On this page
Academia
Awesome Lists
Awesome lists are curated collections of projects and resources from the community. You can find lists for just about any topic you can think of, from CLI applications to fantasy books.
TL;DR:
- Application Security
- Security
- CTF: Capture The Flag.
- Cyber Security University: Free educational resources that focus on learning by doing.
- Malware Analysis
- Android Security
- Hacking
- Hacking Spots
- Honeypots: Deception trap, designed to entice an attacker into attempting to compromise the information systems in an organization.
- Incident Response
- Vehicle Security and Car Hacking
- Web Security: Security of web apps & services.
- Lockpicking: The art of unlocking a lock by manipulating its components without the key.
- Cybersecurity Blue Team: Groups of individuals who identify security flaws in information technology systems.
- Fuzzing: Automated software testing technique that involves feeding pseudo-randomly generated input data.
- Embedded and IoT Security
- GDPR: Regulation on data protection and privacy for all individuals within the EU.
- DevSecOps: Integration of security practices into DevOps.
- Executable Packing: Packing and unpacking executable formats.
- Malware Persistence: Techniques that adversaries use to keep access to systems across restarts.
- EVM Security: Understanding the Ethereum Virtual Machine security ecosystem.
- Password Cracking: The process of recovering passwords from data that has been stored in or transmitted by a system in scrambled form.
- Security Card Games: Train your skills and discuss various security topics.
- Suricata: Intrusion detection/prevention system and network security monitoring engine.
- Prompt Injection: A type of vulnerability that specifically targets machine learning models.
- Detection Engineering: Design, build, and operate detective cybersecurity controls.
Blogs
Many security professionals use blogs as a platform to share knowledge, raise awareness, and contribute to the growth of the cybersecurity community. Blogs help bridge the gap between technical experts, businesses, and everyday users by presenting insights, updates, and advice in an accessible format.
Books
More:
CTFs
A Capture the Flag challenge is a type of competition where participants solve challenges related to cybersecurity to obtain “flags,” which are like virtual trophies. It’s a hands-on, gamified way for individuals and teams to test their cybersecurity skills, learn new techniques, and have fun while doing it.
GPTs
A Generative Pre-trained Transformer (GPT) is a more recent type of advanced artificial intelligence model developed primarily for generating and understanding human-like text. It’s like having a highly intelligent text-based assistant that can answer questions, create content, translate languages, summarize text, and more.
- Code Copilot: Code Smarter, Build Faster—With the Expertise of a 10x Programmer by Your Side.
- Cover Letter By masterinterview.ai: Boost interviews with compelling cover letters tailored to job applications—simple, quick, effective.
- Python By Maryam Eskandari: A Python assistant for all skills levels, pre-trained on python.org and stackoverflow.com.
- Python By Nicholas Barker: A highly sophisticated GPT tailored for Python programmers. Optimized for GPT-4o.
History
- 1988 The Morris Worm: Created by Robert Tappan Morris, this was one of the first major worms to spread via the internet, causing significant disruptions and illustrating the vulnerability of connected systems.
- 2000 The “ILOVEYOU” Virus: A computer worm disguised as a love letter email attachment that spread rapidly worldwide, causing billions of dollars in estimated damages by overwriting files and mailing itself to contacts.
- 2007 Estonia Cyberattacks: A series of coordinated DDoS (Distributed Denial of Service) attacks crippled government, bank, and media websites in Estonia, marking one of the first large-scale cyberattacks on a nation.
Labs
OffSec
Offensive Security (OffSec) is a proactive, adversarial approach to cybersecurity, focusing on identifying and exploiting flaws in systems, networks, or applications to enhance their security. The goal of offensive security is to think and act like an attacker to identify weaknesses before they can be exploited.
Programming
More:
Tools
Training
War Games
War Games are simulated exercises designed to test and enhance an organization’s ability to handle cyber threats and incidents. These exercises typically involve scenarios that mimic real-world attacks, allowing teams to practice their defensive (and sometimes offensive) skills in a controlled environment.
Think of War Games as a cybersecurity boot camp—a combination of strategy, tactics, and hands-on problem-solving where participants learn by doing.
Web Development
This website is built on some wonderful technologies across freemium and open-source solutions.
Content Management
DNS Security
Web Icons
Writeups
Writeups are a detailed technical document describing the process of solving a particular challenge, exploit, or security problem in the corporate and academic world. Writeups are typically created after solving CTF challenges, building labs, or as lessons learned from real-world security incidents. They serve as an educational resource, helping the community to understand the steps, tools, and thought processes involved in identifying and addressing vulnerabilities or solving complex technical problems.