Resources

On this page

💡
This site uses affiliate links. Learn more.

Academia

Semantic Scholar | AI-Powered Research Tool
Semantic Scholar uses groundbreaking AI and engineering to understand the semantics of scientific literature to help Scholars discover relevant research.

Semantic Scholar provides free, AI-driven search and discovery tools, and open resources for the global research community. 

Awesome Lists

Awesome lists are curated collections of projects and resources from the community. You can find lists for just about any topic you can think of, from CLI applications to fantasy books.

GitHub - sindresorhus/awesome: 😎 Awesome lists about all kinds of interesting topics
😎 Awesome lists about all kinds of interesting topics - sindresorhus/awesome

TL;DR:

Blogs

Many security professionals use blogs as a platform to share knowledge, raise awareness, and contribute to the growth of the cybersecurity community. Blogs help bridge the gap between technical experts, businesses, and everyday users by presenting insights, updates, and advice in an accessible format.

Go Make Things
A simpler, more resilient way to make things for the web.

Books

More:

CTFs

A Capture the Flag challenge is a type of competition where participants solve challenges related to cybersecurity to obtain “flags,” which are like virtual trophies. It’s a hands-on, gamified way for individuals and teams to test their cybersecurity skills, learn new techniques, and have fun while doing it.

National Cyber League
The NCL is a learning-centered cybersecurity competition and community for high school and college students.
picoCTF - CMU Cybersecurity Competition
picoCTF is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at Carnegie Mellon University.

GPTs

A Generative Pre-trained Transformer (GPT) is a more recent type of advanced artificial intelligence model developed primarily for generating and understanding human-like text. It’s like having a highly intelligent text-based assistant that can answer questions, create content, translate languages, summarize text, and more.

History

Labs

OffSec

Offensive Security (OffSec) is a proactive, adversarial approach to cybersecurity, focusing on identifying and exploiting flaws in systems, networks, or applications to enhance their security. The goal of offensive security is to think and act like an attacker to identify weaknesses before they can be exploited.

Get Kali | Kali Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Download BlackArch
Downloads the netinstall or the live iso by torrent, http or ftp

Programming

The Ultimate Python Beginner’s Handbook
Python has become one of the fastest-growing programming languages over the past few years. Not only it is widely used, it is also an awesome language to tackle if you want to get into the world of programming. This Python Guide for Beginners allows you to learn the core of

More:

Tools

GitHub - gchq/CyberChef: The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - gchq/CyberChef

Training

Free Cyber Security Training & Resources | SANS Institute
Free Cyber Security
Hacking Training For The Best
From beginners to experts, this is where hackers level up! Join today and learn how to hack.
TryHackMe | Cyber Security Training
An online platform for learning and teaching cyber security, all through your browser.

War Games

War Games are simulated exercises designed to test and enhance an organization’s ability to handle cyber threats and incidents. These exercises typically involve scenarios that mimic real-world attacks, allowing teams to practice their defensive (and sometimes offensive) skills in a controlled environment.

Think of War Games as a cybersecurity boot camp—a combination of strategy, tactics, and hands-on problem-solving where participants learn by doing.

Codewars - Achieve mastery through coding practice and developer mentorship
A coding practice website for all programming levels – Join a community of over 3 million developers and improve your coding skills in over 55 programming languages!
malwareunicorn.org
Provides workshops and resources for reverse engineering in the infosec space.

Web Development

This website is built on some wonderful technologies across freemium and open-source solutions.

Content Management

Ghost: The best open source blog & newsletter platform
Beautiful, modern publishing with email newsletters and paid subscriptions built-in. Used by Platformer, 404Media, Lever News, Tangle, The Browser, and thousands more.

DNS Security

Connect, protect, and build everywhere
Make employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.

Web Icons

Free open source icons, illustrations, emojis and graphics - Iconduck
Iconduck lists 273,858 free open source icons, illustrations, emojis and graphics. They can be used for personal and commercial projects.
Remix Icon - Open source icon library
Remix Icon is a set of open source neutral style system symbols elaborately crafted for designers and developers. All of the icons are free to use for both personal and commercial.
Free Core Solid - Free Icons Set - 1000 customizable PNGs, SVGs, PDFs
[Free + Open-source] Core is timeless, like the Helvetica font or The Beatles. With its minimalist design and neutrality, it can adapt to any layout. The Solid style is ideal for projects where quick recognition is crucial, especially effective on dark backgrounds. All Core Solid icons are designed on a 14px grid using filled shapes. Licensed under the Creative Commons - CC BY 4.0 – Made by Streamline

Writeups

Writeups are a detailed technical document describing the process of solving a particular challenge, exploit, or security problem in the corporate and academic world. Writeups are typically created after solving CTF challenges, building labs, or as lessons learned from real-world security incidents. They serve as an educational resource, helping the community to understand the steps, tools, and thought processes involved in identifying and addressing vulnerabilities or solving complex technical problems.

InfoSec Write-ups
A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/.

Subscribe to X64.ONL

We're a sponsor fueled security publication. No ads, no spam, no 💩
Awesome! We sent a confirmation link to that email.
Oops! A valid email address is required.