0% found this document useful (0 votes)
458 views3 pages

Cybersecurity Resources Hub

The document provides a list of various resources for security training and practice, including free virtual networks (VPNs), custom hacking targets, book and archive repositories, programming courses, security courses and training materials. It covers a wide range of topics such as assembly language, exploitation, web application hacking, and penetration testing.

Uploaded by

Kien Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
458 views3 pages

Cybersecurity Resources Hub

The document provides a list of various resources for security training and practice, including free virtual networks (VPNs), custom hacking targets, book and archive repositories, programming courses, security courses and training materials. It covers a wide range of topics such as assembly language, exploitation, web application hacking, and penetration testing.

Uploaded by

Kien Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Resources

(Free) Virtual Networks (VPNs)


 ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN
 Gh0st Networks: http://www.gh0st.net/
 Hacking Lab: https://www.hacking-lab.com/
 p0wnlabs: http://p0wnlabs.com/
 pwn0: https://pwn0.com/
 PentestIT: https://lab.pentestit.ru/

Custom Personal Targets


 Hack A Server: https://hackaserver.com/
 Hack Me: http://hack.me/
 Hack This: https://www.hackthis.co.uk/
 Smash The Stack: http://smashthestack.org/
 Hack The Box: https://www.hackthebox.gr/
 SecAdvise: https://labs.secadvise.com/
 DarkHive: http://darkhive.net/
 Avatao: https://avatao.com/
 Root-Me: https://www.root-me.org/

Archive/Repository
 Security Conference Library: http://archive.liquidmatrix.org/
 Shell-Storm.org Repository: http://repo.shell-storm.org/CTF/

Books
 Assembly Language Step-by-Step: Programming with Linux [ISBN-13: 978-047-04-9702-
9]: http://www.amazon.com/Assembly-Language-Step-Step-Programming/dp/0470497025/
 Brute Force Vulnerability Discovery [ISBN-13: 978-032-1-44611-
4]: http://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119/
 Bug Hunter's Diary [ISBN-13: 978-1-59327-385-9]: http://nostarch.com/bughunter
 Hacking: The Art of Exploitation [ISBN-13: 978-159-327-144-
2]: http://www.amazon.co.uk/Hacking-Art-Exploitation-Book-Package/dp/1593271441/
 Metasploit: The Penetration Tester's Guide [ISBN-13: 978-159-3-27288-
3]: http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/
 Operating Systems Design and Implementation (3rd Edition) [ISBN-13: 978-013-142-938-
3]: http://www.amazon.com/Operating-Systems-Design-Implementation-Edition/dp/0131429388/
 The Art of Exploitation (2nd Edition) [ISBN-13: 978-1-59327-144-
2]: http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/
 The Shellcoder's Handbook [ISBN-13: 978-0-76454-468-2]: http://www.amazon.com/The-
Shellcoders-Handbook-Discovering-Exploiting/dp/0764544683/
 The Web Application Hacker's Handbook (2nd Edition) [ISBN-13: 978-1-11802-647-
2]: http://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/

Misc
 Bug crowd: http://bugcrowd.com/
 CTF Time: http://ctftime.org/
 CTF365: http://ctf365.com/
 Hacker Cons: http://hackercons.org/
 Hat Force: https://www.hatforce.com/
 Intense School: http://www.intenseschool.com/resources/
 SECore: https://secore.info/
 We Chall: https://www.wechall.net/
 WirelessPentest: http://www.wirelesspentest.com/ (WayBackMachine)

Programming
 Codec Ademy: http://www.codecademy.com/
 Learn {Python,Ruby,C,Regex,SQL,CLI} The Hard
Way: http://learnpythonthehardway.org/book/
 Learn {Python,Java,C,JavaScript,PHP,Shell,C#}: http://learn-c.org/
 PHP - The Right Way.: http://www.phptherightway.com/
 Rails for Zombies: http://railsforzombies.org/

Security Courses
 ComputerSecurityStudent: https://www.computersecuritystudent.com/
 eLearn Security: http://www.elearnsecurity.com/
 Hacking Dojo: http://hackingdojo.com/
 MDSec: http://mdsec.net/
 Offensive Security: https://www.offensive-security.com/
 Security Tube Training: http://securitytube-training.com/
 The Hacker Academy: http://www.thehackeracademy.com/

Training Material
 nets.ec (used to be called "Blackhat Library"): https://nets.ec/Main_Page
 Codecademy: http://www.codecademy.com/
 Corelan: https://www.corelan.be/index.php/articles/
 End Game (How to Get Started in CTF): http://www.endgame.com/
 Hacking Cisco: http://hackingcisco.blogspot.com/
 Metasploit Unleashed: http://www.offensive-security.com/metasploit-unleashed/
 N00b pentesting: http://n00bpentesting.com/lessons/
 Open Security Training: http://opensecuritytraining.info/
 Pentest Standard: http://www.pentest-standard.org/index.php/Main_Page
 Router Gods: http://www.routergods.com/
 SWEET (Secure WEb dEvelopment Teaching): http://www.csis.pace.edu/~lchen/sweet/
 SEED: Vulnerability and Attack Labs: http://www.cis.syr.edu/~wedu/seed/all_labs.html/
 Security Tube: http://www.securitytube.net/

You might also like