Access essential hacking tutorials, conference information, and bibliography resources in this comprehensive cheat sheet. Boost your cybersecurity expertise!
Bug bounty
Articles
- tbhm: The Bug Hunters Methodology.
Books
Conferences
Certifications
CEH (Certified Ethical Hacker)
Books
Miscellaneous
- skillset: Practice questions for different certifications.
Forensics
Books
Hacking web
Books
Hacking wireless
Papers
Internet of Things (IoT)
Articles
Malwares / Reverse Engineering
Articles
- Anatomy of a .NET Assembly – PE Headers
- An In-Depth Look into the Win32 Portable Executable File Format
- An In-Depth Look into the Win32 Portable Executable File Format - Part 1
- An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities
- Antivirus-Artifacts: Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
- APTnotes: Various public documents, whitepapers and articles about APT campaigns.
- Axial - Community Papers: Papers about malwares and reverse engineering.
- Basics of Windows shellcode writing
- 'CRYPTERS': PRACTICANDO LA TÉCNICA DSPLIT/AVFUCKER (Spanish)
- corkami: Abusing File Formats, CharSets, Initial registers values under Windows, Initial registers values under Windows,...
- Introducing the TypeRefHash (TRH) (.NET)
- Machine Learning for Malware Detection by Kaspersky
- MalwareAnalysis.co Publications
- Malware-analysis-and-Reverse-engineering: Some of my publicly available Malware analysis and Reverse engineering.
- Macro Malware Again
- Malware researcher’s handbook (demystifying PE file)
- PeStudio Standard
- Reverse Engineering Malicious Macros for Fun & Profit
- Reverse engineering tools for .NET applications
- richprint: Print compiler information stored in Rich Header of PE executables.
- Shikata Ga Nai Encoder Still Going Strong
- The .NET File Format
- Todo lo que quisiste saber sobre las DLL y no te atreviste a preguntar (Spanish)
- vx-underground papers
- Win64/Expiro: virus multiplataforma altamente versátil e infeccioso (Spanish)
- windows-syscalls: Windows System Call Tables (NT/2000/XP/2003/Vista/2008/7/2012/8/10).
Books
- Expert .NET 2.0 IL Assembler
- Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
- MalwareAnalysis.co Books
- Malware Data Science: Attack, Detection, and Attribution
- Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- Practical Malware Analysis. The Hands-On Guide to Dissecting
- Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
- The Art Of Mac Malware: Books about macOS malware, written by patrick wardle.
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Wile05)
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular
Cheat sheets and posters
Documentation
Magazines
Papers
Tutorials
Videotutorials
Miscellaneous
Articles
Cheat sheets
Conferences
Networks
Articles
Cheat sheets
Programming
Books
Protection
Articles
Salesforce
Articles
Conferences
Documentation
Trailheads
Social engineering
Articles
Books
Conferences
System hacking
Articles
Cheat sheet
Tutorials
Books
Source: https://github.com
#security #hacking