User Tools

Site Tools


wiki:resources

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
wiki:resources [2021/11/21 14:24]
poortheodore [Other Maintained Blogs/Resource Dumps] added ired.team
wiki:resources [2021/12/24 02:51] (current)
poortheodore [Other Maintained Blogs/Resource Dumps] added TeachYourselfInfosec
Line 190: Line 190:
   * [[https://www.bau.edu.jo/UserPortal/UserProfile/PostsAttach/10617_1870_1.pdf|Computer Networking (PDF)]]   * [[https://www.bau.edu.jo/UserPortal/UserProfile/PostsAttach/10617_1870_1.pdf|Computer Networking (PDF)]]
   * [[http://2thi.cc/doc/Internetworking_Technology_Handbook.pdf|Internetworking Technology Handbook (PDF)]]   * [[http://2thi.cc/doc/Internetworking_Technology_Handbook.pdf|Internetworking Technology Handbook (PDF)]]
-  * [[https://www.youtube.com/playlist?list=PLG49S3nxzAnmpdmX7RoTOyuNJQAb-r-gd|Professor Messer's CompTia Networks+ Course (Youtube)]]+  * [[https://youtube.com/playlist?list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G|Professor Messer's CompTia Networks+ Course (Youtube)]]
   * [[https://www.amazon.com/Computer-Networking-Top-Down-Approach-7th/dp/0133594149/ref=sr_1_1?ie=UTF8&qid=1548385689&sr=8-1&keywords=computer+networking+a+top-down+approach|Computer Networking: A Top Down Approach]]   * [[https://www.amazon.com/Computer-Networking-Top-Down-Approach-7th/dp/0133594149/ref=sr_1_1?ie=UTF8&qid=1548385689&sr=8-1&keywords=computer+networking+a+top-down+approach|Computer Networking: A Top Down Approach]]
   * [[https://www.amazon.com/Nmap-Cookbook-Network-Security-Scanning/dp/1507781385/ref=sr_1_2?ie=UTF8&qid=1548386520&sr=8-2&keywords=nmap+cookbook|Nmap Cookbook]]   * [[https://www.amazon.com/Nmap-Cookbook-Network-Security-Scanning/dp/1507781385/ref=sr_1_2?ie=UTF8&qid=1548386520&sr=8-2&keywords=nmap+cookbook|Nmap Cookbook]]
Line 233: Line 233:
   * [[https://www.amazon.com/Art-Memory-Forensics-Detecting-Malware/dp/1118825098/ref=sr_1_1?ie=UTF8&qid=1548387014&sr=8-1&keywords=art+of+memory+forensics|The Art of Memory Forensics]]   * [[https://www.amazon.com/Art-Memory-Forensics-Detecting-Malware/dp/1118825098/ref=sr_1_1?ie=UTF8&qid=1548387014&sr=8-1&keywords=art+of+memory+forensics|The Art of Memory Forensics]]
   * [[https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315/ref=sr_1_2?ie=UTF8&qid=1548387096&sr=8-2&keywords=practical+reverse+engineering|Practical Reverse Engineering]]   * [[https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315/ref=sr_1_2?ie=UTF8&qid=1548387096&sr=8-2&keywords=practical+reverse+engineering|Practical Reverse Engineering]]
 +  * [[https://nostarch.com/malware|Practical Malware Analysis]]
 +  * [[https://nostarch.com/binaryanalysis|Practical Binary Analysis]]
   * [[https://github.com/guyinatuxedo/nightmare|Nightmare Bin Exp/Reverse Engineering Intro]]   * [[https://github.com/guyinatuxedo/nightmare|Nightmare Bin Exp/Reverse Engineering Intro]]
 +  * [[https://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426|The Art of Software Security Assessment]]
  
 ==== Password Cracking ==== ==== Password Cracking ====
Line 434: Line 437:
   * [[https://freecomputerbooks.com/|Free computer books, lectures, whitepapers, etc.]]   * [[https://freecomputerbooks.com/|Free computer books, lectures, whitepapers, etc.]]
   * [[https://www.ired.team/|Redteaming notes by @spottheplanet on twitter]]   * [[https://www.ired.team/|Redteaming notes by @spottheplanet on twitter]]
 +  * [[https://teachyourselfinfosec.com/|Teach Yourself Infosec]]
   * “Awesome Lists”   * “Awesome Lists”
     * [[https://github.com/sindresorhus/awesome#security|Master List]]     * [[https://github.com/sindresorhus/awesome#security|Master List]]
wiki/resources.1637526279.txt.gz · Last modified: 2021/11/21 14:24 by poortheodore