Toolbox
-
⚙️ General
Availability
Lookup
Encryption & Hashing
-
🔭 Reconnaissance
Surface
Certificates
-
🚨 Threat Detection
Reputation
Threat Intelligence
- Hunting Abuse CH
- Alien Vault OTX
- IBM X-Force Exchange
- Cisco Talos Intelligence
- GreyNoise
- Netlas
- ODIN
- ThreatBook (Cyber Threat Intelligence)
- Maltiverse (Threat Intelligence Aggregator)
- OpSecFailure (OpSec Mistakes)
- TrailDiscover (CloudTrail Events)
- Inquest Labs (Threat Intelligence & Malware FDR Signatures)
- Detection.FYI (Sigma Rules & Threat Hunting)
- ThreatMiner (Threat Intelligence Data Mining)
- ThreatCrowd (Threat Search Engine)
Scanners
-
⚠️ Vulnerability
Vulnerability Databases
-
💥 Exploitation
Exploits
Living Off The Land
-
☣️ Malware
Malware Information
Samples
- Malware Bazaar
- MalShare
- VirusShare
- VirusBay
- Malware Feed
- Awesome Malware Analysis
- theZoo - Live Malware Repository
- The MALWARE Repo
- Fabrimagic Malware Samples
- Jstrosch Malware Samples
- InQuest Malware Samples
- Malware Sample Library
- Virus Sample Sources
- Cryptware Malware Database
- Pyran1 Malware Database
- Ultimate RAT Collection
- Ransomware Samples
- JavaScript Malware Collection
- Rust for Malware Development
- Rust Malware Gallery
- trickster0 Offensive Rust
- JPG to Malware (Steganography Techniques)
- Linux Malware Samples
- Android Malware Datasets
- Android Malware Source Code Samples
RATs
Sandboxers
-
🌐 Internet
Live Maps
Live Cameras
Tor
IANA
RFC (Request for Comments)
- RFC 791 - Internet Protocol (IP)
- RFC 793 - Transmission Control Protocol (TCP)
- RFC 768 - User Datagram Protocol (UDP)
- RFC 1035 - Domain Name System (DNS)
- RFC 2616 - Hypertext Transfer Protocol (HTTP/1.1)
- RFC 5246 - Transport Layer Security (TLS 1.2)
- RFC 854 - Telnet Protocol Specification
- RFC 2821 - Simple Mail Transfer Protocol (SMTP)
- RFC 2131 - Dynamic Host Configuration Protocol (DHCP)
- RFC 4291 - Internet Protocol Version 6 (IPv6) Addressing Architecture
-
📚 Learning
Practice Labs
- OWASP Vulnerable Web Applications Directory
- CyberDefenders
- LetsDefend
- Blue Team Labs Online
- Hack The Box (HTB)
- TryHackMe
- pwn.college
- PentesterLab
- VulnHub
- CTFtime
- OverTheWire
- Root-Me
- PortSwigger Web Security Academy
- Hacker101 CTF
- Hackers Academy
- National Cyber League (NCL)
- VulnMachines
- Application Security Training
- HackingHub
- Google Public Firing Range
- APIsec Training
- OWASP crAPI
- VAPI - Vulnerable API
- VulnLab Red Team Labs
Learning Resources
- TCM Security Academy
- Cybrary
- AttackIQ Academy
- EC-Council CodeRed
- APIsec University
- Open Security Training
- OST2 Cybersecurity Training
- Learn X in Y Minutes
- Advanced Bash Scripting Guide
- OSCP Guide
- IPPSEC Rocks
- OWASP Web Security Testing Guide (WSTG)
- Pentest Reports Archive
- Security Certification Roadmap
BugBounty Resources
- Resources for Beginner Bug Bounty Hunters
- Bug Bounty Forum - Getting Started
- BugBountyHunter (zSeano)
- How To Hunt
- BugHunterHandbook
- All About Bug Bounty
- Bug Bounty Cheat Sheet
- Awesome Bug Bounty Writeups
- HackerOne Reports Archive
- BBRE (Bug Bounty Explained - Free Resources)
- Bug Reader - Reports
- Bug Bounty World - Slack Archives
News Portals
-
👾 Bug Bounty
Platforms
BB Automation
Subdomain Enumeration
- Sublist3r
- Amass
- massdns
- Findomain
- Sudomy
- chaos-client
- domained
- bugcrowd-levelup-subdomain-enumeration
- shuffledns
- puredns
- censys-subdomain-finder
- Turbolist3r
- censys-enumeration
- tugarecon
- as3nt
- Subra
- Substr3am
- domain
- altdns
- brutesubs
- dns-parallel-prober
- dnscan
- knock
- hakrevdns
- dnsx
- subfinder
- assetfinder
- crtndstry
- VHostScan
- scilla
- sub3suite
- cero
- shosubgo
- haktrails
- bbot
Screenshots
Technologies
Content Discovery
Links