User Tools

Site Tools


wiki:resources

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
wiki:resources [2021/09/30 19:26]
admin
wiki:resources [2021/12/24 02:51] (current)
poortheodore [Other Maintained Blogs/Resource Dumps] added TeachYourselfInfosec
Line 190: Line 190:
   * [[https://www.bau.edu.jo/UserPortal/UserProfile/PostsAttach/10617_1870_1.pdf|Computer Networking (PDF)]]   * [[https://www.bau.edu.jo/UserPortal/UserProfile/PostsAttach/10617_1870_1.pdf|Computer Networking (PDF)]]
   * [[http://2thi.cc/doc/Internetworking_Technology_Handbook.pdf|Internetworking Technology Handbook (PDF)]]   * [[http://2thi.cc/doc/Internetworking_Technology_Handbook.pdf|Internetworking Technology Handbook (PDF)]]
-  * [[https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd|Professor Messer's CompTia Networks+ Course (Youtube)]]+  * [[https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G|Professor Messer's CompTia Networks+ Course (Youtube)]]
   * [[https://www.amazon.com/Computer-Networking-Top-Down-Approach-7th/dp/0133594149/ref=sr_1_1?ie=UTF8&qid=1548385689&sr=8-1&keywords=computer+networking+a+top-down+approach|Computer Networking: A Top Down Approach]]   * [[https://www.amazon.com/Computer-Networking-Top-Down-Approach-7th/dp/0133594149/ref=sr_1_1?ie=UTF8&qid=1548385689&sr=8-1&keywords=computer+networking+a+top-down+approach|Computer Networking: A Top Down Approach]]
   * [[https://www.amazon.com/Nmap-Cookbook-Network-Security-Scanning/dp/1507781385/ref=sr_1_2?ie=UTF8&qid=1548386520&sr=8-2&keywords=nmap+cookbook|Nmap Cookbook]]   * [[https://www.amazon.com/Nmap-Cookbook-Network-Security-Scanning/dp/1507781385/ref=sr_1_2?ie=UTF8&qid=1548386520&sr=8-2&keywords=nmap+cookbook|Nmap Cookbook]]
Line 233: Line 233:
   * [[https://www.amazon.com/Art-Memory-Forensics-Detecting-Malware/dp/1118825098/ref=sr_1_1?ie=UTF8&qid=1548387014&sr=8-1&keywords=art+of+memory+forensics|The Art of Memory Forensics]]   * [[https://www.amazon.com/Art-Memory-Forensics-Detecting-Malware/dp/1118825098/ref=sr_1_1?ie=UTF8&qid=1548387014&sr=8-1&keywords=art+of+memory+forensics|The Art of Memory Forensics]]
   * [[https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315/ref=sr_1_2?ie=UTF8&qid=1548387096&sr=8-2&keywords=practical+reverse+engineering|Practical Reverse Engineering]]   * [[https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315/ref=sr_1_2?ie=UTF8&qid=1548387096&sr=8-2&keywords=practical+reverse+engineering|Practical Reverse Engineering]]
 +  * [[https://nostarch.com/malware|Practical Malware Analysis]]
 +  * [[https://nostarch.com/binaryanalysis|Practical Binary Analysis]]
   * [[https://github.com/guyinatuxedo/nightmare|Nightmare Bin Exp/Reverse Engineering Intro]]   * [[https://github.com/guyinatuxedo/nightmare|Nightmare Bin Exp/Reverse Engineering Intro]]
 +  * [[https://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426|The Art of Software Security Assessment]]
  
 ==== Password Cracking ==== ==== Password Cracking ====
Line 433: Line 436:
   * [[https://github.com/V33RU/IoTSecurity101|IOT Security 101]]   * [[https://github.com/V33RU/IoTSecurity101|IOT Security 101]]
   * [[https://freecomputerbooks.com/|Free computer books, lectures, whitepapers, etc.]]   * [[https://freecomputerbooks.com/|Free computer books, lectures, whitepapers, etc.]]
 +  * [[https://www.ired.team/|Redteaming notes by @spottheplanet on twitter]]
 +  * [[https://teachyourselfinfosec.com/|Teach Yourself Infosec]]
   * “Awesome Lists”   * “Awesome Lists”
     * [[https://github.com/sindresorhus/awesome#security|Master List]]     * [[https://github.com/sindresorhus/awesome#security|Master List]]
Line 444: Line 449:
   * [[http://vulnhub.com/|Vuln Hub Boxes]]   * [[http://vulnhub.com/|Vuln Hub Boxes]]
   * [[https://gist.github.com/joepie91/5a9909939e6ce7d09e29|Don't Bother Using a VPN]]   * [[https://gist.github.com/joepie91/5a9909939e6ce7d09e29|Don't Bother Using a VPN]]
-  * Security and Hacking Conferences+  * Security and Hacking Conferences - page currently down. ETA October 15th 2021
   * [[https://www.alchemistowl.org/pocorgtfo/|Proof-of-Concept or GTFO]]   * [[https://www.alchemistowl.org/pocorgtfo/|Proof-of-Concept or GTFO]]
   * [[http://www.realtimerendering.com/blog/an-introduction-to-ray-tracing-is-now-free-for-download/|An Introduction to Ray Tracing (Free Book)]]   * [[http://www.realtimerendering.com/blog/an-introduction-to-ray-tracing-is-now-free-for-download/|An Introduction to Ray Tracing (Free Book)]]
-  * A challenge for wannabe Linux System Administrators +  * [[wiki:challenges:linuxsysadmin|A challenge for wannabe Linux System Administrators]] 
-  * Lowebrew's Lair of Resources+  * [[blogs:lowebrew_lair|Lowebrew's Lair of Resources]]
   * [[wiki:resources:fileformats|File Formats and structure]]   * [[wiki:resources:fileformats|File Formats and structure]]
 +  * [[https://hackerspaces.org/|hackerspaces]]
wiki/resources.1633047988.txt.gz · Last modified: 2021/09/30 19:26 by admin