This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right place. As a beginner, these tutorials will carry you from nothing upto the mid-basics of reverse engineering, a skill that everyone within the realm of cyber-security should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.
The RFC Series (ISSN 2070-1721) contains technical and organizational documents about the Internet, including the specifications and policy documents produced by five streams. The Internet Engineering Task Force (IETF), the Internet Research Task Force (IRTF), the Internet Architecture Board (IAB), Independent Submissions, and Editorial.
The security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
This is the top level of the kernel's documentation tree. Kernel documentation, like the kernel itself, is very much a work in progress; that is especially true as we work to integrate our many scattered documents into a coherent whole. Please note that improvements to the documentation are welcome; join the linux-doc list at vger.kernel.org if you want to help out.
Are you pulling your hair out trying to find out why your secure page is not fully secure? Here's a simple tool that will tell you about any insecure items on your SSL page!
SIGNAL Media delivers award-winning news, analysis and important perspectives to help people understand the complex world of cyber, defense, security, intelligence and related information technology disciplines. With our accurate, unbiased and ethical reporting, we keep stakeholders in-the-know so they may focus on advancing global security.
Visit the Akamai Blog to learn more about what's going on in cybersecurity. Learn about our products and how we provide solutions to our customers.
A premier destination for computer users of all skill levels to learn how to use and receive support for their computer.
The latest cybersecurity insights on identifying threats, managing risk, and strengthening your organization's security posture.
Coins that encrypt their transactions using zero-knowledge proofs or similar private technology.
CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks. With incisive content that addresses all security disciplines from risk management to network defense to fraud and data loss prevention, CSO offers unparalleled depth and insight to support key decisions and investments for IT security professionals.
Cybersecurity Insiders is your comprehensive source for everything related to cybersecurity - connecting people, opportunities, and ideas.
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
I'm a software developer, penetration tester and IT consultant.
IT Security Guru is the home of IT Security and Cybersecurity news in the UK, Europe and the World. Get the latest industry news and articles here.
PCWorld helps you navigate the PC ecosystem to find the products you want and the advice you need to get the job done.
This book is my collection of notes and write-ups for various offensive security based topics and platforms. This book is generally updated most days and will continue to be for the foreseeable future. If at any point this book stops being developed, I will leave a warning on this page.
Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.
It provides a platform for the cybersecurity community to share news, commentary and resources—all in one place. We’re extremely proud to offer a highly visible platform to those who work within cybersecurity or aspire to do so. We work with IT security professionals from around the globe, maintaining The State of Security as a platform for them to share their voice.
Hi, I'm Troy Hunt, I write this blog, run "Have I Been Pwned" and am a Microsoft Regional Director and MVP who travels the world speaking at events and training technology professionals.
Unsupervised Learning is a Security, AI, and Meaning-focused company/newsletter/podcast that looks at how best to thrive in a post-AI world. It combines original ideas and analysis to bring not just the news—but why it matters, and how to respond.
A list of all publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers. While the affected vendor is working on a patch for these vulnerabilities, Trend Micro customers are protected from exploitation by security filters delivered ahead of public disclosure.
Android incorporates industry-leading security features to keep the Android platform and ecosystem safe. Learn more about Android's robust security model and rigorous security program.
Lock unto your next target, bounty hunter! Browse through the latest hacktivity to keep your bug hunting ongoing and find the contact information to report your findings to them. You can even save your targets for later.
Check point Cyber-hub, Explore all the cyber security topics in one place and learn how to secure your business from cyber threats.
Videos all about computers and computer stuff. Sister channel of Numberphile.
Want to learn about IT? Want to get ahead in your career? Well, this is the right place! On this channel, I discuss Linux, Python, Ethical Hacking, Networking, CCNA, Virtualization and other IT related topics. This YouTube channel has new videos uploaded every week! Subscribe for technical, detailed, no fluff content
Trick Gandalf into revealing information and experience the limitations of large language models firsthand. Your goal is to make Gandalf reveal the secret password for each level. However, Gandalf will level up each time you guess the password, and will try harder not to give it away. Can you beat level 7? (There is a bonus level 8)
Cyber Security Blogs, News and Articles. Keep up-to-date with the latest news, articles, surveys, research on cyber security. Visit our cyber security blogs and find the latest cyber security trends.
The Legit Security Blog. Our mission is to secure every organization's software factory (code, pipelines, infrastructure and people) for faster and more secure software releases.
The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results.
Website with the collection of all the cheat sheets of the project.
I'm snovvcrash and I do ethical penetration testing, red teaming, offensive tooling developement and cybersecurity researching. This is a GitBook of mine whose purpose is keeping my pentest notes on hand. It's far from being perfect in terms of organization (that's why I call it "promiscuous") and, basically, I'm logging it for myself, but it turned out that hosting it online makes it most convenient to access. So, if you find it handy too, feel free to use it... responsibly, of course!
Stay Ahead in Data Security, Gavernance, Privacy and Compliance. Explore expert insights on governance and data privacy at our blog. Stay informed with our thought-provoking articles, news, and industry updates.