Resources
AI/Machine Learning¶
- CS224n: Natural Language Processing with Deep Learning or Youtube Link
 - Best of Machine Learning
 - Interactive Machine Learning List: A collaborative list of interactive Machine Learning, Deep Learning and Statistics websites
 - AWS Machine Learning Training
 - Dive into Deep Learning
 - OpenAI Resources
 - Andrew Ng Machine Learning
 
Cybersecurity¶
Blogs¶
- Krebs on Security
 - Didier Stevens
 - Daniel Miessler
 - Lenny Zeltser: A lot of good content and information on Lenny's Blog.
 - Schneier on Security
 - Graham Clueley
 - Troy Hunt
 - Trail of Bits
 - Black Hills
 - CIS Center for Internet Security:
 
Career¶
- How to Build a Successful Career in Information Security / Cybersecurity
 - Tips for Getting the Right IT Job
 - Zeltser Career Development
 - Getting Started with CyberSecurity
 
Cheat Sheets¶
Cloud¶
Security Assessments¶
- Azucar: is a multi-threaded plugin-based tool to help assess the security of Azure Cloud environment subscriptions.
 - How to Secure and Audit an Amazon Web Services Three-tier Web Architecture
 
CTF¶
- Hack The Box
 - Vulnerable By Design
 - Hack This Site!
 - PentesterLab
 - Hack.me
 - Hone your Ninja skills in Cyber Security
 - DFIR SANs Challenges
 - DFIR Challenges 1
 - DFIR Challenges 2
 - DFIR Challenges 3
 - DFIR Challenges 4
 
Dev¶
Finding Secrets in Code¶
- TruffleHog: Find secret keys in code
 - Git All Secrets
 
DFIR¶
DFIR Articles¶
- Windows Events log for IR/Forensics: Logon Event IDs
 
Tools for DFIR¶
OSINT¶
PenTesting¶
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based stenography.
 - Exfiltrating data from (very) isolated environments:
 - Powershell Empire - Post Exploitation Framework
 - The Easiest Metasploit Guide You’ll Ever Read
 
PE Tricks¶
- Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege
 - Upgrading simple shells to fully interactive TTYs
 
Podcasts¶
Skill Assessment¶
- Security Esstials Placement Assessment: The Assessment provides data and insights into Information Security Foundations, Cornerstone Information Security and Advanced Information Security Principles.
 
Reverse Engineering Malware¶
Decoding/Encoding¶
- CyberChef: Swiss Army knife of decoding and transforming data.
 
Education¶
- Reverse Engineering for Beginners
 - Assembly Language for Beginners
 - Wasm Reverse Engineering
 - SANS Pen Testing Training
 - SANS Digital Forensics and Incident Response
 - Shortcuts for Understanding Malicious Scripts
 
File Analysis¶
Flash Analysis¶
- FLASHMINGO or Here: This is the flash analysis tool from FireEye
 - SWFTools: SWFTools (to dump ActionScript code use swfdump -Ddu 
blah.txt)  - SWFREtools
 - Adobe SWF Investigator
 
JS Analysis¶
Beautify JS¶
Analysis¶
Office files¶
Ransomware¶
- ID Ransomware: ID Ransomware
 - No More Ransome!: Helps unlock files without paying attackers.
 
Malicious Websites Lookup¶
- Talos Intelligence: Reputation lookup
 - MXToolBox: Blacklists Lookup
 - URL Query: Detect and analyze web-based malware
 - URL Scan: Detect and analyze web-based malware
 
Network¶
Snort¶
Yara¶
Sandbox / Dynamic Analysis¶
Education¶
MOC Courses¶
Misc¶
Interesting Articles¶
- How to Find Hidden Cameras in your AirBNB
 - List of Common Misconceptions
 - List of Lists
 - List of Unusual Articles
 - Longevity FAQ: A beginner's guide to longevity research
 
Interesting Online Tools¶
Interesting Videos¶
- How to Take Charge of Your Life - Jim Rohn Personal Development
 - The Need for a Paradigm Shift in Safety and Cyber Security: by Nancy Leveson, Professor of Aeronautics and Astronautics and Engineering Systems, MIT. Cyber Resilient Energy Delivery Consortium (CREDC). She has written the book "Engineering a Safer World" which is available online for free.