Resources
AI/Machine Learning¶
- CS224n: Natural Language Processing with Deep Learning or Youtube Link
- Best of Machine Learning
- Interactive Machine Learning List: A collaborative list of interactive Machine Learning, Deep Learning and Statistics websites
- AWS Machine Learning Training
- Dive into Deep Learning
- OpenAI Resources
- Andrew Ng Machine Learning
Cybersecurity¶
Blogs¶
- Krebs on Security
- Didier Stevens
- Daniel Miessler
- Lenny Zeltser: A lot of good content and information on Lenny's Blog.
- Schneier on Security
- Graham Clueley
- Troy Hunt
- Trail of Bits
- Black Hills
- CIS Center for Internet Security:
Career¶
- How to Build a Successful Career in Information Security / Cybersecurity
- Tips for Getting the Right IT Job
- Zeltser Career Development
- Getting Started with CyberSecurity
Cheat Sheets¶
Cloud¶
Security Assessments¶
- Azucar: is a multi-threaded plugin-based tool to help assess the security of Azure Cloud environment subscriptions.
- How to Secure and Audit an Amazon Web Services Three-tier Web Architecture
CTF¶
- Hack The Box
- Vulnerable By Design
- Hack This Site!
- PentesterLab
- Hack.me
- Hone your Ninja skills in Cyber Security
- DFIR SANs Challenges
- DFIR Challenges 1
- DFIR Challenges 2
- DFIR Challenges 3
- DFIR Challenges 4
Dev¶
Finding Secrets in Code¶
- TruffleHog: Find secret keys in code
- Git All Secrets
DFIR¶
DFIR Articles¶
- Windows Events log for IR/Forensics: Logon Event IDs
Tools for DFIR¶
OSINT¶
PenTesting¶
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based stenography.
- Exfiltrating data from (very) isolated environments:
- Powershell Empire - Post Exploitation Framework
- The Easiest Metasploit Guide You’ll Ever Read
PE Tricks¶
- Windows Exploitation Tricks: Exploiting Arbitrary File Writes for Local Elevation of Privilege
- Upgrading simple shells to fully interactive TTYs
Podcasts¶
Skill Assessment¶
- Security Esstials Placement Assessment: The Assessment provides data and insights into Information Security Foundations, Cornerstone Information Security and Advanced Information Security Principles.
Reverse Engineering Malware¶
Decoding/Encoding¶
- CyberChef: Swiss Army knife of decoding and transforming data.
Education¶
- Reverse Engineering for Beginners
- Assembly Language for Beginners
- Wasm Reverse Engineering
- SANS Pen Testing Training
- SANS Digital Forensics and Incident Response
- Shortcuts for Understanding Malicious Scripts
File Analysis¶
Flash Analysis¶
- FLASHMINGO or Here: This is the flash analysis tool from FireEye
- SWFTools: SWFTools (to dump ActionScript code use swfdump -Ddu
blah.txt) - SWFREtools
- Adobe SWF Investigator
JS Analysis¶
Beautify JS¶
Analysis¶
Office files¶
Ransomware¶
- ID Ransomware: ID Ransomware
- No More Ransome!: Helps unlock files without paying attackers.
Malicious Websites Lookup¶
- Talos Intelligence: Reputation lookup
- MXToolBox: Blacklists Lookup
- URL Query: Detect and analyze web-based malware
- URL Scan: Detect and analyze web-based malware
Network¶
Snort¶
Yara¶
Sandbox / Dynamic Analysis¶
Education¶
MOC Courses¶
Misc¶
Interesting Articles¶
- How to Find Hidden Cameras in your AirBNB
- List of Common Misconceptions
- List of Lists
- List of Unusual Articles
- Longevity FAQ: A beginner's guide to longevity research
Interesting Online Tools¶
Interesting Videos¶
- How to Take Charge of Your Life - Jim Rohn Personal Development
- The Need for a Paradigm Shift in Safety and Cyber Security: by Nancy Leveson, Professor of Aeronautics and Astronautics and Engineering Systems, MIT. Cyber Resilient Energy Delivery Consortium (CREDC). She has written the book "Engineering a Safer World" which is available online for free.