OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
Security news coverage encompasses investigative cybersecurity reporting and analysis on the latest security breaches, hacks and cyberattacks around the globe.
It is the golden age of Command and Control (C2) frameworks. The goal of this site is to point you to the best C2 framework for your needs based on your adversary emulation plan and the target environment. Take a look at the matrix or use the questionnaire to determine which fits your needs.
List of attack techniques.
A network attack aims to access a network without permission, either to steal or alter data. This differs from endpoint, malware, and software vulnerability attacks. Learn about passive vs. active network attacks and more.
Find out if you are under cyber-attack here.
Security Joes is a multi-layered Incident Response company that specializes in IR, MDR & Red Teaming. The company was established by security researchers to first and foremost generate resilience against highly complex cyberwarfare incidents, extract vital evidence and attribute TTPs to threat actors and state-sponsored hacking groups. Based out of Israel, the company is constructed from a best-of-breed agnostic team of threat hunters, responders & security researchers, hand-picked from all over the world, to provide 24x7x365 “follow-the-sun” coverage.
A question and answer site for researchers and developers who explore the principles of a system through analysis of its structure, function, and operation.
Read the Forescout blog for insights into cybersecurity automation and research about vulnerabilities, threats and risks across IT, OT, IoT and IoMT devices.
At this site, you can get a lot of free material. Indeed, this site exists primarily to supply you with free samples as a means of encouraging your attention.
An advanced, low-level programer's guide to Windows NT Kernel, Native API and drivers.
Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers.
This collection of Native API header files has been maintained since 2009 for the Process Hacker project, and is the most up-to-date set of Native API definitions that we know of. We have gathered these definitions from official Microsoft header files and symbol files, as well as a lot of reverse engineering and guessing. See phnt.h for more information.
View the latest Salt blog posts on API security and subscribe to our education series.
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities.
Home of AI and Artificial Intelligence News. The No.1 Magazine, Website, Newsletter & Webinar service covering AI, Machine Learning, AR & VR, Data, Technology and AI Applications.
Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet.
Breaking cybersecurity and information news, independent research, latest tech analysis and product reviews all produced by Cybernews in-house experts.
Explore the latest cybersecurity trends and innovations, leading edge threat intelligence from FortiGuard Labs, Fortinet executive insights, and customer perspectives.
Cybersecurity news with a focus on enterprise security. Discover what matters in the world of information security today.
This page displays the complete IPv4 address ranges organized by country. There are 249 countries listed below, and each link will bring you to a new page containing the respective IP address ranges. If you are interested to learn more about the ranking of IP addresses allocated for each country, please visit IP Address Reports for details.
Learn about the world's most prevalent cyberthreats, including viruses and malware. Understand how they arrive, their detailed behaviors, infection symptoms, and how to prevent and remove them.
This repository is for the Offensive Security and Reverse Engineering Offensive Software Exploitation Course I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on HTID Course, but the labs were fully created by myself. I used publicly available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
Hey there, I am Gurkirat Singh (aka tbhaxor). This is my secret cave, where I will share my knowledge of computer science, mathematics, and physics.
The best practices, latest research and breaking news in social media, mobile, digital and collaboration platforms.
This is a simple place where you can download crackmes to improve your reverse engineering skills. If you want to submit a crackme or a solution to one of them, you must register. But before that, I strongly recommend you to read the FAQ. If you have any kind of question regarding the website, a crackme, feel free to join the discord chat.
Internet Search Engines For Security Researchers.
Kroll specialists regularly publish articles, blogs, studies and books that help our clients better understand the changing business landscape. Browse our featured items below, or search for all recent materials by service, industry or topic.
Deepen your security knowledge and gain a fundamental understanding of a variety of cybersecurity, identity, and compliance topics and best practices.
Commands, Payloads and Resources for the OffSec Certified Professional Certification (OSCP).