Blogs, cybersecurity news sites, and resources I come across #
Pentesting #
- https://github.com/TCM-Course-Resources/Practical-Ethical-Hacking-Resources
- pentestmonkey
- https://tryhackme.com/
- https://www.hackthebox.com/
- https://www.offensive-security.com/
Writing a report #
- https://github.com/hmaverickadams/TCM-Security-Sample-Pentest-Report
- Tool, pckg to install https://github.com/blacklanternsecurity/writehat
Containers #
News sites #
- https://thehackernews.com
- https://thehackernews.com/
- https://www.theregister.com/
- https://www.schneier.com/
- https://www.bleepingcomputer.com
- https://nakedsecurity.sophos.com/
- https://gru.gq/
- https://risky.biz/
OSINT Search Engines #
Github projects #
- Password audit, brute force crack of authentication systems: https://github.com/vanhauser-thc/thc-hydra
Certifications #
Cybersecurity Search Engines #
Daniel Kelly, 22 Aug 2023, LinkedIn
- DeHashed—View leaked credentials.
- SecurityTrails—Extensive DNS data.
- DorkSearch—Really fast Google dorking.
- ExploitDB—Archive of various exploits.
- ZoomEye—Gather information about targets.
- Pulsedive—Search for threat intelligence.
- GrayHatWarfare—Search public S3 buckets.
- PolySwarm—Scan files and URLs for threats.
- Fofa—Search for various threat intelligence.
- LeakIX—Search publicly indexed information.
- DNSDumpster—Search for DNS records quickly.
- FullHunt—Search and discovery attack surfaces.
- AlienVault—Extensive threat intelligence feed.
- ONYPHE—Collects cyber-threat intelligence data.
- Grep App—Search across a half million git repos.
- URL Scan—Free service to scan and analyse websites.
- Vulners—Search vulnerabilities in a large database.
- WayBackMachine—View content from deleted websites.
- Shodan—Search for devices connected to the internet.
- Netlas—Search and monitor internet connected assets.
- CRT sh—Search for certs that have been logged by CT.
- Wigle—Database of wireless networks, with statistics.
- PublicWWW—Marketing and affiliate marketing research.
- Binary Edge—Scans the internet for threat intelligence.
- GreyNoise—Search for devices connected to the internet.
- Hunter—Search for email addresses belonging to a website.
- Censys—Assessing attack surface for internet connected devices.
- IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
- Packet Storm Security—Browse latest vulnerabilities and exploits.
- SearchCode—Search 75 billion lines of code from 40 million projects
Bug Bounty #
How I’d Get Into Bug Bounty Hunting: A Practical Guide #
Daniel Kelly, Apr 22, 2023 Daniel Kelly
Includes some Bug Bounty methodologies:
- Zseano’s Bug Bounty Methodology
- Jhaddix’s Bug Bounty Methodology
- STÖK’s YouTube Videos
- Nahamsec’s YouTube Videos