Useful resources for security analysts/researchers/hacker/bountyhunter/weirdos.
Links to websites offering operating systems and virtual environments tailored for security analysts/bounty hunters.
Operating systems designed to prioritize user privacy and security.
Platforms dedicated to the exploration and disclosure of zero-day vulnerabilities.
Features websites related to Common Vulnerabilities and Exposures (CVE) information.
Consists of platforms specialized in scanning and indexing internet-connected devices.
Includes tools and platforms focused on processing and analyzing data.
Platforms dedicated to the analysis of suspicious files and behavior in a controlled environment.
A variety of platforms dedicated to meticulously analyzing URLs, files, and cryptographic hashes for the purpose of enhancing security measures. These platforms play a critical role in identifying potential threats, assessing risks, and safeguarding against various cybersecurity risks.
- Hybrid Analysis
- Virtus Total
- Jotti
- PolySwarm
- OPSWat
- Intezer
- AntiScan
- URL Scan
- URLhaus
- URLVoid
- Url Scanner
- InQuest Labs
- CyberGordon
A diverse range of platforms dedicated to gathering, analyzing, and disseminating comprehensive information about potential cyber threats. These platforms serve as invaluable resources for security professionals, researchers, and organizations seeking to enhance their cybersecurity posture and stay ahead of evolving threats in the digital landscape.
Includes platforms that specialize in detecting and mitigating phishing attacks and spam emails. These platforms play a crucial role in maintaining online security by identifying fraudulent websites, malicious emails, and other deceptive tactics used by cybercriminals to steal sensitive information or spread malware.
Platforms dedicated to monitoring and providing information about data breaches and compromised passwords, helping individuals and organizations assess their exposure to cybersecurity risks.
Platforms and resources dedicated to providing information about cybersecurity threats, vulnerabilities, and exploits. These platforms serve as valuable repositories of knowledge for security professionals, researchers, and organizations seeking to stay informed about emerging threats and vulnerabilities.
Focuses on platforms and solutions dedicated to deploying and managing honeypots, which are decoy systems designed to lure and detect malicious actors.
Platforms dedicated to examining and assessing the reputation and potential threat level associated with IP addresses and domains.
Platforms offering a variety of utilities and services for analyzing and managing network-related tasks.
Platforms that provide web-based browser emulation services, allowing users to access and interact with web content without installing additional software.
Platforms dedicated to assessing the reputation and reliability of mail servers by analyzing various factors such as spam reports, blacklists, and other indicators.
Includes platforms designed to assess and analyze the security configuration of SSL/TLS certificates used by websites.
Platforms and tools dedicated to analyzing and identifying the technologies and frameworks used in websites and web applications.
Platforms dedicated to searching for images based on their content rather than text-based queries.
Platforms dedicated to assessing the performance, security, and overall health of websites.
Platforms dedicated to archiving and preserving historical snapshots of web pages and websites.
Platforms and tools focused on analyzing, testing, and troubleshooting Domain Name System (DNS) configurations and records.
Platforms and tools designed to detect and analyze potential information leaks from web browsers, helping users assess their online privacy and security.
Platforms and tools dedicated to decrypting and cracking password hashes, aiding in password recovery and security testing.
Platforms and tools dedicated to decoding and converting encoded data into human-readable formats.
Open-Source Intelligence category comprises platforms and resources dedicated to gathering, analyzing, and utilizing publicly available information for intelligence and investigative purposes.
Online platforms that provide hands-on cybersecurity training and practical learning environments for aspiring ethical hackers, penetration testers, and security professionals.
- TryHackMe
- HackTheBox
- PentesterLab
- Blue Team Labs
- Wargames
- CyberDefenders
- INE
- Cybrary
- PortSwigger
- Vulnhub
- RootMe
- picoCTF
- HackThisSite
- TCM
- LetsDefend
- Security Blue Team
- Vulnmachines
- DevSecOps
- Hackspalaining
- DarkRelay
- AttackDefense
- Flaws
Platforms and tools dedicated to identifying and decrypting ransomware-encrypted files, aiding victims of ransomware attacks in recovering their data.
Platforms and tools focused on analyzing and discovering publicly accessible data stored in cloud storage services.
Platforms and resources dedicated to documenting and exploring legitimate system binaries and utilities that can be abused by attackers for malicious purposes.
Report bugs properly and grab a reward.
Tools to scan and search vulnerabilities.
All cool tools to do a pentest or hack.
Sources to make Internet a safer place
Everything you should know about security ;)
- Sans resources
- Cybersecurity guide
- US Homeland Security - Cybersecurity Resources
- NICCS
- NIST
- Security Acronyms
Security wikis.
Tips how to start in cyber
Repositories like this or even better.
- Android Security
- Application security
- CTF
- Cybersecurity Blue Team
- DevSecOps
- Embedded and IoT Security
- Fuzzing
- GDPR
- Hacking - carpedm20
- Hacking - Hack with Github
- Awesome Hacking Resources
- Honeypots
- Industrial Control Systems Security
- ICS Writeups
- Incident Response
- Lockpicking
- Malware Analysis
- Pentest
- Pcap Tools
- Reversing
- Security
- Vehicle Security and Car Hacking
- Web Security