Le guide
  • 📖Qui sommes-nous ?
  • prévention
    • 📱Les dangers des réseaux sociaux
    • 🔑Qu'est ce qu'un ransomware
    • 👀C'est quoi le phishing ?
    • 🌐Que peut-on faire avec une IP ?
    • Comment se rétracter lors d'un achat (ecommerce) ?
  • urgence
    • ⚡Cybermalveillance
    • 🩹Kit d'aide digital
    • 🚨Infos d'urgences
    • 📘Dernier poste
  • HELP
    • Dont ask to ask
    • Une alternative ?
    • 🎓Apprendre
      • 🇬🇧 Apprendre autre chose
      • Apprendre la cybersécurité
      • Apprendre le développement
      • liens utiles cybersec
      • Apprendre la création de jeux
      • Apprendre l’intelligence artificiel
      • Sauvegarder sous toutes les formes
  • Projets
    • Blukeys (en cours)
    • Communautés
      • Quark
  • Français
    • Comment bien écrire une liste ?
  • Cybersécurité - Hack
    • Outils
      • Introduction au reverse engineering
      • Outils de Base (introduction au Pentesting et la cybersécurité)
      • BurpSuite - Intercepter toutes les requêtes HTTP
      • 🇬🇧 fabacab/awesome-cybersecurity-blueteam
      • 🇬🇧 fabionoth/awesome-cyber-security
      • 🇬🇧 Bypassing Cloudflare WAF with the origin server IP address | Detectify Blog
    • OWASP Top 10
    • On dit chiffrer plutôt que crypter
    • Web security academy - WSA
    • Write-up ctf
      • TryHackMe - Retro
    • SANS - Formations en cybersécurité
  • Développement logiciels
    • Par où commencer ?
    • Principes et bonnes pratiques
      • POO (Programmation Orienté Objet)
    • Langages informatique
      • CSS, SASS
      • HTML
      • L'algorithmique
      • La famille C
      • La famille JS, TS
      • La famille JVM
      • PHP
      • Python
      • Ruby
      • RUST
      • SQL
    • Technologies
      • C'est quoi le Cloud Native ?
      • Installation Sqlite3 avec NPM ou Yarn
      • Les IDE recommandés
      • Base de données
      • Développement web sur windows
    • Toute les documentations
  • Cryptomonnaie
    • Tips navigateur Brave | Laisser un pourboire
  • Infrastructure
    • Générateur de configuration SSL
  • Qualité ingénierie logicielle
    • CI/CD Dév
    • CI/CD d'une infra
    • 🇬🇧 Introduction Mangle enables you to run chaos engineering experiments
      • Overview
      • Mangle Deployment and Administration Guide
      • Mangle Users Guide
      • Mangle Troubleshooting Guide
      • Mangle Developers' Guide
      • Contributing to Mangle
      • mangle-administration
        • Supported Deployment Models
          • Advanced Cassandra Configuration
        • Admin Settings
      • sre-developers-and-users
        • Adding Endpoints
        • Injecting Faults
          • Infrastructure Faults
          • Application Faults
          • Custom Faults
        • Requests and Reports
      • troubleshooting-guide
        • Deployment Stage
        • Boot/Initialization Stage
        • Endpoint Addition Stage
        • Fault Injection Stage
  • Web
    • Inspecteur de code web
    • Liste des APIs publique ( en cours )
    • Apprendre le SEO naturel
    • Tips pour fusionner des communautés Discord
    • Qu’est-ce que le rp ?
    • Google Admin Toolbox HAR Analyzer
  • Couche haute
    • HUGO
      • 🇬🇧 Quick Start
      • Mettre en place son premier site sous Hugo
    • 🇬🇧 Deno Introduction with Practical Examples
    • React-native
    • 🇬🇧 Angular HttpClient v9/8
    • 🇬🇧 Compiler un front Angular variabilisé comme un chef
    • 🇬🇧 Applying Angular Runtime Configurations in Dockerized Environments | Hacker Noon
  • Gaming
    • Installer Shadow Linux et Chrome book
    • Comment choisir son alimentation d'ordi ?
  • Linux
    • Git
    • Bash
    • Bases de linux
    • Installation LEMP sur Ubuntu 20.04 Digitalocean
    • 🇬🇧 Wireguard VPN on Ubuntu 20.04
    • Comment installer et utiliser Docker sur Ubuntu 20.04 | DigitalOcean
    • Sécuriser son serveur Linux sous Ubuntu
    • Introduction à tmux (terminal multiplexer)
  • Bot
    • Héberger son bot Discord
  • setup
    • Rainmeter personnalise ton Win10
  • Virtualisation
    • 🇬🇧 Dockerize Angular 9 App With Nginx
    • 🇬🇧 How To Remove Docker Images, Containers, Networks & Volumes
  • Architecture
    • L'Art De Créer Des Diagrammes d'Architecture
  • Marketing
    • Tips sur les réseaux sociaux 2021
  • Gestions IT (pro/perso)
    • Méthodes Agiles
    • Savoir utiliser la méthode GTD (Getting Things Done)
    • Méthode QQCOQP : analyse et résolution des problèmes
  • Nouveautés
    • 🇬🇧 Netflix-technologies
      • How Netflix Scales its API with GraphQL Federation (Part 1)
      • How Netflix Scales its API with GraphQL Federation (Part 2)
  • Autres
    • A classer
  • How to install Windows 10 root certificates [EASY STEPS]
  • 💕Nous soutenons
    • 💻Azales
    • Papi Uzumaki
    • 💻Beau de l'aire
    • Toshi
    • 🛡️ FCC (French Communuty Cybersecurity)
    • 🛡️Sharpforce
Propulsé par GitBook
Sur cette page
  • CERT and alerts
  • Certification
  • Organizations
  • Informatives and blogs
  • CTF, Training L3g@l and G@mes
  • Non-legal Cyber activism
  • IT Hacking list
  • AT Hacking list
  • Courses and Guides Sites
  • OS - Operation Systens
  • Tools

Cet article vous a-t-il été utile ?

Exporter en PDF
  1. Cybersécurité - Hack
  2. Outils

🇬🇧 fabionoth/awesome-cyber-security

Précédent🇬🇧 fabacab/awesome-cybersecurity-blueteamSuivant🇬🇧 Bypassing Cloudflare WAF with the origin server IP address | Detectify Blog

Dernière mise à jour il y a 4 ans

Cet article vous a-t-il été utile ?

A collection of awesome software, libraries, documents, books, resources and cool stuff about security.

Inspired by and .

Thanks to all , you're awesome and wouldn't be possible without you! The goal is to build a categorized community-driven collection of very well-known resources.

CERT and alerts

Link

Description

(Latest News) Computer emergency response Tean for the EU (Europe Union) institutions, bodies and agencies

(Alerts) US-CERT United States Computer Emergency Readiness Team

An ICS-CERT Alert is intended to provide timely notification to critical infrastructure owners and operators concerning threats or activity with the potential to impact critical infrastructure computing networks.

Certification

Link

Description

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

The Certified Information Systems Security Professional (CISSP) is an information security certification for security analysts.

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives include penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct a penetration test.

Penetration Testing with Kali (PWK) is a self-paced, online course that introduces students to the latest ethical hacking tools and techniques.

The Offensive Security Certified Professional (OSCP) is the companion certification for our Penetration Testing with Kali Linux training course and is the world’s first completely hands-on offensive information security certification. The OSCP challenges the students to prove they have a clear and practical understanding of the penetration testing process and life-cycle through an arduous twenty-four (24) hour certification exam.

Organizations

Link

Description

CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

CVE® is a list of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities.

Need Help unlocking your digital life without paying your attackers?

Open Web Application Security Project

(Alerts) Zero Day Iniciative

Informatives and blogs

Link

Description

Blog

Sans Industrial Control Systems blog

Security blog

Google Security Blog

Hacker blog

Hacker security News and Blog

Help Net Security

Security Focus

Internet and Enterprise Security News, Insights e Analysis

Security art Work

Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.

The Hacker News Security in a Serius Way

Powered by Knowledge

News about Malware

News, Views, and insight from the ESET security comunity

CTF, Training L3g@l and G@mes

Link

Description

MotherfuckingCTF inspired platform. But better.

CTF Praticing

Facebook Capture the Flag

Game of Hacker Experience

Brazilian Hackflag

Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents.

Pen-testing Labs

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.

OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.

'pwnable.kr' is a non-commercial wargame site which provides various pwn challenges regarding system exploitation.

CTF Field Guide

Social Network focused on information security

Non-legal Cyber activism

Link

Description

List of sites attacked by unethical Hackers

WikiLeaks is a multi-national media organization and associated library.

IT Hacking list

Link

Description

Google Hackgin Database

Metasploit penetration testing software

AT Hacking list

Link

Description

Open ports in A.T

Default Password database of A.T

Courses and Guides Sites

Link

Description

Free and Open Source Cyber Security Learning

[PT-BR] Safe Development Guide

Website with guides and a Free Ethical Hacking Course

OS - Operation Systens

Link

Description

BackBox Linux is a penetration testing and security assessment oriented Linux distro..

BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 1925 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.

Penetration Testing Destribution OS

Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS).

Web Tester OS

Pentoo is a security-focused livecd based on Gentoo

OS with vulnerabilities for pentests

Tools

Link

Description

The FindBugs plugin for security audits of Java Web Applications.

Static Code Reviewer

A global web application vulnerability search engine.

Pentest Framework used by Kali Linux.

Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing.

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.

Static Code Reviewer

Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression;

OSSEC is a multplatform, opensource and free HIDS

Wazun is a open source enterprise-ready security monitoring solution for threat detection, integrity monitorying, incident response and compliance.

Web Application Attack And Audit Framework

Wireshark is the world’s foremost and widely-used network protocol analyzer

CERT-EU - Latest News
CERT-US - ALERTS
ICS-CERT-US - Alerts
CEH - Certified Ethical Hacker
CISSP - CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL
CompTIA Security +
GPEN - GIAC Penetration Tester
PWK - Penetration Testing Training with Kali Linux
OSCP - Offensive Security Certified Professional
CIS Centor for Internet Security
CVE - Common Vulnerabilities and Exposures
No more ransomware
Owasp
ZeroDayInitiative
EffectHacking
ICS Sans
GBHackers on Security
Google Security Blog
g0tmi1k Blog
Hacker Security
HelpNetSecurity
Security Focus
SecurityWeek
Security art Work
Security Affairs
The Hacker News
Virus Guides
Malwaretech
WeLiveSecurity
BetterMotherFucking CTF
CTF365
FBCTF
Hacker Experience
Hackflag
Hacking-LAB
HackTheBox
Over The Wire
Open Security Training
Pwnable.kr
Trailofbits Github
Shellter
Zone-H
WikiLeaks
Google Hacking Database
Metasploit
Shodan
Critifence
Cybrary
O Tao do Desenvolvimento Seguro
Guru99
BackBoxLinux
BlackArckLinux
Kali
ParrotSec
QubesOS
Samurai Web Tester Framework
PENTOOS
Vulnhub
Find Sec Bugs
Sonarqube
PunkSPIDER
Metasploit Framework
NMap
Netcat
Sonarqube
TCPDump
OSSEC
Wazuh
w3af
Wireshark
Awesome Security
Herman Slatman
contributors
Awesome