PLEASE NOTE: This list is NOT as up to date as the html bookmarks list that is located in the repo! Please import the bookmarks (the .html file) into your browser for the most up to date list and cleaner layout, since it is organized into folders rather than one large list.
edX | Free online courses from the world's best universities
Udacity - Free Online Classes & Nanodegrees | Udacity
Khan Academy | Free Online Courses, Lessons & Practice
3Blue1Brown - Teaches Hard Concepts Well!
Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1 - YouTube
Modern Binary Exploitation - Spring 2015
GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC
Computer Systems Security | Electrical Engineering and Computer Science | MIT OpenCourseWare
Electrical Engineering and Computer Science | MIT OpenCourseWare | Free Online Course Materials
Network and Computer Security | Electrical Engineering and Computer Science | MIT OpenCourseWare
Live Overflow - Where to start with hacking
The Importance of Deep Work & The 30-Hour Method for Learning a New Skill | Azeria Labs
How to Build a Successful Career in Cybersecurity - Daniel Miessler
Good List of Practice Areas in CyberSecurity
So, you want to work in security? – freeCodeCamp
VeteranSec – A Veteran Cyber Security Community
Hackaday | Fresh hacks every day
NYU Tandon Vulnerability Research and Pen Test Course
CBT Nuggets - Awesome For Certs
Whitehatters Computer Security Club
Open Security Training - Lots of Beginner Stuff
Null Byte — Random Hacking Tutorials
Free Military Cyber Training - PCTC (Requires Invite?)
600 free online courses you can take from universities worldwide
Lynda.com (Requires Library Card) - Lots of Free Training On Various Subjects
CS50's Introduction to Computer Science | edX
Practical Programming in C | MIT OpenCourseWare
Home | Lynda | Georgia Institute of Technology | Atlanta, GA
How Do I Declare A Function Pointer in C?
C Tutorial - Learn C - Cprogramming.com
Function Pointers in C and C++ - Cprogramming.com
Intro to OS - C Programming Q&A - YouTube
Phases of translation - cppreference.com
Steps of compiling a C program - Becky Chen - Medium
C Programming Language, 2nd Edition
C Programming: A Modern Approach, 2nd Edition
CMU Recommended - C Traps and Pitfalls
Also CMU Recommended - Computer Systems: A Programmer's Perspective
Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online
The Definitive C Book Guide and List – seclab
C reference - cppreference.com
C/C++ for Hackers « Null Byte :: WonderHowTo
Learn C the Hard Way: Practical Exercises on the Computational Subjects You Keep Avoiding (Like C)
10.2 Pointers and Arrays; Pointer Arithmetic
c - What does getting the address of an array variable mean? - Stack Overflow
ridiculousfish/cdecl-blocks: The venerable cdecl, with Apple blocks support
How Do I Declare A Function Pointer in C?
Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online
C/C++ for Hackers « Null Byte :: WonderHowTo
C reference - cppreference.com
The Definitive C Book Guide and List – seclab
UMBC | Essential C (45 page summary of everything you need to know)
The Definitive C++ Book Guide and List - Stack Overflow
Introduction to Standard Template Library in C++ | Studytonight
Good Video Intro to C++ Programming
Learn C++ - Free Interactive C++ Tutorial
C++ Programming Language - GeeksforGeeks
C++ Tutorial Front Page - 2018
Newbie Questions & Answers, C++ FAQ
C++ Programming/Code/Statements/Functions - Wikibooks, open books for an open world
c++ - Isn't "const" redundant when passing by value? - Stack Overflow
C++ Programming/Code/Statements/Functions - Wikibooks, open books for an open world
The rule of three/five/zero - cppreference.com
C++ reference - cppreference.com
C++ Stuff from r/learnprogramming
c++ - Why is list initialization (using curly braces) better than the alternatives? - Stack Overflow
gabime/spdlog: Fast C++ logging library.
ObjectOrientedProgramminginC4thEdition.pdf
Ampersand (&) operator in a C++ function argument
pointers - How to pass objects to functions in C++? - Stack Overflow
Use constexpr for faster, smaller, and safer code | Trail of Bits Blog
Embedded Systems Coding Standard
Resource Acquisition is Initialisation (RAII) Explained — Tom Dalling
USC - CSCI 104 – Data Structures and Object Oriented Design
Data Structures and Algorithms in C++, Second Edition: Safari Books Online - Premium
Notes on Data Structures and Programming Techniques (CPSC 223, Spring 2018)
A beginner's look at smart pointers in modern C++ - Internal Pointers
Move smart pointers in and out functions in modern C++ - Internal Pointers
GotW #89 Solution: Smart Pointers – Sutter’s Mill
c++ - How to properly duplicate an object given its shared_ptr - Stack Overflow
c++ - clearing a vector of pointers
Destructors (C++) | Microsoft Docs
Smart Pointers (Modern C++) | Microsoft Docs
How to: Create and Use unique_ptr Instances | Microsoft Docs
Unique Pointers - Windows applications | Microsoft Docs
GitHub - rigtorp/awesome-modern-cpp: A collection of resources on modern C++
Introduction to Computer Science and Programming in Python - MIT
The Python Tutorial — Python 3.7.0 documentation
Welcome to Python 101! — Python 101 1.0 documentation
MIT - Introduction to Computer Science and Programming Using Python
How to Learn Python Tutorial - Easy & simple! Learn How to Learn Python! - YouTube
Python's Class Development Toolkit - YouTube
Transforming Code into Beautiful, Idiomatic Python - YouTube
What Does It Take To Be An Expert At Python? - YouTube
Python Network Programming - TCP/IP Socket Programming - YouTube
UsingAssertionsEffectively - Python Wiki
Data model (Dunder Methods, i.e., repr)
PEP 8 -- Style Guide for Python Code | Python.org
Popular Python recipes « ActiveState Code
oop - What is the difference between @staticmethod and @classmethod in Python? - Stack Overflow
Enriching Your Python Classes With Dunder (Magic, Special) Methods – dbader.org
Interfacing Python and C: Advanced “ctypes” Features – dbader.org
Serious Python | No Starch Press
Math Adventures with Python | No Starch Press
How to Write Perfect Python Command-line Interfaces — Learn by Example
Writing Python Command-Line Tools With Click – dbader.org
python - Permanently add a directory to PYTHONPATH - Stack Overflow
How do I find the location of Python module sources? - Stack Overflow
installation - How do I find the location of my Python site-packages directory? - Stack Overflow
Linear algebra (numpy.linalg) — NumPy v1.16 Manual
Mathematical functions — NumPy v1.16 Manual
Random sampling (numpy.random) — NumPy v1.16 Manual
Broadcasting — NumPy v1.16 Manual
Array creation — NumPy v1.16 Manual
Data types — NumPy v1.16 Manual
The N-dimensional array (ndarray) — NumPy v1.16 Manual
Automate the Boring Stuff with Python
10 Essential Python Tips And Tricks For Programmers - GeeksforGeeks
Understanding the underscore( _ ) of Python – Hacker Noon
Python Argparse Cookbook – mkaz.blog
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
c - Can I use Intel syntax of x86 assembly with GCC? - Stack Overflow
ubuntu - Compile/run assembler in Linux? - Stack Overflow
x86 - How do you use gcc to generate assembly code in Intel syntax? - Stack Overflow
Assembly Primer For Hackers (Part 1) System Organization - YouTube
UMBC CMSC313 | Computer Organization & Assembly Language Programming |Spring 2013
A collection of full-stack resources for programmers.
freeCodeCamp - Full Stack Tutorial
Full Stack Book: crash-course-django
Super Crash Course in Full Stack Web Development with Python and Django
Learn Shell Programming - Free Interactive Shell Programming Tutorial
The Linux Documentation Project: Guides
LinuxCommand.org: Learning the shell.
OverTheWire: Bandit - Wargame For Learning UNIX Shell Stuff
OverTheWire: Leviathan - Unix Wargame
Bash tips & tricks: good and not-so-good bash practices | Pragmatic Coders
Understanding Awk – Practical Guide – Developers Area
command line - How to iterate over arguments in a Bash script - Stack Overflow
how to access the next argument of command line parameters in bash? - Unix & Linux Stack Exchange
Multiple conditions in if statement shell script - Stack Overflow
Open Source: 2018 - Java/C++/Python/BigData/Android/
Project-based-learning: Curated list of project-based tutorials
free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books
Free Programming Books – GoalKicker.com
What book made you a better developer? : learnprogramming
Structure and Interpretation of Computer Programs
SICP - Structure and Interpretation of Computer Programs
free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books
CS50's Introduction to Computer Science | edX
Introduction to Game Development
Berkeley 61B - Data Structures
Berkeley 61C - Computer Architecture
Berkeley CS and EE Course Achives
MIT - Software Construction - How to write good code
CS Dojo - CS Stuff Explained Well!
Recursion for Beginners: A Beginner's Guide to Recursion - YouTube
How to solve coding interview problems ("Let's leetcode") - YouTube
Great Intro Videos - Back To Back SWE - YouTube
Daniel Schiffman - Tons of Coding Tutorials and Challenge Walkthroughs
ABC: Always Be Coding – Always Be Coding – Medium
Stevey's Blog Rants: Get that job at Google
Is it possible to be self taught and get a good job without a degree?
Intro to Programming, Data Structures, Algorithms
ossu/computer-science: Path to a free self-taught education in Computer Science!
Coding-interview-university: A complete computer science study plan to become a software engineer.
Teach Yourself Computer Science
List of free university courses for learning Computer Science!
professional-programming github repo
Learn Computer Science | Free Online Courses | Class Central
Intro to Systems Software - C/x86 ASM/Memory Management/GDB
Programming Pearls (2nd Edition): Jon Bentley: 0785342657883: Amazon.com: Books
Martin Fowler @ OOP2014 "Workflows of Refactoring" - YouTube
Must Read - Makefiles – Mrbook's Stuff
Introduction to CMake | Skand Hurkat
Basic tips for optimizing code for speed
java - Why is "2 * (i * i)" faster than "2 * i * i"? - Stack Overflow
"The Clean Code Talks -- Inheritance, Polymorphism, & Testing" - YouTube
Introduction to Object-oriented Programming - MIT OpenCourseWare
Object-Oriented Programming - MIT OpenCourseWare
Encapsulation, Inheritance, Shadowing - MIT OpenCourseWare
University of Helsinki - Object-Oriented programming with Java, part I
Design Patterns | Object Oriented Design
the_skills_poor_programmers_lack.md
Notes on Data Structures and Programming Techniques (CPSC 223, Spring 2018)
kernel_user_space_howto - The Linux Documentation Project
LXR / The Linux Cross Reference
linux - What is the difference between procfs and sysfs? - Unix & Linux Stack Exchange
Configfs - an introduction [LWN.net]
debugfs - yet another in-kernel file system [LWN.net]
Kernel Korner - Why and How to Use Netlink Socket | Linux Journal
networking:generic_netlink_howto [Wiki]
Generic Netlink HOW-TO based on Jamal's original doc [LWN.net]
Computer Programming/Standards and Best Practices - Wikibooks, open books for an open world
Set (abstract data type) - Wikipedia
MUST READ - The Interview Study Guide For Software Engineers
How do you get better at coding interviews? : learnprogramming
A list of events and fellowship opportunities for Computer Science students
Google Interview Problems: Synonymous Queries – Alex Golec – Medium
joyoyao/interviews: Everything you need to know to get the job.
The Interview Study Guide For Data Engineers
User Level thread Vs Kernel Level thread - LeetCode Discuss
Intro to Processes & Threads - YouTube
Difference Between Process and Thread - Georgia Tech - Advanced Operating Systems - YouTube
Difference between forking and multithreading - LeetCode Discuss
19. Dynamic Programming I: Fibonacci, Shortest Paths - YouTube
What is complexity theory? (P vs. NP explained visually) - YouTube
Algorithms: Graph Search, DFS and BFS - YouTube
Algorithms: Binary Search - YouTube
Binary Search Tree Review - YouTube
Python Algorithms for Interviews - YouTube
Algorithms: Recursion - YouTube
Algorithms: Bubble Sort - YouTube
Algorithms: Merge Sort - YouTube
Algorithms: Quicksort - YouTube
Introduction to Big O Notation and Time Complexity (Data Structures & Algorithms #7) - YouTube
Dynamic Programming (Think Like a Programmer) - YouTube
Algorithms: Memoization and Dynamic Programming - YouTube
Dynamic Programming I: Fibonacci, Shortest Paths - YouTube
Dynamic Programming II: Text Justification, Blackjack - YouTube
VisuAlgo - visualising data structures and algorithms through animation
Algorithms for Visual Learners | Hackaday
Algorithms | Computer science | Computing | Khan Academy
Big-O Algorithm Complexity Cheat Sheet (Know Thy Complexities!) @ericdrowell
A Gentle Introduction to Algorithm Complexity Analysis
Analysis of Algorithms | Set 4 (Analysis of Loops) - GeeksforGeeks
Data Structures & Algorithms #1 - What Are Data Structures? - YouTube
Dynamic Arrays - Dynamic Arrays and Amortized Analysis | Coursera
Data Structures: Linked Lists - YouTube
UC San Diego - Linked Lists vs. Arrays - Interfaces, Linked Lists vs. Arrays, and Correctness
Data Structures: Trees - YouTube
Data Structures: Heaps - YouTube
Data Structures: Hash Tables - YouTube
UC San Diego - Phone Book Problem - Hash Tables | Coursera
Data Structures: Stacks and Queues - YouTube
Data Structures: Crash Course Computer Science #14 - YouTube
Berkeley Foundations of Software Engineering
UC Berkeley CS 169 Software Engineering
Allen Holub: Training/Consulting/Programming: Agile, Architecture, Swift, Java
Georgia Tech - High Performance Computer Architecture - Udacity
MIT - Comp Org, Arch, and Digital Design
User Level thread Vs Kernel Level thread - LeetCode Discuss
Intro to Processes & Threads - YouTube
Difference Between Process and Thread - Georgia Tech - Advanced Operating Systems - YouTube
Difference between forking and multithreading - LeetCode Discuss
The Case For Architecture-Aware OS Kernel
Formal Requirements for Virtualizable Third Gen Architectures
Virtual Machine Monitors: Current Tech and Future Trends
Implementing Remote Procedure Calls
GOOD - SystemProgramming Wiki · GitHub
An Introduction to programming with threads
hessmjr/operating-systems: Georgia Tech OMSCS - Operating Systems
drharris/pretty-bonnie: Helps with Bonnie test output on Udacity.
Interactive map of Linux kernel
Linux source code: (v4.20) - Bootlin
Spring19-schedule.xlsx - Google Sheets
.net - What's the purpose of Thread.SpinWait method? - Stack Overflow
A gentle introduction to multithreading - Internal Pointers
multithreading - Why should I use a thread vs. using a process? - Stack Overflow
Atomic vs. Non-Atomic Operations
Can multithreading be implemented on a single processor system? - Stack Overflow
Parallelism vs. Concurrency - HaskellWiki
Difference between Multiprogramming, Multitasking, Multithreading and Multiprocessing
Inter-process communication - Wikipedia
Process (computing) - Wikipedia
Concurrency (computer science) - Wikipedia
Parallel computing - Wikipedia
Multithreading (computer architecture) - Wikipedia
multithreading - When one thread blocks in C, why doesn't the entire process block - Stack Overflow
Heavily Commented Linux Kernel Source Code
Wonderful World of Linux 3.0 | Kniggit.net
The Linux Kernel Module Programming Guide (2.6)
Syscall Hijacking: Dynamically obtain syscall table address (kernel 2.6.x) | memset's blog
Syscall Hooking via the Interrupt Descriptor Table (2.6)
CMSC 421 - Adding a System Call to the Linux Kernel
HowTos/I need the Kernel Source - CentOS Wiki
Implementing a System Call on Linux 2.6 for i386
The Linux Kernel, Kernel Modules And Hardware Drivers
Linux Interrupt Handling
Understanding the Linux Kernel, Third Edition - Amazon
How Computers Boot Up | Many But Finite
The Kernel Boot Process | Many But Finite
How The Kernel Manages Your Memory | Many But Finite
Anatomy of a Program in Memory | Many But Finite
System Calls Make the World Go Round | Many But Finite
Page Cache, the Affair Between Memory and Files | Many But Finite
Memory Translation and Segmentation | Many But Finite
CPU Rings, Privilege, and Protection | Many But Finite
Inside the Linux 2.6 Completely Fair Scheduler – IBM Developer
An overview of Linux processes - Real world Linux Blog
Introduction to Linux Threads – Part I
How to Create Threads in Linux (With a C Example Program)
What are Linux Processes, Threads, Light Weight Processes, and Process State
The Linux Kernel: Table of Contents
Embedded Linux, kernel and real-time presentations - Bootlin
Kernels 101 – Let’s write a Kernel - Arjun Sreedharan
Kernels 201 - Let’s write a Kernel with keyboard and screen support - Arjun Sreedharan
Amazing Free OS Book | Operating Systems: Three Easy Pieces
PRIMER - Unix and Internet Fundamentals
MikeOS - simple x86 assembly language operating system
Operating systems development for Dummies – Leo Whitehead – Medium
Writing a Tiny x86 Bootloader - Joe Bergeron
Write an OS from scratch. A book for self-learner.
raspberry-pi-os: Learning operating system development using Linux kernel and Raspberry Pi
Writing a Bootloader Part 1 | Alex Parker's Website
GitHub - lduck11007/os-tutorial: How to create an OS from scratch
A pattern language for microservices
NGINX - Register for free books and info
Waterloo - Programming for Performance
Introduction to Parallel Computing
Princeton - COS 326: Functional Programming
UC Berkeley - CS164: Hack Your Language!
Cornell - CS 3110 - Functional Programming and DS
Intro to Programming Languages
Programming in Standard ML Book
CS 15-150: Principles of Functional Programming (Fall 2015)
CS 5010: Program Design Paradigms
UMD - CMSC430: Introduction to Compilers
UIUC - CS 421 Programming Languages and Compilers
Cornell - CS 4120 - Intro to Compilers
Compilers and Compiler Generators
Compilers: Principles, Techniques, and Tools --- Second Errata Sheet
Compilers: Principles, Techniques, and Tools - Wikipedia
Engineering A Compiler - Google Search
ELI5: What is LLVM? Can it be used for general purpose programming? : learnprogramming
LLVM Language Reference Manual — LLVM 10 documentation
LLVM Project Blog: Clang is now used to build Chrome for Windows
c++ - How to generate assembly code with clang in Intel syntax? - Stack Overflow
Cocoa Samurai: Understanding the Objective-C Runtime
A Guide To Parsing: Algorithms And Terminology
7 Steps to Mastering Machine Learning With Python
Top 10 Machine Learning Algorithms for Beginners
8 Fun Machine Learning Projects for Beginners
Andrew NG Intro to Machine Learning
scikit-learn: machine learning in Python — scikit-learn 0.19.1 documentation
Metacademy - Deep learning from the bottom up
Deep Learning For Coders—36 hours of lessons for free
Machine Learning - complete course notes
Machine Learning Tutorial Part 1 | Machine Learning For Beginners - YouTube
Field Guide to Genetic Programming
Artificial Intelligence: A Modern Approach (3rd Edition)
Machine Learning Books : MachineLearning
Microsoft Word - EvolProg_Introduction.doc
awesome-machine-learning/books.md at master · josephmisiti/awesome-machine-learning · GitHub
https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/
Machine Learning & Artificial Intelligence: Crash Course Computer Science #34 - YouTube
Crash Course in Machine Learning – IoT For All – Medium
Machine Learning Crash Course 2015 - YouTube - YouTube
Prof. Lorenzo Rosasco (part 1) - Machine Learning: A basic toolkit - YouTube
Syllabus | Machine Learning for Intelligent Systems
A List of Awesome Machine Learning Courses
Another Awesome List of Machine Learning Courses
Artificial Intelligence | Electrical Engineering and Computer Science | MIT OpenCourseWare
13. Learning: Genetic Algorithms - YouTube
Deep Learning Summer School, Montreal 2015 - VideoLectures - VideoLectures.NET
Stanford University: Tensorflow for Deep Learning Research
Columbia - Machine Learning 4771
CS 189/289A: Introduction to Machine Learning
Stanford University CS224d: Deep Learning for Natural Language Processing
Stanford University CS231n: Convolutional Neural Networks for Visual Recognition
Kaggle: Your Home for Data Science
Deep Learning Tutorials — DeepLearning 0.1 documentation
Creating a genetic algorithm for beginners
Cornell - CS 4700: Foundations of Artificial Intelligence
Cornell - CS 6700: Advanced Artificial Intelligence
MIT - The Society of Mind | Electrical Engineering and Computer Science | MIT OpenCourseWare
How to Stream Text Data from Twitch with Sockets in Python – LearnDataSci
Learn Data Science | Free Online Courses | Class Central
Collection: Getting started with machine learning · GitHub
Topic: evolutionary-computation · GitHub
A curated list of adversarial machine learning resources
Machine Learning for Cyber Security Resources
Introduction To Genetic Algorithms | Codecademy
Welcome — Theano 1.0.0 documentation
Start Here With Machine Learning - Machine Learning Mastery
Choosing the right estimator — scikit-learn 0.19.1 documentation
Geoffrey Hinton Neural Networks for Machine Learning
[D] What is the best ML paper you read in 2018 and why? : MachineLearning
GFlags and PageHeap - Windows drivers | Microsoft Docs
Using the Pointer Ownership Model to Secure Memory Management in C and C++
Making a contribution to an Open Source project on GitHub and whoa! : learnprogramming
Booting an Intel Architecture System, Part I: Early Initialization | Dr Dobb's
unicode - What is exactly an overlong form/encoding? - Stack Overflow
Reverse Engineering for Beginners Book (REALLY LONG)
Reversing: Secrets of Reverse Engineering: Eldad Eilam
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler: Chris Eagle
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
The Antivirus Hacker's Handbook
Exploiting Software: How to Break Code: Greg Hoglund, Gary McGraw: 9780201786958: Amazon.com: Books
Reverse Engineering 101 - NYU Poly - 2009
Reverse Engineering 101 - NYU:Poly 2010
Reverse Engineering 102 - NYU:Poly 2010
Software RE Resources | NSA Codebreaker Challenge
Software Reverse Engineering and Malware Analysis
Microcorruption - Interactive Intro to RE
RE for Beginners | Reverse Engineering
RPI - CSCI 4971 - Secure Software Principles (RE stuff)
RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec
Reverse Engineering 101 - Reverse Engineering - 0x00sec
How to Reverse Engineer Software (Windows) in a Right Way
Bootstrapping Understanding: An Introduction to Reverse Engineering
[KEYGENME - EASY] Cracking Your First Program - Reverse Engineering / Challenges - 0x00sec
Malwarebytes CrackMe 2 by hasherazade
How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs
VIDEO: Tips, Tricks, and Clues to Escape the LabyREnth CTF
[Crackme] ESET Crackme Challenge 2015 - Archived - Tuts 4 You
"ESET - Malware analyst challenge"
ESET CrackMe Challenge 2015 Walkthrough - UIC Academy
SANS 2018 Holiday Hack Writeup
SANS Penetration Testing | SANS 2015 Shmoo Challenge Winners and Official Answer | SANS Institute
ROOTCON 2019's CTF Writeups for Web Category - InfoSec Write-ups - Medium
SAN 2015 Challenge #ShmooCon - writeup
SANS 2017 Holiday Hack Writeup
2018 Flare-On Challenge Solutions « 2018 Flare-On Challenge Solutions | FireEye Inc
2019 Flare-On Challenge Solutions | FireEye Inc
Coding | Reversing: Flare-On Challenge 2017 Writeup
2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions | FireEye Inc
Network Forensics Puzzle Contest
Network Forensics Puzzle Contest 2014 Walkthrough – Network Forensics Puzzle Contest
Network Forensics Puzzle 2014 – BytePuzzles
DEFCON 22 Network Forensics Puzzle Contest Walkthrough : netsec
Reverse Engineering & Exploitation of a “Connected Alarm Clock” – Courk's Blog
2018 B-day Reverse Engineering Challenge
Flareon 5 Challenge 6 - Magic (Walk through - Reverse Engineering) - YouTube
BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)
BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)
Getting ready for Assembly Programming – Anatomy of Intel Processor - Part 2
Getting ready for Assembly Language Programming – Part 1
Getting started with Assembly language programming - End of theory - Part 3
Assembly Language Programming and Shellcoding - Lab setup and some important things - Part 4
Assembly Language Programming and Shellcoding - Hello World - Part 5
Assembly Language Programming and Shellcoding - Important Functions - Part 6
Assembly Language Programming and Shellcoding – Important Functions – Part 7
Part 1 - Reverse Engineering Basics - Linux x64
Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64
Part 3 - Reverse Engineering Basics - Linux on ARM64
Part 3-2 - Reverse Engineering - Patching Binaries with Radare2 - ARM64 - ScriptDotSh
Part 2 - Reverse Engineering Basics - Windows x64 - ScriptDotSh
Part 2-2 – Reverse Engineering – XOR encryption – Windows x64 - ScriptDotSh
Part 2-3 – Reverse Engineering – Building Cracked Binaries – Windows x64 - ScriptDotSh
Shitsco CTF Problem Walkthrough – Georgia Weidman – Medium
Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!
[Tutorial] An example of reversing an undocumented game file format
gdb record and replay - Google Search
gdb - How do I use watchpoints?
Debugging with GDB - Set Watchpoints
GDB Command Reference - Breakpoint and watchpoint management
Debugging with GDB Introduction | Azeria Labs
longld/peda: PEDA - Python Exploit Development Assistance for GDB
Using GDB to Develop Exploits - A Basic Run Through
GDB Command Reference - x command
debuggers - Decent GUI for GDB - Reverse Engineering Stack Exchange
How to highlight and color gdb (and other alternatives)
snare/voltron: A hacky debugger UI for hackers
Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers: GEF
Guide to Faster, Less Frustrating Debugging
Georgia Tech - Debugging with GDB
Using GDB to Develop Exploits - A Basic Run Through
Home - GEF - GDB Enhanced Features documentation
Art of Debugging | No Starch Press
Debugging C/C++ Programs Remotely Using Visual Studio Code and gdbserver
Plugins · x64dbg/x64dbg Wiki · GitHub
GitHub - x64dbg/x64dbg: An open-source x64/x32 debugger for windows.
utkonos/lst2x64dbg: Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database.
rr: lightweight recording & deterministic debugging
Debuggex: Online visual regex tester. JavaScript, Python, and PCRE.
felberj/gotools: Plugin for Ghidra to assist reversing Golang binaries
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra
GitHub - NationalSecurityAgency/ghidra
Frequently asked questions · NationalSecurityAgency/ghidra Wiki · GitHub
First Look at Ghidra (NSA Reverse Engineering Tool) - YouTube
Reversing Android Bluetooth Chipsets with Ghidra - YouTube
Ghidra: A quick overview for the curious | Shortjump!
Ghidra Plugin Development for Vulnerability Research - Part-1 — Somerset Recon
decompiler: Decompiler Analysis Engine
Using NSA's Ghidra to make a keyboard backlight match in-game graphics of SuperHexagon : programming
INFILTRATE 2019 - Three Heads are Better Than One: Mastering Ghidra
Working With Ghidra's P-Code To Identify Vulnerable Function Calls - River Loop Security
A Vagrantfile for provisioning a VM with Ghidra and X11 forwarding enabled.
The Basics of IDA Pro - InfoSec Resources
Reversing Basics - A Practical Approach Using IDA Pro | www.SecurityXploded.com
ida pro tutorial for beginners - Google Search
Basic Dynamic Analysis with IDA Pro and WinDBG - YouTube
GitHub - patois/IDACyber: Data Visualization Plugin for IDA Pro
Real-world Decompilation with IDA Pro - Part 1: Introduction - YouTube
Real-world Decompilation with IDA Pro - Part 2: String Handling - YouTube
IDA series, part 2: debugging a .NET executable
IDA series, part 1: the Hex-Rays decompiler
Marco Ramilli's Blog: How to Patch Binary with IDA Pro
daniel_plohmann / simpliFiRE.IDAscope — Bitbucket
GitHub - onethawt/idaplugins-list: A list of IDA Plugins
GitHub - Maktm/FLIRTDB: A community driven collection of IDA FLIRT signature files
Binary Cracking & Byte Patching with IDA Pro - CodeProject
Free IDA Pro Reverse Code Engineering and Binary Auditing Training Material for University Lectures
Using Z3 with IDA to simplify arithmetic operations in functions | Shortjump!
RE for Beginners | Short Intro to IDA
IDA Shortcuts [PDF]
GitHub - ColdHeat/liil: Linear IL view for Binary Ninja
2000 cuts with Binary Ninja | Trail of Bits Blog
De-obfuscating Jump Chains with Binary Ninja - This is Security :: by Stormshield
GitHub - radare/radare2: unix-like reverse engineering framework and commandline tools
A journey into Radare 2 – Part 2: Exploitation – Megabeets
Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2 - YouTube
Radare2: An Introduction to Visual Mode - MOVEAX.ME
Reverse Engineering Using Radare2 – Jacob Pimental – Medium
Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium
Crackme0x04 Dissected with Radare2 - MOVEAX.ME
Crackme0x03 Dissected with Radare2 - MOVEAX.ME
Crackme0x05 Dissected with Radare2 - MOVEAX.ME
Crackme0x06 Dissected with Radare2 - MOVEAX.ME
Crackme0x07 Dissected with Radare2 - MOVEAX.ME
Crackme0x08 Dissected with Radare2 - MOVEAX.ME
Debugging Using Radare2… and Windows! – Jacob Pimental – Medium
Crackme0x09 Dissected with Radare2 - MOVEAX.ME
Reversing a Self-Modifying Binary with radare2 – Megabeets
Reverse engineering a Gameboy ROM with radare2 – Megabeets
BombLab Dissected with Radare2 - MOVEAX.ME
Dr Von Noizeman's Nuclear Bomb defused with Radare2 - MOVEAX.ME
Crackme0x01 Dissected with Radare2 - MOVEAX.ME
Conditions and loops – Max Kersten
radare2 python scripting - r2wiki
radare2-extras/r2snowman at master · radare/radare2-extras
radareorg/radeco: radare decompiler tool based on radeco-lib
radareorg/cutter: A Qt and C++ GUI for radare2 reverse engineering framework
A journey into Radare 2 – Part 1: Simple crackme – Megabeets
Compiler Explorer - Programming Language to Assembler Converter
x86 Disassembly/Disassemblers and Decompilers - Wikibooks, open books for an open world
Veles - Visual Binary Analysis Tool
WORTH READING - x86 Disassembly.pdf
x86 Assembly - YouTube - YouTube
Breaking the x86 Instruction Set - YouTube
A Crash Course in x86 Assembly for Reverse Engineers
x86 Assembly - Wikibooks, open books for an open world
x86 Disassembly - Wikibooks, open books for an open world
jasmin download | SourceForge.net
Assembly Language Step-by-Step Third Edition: Jeff Duntemann: 8601400126363: Amazon.com: Books
When and how to use an assembler. Assembly programming basics.
WORTH READING - x86 Disassembly.pdf
C Function Call Conventions, UMBC CMSC 313, Spring 2002
x86 In-Depth: CDECL Calling Convention Complete Tutorial - BONUS video - YouTube
What are the calling conventions for UNIX & Linux system calls on i386 and x86-64 - Stack Overflow
Executable and Linkable Format 101. Part 2: Symbols - Intezer
Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer
Introduction to the ELF Format : The ELF Header (Part I)
The 101 of ELF files on Linux: Understanding and Analysis - Linux Audit
Automatic Reverse Engineering of Data Structures from Binary Execution [PDF]
Digging For Data Structures [PDF]
TIE: Principled Reverse Engineering of Types in Binary Programs [PDF]
MemPick: High-Level Data Structure Detection in C/C++ Binaries [PDF]
Howard: a dynamic excavator for reverse engineering data structures [PDF]
.NET Reverse Enginering - Part 1 – CodePool – Programming and a bit more
Getting Started with Windows Debugging - Windows 10 hardware dev
Debug Universal Drivers - Step by Step Lab (Echo Kernel-Mode) - Windows 10 hardware dev
Exploring Windows virtual memory management
An In-Depth Look into the Win32 Portable Executable File Format - Part 1 - DelphiBasics
An In-Depth Look into the Win32 Portable Executable File Format - Part 2 - DelphiBasics
Visual Studio Documentation | Microsoft Docs
An Introduction to Windows Kernel Debugging | Endgame
ReactOS (open source Windows remake)
CVE-2019-8372: Local Privilege Elevation in LG Kernel Driver - @Jackson_T
Malware Unicorn Environment VM's
Creating a Simple Free Malware Analysis Environment - MalwareTech
Creating the Ultimate Tor Virtual Network - MalwareTech
Malware Sample Sources for Researchers
Official Documentation — Viper 2.0-dev documentation
phoenix: Cuckoo Sandbox is an automated dynamic malware analysis system
RPISEC - Malware Analysis 2013
RPISEC - Malware Analysis 2015
Open Security Training - Reverse Engineering Malware
How to start RE/malware analysis? | hasherezade's 1001 nights
CNIT 126: Practical Malware Analysis -- Sam Bowne
UMBC CMSC 491/691 Malware Analysis
Free Automated Malware Analysis Service - powered by Falcon Sandbox
REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware
ProcDump - Windows Sysinternals | Microsoft Docs
Dependency Walker (depends.exe) Home Page
Automated Malware Analysis - Joe Sandbox Cloud Basic
GitHub - TheHive-Project/Cortex: Cortex: a Powerful Observable Analysis and Active Response Engine
Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analysis - A Way to Learn Anti-Reversing Tricks - YouTube
Malware Theory - Basic Structure of PE Files - YouTube
An Introduction to Dumping Malware with Process Dump - YouTube
Colin Hardy - Lots of Malware Analysis Stuff
IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports - YouTube
Structs and Stuff | Reverse Engineering C++ Malware With IDA Pro - YouTube
GitHub - corkami/docs: documentations, slides decks...
Dr. Fu's Blog: Malware Analysis Tutorial 8: PE Header and Export Table
A curated list of malware analysis tools and resources.
Interactive Online Malware Analysis Sandbox - ANY.RUN
ANY.RUN - Interactive Online Malware Sandbox
rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources.
Daily Releases (February 14, 2018) : CrackWatch
CS.RIN.RU - Steam Underground Community • Index page
PwnAdventure3/re-mmorpg-troopers18.pdf at master · beaujeant/PwnAdventure3 · GitHub
You Have to Hack This Massively Multiplayer Game to Beat It | WIRED
GitHub - Vector35/PwnAdventureZ: NES zombie survival game made to be hacked
Getting Started With Game Hacking: The Definitive Guide (Part 1)
[Tutorial] Getting Started With Programming And Gamehacking
[Tutorial] Make your own dll hack | [1] | Memory patching & Editing
[Tutorial] CodeCave with OllyDbg
[Information] Useful C++/Gamehacking/Programming for beginners threads - Mega thread
Game Hacking: WinXP Minesweeper - Reverse Engineering - 0x00sec
Finding and exploiting hidden features of Animal Crossing’s NES emulator | jamchamb.github.io
Basics of Cryptography Part I: RSA Encryption and Decryption
jcryptool/doc: JCrypTool Documentation and Resources
Base64 Decode and Encode - Online
Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering
Rewriting Functions in Compiled Binaries | Trail of Bits Blog
GitHub - trailofbits/fennec: Rewriting functions in compiled binaries
Hacking the Xbox: An Introduction to Reverse Engineering
PCB-RE: Tools & Techniques: Mr Keng Tiong Ng: 9781979331388: Amazon.com: Books
Software-based Microarchitectural Attacks
Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges
Build an 8-bit computer | Ben Eater
8-bit computer update - YouTube
Learning FPGA And Verilog A Beginner’s Guide Part 1 – Introduction | Numato Lab Help Center
Introduction to Firmware Reversing - YouTube
34C3 - Reverse engineering FPGAs - YouTube
Reverse engineering a simple CMOS chip - YouTube
How safe is a Wifi Cloud Hub Router (from hackers)? - YouTube
Secrets of the Nintendo CIC Chip - Early Cartridge Anti-Piracy | MVG - YouTube
The IoT Hacker's Toolkit · System Overlord
Analog Discovery 2 - National Instruments
Syonyk's Project Blog: DSO138 Scope, Acrylic Housing Assembly, and USB Power
ChipWhisperer® – NewAE Technology Inc.
Reverse Engineering Firmware: Linksys WAG120N – /dev/ttyS0
5-Min Tutorial: Lifting Firmware with the Bus Pirate – B-sides
Hacking Microcontroller Firmware through a USB | Securelist
GitHub - praetorian-code/DVRF: The Damn Vulnerable Router Firmware Project
Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1
GitHub - firmadyne/firmadyne: Platform for emulation and dynamic analysis of Linux-based firmware
GitHub - hugsy/gdb-static: Public repository of static GDB and GDBServer
gdbserver remote debugging - Google Search
gdb - Cross debugging for ARM / MIPS ELF with QEMU/toolchain - Reverse Engineering Stack Exchange
ULN2003 - practical example of «reading» microchip schematic : ZeptoBars
How to crack open some computer chips and take your own die shots - ExtremeTech
fail0verflow :: ShofEL2, a Tegra X1 and Nintendo Switch exploit
fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia
fail0verflow :: PS4 Aux Hax 2: Syscon
fail0verflow :: PS4 Aux Hax 3: Dualshock4
Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP
Making a GameCube memory card editor with Raspberry Pi | jamchamb.github.io
Embedded Hardware Hacking 101 – The Belkin WeMo Link « Threat Research Blog | FireEye Inc
Reverse Engineering My Home Security System: Decompiling Firmware Updates
Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World
Heart of Darkness - exploring the uncharted backwaters of HID iCLASS RFID reader security
Hackaday | Fresh hacks every day
Hardware Hacking for Software People | Don't Stuff Beans Up Your Nose
Methodologies For Hacking Embedded Security Appliances
Changing your MAC address in Windows - inc0x0
Solder Skills Challenge - SMD Challenge from MakersBox on Tindie
Application-Specific Integrated Circuits (ASICs) - Google Search
Field Programmable Gate Arrays (FPGAs) - Google Search
Latest hacking topics - 0x00sec
Zero Day Initiative — VMware Exploitation through Uninitialized Buffers
In-Memory-Only ELF Execution (Without tmpfs) Mrs Quis Will Think of a Better Title
High-Level Approaches for Finding Vulnerabilities - @Jackson_T
How do I get started in vulnerability research? : ReverseEngineering
A bunch of Linux kernel exploitation resources
Travel blog of an evil transgirl: Reversing ALPC: Where are your windows bugs and sandbox escapes?
Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog
Vulnerability Discovery Against Apple Safari | Ret2 Systems Blog
Security Bulletins | Microsoft Docs
Null Byte Poisoning ~ The Magic Byte - Exploit Development - 0x00sec - The Home of the Hacker
Latest Exploit Development topics - 0x00sec - The Home of the Hacker
Cheat sheet - How Stack Pivots are used in Modern Exploits : ReverseEngineering
Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research
Zero Day Initiative — The Story of Two Winning Pwn2Own JIT Vulnerabilities in Mozilla Firefox
Phrack - Javascript Jit Type Confusion
Phrack - Javascript Engine Basics
Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!
Hackers Hut: Local root exploits
Troy Hunt: Everything you need to know about the Heartbleed SSL bug
Project Zero: The Fully Remote Attack Surface of the iPhone
Don't Follow The Masses: Bug Hunting in JavaScript Engines | Bluefrostsecurity
Escaping the Chrome Sandbox via an IndexedDB Race Condition | Bluefrostsecurity
Project Zero: Down the Rabbit-Hole...
Azeria | Write up of iOS exploit - Walking through the underlying exploit development process
Vulnerability Reports || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
Sudoers Bug | Oss-security - Sudo: CVE-2019-14287
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Hacking: The Art of Exploitation, 2nd Edition
Amazon.com: Windows Internals, Part 2 (6th Edition) (Developer Reference)
RPISEC - Modern Binary Exploitation
Fall 2020 - Georgia Tech Information Security Lab Course
Modern Binary Exploitation - Spring 2015
RPISEC INTROSEC - Command Line
RPISEC INTROSEC - Stegonography
CNIT 127: Exploit Development -- Sam Bowne
Violent Python and Exploit Development
Basic General Vulnerability Course
LiveOverflow - Binary Hacking (exploit exercises)
How To Hack: Episode 1 - Trampoline Stack Smash - YouTube
Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21 - YouTube
Exploit-Exercises: Protostar (v2) ~ VulnHub
Exploit Education :: Andrew Griffiths' Exploit Education
OverTheWire: Narnia - Basic Exploitation
OverTheWire: Behemoth - Common Coding Mistakes
OverTheWire: Utumno - Intermediate Difficulty Wargame
OverTheWire: Maze - Exploitation/Programming/RE Wargame
OverTheWire: Semtex - Exploitation and RE
Analysis of a Chrome Zero Day: CVE-2019-5786 | McAfee Blogs
One more Steam Windows Client Local Privilege Escalation 0day
Issues - chromium - An open-source project to help move the web forward. - Monorail
h4cker/exploit_development at master · The-Art-of-Hacking/h4cker
Installation — pwntools 3.12.0 documentation
Exploit Development with AFL, PEDA and PwnTools
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
Weaponization of Nessus Plugins
merrychap/shellen: Interactive shellcoding environment to easily craft shellcodes
0xdea/tactical-exploitation: Modern tactical exploitation toolkit.
Payload Generation using SharpShooter – MDSec
mdsecactivebreach/SharpShooter: Payload Generation Framework
Intermediate Level Linux Exploitation
Intro Binary Hacking Course - LiveOverflow
Open Security - Intro to Software Exploits for Linux
ExploitDev: Part 1 - Intro to Exploit Development
ExploitDev: Part 2 - Saved Return Pointer Overflowing
ExploitDev: Part 3 - Structured Exception Handler (SEH)
ExploitDev: Part 4 - Egg Hunters
ExploitDev: Part 6 - Win32 Shellcode
ExploitDev: Part 8 - Heap Spraying
ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)
ExploitDev: Part 10 - Kernal Exploitation - Stack Overflow
ExploitDev: Part 11 - Kernel Exploitation - Write-What-Where
ExploitDev: Part 12 - Kernel Exploitation - Null Pointer Dereference
ExploitDev: Part 13 - Kernel Exploitation - Uninitialized Stack Variable
ExploitDev: Part 14 - Kernel Exploitation - Integer Overflow
ExploitDev: Part 15 - Kernel Exploitation - Use After Free (UAF)
ExploitDev: Part 16 - Kernel Exploitation - Pool Overflow
ExploitDev: Part 17 - Kernel Exploitation - GDI Bitmap Abuse
ExploitDev: Part 18 - Kernel Exploitation - RS2 Bitmap Necromancy
ExploitDev: Part 19 - Kernel Exploitation - Logic bugs in Razer rzpnk.sys
A curated list of Windows Exploitation resources
Introduction to Windows Kernel Driver Exploitation (Pt. 1)
Starting with Windows Kernel Exploitation – part 1 – setting up the lab | hasherezade's 1001 nights
Open Security Videos - Intro to Windows Exploits
Shellcoding for Linux and Windows Tutorial
How to write a (Linux x86) egg hunter shellcode | Adventures in the programming jungle
Shellcode Injection - Dhaval Kapil
Writing ARM Shellcode | Azeria Labs
Linux Shellcoding (Part 1.0) - Exploit Development - 0x00sec - The Home of the Hacker
M34_The_Art_of_Writing_Shellcode.pdf
Phrack | how to turn any code into alphanumeric code
Shellcode limitations - Wikipedia
Phrack | Bypassing Unicode Translation That Adds Null Bytes
Best books, tutorials and courses to learn about exploit development
Ask HN: What's the prerequisite to become an exploit developer? | Hacker News
slimm609/checksec.sh: Checksec.sh
Corelan Team - Exploit Writing Tutorials
[Backdoor 101] Backdooring PE File by Adding New Section Header - Hack.Learn.Share
Memory Corruption 101 - NYU Poly 2011
Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team
Linux ExploitDev: Part 3 - Buffer Overflow
0x7 Exploit Tutorial: Bad Character Analysis
0x0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite
0×3 Exploit Tutorial: Buffer Overflow – SEH Bypass
Binary Exploitation ELI5– Part 1 –Stack/Buffer Overflow/Ret2Libc
Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations
Speedrun Hacking Buffer Overflow - speedrun-001 DC27 - YouTube
SROP | Signals, you say? - Exploit Development - 0x00sec - The Home of the Hacker
Learn ROP through a short series of practical challenges : netsec
Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP
Notes/ret2libc.txt at master · Malformation/Notes
libc - offset - 64-bit Linux stack smashing tutorial: Part 3
Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray
Dive into ROP - a quick introduction to Return Oriented Programming
Demo6A - Return-Oriented Programming Exploit with ROPgadget 64-bit Variant - YouTube
Demo6 - Return-Oriented Programming Exploit with ROPgadget - YouTube
Demo5 - Return-Into-Libc Exploit - YouTube
h4cker/exploit_development at master · The-Art-of-Hacking/h4cker
Buffer Overflow Practical Examples , ret2libc - protostar stack6 | 0xRick Owned Root !
acama/xrop: Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
Return Oriented Programming (ROP) Exploit Explained | Rapid7
Intro to ROP: ROP Emporium — Split - I See Thieves - Medium
A Simple ROP Exploit – /bin/sh via syscall | Failing Silently
Introduction to format string exploits
Linux ExploitDev: Part 2 - Format String Exploit
Demo3A - Format String Vulnerability and Exploit Variant - YouTube
Demo3 - Format String Vulnerability and Exploit - YouTube
CNIT 127 Ch 4: Introduction to format string bugs - YouTube
Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit
Recommended - shellphish/how2heap: A repository for learning various heap exploitation techniques.
ExploitDev: Part 8 - Heap Spraying
ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)
Linux ExploitDev: Part 4 - Use After Free (UAF)
Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray
Demo8 - Heap Spray Example - YouTube
CNIT 127 Ch 5: Introduction to heap overflows - YouTube
Heap Exploitation Part 1: Understanding the Glibc Heap Implementation | Azeria Labs
Heap Exploitation Part 2: Understanding the Glibc Heap Implementation | Azeria Labs
Heap Exploitation ~ Abusing Use-After-Free - Exploit Development - 0x00sec - The Home of the Hacker
thread local caching in glibc malloc · Online tukan sanctuary
Mathy Vanhoef, PhD: Understanding the Heap & Exploiting Heap Overflows
Understanding the Heap by Breaking it
Glibc Adventures: The Forgotten Chunks | Context Information Security UK
Bugtraq: The Malloc Maleficarum
Phrack - Malloc Des-Maleficarum
Phrack - w00w00 on heap overflows
Understanding glibc malloc – sploitF-U-N
The Heap: How do use-after-free exploits work? - bin 0x16 - YouTube
Unsorted bin attack - CTF Wiki
ctf/0ctf/pwn/babyheap at master · guyinatuxedo/ctf
Glibc Heap Exploitation Basics : Introduction to ptmalloc2 internals (Part 1)
Glibc Heap Exploitation Basics : ptmalloc2 internals (Part 2) - Fast Bins and First Fit Redirection
children_tcache writeup and tcache overview - Eternal Stories
Heap Exploit Development | Azeria Labs
How a double-free bug in WhatsApp turns to RCE - Home
Double Free · Heap Exploitation
Finding and Understanding Bugs in C Compilers
Stateful Runtime Model Checking for Multithreaded Programs
funfuzz/src/funfuzz/js/jsfunfuzz at master · MozillaSecurity/funfuzz · GitHub
The Art of Fuzzing – Slides and Demos | SEC Consult
Automating Web Apps Input fuzzing via Burp Macros - SecureLayer7
Fuzzing: Brute Force Vulnerability Discovery
Fuzzing · isislab/Project-Ideas Wiki
Scaling AFL to a 256 thread machine | Gamozo Labs Blog
hellscape - 6 increasingly difficult buggy tool for testing fuzzer
Structure-Aware Fuzzing with libFuzzer
RUB-SysSec/nautilus: a grammar based feedback fuzzer
TriforceAFL/limit_memory.sh at master · nccgroup/TriforceAFL · GitHub
Implemented new approach for fuzzer synchronization · googleprojectzero/fuzzilli@5aeae9d · GitHub
Impeding Fuzzing Audits of Binary Executables
designing_new_operating_primitives_to_improve_fuzzing_performance_vt.pdf
libFuzzer – a library for coverage-guided fuzz testing. — LLVM 10 documentation
(nearly) Complete Linux Loadable Kernel Modules
Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time
Phrack - Attacking the Core: Kernel Exploitation
Understanding the Linux Kernel, Third Edition - Amazon.com
A Guide to Kernel Exploitation: Attacking the Core - Amazon.com
FuzzySecurity | Windows ExploitDev: Part 19
ASUS Drivers Elevation of Privilege Vulnerabilities | SecureAuth
GIGABYTE Drivers Elevation of Privilege Vulnerabilities | SecureAuth
Weaponizing vulnerable driver for privilege escalation— Gigabyte Edition!
Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878 – MDSec
HackerOne: Vulnerability Coordination and Bug Bounty Platform
How to Break Into Security, Miller Edition — Krebs on Security
Bug Bounty Toolkit – BugBountyHunting – Medium
Another list of bug bounty write-ups
How I could have stolen your photos from Google - my first 3 bug bounty writeups
Android Internals: A Confectioner's Cookbook
codemetrix.net - Hacking Android apps with FRIDA I
ashishb/android-security-awesome: A collection of android security related resources
1942 - Android: Use-After-Free in Binder driver - project-zero - Monorail
Control Flow Guard - Windows applications | Microsoft Docs
Exploring Control Flow Guard in Windows 10
Windows 10 Exploit Protection system-level mitigation, Control flow guard (CFG), must be on.
Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations
aslur/offensivecon-talk.pdf at master · blackzert/aslur · GitHub
asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf
Exploitation Mitigation Techniques · isislab/Project-Ideas Wiki
Bypassing ASLR – Part I – sploitF-U-N
Bypassing ASLR – Part II – sploitF-U-N
Writing a simple x86 emulator with IDAPython | Shortjump!
How to write an emulator (CHIP-8 interpreter) | Multigesture.net
pwnable.tw - wargame site for hackers to test and expand their binary exploiting skills.
CVE - Common Vulnerabilities and Exposures (CVE)
Recreating exploits - Disk Pulse Enterprise 9.9.16 - Remote Buffer Overflow (SEH) - Zero Aptitude
[1902.05178] Spectre is here to stay: An analysis of side-channels and speculative execution
Project Zero: 0day "In the Wild"
How spending our Saturday hacking earned us 20k – intigriti – Medium
Stanford Cryptography I | Coursera
Stanford University | Applied Cryptography Group
Stanford | Online Cryptography Course by Dan Boneh
UMD - Intro to Ethical Hacking
Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net
Module 6 - Hacking Webservers - Free Ethical Hacking Course - en.gburu.net
Tactical Burp Suite | Professionally Evil Training
Advanced Tactical Burp Suite | Professionally Evil Training
THXAVET - secureideas military discount
Zero to Hero Pentesting | Cybersecurity Training | The Cyber Mentor
Armitage - Metasploit Unleashed
Armitage | Penetration Testing Tools
Step by step Metasploit walkthrough
How to create metasploitable 3
How to setup Metasploitable 3 on Windows 10 - Hacking Tutorials
Metasploitable 2 Exploitability Guide
Home · rapid7/metasploitable3 Wiki · GitHub
Hack the Box Challenge: Tally Walkthrough
Hack The Box :: Penetration Testing Labs
GitHub - Hackplayers/hackthebox-writeups: Writeups for HacktheBox 'boot2root' machines
Red Teaming and Pentesting Tips | synack.blog
Pen Testing Standard (READ FOR STUDYING)
Shared thoughts after 6+ years in Pentesting - Inspiration - 0x00sec - The Home of the Hacker
Where to start - 1st Line to Pen Testing : netsecstudents
So You Want To Be a Pentester? - Jack Hacks
Most Important Penetration Testing Cheat Sheet Linux Machine
SANS Penetration Testing Cheat Sheet: PowerShell
Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual
Prep guide for Offsec’s PWK – Tulpa Security
offsec_pdfs: your offsec knowledge
abatchy's blog | How to prepare for PWK/OSCP, a noob-friendly guide
Offensive Security Training and Professional Services
Offensive Security – Godlike Security
Free Advanced Penetration Testing Training Class from Cybrary
Next Step After OSCP/OSCE? : netsecstudents
PWK Syllabus Scheduling Question For OSCP Holders : netsecstudents
Advice on Windows pentesting methodology (OSCP) : HowToHack
A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate
xMilkPowderx/OSCP: OSCP cheet sheet
Cheatsheet-God: Penetration Testing
Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks
Exploit Writing Tutorials | Corelan Team - Part 2
Corelan Exploit Development Training
0x5 Course Review: Cracking The Perimeter (OSCE)
Cracking the Perimeter (CTP) + Offensive Security Certified Expert (OSCE)
Course Review: Offensive Security AWE (Advanced Windows Exploitation) - EH-Net Online Mag
abatchy's blog: OSCE Study Plan
31 days of OSCP Experience - ScriptDotSh
The OSCP: A Process Focused Review – Occult Sec
www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html
Zero to OSCP in 292 Days... or How I Accidentally the Whole Thing - Part 2
Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog
The Journey to Try Harder: TJNull’s Preparation Guide for PWK/OSCP | NetSec Focus
Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks
Nmap Tutorial: from the Basics to Advanced Tips
Nmap: the Network Mapper - Free Security Scanner
21y4d/nmapAutomator: A script that you can run in the background!
FindSubDomains.com — subdomains search service
Sublist3r: Fast subdomains enumeration tool
SubBrute: A DNS meta-query spider that enumerates DNS records, and subdomains.
A penetration tester’s guide to sub-domain enumeration
Domain Name Search | Domain Lookup
Gobuster: Directory/file & DNS busting tool written in Go
SANS - Foot Printing with WhoIS/DNS records
DNSdumpster.com - dns recon and research, find and lookup dns records
Information-Gathering Resources
Discover - Combination of Recon Tools
Th3Inspector 🕵️ best tool for Information Gathering 🔎
sullo/nikto: Nikto web server scanner
Google Dorks for finding Emails, Admin users etc.
SPARTA - scanning and enumeration phase tool
Search - Public Database Directory - Public DB Host
Penetration Testing Methodology - 0DAYsecurity.com
Find email addresses in seconds • Hunter (Email Hunter)
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets) | Sequoia
Exploitation Tools and Resources
Local File Inclusion (LFI) [Definitive Guide] - Aptive
PHP htaccess injection cheat sheet
A collection of web attack payloads.
Useful payloads and bypass for Web App
unicorn: PowerShell downgrade attack and inject shellcode straight into memory
Nmap: the Network Mapper - Free Security Scanner
TCPDUMP/LIBPCAP public repository
dsniff - For sniffing passwords from plaintext protocols like ftp, and for arpspoofing
socat - networking swiss army knife
Screen - GNU Project - Free Software Foundation
SOCKS Proxy Server - Simple socks5 server in C++
Mimikatz: A little tool to play with Windows security
Samba - opening windows to a wider world
ProxyChains - TCP and DNS through proxy server. HTTP and SOCKS
Post-Exploitation Resources (Windows)
rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Post-Exploitation - NYU Poly 2011
Transferring files from Kali to Windows (post exploitation)
PowerSploit - A PowerShell Post-Exploitation Framework
Empire: A PowerShell and Python post-exploitation agent.
enum4Linux: is a Linux alternative to enum.exe
PwnWiki.io - TTPs (tools, tactics, and procedures) for what to do after access has been gained
Basic Linux Privilege Escalation
Linux_Exploit_Suggester: Linux Exploit Suggester; based on operating system release number
Linux-exploit-suggester-2: Next-Generation Linux Kernel Exploit Suggester
Checksec.sh - Check Securities on a file
Linux Privilege Escalation via Automated Script
A guide to Linux Privilege Escalation - payatu
Abusing SUDO (Linux Privilege Escalation)
Editing /etc/passwd File for Privilege Escalation
Linux Privilege Escalation Using PATH Variable
Linux Privilege Escalation using Misconfigured NFS
Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser
Privilege Escalation on Linux with Live examples
4 Ways to get Linux Privilege Escalation
Linux Privilege Escalation by Exploiting Cronjobs
Well, That Escalated Quickly… – To Shell And Back: Adventures In Pentesting
OSCP - Windows Priviledge Escalation
Checklists-Windows-Privilege-Escalation
Windows Privilege Escalation Fundamentals
Windows Privilege Escalation Guide
Windows Privilege Escalation Methods for Pentesters – Pentest Blog
A Virgil's Guide to Pentest: Escalation Time
BeRoot For Windows – Privilege Escalation Project – Haxf4rall
Elevating privileges by exploiting weak folder permissions | GreyHatHacker.NET
Windows / Linux Local Privilege Escalation Workshop
rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
SQLMap Tamper Scripts (SQL Injection and WAF bypass)
Privilege Escalation Video List
Reporting - The Penetration Testing Execution Standard
sample-penetration-testing-report.pdf
My First Go with BloodHound | Strategic Cyber LLC
Active Directory Pentesting Archives - ScriptDotSh
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)
A curated list of Threat Intelligence resources
List of Threat Intelligence Stuff
GitHub - x0rz/tweets_analyzer: Tweets metadata scraper & activity analyzer
Spiderfoot, an Open Source Intelligence Automation Tool
ꓘamerka — Build interactive map of cameras from Shodan
Open Source Intelligence Gathering 101 – Appsecco
Open Source Intelligence Gathering 201 (Covering 12 additional techniques)
Creepy: A geolocation OSINT tool
XRay - mapping and OSINT gathering from public networks.
Geotweet_GUI: Social engineering tool
DataSploit: An OSINT Framework to perform various recon techniques
Google Hacking Database, GHDB, Google Dorks
theHarvester: E-mails, subdomains and names Harvester
OSINT Search Tool by IntelTechniques | Open Source Intelligence
Google Search Operators: The Complete List (42 Advanced Operators)
BelleBytes OSINT Guide - Storm CTF
From Email Address to Phone Number: A New OSINT Approach - Martin Vigo - YouTube
hashcat - advanced password recovery
THC Hydra - brute force crack a remote authentication service
Patator: is a multi-purpose brute-forcer
Ophcrack - Windows Password Cracker
Nozzlr: Multithreaded Brute Forcer
Decrypt Google Chrome / Chromium passwords and credit cards on macOS / OS X.
webGun - XSS Payload Build Tool
Unleashing an Ultimate XSS Polyglot · 0xSobky/HackVault Wiki
Browser's XSS Filter Bypass Cheat Sheet · masatokinugawa/filterbypass Wiki
Web Security · isislab/Project-Ideas Wiki
zseano | UK Security Researcher
High Performance Web Brute-Forcing 🕸🐏 – hiburn8
The Bug Hunter’s Methodology 2.0 – Jason Haddix
A list of web application security resources
A curated list of Web Security materials and resources.
A Methodical Approach to Browser Exploitation | Ret2 Systems Blog
ZAP - Zed Attack Proxy Project
Samurai 3.0 Branch - Web Pen Testing VM
Samurai - Course -Web Pen-testing VM
Red-Team-Infrastructure-Wiki/README.md at master · bluscreenofjeff/Red-Team-Infrastructure-Wiki
Red Team Laptop & Infrastructure (pt 1: Architecture) – Hacking & Coffee
Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike - CyberArk
Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.
writeups/icectf-2016 at master · WCSC/writeups · GitHub
CTFtime.org / IceCTF 2016 tasks and writeups
Hackover CTF 2015 – easy-shell - Writeup - f00ls bl0g
Google CTF 2017 Quals Write-up Winners - Google Drive
Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!
Zero Day Initiative — Testing for Truthiness: Exploiting Improper Checks
How To Hack - Episode 2: Use-After-Free Triple Bounce - YouTube
Building up from the Ethereum Bytecode | Ret2 Systems Blog
DEF CON® 26 Hacking Conference News
CSAW CTF 2015 - Alexander Taylor – OSIRIS Lab at NYU SOE
Practical case: Secura Grand Slam CTF “Easy Reverse” – Max Kersten
GitHub - antihorsey/ctf-writeups: Writeups of problems from past CTFs
write-ups-2015/seccon-quals-ctf-2015/stegano/steganography-2 at master · ctfs/write-ups-2015
How to Read JPG Height and Width from Binary/Hex data?
ctf-writeups/babypwn.md at master · VulnHub/ctf-writeups · GitHub
ctf-writeups/rop2libc.md at master · VulnHub/ctf-writeups · GitHub
ctf-challenges/pwn/stackoverflow/ret2libc at master · ctf-wiki/ctf-challenges · GitHub
33C3 CTF 2016 -- ESPR « Hacking Tube
write-ups-2016/hackcon-ctf-2016/pwn/easiest-pwn-not-250 at master · ctfs/write-ups-2016
Metasploit Community CTF 2018: 2 of Diamonds Write-Up
50M_CTF_Writeup/README.md at master · manoelt/50M_CTF_Writeup
CTFtime.org / Google Capture The Flag 2017 (Quals) tasks and writeups
zardus/ctf-tools- Some useful tools for various challenges
dCode - Solvers, Crypto, Maths, Decoding, Online Tools
Base64 Decode and Encode - Online
quipquip - Awesome Crypto Solver
The Enigma machine: Encrypt and decrypt online — Cryptii
zweisamkeit/RSHack: RSHack - Tool for RSA CTF's challenges
Practice Crypto Challenges - Cryptopals
Awesome Frequency Analysis Tool
Some inactive CTF challenge : codes
MD5 Cracker Page - Over 312.072 billion cracked MD5 hashes - HashKiller.co.uk
SHA1 Cracker Page - Over 312.072 billion cracked SHA1 hashes - HashKiller.co.uk
shell-storm | ROPgadget - Gadgets finder and auto-roper
shell-storm | Shellcodes Database
Dllinjector: dll injection tool that implements various methods
Libformatstr: Simplify format string exploitation.
pwntools — pwntools 3.3.4 documentation
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
hugsy/gef: GEF - GDB Enhanced Features for exploit devs & reversers
Playing with rasm2 (for shellcoding)
Rasm2 · Radare2 Book (for shellcoding)
zardus/preeny: Some helpful preload libraries for pwning stuff.
Exploitation Practice: An archive of low-level CTF challenges developed over the years
Boomerang Decompiler - Decompile x86 binaries to C
Angr: binary analysis platform!
Jadx: Dex to Java decompiler (Android)
Krakatau: Java decompiler, assembler, and disassembler
Pin - A Dynamic Binary Instrumentation Tool | Intel® Software
binary.ninja : a reverse engineering platform
geohot/qira: QEMU Interactive Runtime Analyser (timeless debugger)
ExifTool - Read Write and Edit Meta Info
fsck - Fix Broken File Systems
NetworkMiner - Network Forensics Analysis Tool ⛏
Dump file analyzer - Memory Extraction
Binwalk: Firmware Analysis Tool (forensic) - Extracts Hidden Files
Memory Analysis with Volatility Analyzing a RAM Image with Volatility (15 Points)
Exif - shows EXIF information in JPEG files
exiftool: Read/write meta info in files
Exiv2 - Image metadata library and tools
SmartDeblur: Restoration of defocused and blurred photos/images
stegbreak - brute force dictionary on JPEG
StegCracker: Steganography brute-force utility to uncover hidden data inside files
stegextract: Detect hidden files and text in images
Steganography - A list of useful tools and resources | 0xRick Owned Root !
CTF Tidbits: Part 1 — Steganography - FourOctets - Medium
Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit
Burp Suite for Web Challenges (cookies)
Useful payloads and bypass for Web App
SSH Brute Force | SSH Password Testing With Hydra on Kali Linux - LinuxConfig.org
Wireshark 2.6 Available to Install in Ubuntu 18.04, 16.04 via PPA | UbuntuHandbook
Download and Installation — Scapy 2.4.3.dev7 documentation
Reading Pcap files with Scapy | IncognitJoe
network manager - How to Add dnsmasq and keep systemd-resolved (18.04) - Ask Ubuntu
How to Configure dnsmasq on Ubuntu Server 18.04 LTS – Linux Hint
How to Install and Configure Dnsmasq on Ubuntu 18.04 LTS - Computing for Geeks
FreeKB - Understanding the /etc/hosts.allow and /etc/hosts.deny files in Linux
CTFtime.org / All about CTF (Capture The Flag)
The Sleuth Kit (TSK) & Autopsy: Open Source Digital Forensics Tools
TheresAFewConors/Sooty: The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
MITRE ATT&CK framework - Google Search
The Attackers Life cycle - Google Search
The Cyber kill chain - Google Search
Termshark • A terminal UI for tshark, inspired by Wireshark
Aircrack-ng - Wireless Pen Testing
WiFiJammer - Continuously jam all wifi clients/routers
Network Security · isislab/Project-Ideas Wiki
Scapy: packet manipulation program & library
Online IP CIDR / VLSM Supernet Calculator
TCPDUMP/LIBPCAP public repository
GitHub - defuse/sockstress: Sockstress (TCP DoS) implementation.
A curated list of awesome forensic analysis tools and resources
www.amanhardikar.com/mindmaps/ForensicChallenges.html
Software Assurance Reference Dataset
The FREE Secure Coding Training Course only at Cybrary
Cyber Defense Presentation - SANS Institute
Digital Forensics and Incident Response Cheatsheet
Home - DFIR - The Definitive Compendium Project
Applied Network Defense | good cheap blue team courses
SANS Digital Forensics and Incident Response | DFIR Courses | SANS
meirwah/awesome-incident-response: A curated list of tools for incident response
Downloads :: Andrew Griffiths' Exploit Education
virtualbox - Is it possible to “SSH” into my virtual machine remotely? - Ask Ubuntu
Installing operating system images - Raspberry Pi Documentation
ethernet - Multiple Simultaneous SSH Connections - Raspberry Pi Stack Exchange
SSH (Secure Shell) - Raspberry Pi Documentation
linux - Find out how much SSH-connections currently exist - Stack Overflow
Protect SSH Logins with SSH & MOTD Banner Messages<
Ubuntu Linux Change Hostname (computer name) - nixCraft
How to install Ubuntu on the Raspberry Pi | TechRadar
How To Install And Configure QEMU In Ubuntu | Unixmen
Run another OS on your RPi3 as a virtualized QEMU guest under KVM (64-bit) - Raspberry Pi Forums
What to do with a Raspberry Pi? : netsecstudents
Pi-hole®: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash
The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need
LibreELEC – Just enough OS for KODI
RPi-youtube, smooth youtube videos on Chromium - Raspberry Pi Forums
How to Enable HDMI-CEC on Your TV, and Why You Should
Puffin Internet Terminal - Turning a tiny Raspberry Pi into a high-end PC
AdguardTeam/AdGuardHome: Network-wide ads & trackers blocking DNS server
Intel® Xeon® Processor E5-2670 (20M Cache, 2.60 GHz, 8.00 GT/s Intel® QPI) Product Specifications
SR0KX E5-2670 Xeon Intel 8 Core 2.60Ghz 20M 115W CPU /w Thermal - 670523-001 | eBay
Amazon.com: Intel E5-2670 2.60Ghz 20M Cache 8-Core 115W Processor SR0KX: Computers & Accessories
Amazon.com: ASRock Motherboard ATX DDR3 1066 Intel LGA 2011 EP2C602-4L/D16: Computers & Accessories
Samsung 128GB (16 x 8GB) 2Rx4 PC3-10600R M393B1K70CHD-CH9 PowerEdge R710 | eBay
128GB (16x 8GB) 10600R ECC REG RAM MEMORY FOR DELL HP SERVERS | eBay
Windows Server Free Trial | Microsoft
Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development
How to make a boot option to turn on/off hyper-v
How to create a Linux virtual machine on Windows 10 using Hyper-V
Parrot Project - The best choice for security experts, developers and crypto-addicted people.
ESXi | Bare Metal Hypervisor | VMware
Using the VMware View Application - Like VMware Player on an Android Tablet!
Building Virtual Machine… by Tony Robinson [PDF/iPad/Kindle]
VMware Lab setup - A virtualized lab for testing HA and DRS - Simple Talk
How to Set up an SSH Server on a Home Computer - DEV Community 👩💻👨💻
Know Your Network, Lesson 4: Access Your Home Computers from Anywhere
How to Control Your Linux PC with an Android Device
Setting Up A Penetration Testing Lab
Infosec_Reference/Building A Pentest Lab
Building a Home Lab for Offensive Security & Security Research · System Overlord
Building-Your-Own-Kickass-Home-Lab-Jeff-McJunkin.pdf
My semi-humble homelab! : homelab
Stumbled into /r/homelab? Start Here! : homelab
My actual "mini-lab" : homelab
UniFi Home Setup - Page 4 - Ubiquiti Networks Community
Saw this in /r/oddlysatisfying, thought some people here might find it useful : homelab
E-Ink based status display : homelab
Intel® Advanced Vector Extensions 512 (Intel® AVX-512) Overview
Amazon.com: Intel Xeon Phi 7120P Coprocessor: Computers & Accessories
How can I work on vulnhub VM's in virtualbox in a school setting? : netsecstudents
128GB (16x 8GB) 10600R ECC REG RAM MEMORY FOR DELL HP SERVERS | eBay
gnome - Freeze after login Ubuntu 18.04 - Ask Ubuntu
Ubuntu 18.04 stuck at shutdown - Ask Ubuntu
Ubuntu 18.04 Live boot leads to blank screen - Ask Ubuntu
filesystem - How to fix "sudo: unable to open ... Read-only file system"? - Ask Ubuntu
drivers - Is nomodeset still required? - Ask Ubuntu
Ubuntu ugrade 17.10 to 18.04 nvidia black screen - Ask Ubuntu
Black screen after boot on 18.04 with nvidia - Support & Help Requests - Ubuntu MATE Community
2 Ways to Install Nvidia Driver on Ubuntu 18.04 (GUI & Command Line)
Trying to install nvidia driver for ubuntu Desktop 18.04 LTS - Ask Ubuntu
boot - Ubuntu 18.04 stuck at purple screen after login - Ask Ubuntu
No GUI after Kubuntu 18.04 LTS upgrade from 17.10 - Ask Ubuntu
kali linux - VMware tools installed but not working - Unix & Linux Stack Exchange
How to Reset Lost Password of Kali Linux? - Technig
kali linux - proxy timeout, error - Unix & Linux Stack Exchange
[ubuntu] Ubuntu 18.04 LTS remains in Airplane mode and WIFI not works
Ubuntu 18.04 LTS remains in Airplane mode
[SOLVED] Laptop stuck in airplane mode after suspend
networking - Cannot disable Airplane Mode - Ask Ubuntu
Newest 'airplane-mode' Questions - Ask Ubuntu
How can I uninstall flight mode in Ubuntu 18.04 and turn on Wi-Fi? - Quora
Airplane mode won't turn off [SOLVED] - Linux Mint Forums
centos - Permanently disable airplane mode gnome 3.2 - Unix & Linux Stack Exchange
10.04 - Prevent wireless from turning off when lid goes down - Ask Ubuntu
Keep Ubuntu 17.10 / 18.04 Desktop Running when Laptop Lid is Closed | Website for Students
Ubuntu Wifi Hardware Disabled after Suspend : MSILaptops
Wifi Hard Blocked After Suspend in Ubuntu on GS65 : Ubuntu
wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu
Airplane mode on resume and no wireless · Issue #181 · linrunner/TLP
Kernel/MainlineBuilds - Ubuntu Wiki
wireless - How to know I have to blacklist acer_wmi? - Ask Ubuntu
linux - How to turn off Wireless power management permanently - Unix & Linux Stack Exchange
How to Update Ubuntu Kernel - wikiHow
wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu
SOLUTION: 18.04 MSI GS65 wifi hardware switch disabled after suspend - Ask Ubuntu
brndnmtthws/conky: Light-weight system monitor for X.
11 Things To Do After Installing Ubuntu 18.04 LTS 'Bionic Beaver' - OMG! Ubuntu!
How to Install Desktop Themes on Ubuntu 18.04 LTS
How To Install Numix Theme And Icons In Ubuntu 18.04 | Omgfoss.com
5 Of The Best Linux Desktop Themes Compared
GitHub - arcticicestudio/nord: An arctic, north-bluish color palette.
Where is the "Default Wallpaper" wallpaper stored - Ask Ubuntu
ability to stream output of a linux desktop to Sonos · Issue #60 · janbar/noson-app · GitHub
noson-app: Control your SONOS devices on Linux platforms
ability to stream output of a linux desktop to Sonos · Issue #60 · janbar/noson-app · GitHub
mkchromecast: Cast macOS and Linux Audio/Video to your Google Cast and Sonos Devices
Use your Chromecast from Linux and MacOS with mkchromecast — The Ultimate Linux Newbie Guide
filesystem - How to make read-only file system writable?
tor - how to verify that proxychains is working - Super User
Inconsistent and erratic mouse wheel in Linux while moving the mouse pointer - Super User
How can I adjust the mouse scroll speed? - Ask Ubuntu
Generating a new SSH key and adding it to the ssh-agent - User Documentation
[SOLVED] Error: Unable to correct problems, you have held broken packages
Install VMware Workstation or VMware Player from a .bundle file | Linuxlookup
Could not get vmci driver version: The handle i... |VMware Communities
How to reinstall network manager without internet access? - Ask Ubuntu
live usb - How to install the MPEG-4 AAC decoder and the H.264 decoder? - Ask Ubuntu
Unable to forward search Bash history similarly as with CTRL-r - Stack Overflow
How to cycle through reverse-i-search in BASH? - Unix & Linux Stack Exchange
My Favorite Command-Line Shortcuts | Henrik Warne's blog
How to Install Deepin Desktop Environment on Ubuntu 18.04 - OMG! Ubuntu!
[ubuntu] How To: Setup DOD Common Access Card (CAC) for service portals
Is there any way to roll back the most recent upgrade? - Ask Ubuntu
Bluetooth Headset volume too low (only in arch) / Multimedia and Games / Arch Linux Forums
20 Linux Command Tips and Tricks That Will Save You A Lot of Time - Tips and Tricks
how to change hostname ubuntu - Google Search
How to compress and extract files using tar command in Linux – Hostway Help Center
Courses - LPI Linux Essentials
rsu-client/rsu-client: A git repository for the RuneScape Linux/Unix Client Project
How to make a bootable USB on Windows
Rainmeter, desktop customization tool
Win10 Widgets - Widgets for Windows 10
Removing Debian Installation Prompt - Unix & Linux Stack Exchange
Download Windows Commands Reference from Official Microsoft Download Center
The fastest way to search your Chrome history or bookmarks - CNET
how to close a tab in a browser and other things
Windows Subsystem for Linux 2 (WSL 2) Released to Insiders
The Windows Subsystem for Linux Guide! — Windows Subsystem for Linux Guide documentation