |
TryHackMe | Learn cyber security through hands-on exercises and labs. | Website |
Hack The Box | Cybersecurity training platform to level up hacking skills. | Website |
Hack This Site | Training ground for ethical hacking with challenges, CTFs, and more. | Website |
Cyberseek | Explore career paths, skills, and certifications in cyber security. | Website |
Advent of Code | Christmas-themed programming challenges following an Advent calendar. | Website |
Collection of tools used to perform penetration testing or ethical hacking.
Website | Description | Source |
Cybersecurity Stash | Curated list of cybersecurity tools. | Website |
Wireshark | Free and open-source packet analyzer. | Website |
Responder | Penetration testing tool for various network protocol poisoning. | Website |
Hashcat | Powerful tool for cracking password hashes. | Website |
Metasploit | Security project providing vulnerability data and aiding penetration tests. | Website |
Shodan | Search engine for Internet-connected devices. | Website |
ExifTool | Reads and writes meta information in a wide variety of files. | GitHub |
Remote Admin Tool | Allows full control of a tech device remotely. | GitHub |
DNScat2 | Creates an encrypted command-and-control channel over DNS. | GitHub |
Social Engineer Toolkit | Framework designed for social engineering in penetration testing. | GitHub |
VirusTotal | Scans files, URLs, domains, and IPs for threats. | Website |
CyberChef | Web app for encryption, encoding, compression, and data analysis. | GitHub |
dCode | 800+ tools for games, riddles, cyphers, math, and puzzles. | Website |
Firefox DevTools Docs | Set of web developer tools built into Firefox. | Website |
Burp Suite | Integrated platform for security testing of web applications. | Website |
WiFi Map | Locates nearby hotspots, displays passwords and enables connection. | Website |
Steganography Toolkit | Docker image useful for solving Steganography challenges. | GitHub |
Medicat USB | Toolkit to compile the latest computer diagnostic and recovery tools. | GitHub |
Wazuh | Open source platform used for threat prevention, detection, and response. | GitHub |
OpenVAS | Open source full-featured vulnerability scanner. | Website |
Discover the imprint left by your online activities.
Website | Description | Source |
Firefox Monitor | Checks if your data has been involved in an online breach. | Website |
Have I Been Pwned | Scans multiple breaches for your compromised email or phone. | Website |
DeHashed | Offers free deep-web scans and guards against credential leaks. | Website |
LeakCheck | Engine to search for data breaches. | Website |
Intelligence X | Searches across Tor, I2P, data leaks, and the web using diverse parameters. | Website |
Password Strenght | Checks password strength. | Website |
OSINT Framework | Gathers information from various free tools/resources. | Website |
sherlock | Locates social media accounts via usernames on multiple platforms. | GitHub |
Password Game | Engaging yet challenging password game. | Website |
VPN
Secure your internet connection with a Virtual Private Network.
Website | Description | Source |
Proton | Offers end-to-end encrypted VPN, mail, drive, and calendar services. | Website |
OpenVPN | Enables secure point-to-point, site-to-site connections, and remote access facilities. | Website |
Tailscale | Offers a zero-config VPN for constructing secure networks. | Website |
Bootable USB
Create portable storage to install or repair operating systems.
Website | Description | Source |
Rufus | Open-source portable app for Windows, creating bootable USB flash drives or Live USBs. | Website |
Ventoy | Open-source tool for creating bootable USB drives supporting various file types. | Website |
Etcher | Cross-platform tool for safely flashing OS images onto SD cards and USB drives. | Website |
Data Forensics
Information and tools for managing, recovering, or securely wiping data effectively.
Management | Description | Source |
hdparm | Set and view ATA hard disk drive hardware parameters and test performance. | Website |
sdparm | Similar to hdparm but can be used on any device that uses a SCSI command set. | Website |
GParted | Create, delete, resize, move, check, and copy disk partitions and their file systems. | Website |
DiskPart | Command-line disk partitioning utility, replacing its predecessor, fdisk. | Website |
Recovery | Description | Source |
Disk Drill | Data recovery utility for Windows and macOS developed by Cleverfiles. | Website |
PhotoRec | Free and open-source utility software for data recovery with text-based user interface. | Website |
TestDisk | Data recovery tool that recovers lost partitions or repairs corrupted filesystems. | Website |
Recuva | Undeletion program for Windows, developed by Piriform Software. | Website |
R-Studio | Data recovery and file undelete solution for Windows, Mac and Linux OS. | Website |
ddrescue | Data recovery tool for disk drives, DVDs, CDs, and other digital storage media. | Website |
Wiping | Description | Source |
DBAN | Erase a hard disk until its data is permanently removed and unrecoverable. | Website |
nwipe | Erase the entire contents a single drive or multiple disks simultaneously. | GitHub |
ShredOS | USB bootable (BIOS or UEFI) small linux distribution based on nwipe. | GitHub |
Eraser | Security tool for complete removal of sensitive data from hard drives. | Website |
Erasing Methods | Provides 16 types of critical data erasing methods. | Website |
Master Passwords | List of master passwords for various hard disk drives. | Website |
FBI | Disposal of media policy and procedures. | PDF |
CISA | Disposing of devices safely. | PDF |
NIST | Guidelines for media sanitization. | PDF |
Utility | Description | Source |
Czkawka | Multi functional app to find duplicates, empty folders, similar images, etc. | GitHub |
BleachBit | Open-source disk space cleaner, privacy manager, and computer system optimizer. | Website |
CCleaner | Clean potentially unwanted files and invalid windows registry entries from a computer. | Website |
Package Manager
Software tools that automate the process of installing, upgrading, configuring, and removing programs.
Website | Description | Source |
Chocolatey | Windows tool that wraps installers, executables, zips, and scripts into compiled packages. | Website |
Ninite | Package management system that automatically install popular applications | Website |
FOSSHUB | Platform to download for free many popular and clean software titles. | Website |
NirSoft | Unique collection of small and useful freeware utilities. | Website |
NirLauncher | Package of more than 200 portable freeware utilities for Windows. | Website |
Operating systems for every occasion and tools to enhance them.
Website | Description | Source |
Tails | Privacy-focused Linux distro connecting exclusively through Tor for anonymity. | Website |
Kali | Linux distro for penetration testing, security research, forensics, and reverse engineering. | Website |
Tiny11 | Trimmed-down Windows 11 image available on GitHub. | GitHub |
Win Debloat Tools | Scripts to debloat Windows 10 and 11. | GitHub |
Exploits and Vulnerabilities
Information and resources on how to learn/use exploits and vulnerabilities.
Website | Description | Source |
Bugtraq | Electronic mailing list dedicated to issues about computer security. | Website |
Mimikatz | Windows exploit extracting passwords from memory. | GitHub |
BloodHound | Identifies complex attack paths otherwise hard to spot. | GitHub |
EternalBlue | NSA-developed exploit leaked by Shadow Brokers. | Wikipedia |
MouseJack | Vulnerabilities in wireless, non-Bluetooth keyboards and mice. | Website |
Follina | Exploits the MSDT tool in Microsoft Office. | Youtube |
Guides and Resources
Guides and resources about important topics that may help with cyber security or ethical hacking.
Website | Description | Source |
CVE | Reference for known information-security vulnerabilities and exposures. | Website |
OWASP Top Ten | Developerβs guide for web application security. | Website |
Exploited Vulnerabilities | Catalog of exploited vulnerabilities in the wild. | Website |
Privacy Network | Repository offering privacy guidelines and tools. | Website |
EPSS | Predictive system for potential vulnerabilities. | Website |
CVSS | System to assess and prioritize vulnerabilities. | Website |
What is MD5? | Explanation of MD5, a widely-used cryptographic hash function. | Website |
World of Reversing | Article introducing reversing concepts. | Medium |
Exploring the Heap | Article exploring the computing concept of the heap. | Medium |
Podcasts, News and Videos
Information intended to capture, preserve, and explain the culture around cyber security and ethical hacking.
Website | Description | Source |
Jack Rhysider | Podcast sharing true stories from the internetβs darker side. | Youtube |
SecurityWeek | Premier hub for cybersecurity news, insights, and expert analysis. | News |
The Hacker News | Trusted publication for breaking cybersecurity news and insights. | News |
Heartbleed | Insightful review of the 2014 Heartbleed bug that shook the internet. | Youtube |
How to Get Someoneβs Password | Many possible ways they may be able to get your password. | Youtube |
Hacking Google
Five elite security teams. Six never-before-told stories.