Awesome-Cyber-Security-List

PLEASE NOTE: This list is NOT as up to date as the html bookmarks list that is located in the repo! Please import the bookmarks (the .html file) into your browser for the most up to date list and cleaner layout, since it is organized into folders rather than one large list.

Bookmarks

Everything Cyber

General Cyber Courses/Training/Resources

### Amazing Resources For Learning
[edX | Free online courses from the world's best universities](https://www.edx.org/) [Udacity - Free Online Classes & Nanodegrees | Udacity](https://www.udacity.com/) [Khan Academy | Free Online Courses, Lessons & Practice](https://www.khanacademy.org/) [3Blue1Brown - Teaches Hard Concepts Well!](https://www.youtube.com/channel/UCYO_jab_esuFRV4b17AJtAw) [LiveOverflow - Awesome to learn Computer Security](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) [Welcome to SecurityTube.net](http://www.securitytube.net/)
### FSU Course
[Offensive Security 2013 - FSU - Lecture5: Reverse Engineering (x86) Workshop Day 1 - YouTube](https://www.youtube.com/watch?v=Pg8bmV9vcKg&feature=youtu.be) [Offensive Computer Security Home Page Spring 2014](http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/) [Training for manipulating all kinds of things: Learning Exploitation with Offensive Computer Security 2.0](http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html)
### RPI Classes
[Modern Binary Exploitation - Spring 2015](http://security.cs.rpi.edu/courses/binexp-spring2015/) [GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC](https://github.com/RPISEC/MBE) [GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC](https://github.com/RPISEC/Malware) [security.cs.rpi.edu/courses/malware-spring2013/](http://security.cs.rpi.edu/courses/malware-spring2013/)
### MIT OpenCourseWare
[Computer Systems Security | Electrical Engineering and Computer Science | MIT OpenCourseWare](http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/) [Electrical Engineering and Computer Science | MIT OpenCourseWare | Free Online Course Materials](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/) [Network and Computer Security | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-spring-2014/)
### Linux Stuff
[Home | Linux Journey](https://linuxjourney.com/)
### Complete Noob Intro to Cyber Security
[Live Overflow - Where to start with hacking](https://www.youtube.com/watch?v=2TofunAI6fU) [The Importance of Deep Work & The 30-Hour Method for Learning a New Skill | Azeria Labs](https://azeria-labs.com/the-importance-of-deep-work-the-30-hour-method-for-learning-a-new-skill/) [How to Build a Successful Career in Cybersecurity - Daniel Miessler](https://danielmiessler.com/blog/build-successful-infosec-career/) [Good List of Practice Areas in CyberSecurity](https://blogs.sans.org/pen-testing/files/2018/01/PENT-PSTR-WHITEBOARD-V3-0118_web.pdf) [Hacker Manifesto - Wikipedia](https://en.wikipedia.org/wiki/Hacker_Manifesto) [So, you want to work in security? – freeCodeCamp](https://medium.freecodecamp.org/so-you-want-to-work-in-security-bc6c10157d23) [Getting Into Security Engineering](https://noncombatant.org/2016/06/20/get-into-security-engineering/) [Stuxnet](https://www.quora.com/What-is-the-most-sophisticated-piece-of-software-code-ever-written/answer/John-Byrd-2?share=98032397&srid=nfuR) [The Jargon File](http://www.catb.org/jargon/html/index.html) [How To Become A Hacker](http://www.catb.org/~esr/faqs/hacker-howto.html) [/r/netsecstudents](https://www.reddit.com/r/netsecstudents/) [/r/netsec](https://www.reddit.com/r/netsec/)
[LiveOverflow - LiveOverflow](http://liveoverflow.com/) [VeteranSec – A Veteran Cyber Security Community](https://veteransec.com/) [Hackaday | Fresh hacks every day](http://hackaday.com/) [Infosec Courses Master List](https://github.com/onlurking/awesome-infosec) [NYU Tandon Vulnerability Research and Pen Test Course](https://github.com/isislab/Hack-Night) [CBT Nuggets - Awesome For Certs](https://www.cbtnuggets.com/solutions/government) [Whitehatters Computer Security Club](https://www.wcsc.usf.edu/noobs) [Open Security Training - Lots of Beginner Stuff](http://opensecuritytraining.info/Training.html) [Null Byte — Random Hacking Tutorials](https://null-byte.wonderhowto.com/) [Free Military Cyber Training - PCTC (Requires Invite?)](https://pctc.cert.org/lms) [600 free online courses you can take from universities worldwide](https://qz.com/1437623/600-free-online-courses-you-can-take-from-universities-worldwide/) [Lynda.com (Requires Library Card) - Lots of Free Training On Various Subjects](https://www.lynda.com/)

Programming/Comp Sci/SE Things

### Programming Courses and Tutorials
### Specific Programming Language Stuff (C/C++/Python/Java/etc)
#### C Stuff
#### GT Recommended
[CS50 - Reference](https://reference.cs50.net/) [CS50's Introduction to Computer Science | edX](https://www.edx.org/course/cs50s-introduction-computer-science-harvardx-cs50x) [CS50](https://cs50.harvard.edu/2018/fall/) [Practical Programming in C | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-087-practical-programming-in-c-january-iap-2010/lecture-notes/) [Learn C in Y Minutes](https://learnxinyminutes.com/docs/c/) [Home | Lynda | Georgia Institute of Technology | Atlanta, GA](http://lynda.gatech.edu/) [How Do I Declare A Function Pointer in C?](https://goshdarnfunctionpointers.com/) [C Tutorial - Learn C - Cprogramming.com](https://www.cprogramming.com/tutorial/c-tutorial.html) [Function Pointers in C and C++ - Cprogramming.com](https://www.cprogramming.com/tutorial/function-pointers.html) [C documentation — DevDocs](https://devdocs.io/c/) [Intro to OS - C Programming Q&A - YouTube](https://www.youtube.com/watch?v=UmLpG077DcU) [C Programming - Q&A.pptm - Google Slides](https://docs.google.com/presentation/d/1B7_q_FjpWau-1-A7NFKkDUHLHJMIDKSwCK4dM0nSlXg/edit#slide=id.p17) [Amazon.com: C Programming Language, 2nd Edition (8601410794231): Brian W. Kernighan, Dennis M. Ritchie: Books](https://www.amazon.com/Programming-Language-2nd-Brian-Kernighan/dp/0131103628) [The Linux Programming Interface [Book]](https://www.oreilly.com/library/view/the-linux-programming/9781593272203/)
#### Books and References
##### Translation Phases
[Phases of translation - cppreference.com](https://en.cppreference.com/w/c/language/translation_phases) [Steps of compiling a C program - Becky Chen - Medium](https://medium.com/@bchen720/steps-of-compiling-a-c-program-7a9a531eb9f8) [The Four Stages of Compiling a C Program](https://www.calleerlandsson.com/the-four-stages-of-compiling-a-c-program/) [GCC Preprocessor Options](https://gcc.gnu.org/onlinedocs/gcc/Preprocessor-Options.html)
##### Style Things
[Style Guide for C — CS50 Docs](https://cs50.readthedocs.io/style/c/)
[C Programming Language, 2nd Edition](https://www.amazon.com/Programming-Language-2nd-Brian-Kernighan/dp/0131103628/ref=pd_sim_14_5/139-5608711-4730009?_encoding=UTF8&pd_rd_i=0131103628&pd_rd_r=89ea1745-7254-11e9-8ad6-676656a66066&pd_rd_w=5hN5E&pd_rd_wg=R476m&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=B8N0DR0HFPYKW8EHMMG5&psc=1&refRID=B8N0DR0HFPYKW8EHMMG5) [C Programming: A Modern Approach, 2nd Edition](https://www.amazon.com/C-Programming-Modern-Approach-2nd/dp/0393979504) [CMU Recommended - C Traps and Pitfalls](https://www.amazon.com/C-Traps-Pitfalls-Andrew-Koenig/dp/0201179288) [Also CMU Recommended - Computer Systems: A Programmer's Perspective](https://www.amazon.com/dp/013409266X/ref=cm_sw_su_dp) [Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online](http://techbus.safaribooksonline.com/1565924533/id732826#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTEtNTY1OTItNDUzLTMlMkZpZDczMjgyNiZxdWVyeT0=) [C Book Answers](https://github.com/lekkas/c-algorithms) [The Definitive C Book Guide and List – seclab](https://seclab.skku.edu/the-definitive-c-book-guide-and-list/) [C reference - cppreference.com](https://en.cppreference.com/w/c) [C/C++ for Hackers « Null Byte :: WonderHowTo](https://null-byte.wonderhowto.com/how-to/c-c-for-hackers/) [Learn C the Hard Way: Practical Exercises on the Computational Subjects You Keep Avoiding (Like C)](https://www.amazon.com/Learn-Hard-Way-Practical-Computational/dp/0321884922) ##### Coding Standards
[Intro to Coding Standards — Coding Rules and Guidelines | Perforce](https://www.perforce.com/resources/qac/coding-standards#important-c)
##### Other Useful Things
[c preprocessor - #define macro for debug printing in C? - Stack Overflow](https://stackoverflow.com/questions/1644868/define-macro-for-debug-printing-in-c)
[Beej's Guide to C Programming](https://beej.us/guide/bgc/html/single/bgc.html)
##### Useful Tutorials and Tools
[C Storage Classes](https://www.tutorialspoint.com/cprogramming/c_storage_classes.htm) [10.2 Pointers and Arrays; Pointer Arithmetic](https://www.eskimo.com/~scs/cclass/notes/sx10b.html) [C for C++ Programmers](http://people.cs.uchicago.edu/~iancooke/osstuff/ccc.html) [c - What does getting the address of an array variable mean? - Stack Overflow](https://stackoverflow.com/questions/38202077/what-does-getting-the-address-of-an-array-variable-mean) [cdecl: C gibberish ↔ English](https://cdecl.org/) [ridiculousfish/cdecl-blocks: The venerable cdecl, with Apple blocks support](https://github.com/ridiculousfish/cdecl-blocks) [function - C Assign Pointer to NULL - Stack Overflow](https://stackoverflow.com/questions/16299394/c-assign-pointer-to-null)
##### Data Structures
[C Programming: Advanced Data Types](https://www.edx.org/course/c-programming-advanced-data-types)
##### Embedded Programming
[Become an embedded programmer in 5 months : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/a6hcbu/become_an_embedded_programmer_in_5_months/)
##### Pointer Stuff
[pointers - How come an array's address is equal to its value in C? - Stack Overflow](https://stackoverflow.com/questions/2528318/how-come-an-arrays-address-is-equal-to-its-value-in-c) [PointersAndMemory.pdf](http://cslibrary.stanford.edu/102/PointersAndMemory.pdf)
##### Courses
[Berkeley C Course](http://www-inst.eecs.berkeley.edu/~selfpace/c/) [http://www-inst.eecs.berkeley.edu/~selfpace/c/](http://www-inst.eecs.berkeley.edu/~selfpace/c/) [How to C (as of 2016)](https://matt.sh/howto-c) [cbourke/ComputerScienceI: Computer Science](https://github.com/cbourke/ComputerScienceI) [Berkeley C Programming](https://selfpaced.bitbucket.io/#/)
[GitHub - fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.](https://github.com/fffaraz/awesome-cpp) [How Do I Declare A Function Pointer in C?](https://fuckingfunctionpointers.com/) [cdecl: C gibberish ↔ English](https://cdecl.org/?q=int+%28*f%29%28int%2C+int%29) [How to C (as of 2016)](https://matt.sh/howto-c) [C Book Answers](https://github.com/lekkas/c-algorithms) [Mastering Algorithms with C > Mastering Algorithms with C : Safari Books Online](http://techbus.safaribooksonline.com/1565924533/id732826#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTEtNTY1OTItNDUzLTMlMkZpZDczMjgyNiZxdWVyeT0=) [Learn C The Hard Way](http://c.learncodethehardway.org/book/) [C/C++ for Hackers « Null Byte :: WonderHowTo](https://null-byte.wonderhowto.com/how-to/c-c-for-hackers/) [C reference - cppreference.com](https://en.cppreference.com/w/c) [The Definitive C Book Guide and List – seclab](https://seclab.skku.edu/the-definitive-c-book-guide-and-list/) [Learn C the Hard Way](https://learncodethehardway.org/c/) [Style Guide for C — CS50 Docs](https://cs50.readthedocs.io/style/c/) [UMBC | Essential C (45 page summary of everything you need to know)](http://cslibrary.stanford.edu/101/)
#### C++ Stuff
##### Good Learning Material
##### Books
###### Beginner Books
[The Definitive C++ Book Guide and List - Stack Overflow](https://stackoverflow.com/questions/388242/the-definitive-c-book-guide-and-list) [Recommended Book if No Prior Experience in Programming](https://www.amazon.com/Programming-Principles-Practice-Using-2nd/dp/0321992784) [Recommended Intro Book for Prior Programmers: A Tour of C++](https://www.amazon.com/Tour-2nd-Depth-Bjarne-Stroustrup/dp/0134997832/ref=pd_lpo_sbs_14_t_1?_encoding=UTF8&psc=1&refRID=ZY920TA5XY0D0C8BD3A6)
###### Intermediate Books
[Recommended Intermediate Book: Effective Modern C++: 42 Specific Ways to Improve Your Use of C++11 and C++14](https://www.amazon.com/Effective-Modern-Specific-Ways-Improve/dp/1491903996) [proper resource management and exception safety in C++ through Resource Acquisition is Initialization (RAII) in addition to in-depth coverage of a variety of other topics including the pimpl idiom, name lookup, good class design, and the C++ memory model](https://www.amazon.com/dp/0201615622/?tag=stackoverflow17-20) [generic programming, optimization, and resource management; this book also has an excellent exposition of how to write modular code](https://www.amazon.com/dp/0201760428/?tag=stackoverflow17-20) [101 best practices, idioms, and common pitfalls that can help you to write correct, understandable, and efficient C++ code](https://www.amazon.com/dp/0321113586/?tag=stackoverflow17-20) [Amazon.com: Accelerated C++: Practical Programming by Example](https://www.amazon.com/Accelerated-C-Practical-Programming-Example/dp/020170353X)
[The Definitive C++ Book Guide and List - Stack Overflow](https://stackoverflow.com/questions/388242/the-definitive-c-book-guide-and-list)
##### Courses
[Berkeley C++ Course](http://www-inst.eecs.berkeley.edu/~selfpace/cpp/) [Teach Yourself C++ in 21 Days](http://101.lv/learn/C++/index.htm) [Learn C++ | Codecademy](https://www.codecademy.com/learn/learn-c-plus-plus) [C++ Tutorial for Complete Beginners | Udemy](https://www.udemy.com/free-learn-c-tutorial-beginners/)
[Stroustrup: FAQ](http://www.stroustrup.com/bs_faq.html#learning) [Introduction to Standard Template Library in C++ | Studytonight](https://www.studytonight.com/cpp/stl/stl-introduction) [Good Video Intro to C++ Programming](https://www.youtube.com/watch?v=Rub-JsjMhWY) [Learn C++ - Free Interactive C++ Tutorial](http://learn-cpp.org/) [Learn C++](http://www.learncpp.com/) [C++ Programming Language - GeeksforGeeks](http://www.geeksforgeeks.org/c-plus-plus/) [Storage Classes in C++](https://www.tutorialspoint.com/cplusplus/cpp_storage_classes.htm) #### Translation Phases
[Phases of translation - cppreference.com](https://en.cppreference.com/w/cpp/language/translation_phases) [The C++ Compilation Process](https://github.com/green7ea/cpp-compilation/blob/master/README.md)
[C++ Tutorial Front Page - 2018](https://www.bogotobogo.com/cplusplus/cpptut.php) [C++ FAQ](https://isocpp.org/wiki/faq) [Newbie Questions & Answers, C++ FAQ](https://isocpp.org/wiki/faq/newbie) [Big Picture Issues, C++ FAQ](https://isocpp.org/wiki/faq/big-picture) [C++ Programming/Code/Statements/Functions - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/C%2B%2B_Programming/Code/Statements/Functions)
##### Best Practices
###### Pass By Reference vs Pass By Value
[Pass By Reference](https://www.cs.fsu.edu/~myers/c++/notes/references.html) [c++ - Isn't "const" redundant when passing by value? - Stack Overflow](https://stackoverflow.com/questions/8714250/isnt-const-redundant-when-passing-by-value) [Const Correctness, C++ FAQ](https://isocpp.org/wiki/faq/const-correctness) [C++ Programming/Code/Statements/Functions - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/C%2B%2B_Programming/Code/Statements/Functions#by_reference)
[The rule of three/five/zero - cppreference.com](https://en.cppreference.com/w/cpp/language/rule_of_three) [C++ reference - cppreference.com](https://en.cppreference.com/w/cpp) [C++ Core Guidelines](https://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines) [C++ Stuff from r/learnprogramming](https://www.reddit.com/r/learnprogramming/comments/a34sws/codecademy_finally_launched_learn_c/) [Effective Modern C++ [Book]](https://www.oreilly.com/library/view/effective-modern-c/9781491908419/) [RAII - cppreference.com](https://en.cppreference.com/w/cpp/language/raii) [c++ - Why is list initialization (using curly braces) better than the alternatives? - Stack Overflow](https://stackoverflow.com/questions/18222926/why-is-list-initialization-using-curly-braces-better-than-the-alternatives) [C++ Braced Initialization](https://blog.quasardb.net/2017/03/05/cpp-braced-initialization) [gabime/spdlog: Fast C++ logging library.](https://github.com/gabime/spdlog) [ObjectOrientedProgramminginC4thEdition.pdf](https://fac.ksu.edu.sa/sites/default/files/ObjectOrientedProgramminginC4thEdition.pdf) [CPP_v1.1.pdf](https://ms.sapientia.ro/~manyi/teaching/c++/CPP_v1.1.pdf) [Google C++ Style Guide](https://google.github.io/styleguide/cppguide.html) [The C++ Standard](https://isocpp.org/) [Ampersand (&) operator in a C++ function argument](https://www.quora.com/What-does-ampersand-operator-do-in-a-C-C++-function-argument) [pointers - How to pass objects to functions in C++? - Stack Overflow](https://stackoverflow.com/questions/2139224/how-to-pass-objects-to-functions-in-c/2139254#2139254) [Use constexpr for faster, smaller, and safer code | Trail of Bits Blog](https://blog.trailofbits.com/2019/06/27/use-constexpr-for-faster-smaller-and-safer-code/) [Templates, C++ FAQ](https://isocpp.org/wiki/faq/templates) [Coding Standards, C++ FAQ](https://isocpp.org/wiki/faq/coding-standards) [Embedded Systems Coding Standard](http://stroustrup.com/JSF-AV-rules.pdf) [Good C++ Coding Standards: 101 Rules, Guidelines, and Best Practices (9780321113580): Herb Sutter, Andrei Alexandrescu: Books](https://www.amazon.com/exec/obidos/ASIN/0321113586/) [C++ Core Guidelines](http://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines) ###### Coding Standards
[Intro to Coding Standards — Coding Rules and Guidelines | Perforce](https://www.perforce.com/resources/qac/coding-standards#important-cpp)
[Resource Acquisition is Initialisation (RAII) Explained — Tom Dalling](https://www.tomdalling.com/blog/software-design/resource-acquisition-is-initialisation-raii-explained/)
###### Data Structures
[USC - CSCI 104 – Data Structures and Object Oriented Design](http://www-scf.usc.edu/~csci104/20142/lectures/) [Data Structures and Algorithms in C++, Second Edition: Safari Books Online - Premium](http://techbus.safaribooksonline.com/book/programming/cplusplus/9780470383278) [Notes on Data Structures and Programming Techniques (CPSC 223, Spring 2018)](http://www.cs.yale.edu/homes/aspnes/classes/223/notes.html#cplusplus) [Storage Classes in C++](https://www.tutorialspoint.com/cplusplus/cpp_storage_classes.htm)
###### Memory Management
###### Smart Pointers
[Pointers - C++ Tutorials](http://www.cplusplus.com/doc/tutorial/pointers/) [A beginner's look at smart pointers in modern C++ - Internal Pointers](https://www.internalpointers.com/post/beginner-s-look-smart-pointers-modern-c) [this Pointer | Microsoft Docs](https://docs.microsoft.com/en-us/cpp/cpp/this-pointer?view=vs-2019) [Memory Management, C++ FAQ](https://isocpp.org/wiki/faq/freestore-mgmt#mixing-malloc-and-delete) [Unique/Shared/Weak Pointers](https://isocpp.org/wiki/faq/cpp11-library#unique-ptr) [Move smart pointers in and out functions in modern C++ - Internal Pointers](https://www.internalpointers.com/post/move-smart-pointers-and-out-functions-modern-c) [GotW #89 Solution: Smart Pointers – Sutter’s Mill](https://herbsutter.com/2013/05/29/gotw-89-solution-smart-pointers/) [c++ - How to properly duplicate an object given its shared_ptr - Stack Overflow](https://stackoverflow.com/questions/22782288/how-to-properly-duplicate-an-object-given-its-shared-ptr)
[c++ - clearing a vector of pointers](https://stackoverflow.com/questions/12795196/clearing-a-vector-of-pointers) [Destructors (C++) | Microsoft Docs](https://docs.microsoft.com/en-us/cpp/cpp/destructors-cpp?view=vs-2019&viewFallbackFrom=vs-2019%5C) [Smart Pointers (Modern C++) | Microsoft Docs](https://docs.microsoft.com/en-us/cpp/cpp/smart-pointers-modern-cpp?view=vs-2019) [How to: Create and Use unique_ptr Instances | Microsoft Docs](https://docs.microsoft.com/en-us/cpp/cpp/how-to-create-and-use-unique-ptr-instances?view=vs-2019) [Unique Pointers - Windows applications | Microsoft Docs](https://docs.microsoft.com/en-us/windows/desktop/Rpc/unique-pointers) [std::unique_ptr - cppreference.com](https://en.cppreference.com/w/cpp/memory/unique_ptr) [Memory Management, C++ FAQ](https://isocpp.org/wiki/faq/freestore-mgmt)
[GitHub - fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.](https://github.com/fffaraz/awesome-cpp) [Solve C++ | HackerRank](https://www.hackerrank.com/domains/cpp?filters%5Bsubdomains%5D%5B%5D=classes) [TopCoder Problems](http://web.eecs.utk.edu/~plank/topcoder-writeups/) [GitHub - rigtorp/awesome-modern-cpp: A collection of resources on modern C++](https://github.com/rigtorp/awesome-modern-cpp) [Strong vs Weak References – Elliot Chance – Medium](https://medium.com/@elliotchance/strong-vs-weak-references-70356d37dfd2) ##### Solutions to Problems
[c++ - cannot call member function without object - Stack Overflow](https://stackoverflow.com/questions/1127738/cannot-call-member-function-without-object)
#### Python
##### Courses
[Introduction to Computer Science and Programming in Python - MIT](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-videos/) [Berkeley Python Course](http://www-inst.eecs.berkeley.edu/~selfpace/python/) [The Python Tutorial — Python 3.7.0 documentation](https://docs.python.org/3/tutorial/) [Welcome to Python 101! — Python 101 1.0 documentation](https://python101.pythonlibrary.org/) [MIT - Introduction to Computer Science and Programming Using Python](https://www.edx.org/course/introduction-to-computer-science-and-programming-using-python-0) [Learn Python - Free Interactive Python Tutorial](https://www.learnpython.org/)
##### Videos To Learn From
[Corey Schafer - YouTube](https://www.youtube.com/channel/UCCezIgC97PvUuR4_gbFUs5g) [How to Learn Python Tutorial - Easy & simple! Learn How to Learn Python! - YouTube](https://www.youtube.com/watch?v=5mJ_Qftw2_0&lc=UgyghnrmfblNHEhpqR54AaABAg) [Python Tutorials - YouTube](https://www.youtube.com/playlist?list=PL-osiE80TeTt2d9bfVyTiXJA-UTHn6WwU) [Python's Class Development Toolkit - YouTube](https://www.youtube.com/watch?v=HTLu2DFOdTg) [Raymond Hettinger - Beyond PEP 8 -- Best practices for beautiful intelligible code - PyCon 2015 - YouTube](https://www.youtube.com/watch?v=wf-BqAjZb8M) [Transforming Code into Beautiful, Idiomatic Python - YouTube](https://www.youtube.com/watch?v=OSGv2VnC0go) [What Does It Take To Be An Expert At Python? - YouTube](https://www.youtube.com/watch?v=7lmCu8wz8ro) [python_expert_notes](https://github.com/austin-taylor/code-vault/blob/master/python_expert_notebook.ipynb) [Python Network Programming - TCP/IP Socket Programming - YouTube](https://www.youtube.com/playlist?list=PLhTjy8cBISErYuLZUvVOYsR1giva2payF) [Python for Beginners - YouTube](https://www.youtube.com/playlist?list=PLlrxD0HtieHhS8VzuMCfQD4uJ9yne1mE6)
##### Advanced Python Style/OOP Stuff
[UsingAssertionsEffectively - Python Wiki](https://wiki.python.org/moin/UsingAssertionsEffectively) [Data model (Dunder Methods, i.e., __repr__)](https://docs.python.org/3/reference/datamodel.html) [PEP 8 -- Style Guide for Python Code | Python.org](https://www.python.org/dev/peps/pep-0008/) [Popular Python recipes « ActiveState Code](http://code.activestate.com/recipes/langs/python/) [oop - What is the difference between @staticmethod and @classmethod in Python? - Stack Overflow](https://stackoverflow.com/questions/136097/what-is-the-difference-between-staticmethod-and-classmethod-in-python?rq=1) [Enriching Your Python Classes With Dunder (Magic, Special) Methods – dbader.org](https://dbader.org/blog/python-dunder-methods) [Interfacing Python and C: Advanced “ctypes” Features – dbader.org](https://dbader.org/blog/python-ctypes-tutorial-part-2) [Serious Python | No Starch Press](https://nostarch.com/seriouspython) [Math Adventures with Python | No Starch Press](https://nostarch.com/mathadventures) [How to Write Perfect Python Command-line Interfaces — Learn by Example](https://blog.sicara.com/perfect-python-command-line-interfaces-7d5d4efad6a2) [Writing Python Command-Line Tools With Click – dbader.org](https://dbader.org/blog/python-commandline-tools-with-click) [Python - Multiple constructors](http://coding.derkeiler.com/Archive/Python/comp.lang.python/2005-02/1294.html) [Python 3 Patterns, Recipes and Idioms](https://python-3-patterns-idioms-test.readthedocs.io/en/latest/index.html#)
##### Python Issue Fixes
[python - Permanently add a directory to PYTHONPATH - Stack Overflow](https://stackoverflow.com/questions/3402168/permanently-add-a-directory-to-pythonpath) [How do I find the location of Python module sources? - Stack Overflow](https://stackoverflow.com/questions/269795/how-do-i-find-the-location-of-python-module-sources) [installation - How do I find the location of my Python site-packages directory? - Stack Overflow](https://stackoverflow.com/questions/122327/how-do-i-find-the-location-of-my-python-site-packages-directory)
##### Useful Python things
[8.7\. sets — Unordered collections of unique elements — Python 2.7.16 documentation](https://docs.python.org/2/library/sets.html) [I made a threading guide for beginners. : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/btpol1/i_made_a_threading_guide_for_beginners/)
##### Numpy/SciPy
[Linear algebra (numpy.linalg) — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/reference/routines.linalg.html) [NumPy and SciPy Documentation](https://docs.scipy.org/doc/) [Mathematical functions — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/reference/routines.math.html) [Random sampling (numpy.random) — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/reference/routines.random.html) [Broadcasting — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/user/basics.broadcasting.html) [Array creation — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/user/basics.creation.html) [Data types — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/user/basics.types.html) [The N-dimensional array (ndarray) — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/reference/arrays.ndarray.html) [Sorting, searching, and counting — NumPy v1.16 Manual](https://docs.scipy.org/doc/numpy/reference/routines.sort.html) [pandas.DataFrame.fillna — pandas 0.24.2 documentation](http://pandas.pydata.org/pandas-docs/stable/reference/api/pandas.DataFrame.fillna.html)
[CMU - The Pythonic Way [PDF]](https://www.cs.cmu.edu/~srini/15-441/F11/lectures/r04-python.pdf) [Automate the Boring Stuff with Python](http://automatetheboringstuff.com/) [PyPI tutorial](https://packaging.python.org/) [10 Essential Python Tips And Tricks For Programmers - GeeksforGeeks](https://www.geeksforgeeks.org/10-essential-python-tips-tricks-programmers/) [Understanding the underscore( _ ) of Python – Hacker Noon](https://hackernoon.com/understanding-the-underscore-of-python-309d1a029edc) [Python Argparse Cookbook – mkaz.blog](https://mkaz.blog/code/python-argparse-cookbook/) [Cracking Codes with Python](https://inventwithpython.com/cracking/) [Python Training by Dan Bader – dbader.org](https://dbader.org/) [How to use SimpleHTTPServer](https://www.pythonforbeginners.com/modules-in-python/how-to-use-simplehttpserver/) ##### Profiling/Timing
[The Python Profilers — Python 3.7.4 documentation](https://docs.python.org/3/library/profile.html) [timeit — Measure execution time of small code snippets — Python 3.7.4 documentation](https://docs.python.org/3/library/timeit.html)
[Python Tutorial: Home - 2019](https://www.bogotobogo.com/python/pytut.php) ##### Projects
[OrbitalArt/OrbitalArt.py at master · LAMagicx/OrbitalArt · GitHub](https://github.com/LAMagicx/OrbitalArt/blob/master/OrbitalArt.py)
##### Books
[iluxonchik/blackhat-python-book: Code from Blackhat Python book](https://github.com/iluxonchik/blackhat-python-book)
#### Java Stuff
##### Data Structures
[Java HashSet Tutorial with Examples | CalliCoder](https://www.callicoder.com/java-hashset/)
[java - Is it better to use a TreeSet or ArrayList when using a custom comparator - Stack Overflow](https://stackoverflow.com/questions/24371204/is-it-better-to-use-a-treeset-or-arraylist-when-using-a-custom-comparator)
#### Rust
[Rust Language Cheat Sheet](https://cheats.rs/)
#### x86 Assembly
[Easy x86-64](http://ian.seyler.me/easy_x86-64/) [Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation](https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315) [c - Can I use Intel syntax of x86 assembly with GCC? - Stack Overflow](https://stackoverflow.com/questions/9347909/can-i-use-intel-syntax-of-x86-assembly-with-gcc) [ubuntu - Compile/run assembler in Linux? - Stack Overflow](https://stackoverflow.com/questions/3314919/compile-run-assembler-in-linux) [x86 - How do you use gcc to generate assembly code in Intel syntax? - Stack Overflow](https://stackoverflow.com/questions/199966/how-do-you-use-gcc-to-generate-assembly-code-in-intel-syntax) [Assembly Primer For Hackers (Part 1) System Organization - YouTube](https://www.youtube.com/watch?v=K0g-twyhmQ4&list=PL6brsSrstzga43kcZRn6nbSi_GeXoZQhR) [UMBC CMSC313 | Computer Organization & Assembly Language Programming |Spring 2013](https://www.csee.umbc.edu/~chang/cs313.s13/)
#### Full Stack Development
##### Front End Development
[grab/front-end-guide: 📚 Study guide and introduction to the modern front end stack.](https://github.com/grab/front-end-guide) [CSS Tutorial](https://www.w3schools.com/Css/)
###### JavaScript
[JavaScript Style Guide](https://github.com/airbnb/javascript)
##### Frameworks
[React – A JavaScript library for building user interfaces](https://reactjs.org/) [AngularJS — Superheroic JavaScript MVW Framework](https://angularjs.org/)
[A collection of full-stack resources for programmers.](https://github.com/charlax/professional-programming) [YouTube - Web Dev Stuff](https://www.youtube.com/channel/UC29ju8bIPH5as8OGnQzwJyA) [freeCodeCamp - Full Stack Tutorial](https://learn.freecodecamp.org/) [Courses | The Odin Project](https://www.theodinproject.com/courses) [Full Stack Book: crash-course-django](https://github.com/codexplore-io/crash-course-django) [Super Crash Course in Full Stack Web Development with Python and Django](http://www.codexplore.io/books/crash-course/) [The Odin Project | Free Course on Web Development](https://www.theodinproject.com/home) [Syllabus - CS50 Beyond](https://cs50.harvard.edu/college/beyond/syllabus/)
#### Unix Stuff (Shell Stuff)
##### Courses
[Berkeley UNIX Course](http://www-inst.eecs.berkeley.edu/~selfpace/unix/)
[Learn Shell Programming - Free Interactive Shell Programming Tutorial](http://www.learnshell.org/) [The Bash Guide](https://guide.bash.academy/) [BashGuide - Greg's Wiki](http://mywiki.wooledge.org/BashGuide) [The Linux Documentation Project: Guides](http://tldp.org/guides.html) [#!/bin/bash](https://www.reddit.com/r/bash/) [Linux Command Line Tutorial](https://learnpythonthehardway.org/book/appendixa.html) [LinuxCommand.org: Learning the shell.](http://linuxcommand.org/lc3_learning_the_shell.php) [Bash Guide for Beginners](http://www.tldp.org/LDP/Bash-Beginners-Guide/html/) [The Bash Academy](http://www.bash.academy/) [A curated list of Shell Stuff](https://github.com/alebcay/awesome-shell) [OverTheWire: Bandit - Wargame For Learning UNIX Shell Stuff](http://overthewire.org/wargames/bandit/) [OverTheWire: Leviathan - Unix Wargame](http://overthewire.org/wargames/leviathan/) [Bash tips & tricks: good and not-so-good bash practices | Pragmatic Coders](https://pragmaticcoders.com/blog/bash-tips-and-tricks/) [Bash scripting cheatsheet](https://devhints.io/bash) [Understanding Awk – Practical Guide – Developers Area](https://devarea.com/understanding-awk-practical-guide/) [command line - How to iterate over arguments in a Bash script - Stack Overflow](https://stackoverflow.com/questions/255898/how-to-iterate-over-arguments-in-a-bash-script) [how to access the next argument of command line parameters in bash? - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/261162/how-to-access-the-next-argument-of-command-line-parameters-in-bash) [Multiple conditions in if statement shell script - Stack Overflow](https://stackoverflow.com/questions/23542574/multiple-conditions-in-if-statement-shell-script)
[Open Source: 2018 - Java/C++/Python/BigData/Android/](https://www.bogotobogo.com/index.php) [Project-based-learning: Curated list of project-based tutorials](https://github.com/tuvtran/project-based-learning)
##### Intro Courses/Tutorials/Books
##### Books
[free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books](https://github.com/EbookFoundation/free-programming-books/blob/master/free-programming-books.md) [The Pragmatic Programmer: From Journeyman to Master: 8601404321023: Computer Science Books @ Amazon.com](https://www.amazon.com/The-Pragmatic-Programmer-Journeyman-Master/dp/020161622X) [Free Programming Books – GoalKicker.com](https://goalkicker.com/?fbclid=IwAR1oOo1DczRZygIUd2KQ31qWqVHucHtcY6ylYVcj7pzFKGrwKFbXE_icumw) [What book made you a better developer? : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/azkbzy/what_book_made_you_a_better_developer/) [Structure and Interpretation of Computer Programs](https://mitpress.mit.edu/sites/default/files/sicp/full-text/book/book.html) [SICP - Structure and Interpretation of Computer Programs](https://sarabander.github.io/sicp/) [The Pragmatic Programmer: From Journeyman to Master: 8601404321023: Computer Science Books @ Amazon.com](https://www.amazon.com/The-Pragmatic-Programmer-Journeyman-Master/dp/020161622X) [free-programming-books/free-programming-books.md at master · EbookFoundation/free-programming-books](https://github.com/EbookFoundation/free-programming-books/blob/master/free-programming-books.md) [Free Programming Books – GoalKicker.com](https://goalkicker.com/?fbclid=IwAR1oOo1DczRZygIUd2KQ31qWqVHucHtcY6ylYVcj7pzFKGrwKFbXE_icumw) [Welcome to the SICP Web Site](https://mitpress.mit.edu/sites/default/files/sicp/index.html) [Catalog - zyBooks](https://www.zybooks.com/catalog/) [Code Complete: A Practical Handbook of Software Construction, Second Edition: Steve McConnell: 0790145196705: Amazon.com: Books](https://www.amazon.com/Code-Complete-Practical-Handbook-Construction/dp/0735619670)
### Harvard Stuff (CS 50)
[CS50](https://cs50.harvard.edu/2018/fall/) [CS50's Introduction to Computer Science | edX](https://www.edx.org/course/cs50s-introduction-computer-science-harvardx-cs50x) [CS50 - Reference](https://reference.cs50.net/) [Introduction to Game Development](https://cs50.github.io/games/) [CSCI S-51: Introduction to Computer Science II](https://hc3.seas.harvard.edu/walton/cs51/web/index.html) [CS 61: Systems Programming and Machine Organization](https://cs61.seas.harvard.edu/site/2018/)
### Carnegie Mellon - Intro to Comp Sci
[CMU - Intro to Computer Systems and Foundations of Computer Systems](http://www.cs.cmu.edu/~213/)
### Berkeley Intro to CS, DS, and Comp Arch
[Berkeley 61A - Intro to CS](https://www2.eecs.berkeley.edu/Courses/CS61A/) [Berkeley 61B - Data Structures](https://www2.eecs.berkeley.edu/Courses/CS61B/) [Berkeley 61C - Computer Architecture](https://www2.eecs.berkeley.edu/Courses/CS61C/) [Berkeley CS and EE Course Achives](http://www-inst.eecs.berkeley.edu/classes-eecs.html) [Computer Science 61A, 001 - Spring 2011 : Free Movies : Free Download, Borrow and Streaming : Internet Archive](https://archive.org/details/ucberkeley-webcast-PL3E89002AA9B9879E?sort=titleSorter) ### MIT - Writing Good Code
[MIT - Software Construction - How to write good code](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-005-software-construction-spring-2016/) ### Awesome Videos
[CS Dojo - CS Stuff Explained Well!](https://www.youtube.com/channel/UCxX9wt5FWQUAAz4UrysqK9A) [Recursion for Beginners: A Beginner's Guide to Recursion - YouTube](https://www.youtube.com/watch?v=AfBqVVKg4GE) [How to solve coding interview problems ("Let's leetcode") - YouTube](https://www.youtube.com/watch?v=dIrS31CCITM&feature=youtu.be) [Great Intro Videos - Back To Back SWE - YouTube](https://www.youtube.com/channel/UCmJz2DV1a3yfgrR7GqRtUUA) [Daniel Schiffman - Tons of Coding Tutorials and Challenge Walkthroughs](https://www.youtube.com/user/shiffman) ### Blog Posts To Read
[ABC: Always Be Coding – Always Be Coding – Medium](https://medium.com/always-be-coding/abc-always-be-coding-d5f8051afce2) [Stevey's Blog Rants: Get that job at Google](http://steve-yegge.blogspot.com/2008/03/get-that-job-at-google.html) ### Is CS Useful? What is CS?
[Is it possible to be self taught and get a good job without a degree?](https://www.reddit.com/r/learnprogramming/comments/ahucay/self_taught_programmers_of_reddit_is_it_possible/) [Is computer science all about coding? If not, what do we actually learn in computer science in the university? - Quora](https://www.quora.com/Is-computer-science-all-about-coding-If-not-what-do-we-actually-learn-in-computer-science-in-the-university) [Is "Computer Science != Software Engineering" an excuse to teach programming poorly? - Software Engineering Stack Exchange](https://softwareengineering.stackexchange.com/questions/11721/is-computer-science-software-engineering-an-excuse-to-teach-programming-poo) ### Other Good CS Stuff [Intro to Programming, Data Structures, Algorithms](https://opendsa-server.cs.vt.edu/ODSA/Books/Everything/html/) [ossu/computer-science: Path to a free self-taught education in Computer Science!](https://github.com/ossu/computer-science) [Coding-interview-university: A complete computer science study plan to become a software engineer.](https://github.com/jwasham/coding-interview-university) [Teach Yourself Computer Science](https://teachyourselfcs.com/) [List of free university courses for learning Computer Science!](https://github.com/prakhar1989/awesome-courses) [awesome-courses](https://github.com/prakhar1989/awesome-courses/blob/master/README.md) [Googles CS Guide](https://techdevguide.withgoogle.com/) [professional-programming github repo](https://github.com/charlax/professional-programming#professional-programming) [Learn Computer Science | Free Online Courses | Class Central](https://www.classcentral.com/subject/cs) [Intro to Systems Software - C/x86 ASM/Memory Management/GDB](https://sites.google.com/site/wonsunahn/teaching/cs-0449-systems-software) ### Best Practices and Advanced Topics for Programming
### Books and Videos
[Programming Pearls (2nd Edition): Jon Bentley: 0785342657883: Amazon.com: Books](https://www.amazon.com/Programming-Pearls-2nd-Jon-Bentley/dp/0201657880) [Code Complete: A Practical Handbook of Software Construction, Second Edition: Steve McConnell: 0790145196705: Amazon.com: Books](https://www.amazon.com/Code-Complete-Practical-Handbook-Construction/dp/0735619670/ref=cm_cr_arp_d_product_top?ie=UTF8) [First Few Chaps CMU Recommended - The Practice of Programming (Addison-Wesley Professional Computing Series) eBook: Brian W. Kernighan, Rob Pike: Kindle Store](https://www.amazon.com/Practice-Programming-Addison-Wesley-Professional-Computing-ebook/dp/B00HU50A12) [Martin Fowler @ OOP2014 "Workflows of Refactoring" - YouTube](https://www.youtube.com/watch?v=vqEg37e4Mkw) [Understanding Computation](https://computationbook.com/)
### Makefile/CMake
[Must Read - Makefiles – Mrbook's Stuff](http://mrbook.org/blog/tutorials/make/) [Automatic make file generator](http://www.robertnz.net/genmake.htm) [GNU make](http://www.gnu.org/software/make/manual/make.html) [CMake Tutorial | CMake](https://cmake.org/cmake-tutorial/) [Introduction to CMake | Skand Hurkat](https://skandhurkat.com/post/intro-to-cmake/) [CMake Tutorial | CMake](https://cmake.org/cmake-tutorial/) [Unix Makefile Tutorial](http://www.tutorialspoint.com/makefile/index.htm) [GNU Make Manual - GNU Project - Free Software Foundation](https://www.gnu.org/software/make/manual/) [Makefile Tutorial by Example](https://makefiletutorial.com/) [GNU make](https://www.gnu.org/software/make/manual/make.html#Implicit-Variables)
### Optimization
[Basic tips for optimizing code for speed](https://www.reddit.com/r/learnprogramming/comments/av3jmm/some_basic_tips_for_newer_programmers_when_it/) [Cell lists - Wikipedia](https://en.wikipedia.org/wiki/Cell_lists) [java - Why is "2 * (i * i)" faster than "2 * i * i"? - Stack Overflow](https://stackoverflow.com/questions/53452713/why-is-2-i-i-faster-than-2-i-i)
### Refactoring, Object Oriented Programming, and Design Patterns
### Object Oriented Programming
### Books for OOP
[The Best Go To Book for Design Patterns](https://www.amazon.com/Design-Patterns-Elements-Reusable-Object-Oriented/dp/0201633612) [Refactoring: Improving the Design of Existing Code](https://www.amazon.com/Refactoring-Improving-Existing-Addison-Wesley-Signature-dp-0134757599/dp/0134757599/ref=mt_hardcover?_encoding=UTF8&me=&qid=)
### Videos for OOP
["The Clean Code Talks -- Inheritance, Polymorphism, & Testing" - YouTube](https://www.youtube.com/watch?v=4F72VULWFvc) [C++ Tutorial 11 : Polymorphism - YouTube](https://www.youtube.com/watch?v=k7O7AGfDI2c) ["Uncle" Bob Martin - YouTube](https://www.youtube.com/watch?v=QHnLmvDxGTY)
### Courses for OOP
[Introduction to Object-oriented Programming - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00-introduction-to-computer-science-and-programming-fall-2008/video-lectures/lecture-14/) [Object-Oriented Programming - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-01sc-introduction-to-electrical-engineering-and-computer-science-i-spring-2011/unit-1-software-engineering/object-oriented-programming/) [Encapsulation, Inheritance, Shadowing - MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00-introduction-to-computer-science-and-programming-fall-2008/video-lectures/lecture-16/) [University of Helsinki - Object-Oriented programming with Java, part I](http://moocfi.github.io/courses/2013/programming-part-1/) [Stanford - CS108: Object Oriented Programming](http://web.stanford.edu/class/archive/cs/cs108/cs108.1092/)
[Design Patterns | Object Oriented Design](https://www.oodesign.com/) [SOLID - Wikipedia](https://en.wikipedia.org/wiki/SOLID) [the_skills_poor_programmers_lack.md](https://gist.github.com/justinmeiners/be4540f515986d93ee12ac2f1980631a) [Polymorphism - C++ Tutorials](http://www.cplusplus.com/doc/tutorial/polymorphism/) [OOP Concept for Beginners: What is Abstraction?](https://stackify.com/oop-concept-abstraction/) [4.2\. Introduction to Object Oriented Programming — OpenDSA Data Structures and Algorithms Modules Collection](https://opendsa-server.cs.vt.edu/ODSA/Books/Everything/html/IntroOO.html)
### Design Patterns
[All Design Patterns Video Tutorials - YouTube](https://www.youtube.com/playlist?list=PLF206E906175C7E07) [Software Design Patterns - GeeksforGeeks](https://www.geeksforgeeks.org/software-design-patterns/) [Head First Design Patterns Book](https://www.amazon.com/Head-First-Design-Patterns-Brain-Friendly/dp/0596007124)
### Refactoring
[Code refactoring - Wikipedia](https://en.wikipedia.org/wiki/Code_refactoring) [Refactoring: When and Why (Okay example in PERL)](https://medium.com/@audi17.2/refactoring-when-and-why-b5262ae92fcb) [The Clean Coder: A Code of Conduct for Professional Programmers: Robert C. Martin: 4708364241379: Amazon.com: Books](https://www.amazon.com/Clean-Coder-Conduct-Professional-Programmers/dp/0137081073/ref=pd_sim_14_5?_encoding=UTF8&pd_rd_i=0137081073&pd_rd_r=979e48c3-f72a-11e8-b224-df517db04d31&pd_rd_w=kGnlx&pd_rd_wg=o4jpB&pf_rd_i=desktop-dp-sims&pf_rd_m=ATVPDKIKX0DER&pf_rd_p=18bb0b78-4200-49b9-ac91-f141d61a1780&pf_rd_r=TG9C9V8KNQE1XB4MAYQ5&pf_rd_s=desktop-dp-sims&pf_rd_t=40701&psc=1&refRID=TG9C9V8KNQE1XB4MAYQ5) [Refactoring](https://refactoring.com/)
[Notes on Data Structures and Programming Techniques (CPSC 223, Spring 2018)](http://www.cs.yale.edu/homes/aspnes/classes/223/notes.html) [MIT - Software Construction - How to write good code](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-005-software-construction-spring-2016/)
### Pointer Stuff
[Double Pointers in C/C++ - DEV Community 👩‍💻👨‍💻](https://dev.to/noah11012/double-pointers-in-cc-2n96) [Chapter 22: Pointers to Pointers](https://www.eskimo.com/~scs/cclass/int/sx8.html)
### User Programming References
[kernel_user_space_howto - The Linux Documentation Project](http://wiki.tldp.org/kernel_user_space_howto) [LXR / The Linux Cross Reference](http://lxr.linux.no/) [linux - What is the difference between procfs and sysfs? - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/4884/what-is-the-difference-between-procfs-and-sysfs) [Configfs - an introduction [LWN.net]](https://lwn.net/Articles/148973/) [debugfs - yet another in-kernel file system [LWN.net]](https://lwn.net/Articles/115282/) [Kernel Korner - Why and How to Use Netlink Socket | Linux Journal](https://www.linuxjournal.com/article/7356) [networking:generic_netlink_howto [Wiki]](https://wiki.linuxfoundation.org/networking/generic_netlink_howto) [Generic Netlink HOW-TO based on Jamal's original doc [LWN.net]](https://lwn.net/Articles/208755/) [ioctl - Wikipedia](https://en.wikipedia.org/wiki/Ioctl)
[Advanced Programming Topics](https://github.com/ossu/computer-science#advanced-programming) [Computer Programming/Standards and Best Practices - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/Computer_Programming/Standards_and_Best_Practices) [Set (abstract data type) - Wikipedia](https://en.wikipedia.org/wiki/Set_(abstract_data_type)) [Library (computing) - Wikipedia](https://en.wikipedia.org/wiki/Library_(computing)) [Code Review Stack Exchange](https://codereview.stackexchange.com/)
### Interview Stuff
[MUST READ - The Interview Study Guide For Software Engineers](https://www.coriers.com/the-interview-study-guide-for-software-engineers/) [How do you get better at coding interviews? : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/ai4q1i/how_do_you_get_better_at_coding_interviews/eel4su9/) [A list of events and fellowship opportunities for Computer Science students](https://github.com/anu0012/awesome-computer-science-opportunities) [tech-interview-handbook: Algorithms study materials, behavioral content and tips for rocking your coding interview](https://github.com/yangshun/tech-interview-handbook) [Google Interview Problems: Synonymous Queries – Alex Golec – Medium](https://medium.com/@alexgolec/google-interview-problems-synonymous-queries-36425145387c) [joyoyao/interviews: Everything you need to know to get the job.](https://github.com/joyoyao/interviews) [The Interview Study Guide For Data Engineers](https://www.coriers.com/the-interview-study-guide-for-data-engineers/) [User Level thread Vs Kernel Level thread - LeetCode Discuss](https://leetcode.com/discuss/interview-question/operating-system/124631/User-Level-thread-Vs-Kernel-Level-thread) [Intro to Processes & Threads - YouTube](https://www.youtube.com/watch?v=exbKr6fnoUw) [Difference Between Process and Thread - Georgia Tech - Advanced Operating Systems - YouTube](https://www.youtube.com/watch?v=O3EyzlZxx3g&t=11s) [Difference between forking and multithreading - LeetCode Discuss](https://leetcode.com/discuss/interview-question/operating-system/125024/Difference-between-forking-and-multithreading)
### General Data Structures and Algorithms Stuff
### Algorithms
### Courses
### Intro To Algorithms Courses
[Algorithms, Part I | Coursera](https://www.coursera.org/learn/algorithms-part1) [Algorithms, Part II | Coursera](https://www.coursera.org/learn/algorithms-part2) [Algorithms by Jeff Erickson](http://jeffe.cs.illinois.edu/teaching/algorithms/) [JeffE-Algorithms Hw's, Labs, and Tests](http://jeffe.cs.illinois.edu/teaching/algorithms/hwex/s18-hwex.pdf) [JeffE - Algorithms - Lecture and Lab Schedule](https://courses.engr.illinois.edu/cs374/sp2018/A/schedule.html) [Intro to Algorithms | Udacity](https://www.udacity.com/course/intro-to-algorithms--cs215) [Introduction to Algorithms | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-006-introduction-to-algorithms-fall-2011/)
### Graduate Intro to Algorithms
[Introduction to Graduate Algorithms - Udacity](https://classroom.udacity.com/courses/ud401/lessons/9c7b3b0a-cf36-4d95-9a99-15bc3b3159f3/concepts/5a538a92-4c05-4f9f-a2e9-c92b3ab31bf8#)
### Advanced Algorithms Courses
[Harvard - Advanced Algorithms (CS 224)](http://people.seas.harvard.edu/~minilek/cs224/fall14/index.html) [Advanced Data Structures - GeeksforGeeks](https://www.geeksforgeeks.org/advanced-data-structures/)
### Good Videos For Algorithms
[19\. Dynamic Programming I: Fibonacci, Shortest Paths - YouTube](https://www.youtube.com/watch?v=OQ5jsbhAv_M&vl=en) [What is complexity theory? (P vs. NP explained visually) - YouTube](https://www.youtube.com/watch?v=u2DLlNQiPB4) [Algorithms: Graph Search, DFS and BFS - YouTube](https://www.youtube.com/watch?v=zaBhtODEL0w&list=PLX6IKgS15Ue02WDPRCmYKuZicQHit9kFt) [Algorithms: Binary Search - YouTube](https://www.youtube.com/watch?v=P3YID7liBug&feature=youtu.be) [Binary Search Tree Review - YouTube](https://www.youtube.com/watch?v=x6At0nzX92o&index=1&list=PLA5Lqm4uh9Bbq-E0ZnqTIa8LRaL77ica6) [Python Algorithms for Interviews - YouTube](https://www.youtube.com/watch?v=p65AHm9MX80) [Algorithms: Recursion - YouTube](https://www.youtube.com/watch?v=KEEKn7Me-ms&feature=youtu.be) [Algorithms: Bubble Sort - YouTube](https://www.youtube.com/watch?v=6Gv8vg0kcHc&feature=youtu.be) [Algorithms: Merge Sort - YouTube](https://www.youtube.com/watch?v=KF2j-9iSf4Q&feature=youtu.be) [Algorithms: Quicksort - YouTube](https://www.youtube.com/watch?v=SLauY6PpjW4&feature=youtu.be) [Introduction to Big O Notation and Time Complexity (Data Structures & Algorithms #7) - YouTube](https://www.youtube.com/watch?v=D6xkbGLQesk) [Asymptotic Notation - YouTube](https://www.youtube.com/watch?v=iOq5kSKqeR4) [Dynamic Programming (Think Like a Programmer) - YouTube](https://www.youtube.com/watch?v=iv_yHjmkv4I) [Algorithms: Memoization and Dynamic Programming - YouTube](https://www.youtube.com/watch?v=P8Xa2BitN3I&t=13s) [Dynamic Programming I: Fibonacci, Shortest Paths - YouTube](https://www.youtube.com/watch?v=OQ5jsbhAv_M&t=7s) [Dynamic Programming II: Text Justification, Blackjack - YouTube](https://www.youtube.com/watch?v=ENyox7kNKeY&t=4s)
[VisuAlgo - visualising data structures and algorithms through animation](https://visualgo.net/en) [Algorithms for Visual Learners | Hackaday](https://hackaday.com/2018/05/06/algorithms-for-visual-learners/) [Algorithms | Computer science | Computing | Khan Academy](https://www.khanacademy.org/computing/computer-science/algorithms/) [Red Blob Games](https://www.redblobgames.com/) [Big-O Algorithm Complexity Cheat Sheet (Know Thy Complexities!) @ericdrowell](http://bigocheatsheet.com/) [A Gentle Introduction to Algorithm Complexity Analysis](http://discrete.gr/complexity/) [Analysis of Algorithms | Set 4 (Analysis of Loops) - GeeksforGeeks](https://www.geeksforgeeks.org/analysis-of-algorithms-set-4-analysis-of-loops/) [Greedy Archives - GeeksforGeeks](https://www.geeksforgeeks.org/category/greedy/) [Oracle machine - Wikipedia](https://en.wikipedia.org/wiki/Oracle_machine) [Introduction to A*](http://theory.stanford.edu/~amitp/GameProgramming/AStarComparison.html) [Introduction to the A* Algorithm](https://www.redblobgames.com/pathfinding/a-star/introduction.html)
### Data Structures
### Good Videos for Data Structures
[Data Structures & Algorithms #1 - What Are Data Structures? - YouTube](https://www.youtube.com/watch?v=bum_19loj9A) [Dynamic Arrays - Dynamic Arrays and Amortized Analysis | Coursera](https://www.coursera.org/lecture/data-structures/dynamic-arrays-EwbnV) [Data Structures: Linked Lists - YouTube](https://www.youtube.com/watch?v=njTh_OwMljA&feature=youtu.be) [UC San Diego - Linked Lists vs. Arrays - Interfaces, Linked Lists vs. Arrays, and Correctness](https://www.coursera.org/lecture/data-structures-optimizing-performance/core-linked-lists-vs-arrays-rjBs9) [Data Structures: Trees - YouTube](https://www.youtube.com/watch?v=oSWTXtMglKE&feature=youtu.be) [Data Structures: Heaps - YouTube](https://www.youtube.com/watch?v=t0Cq6tVNRBA&feature=youtu.be) [Data Structures: Hash Tables - YouTube](https://www.youtube.com/watch?v=shs0KM3wKv8&feature=youtu.be) [UC San Diego - Phone Book Problem - Hash Tables | Coursera](https://www.coursera.org/lecture/data-structures/phone-book-problem-NYZZP) [Data Structures: Stacks and Queues - YouTube](https://www.youtube.com/watch?v=wjI1WNcIntg&feature=youtu.be) [Data Structures: Crash Course Computer Science #14 - YouTube](https://www.youtube.com/watch?v=DuDz6B4cqVc&feature=youtu.be) [Data Structures: Tries - YouTube](https://www.youtube.com/watch?v=zIjfhVPRZCg)
### Software Engineering
[Berkeley Foundations of Software Engineering](https://www.mooc-list.com/university-entity/university-california-berkeley?title=software+engineer&field_start_date_value_op=between&field_start_date_value%5Bvalue%5D%5Bdate%5D=&field_start_date_value%5Bmin%5D%5Bdate%5D=&field_start_date_value%5Bmax%5D%5Bdate%5D=&sort_by=field_start_date_value&sort_order=DESC) [UC Berkeley CS 169 Software Engineering](http://cs169.saas-class.org/) [Allen Holub: Training/Consulting/Programming: Agile, Architecture, Swift, Java](https://www.holub.com/goodies/rules.html) [CMU - Syllabus for Software Engineering](https://www.cs.cmu.edu/~aldrich/courses/15-413/)
### Computer Organization and Architecture
[Georgia Tech - High Performance Computer Architecture - Udacity](https://classroom.udacity.com/courses/ud007) [MIT - Comp Org, Arch, and Digital Design](https://6004.mit.edu/web/spring19/course_information) [Cornell - CS 3410 Comp System Organization - Fall 2016](http://www.cs.cornell.edu/courses/cs3410/2016fa/) [CMU - Intro To Computer Architecture - Spring 2019](http://users.ece.cmu.edu/~jhoe/doku/doku.php?id=18-447_introduction_to_computer_architecture)
### Operating Systems and Systems Programming
### Books and Videos
### Carnegie Mellon University OS Course
[OS Book used by CMU](http://iips.icci.edu.iq/images/exam/Abraham-Silberschatz-Operating-System-Concepts---9th2012.12.pdf) [Other OS Book used by CMU](https://www.amazon.com/Operating-Systems-Principles-Thomas-Anderson/dp/0985673524)
### Processes and Threads
[User Level thread Vs Kernel Level thread - LeetCode Discuss](https://leetcode.com/discuss/interview-question/operating-system/124631/User-Level-thread-Vs-Kernel-Level-thread) [Intro to Processes & Threads - YouTube](https://www.youtube.com/watch?v=exbKr6fnoUw) [Difference Between Process and Thread - Georgia Tech - Advanced Operating Systems - YouTube](https://www.youtube.com/watch?v=O3EyzlZxx3g&t=11s) [Difference between forking and multithreading - LeetCode Discuss](https://leetcode.com/discuss/interview-question/operating-system/125024/Difference-between-forking-and-multithreading)
### Good Books for Operating Systems
[The Linux Programming Interface: A Linux and UNIX System Programming Handbook: Michael Kerrisk: 9781593272203: Amazon.com: Books](https://www.amazon.com/gp/product/1593272200/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&psc=1) [Advanced Programming in the UNIX Environment, 3rd Edition: W. Richard Stevens, Stephen A. Rago: 9780321637734: Amazon.com: Books](https://www.amazon.com/Advanced-Programming-UNIX-Environment-3rd/dp/0321637739/ref=pd_sim_14_3/143-1541613-1371665?_encoding=UTF8&pd_rd_i=0321637739&pd_rd_r=632a5c4f-66cd-11e9-b475-c358acaaf9b4&pd_rd_w=rLOlz&pd_rd_wg=VCSmQ&pf_rd_p=90485860-83e9-4fd9-b838-b28a9b7fda30&pf_rd_r=PVQY2S3FZ6CNSCCJBGM9&psc=1&refRID=PVQY2S3FZ6CNSCCJBGM9) [Computer Systems: An Integrated Approach to Architecture and Operating Systems: Umakishore Ramachandran, William D. Leahy Jr.: 9780321486134: Amazon.com: Books](https://www.amazon.com/Computer-Systems-Integrated-Architecture-Operating/dp/0321486137/ref=sr_1_1?ie=UTF8&s=books&qid=1278771624&sr=8-1:)
### Good Videos for Operating Systems
[Bitwise, Day 0: Overview and Q&A - YouTube](https://www.youtube.com/watch?v=ZjwvMcP3Nf0&list=PLU94OURih-CiP4WxKSMt3UcwMSDM3aTtX) [Write your own Operating System - YouTube](https://www.youtube.com/playlist?list=PLHh55M_Kq4OApWScZyPl5HhgsTJS9MZ6M)
[The little book about OS development](https://littleosbook.github.io/)
### OS Courses
### Georgia Tech
### Georgia Tech Graduate Intro to Operating Systems
### Lecture Notes ### Recommended Research Papers
[ud923-birrell-paper.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-birrell-paper.pdf) [eykholt.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-eykholt-paper.pdf) [ud923-stein-shah-paper.pdf](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-stein-shah-paper.pdf) [paper.dvi](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-pai-paper.pdf) [The Case For Architecture-Aware OS Kernel](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-fedorova-paper.pdf) [The performance of spin lock alternatives for shared-money multiprocessors - Parallel and Distributed Systems, IEEE Transactions on](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-anderson-paper.pdf) [Formal Requirements for Virtualizable Third Gen Architectures](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-popek-goldberg-paper.pdf) [Virtual Machine Monitors: Current Tech and Future Trends](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-rosenblum-garfinkel-paper.pdf) [Implementing Remote Procedure Calls](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-birrell-nelson-paper.pdf) [Caching in the Sprite Network File System](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-nelson-paper.pdf) [Distributed Shared Memory: Concepts and Systems - IEEE Parallel & Distributed Technology: Systems & Applications](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/references/ud923-protic-paper.pdf)
[GOOD - SystemProgramming Wiki · GitHub](https://github.com/angrave/SystemProgramming/wiki) [An Introduction to programming with threads](http://www.hpl.hp.com/techreports/Compaq-DEC/SRC-RR-35.pdf) [hessmjr/operating-systems: Georgia Tech OMSCS - Operating Systems](https://github.com/hessmjr/operating-systems) [drharris/pretty-bonnie: Helps with Bonnie test output on Udacity.](https://github.com/drharris/pretty-bonnie) [Interactive map of Linux kernel](http://www.makelinux.net/kernel_map/) [Linux source code: (v4.20) - Bootlin](https://elixir.bootlin.com/linux/latest/source) [Spring19-schedule.xlsx - Google Sheets](https://docs.google.com/spreadsheets/d/1dxPjroHZguFSTPW46atYX1t8QB1wqqi7tRRvI5V923k/edit#gid=1868198252) [.net - What's the purpose of Thread.SpinWait method? - Stack Overflow](https://stackoverflow.com/questions/1091135/whats-the-purpose-of-thread-spinwait-method) [CppCon 2018: Greg Law “Debugging Linux C++” - YouTube](https://www.youtube.com/watch?v=V1t6faOKjuQ) [The Linux Programming Interface: A Linux and UNIX System Programming Handbook: Michael Kerrisk: 9781593272203: Amazon.com: Books](https://www.amazon.com/The-Linux-Programming-Interface-Handbook/dp/1593272200) [Introduction to Operating Systems | Udacity](https://www.udacity.com/course/introduction-to-operating-systems--ud923)
### Georgia Tech Advanced Operating Systems
[AOSPrereq-and-Concepts-List.pdf](https://www.omscs.gatech.edu/sites/default/files/images/AOSPrereq-and-Concepts-List.pdf) [Advanced Operating Systems Readings - Udacity](https://www.udacity.com/wiki/ud156-readings)
[CS 2200 An Introduction to Computer Systems and Networks](https://www.cc.gatech.edu/~rama/CS2200-External/) [CS 2200 - Prof. Kishore Ramachandran - YouTube](https://www.youtube.com/playlist?list=PLl2dezBNo_Bkd8YmSkCX0M7AORHJXe5uG)
### MIT
[MIT - Operating System Engineering - Fall 2014](https://pdos.csail.mit.edu/6.828/2014/schedule.html)
### Stanford
[Stanford - Operating Systems - Spring 2014](http://web.stanford.edu/~ouster/cgi-bin/cs140-spring14/lectures.php)
### Berkeley
[Berkeley CS 162: Operating Systems and Programming](http://www-inst.eecs.berkeley.edu/~cs162/fa17/)
[CUNY - UNIX System Programming](http://compsci.hunter.cuny.edu/~sweiss/course_materials/csci493.66/csci493.66_spr12.php)
### Thread and Process Stuff
[A gentle introduction to multithreading - Internal Pointers](https://www.internalpointers.com/post/gentle-introduction-multithreading) [multithreading - Why should I use a thread vs. using a process? - Stack Overflow](https://stackoverflow.com/questions/617787/why-should-i-use-a-thread-vs-using-a-process) [Thread safety - Wikipedia](https://en.wikipedia.org/wiki/Thread_safety) [Atomic vs. Non-Atomic Operations](https://preshing.com/20130618/atomic-vs-non-atomic-operations/) [Can multithreading be implemented on a single processor system? - Stack Overflow](https://stackoverflow.com/questions/16116952/can-multithreading-be-implemented-on-a-single-processor-system) [Parallelism vs. Concurrency - HaskellWiki](https://wiki.haskell.org/Parallelism_vs._Concurrency) [Difference between Multiprogramming, Multitasking, Multithreading and Multiprocessing](https://www.8bitavenue.com/difference-between-multiprogramming-multitasking-multithreading-and-multiprocessing/) [Inter-process communication - Wikipedia](https://en.wikipedia.org/wiki/Inter-process_communication) [Process (computing) - Wikipedia](https://en.wikipedia.org/wiki/Process_%28computing%29) [Concurrency (computer science) - Wikipedia](https://en.wikipedia.org/wiki/Concurrency_%28computer_science%29) [Parallel computing - Wikipedia](https://en.wikipedia.org/wiki/Parallel_computing) [Multithreading (computer architecture) - Wikipedia](https://en.wikipedia.org/wiki/Multithreading_%28computer_architecture%29) [multithreading - When one thread blocks in C, why doesn't the entire process block - Stack Overflow](https://stackoverflow.com/questions/28724135/when-one-thread-blocks-in-c-why-doesnt-the-entire-process-block) [multithreading - Why blocking system calls blocks entire procedure with user-level threads? - Stack Overflow](https://stackoverflow.com/questions/40877998/why-blocking-system-calls-blocks-entire-procedure-with-user-level-threads)
### RTOS
[Waterloo - CS452 - Spring 2012](http://www.cgl.uwaterloo.ca/wmcowan/teaching/cs452/s12/)
### Linux Specific Stuff
### Linux Kernel Research Stuff
[User-mode Linux - Wikipedia](https://en.wikipedia.org/wiki/User-mode_Linux) [Heavily Commented Linux Kernel Source Code](http://www.oldlinux.org/download/ECLK-5.0-WithCover.pdf) [Wonderful World of Linux 3.0 | Kniggit.net](https://kniggit.net/wonderful-world-linux/wonderful-world-linux-3-0/) [linux_internals.pdf](http://www.cse.unsw.edu.au/~cs9242/11/lectures/08-linux_internals.pdf) [System call - Wikipedia](https://en.wikipedia.org/wiki/System_call) [The Linux Kernel Module Programming Guide (2.6)](https://www.tldp.org/LDP/lkmpg/2.6/lkmpg.pdf) [Syscall Hijacking: Dynamically obtain syscall table address (kernel 2.6.x) | memset's blog](https://memset.wordpress.com/2011/01/20/syscall-hijacking-dynamically-obtain-syscall-table-address-kernel-2-6-x/) [Syscall Hooking via the Interrupt Descriptor Table (2.6)](https://web.archive.org/web/20150504080415/http://www.elliotbradbury.com/linux-syscall-hooking-interrupt-descriptor-table/) [CMSC 421 - Adding a System Call to the Linux Kernel](https://bluegrit.cs.umbc.edu/~lsebald1/cmsc421-sp2019/hello-syscall.shtml) [SYSENTER - OSDev Wiki](https://wiki.osdev.org/SYSENTER) [HowTos/I need the Kernel Source - CentOS Wiki](https://wiki.centos.org/HowTos/I_need_the_Kernel_Source) [Implementing a System Call on Linux 2.6 for i386](https://www.tldp.org/HOWTO/html_single/Implement-Sys-Call-Linux-2.6-i386/) [The Linux Kernel, Kernel Modules And Hardware Drivers](http://haifux.org/lectures/86-sil/kernel-modules-drivers/kernel-modules-drivers.html) [The Linux Kernel API](http://kernelbook.sourceforge.net/kernel-api.html/) [Linux Interrupt Handling](ftp://ftp.lpp.polytechnique.fr/jeandet/keep/sync/LINUX/interrupt/t3.pdf) [Understanding the Linux Kernel, Third Edition - Amazon](https://www.amazon.com/Understanding-Linux-Kernel-Third-Daniel/dp/0596005652) [How Computers Boot Up | Many But Finite](https://manybutfinite.com/post/how-computers-boot-up/) [understanding linuxvmm](https://www.kernel.org/doc/gorman/html/understand/) [The Kernel Boot Process | Many But Finite](https://manybutfinite.com/post/kernel-boot-process/) [How The Kernel Manages Your Memory | Many But Finite](https://manybutfinite.com/post/how-the-kernel-manages-your-memory/) [Anatomy of a Program in Memory | Many But Finite](https://manybutfinite.com/post/anatomy-of-a-program-in-memory/) [System Calls Make the World Go Round | Many But Finite](https://manybutfinite.com/post/system-calls/) [Page Cache, the Affair Between Memory and Files | Many But Finite](https://manybutfinite.com/post/page-cache-the-affair-between-memory-and-files/) [Memory Translation and Segmentation | Many But Finite](https://manybutfinite.com/post/memory-translation-and-segmentation/) [CPU Rings, Privilege, and Protection | Many But Finite](https://manybutfinite.com/post/cpu-rings-privilege-and-protection/) [Linux Memory Management](http://www.cse.psu.edu/~axs53/spring01/linux/memory.ppt) [Inside the Linux 2.6 Completely Fair Scheduler – IBM Developer](https://developer.ibm.com/tutorials/l-completely-fair-scheduler/) [Tour of the Linux kernel source](https://www.tldp.org/LDP/khg/HyperNews/get/tour/tour.html)
### IPC - Interprocess Communication Mechanisms
[Message Queue/IPC](https://www.tldp.org/LDP/tlk/ipc/ipc.html) [Beej - Message Queues](https://beej.us/guide/bgipc/html/multi/mq.html) [Message Queue](https://www.tldp.org/LDP/lpg/node28.html#SECTION00742100000000000000)
### Memory Management
### Shared Memory
[Shared Memory - Advanced Linux Programming - pg 98-100](http://www.makelinux.net/alp/)
### Mapped Memory [Memory Management](https://www.tldp.org/LDP/tlk/mm/memory.html) [Linux Memory Management](http://www.cse.psu.edu/~axs53/spring01/linux/memory.ppt)
### Process & Threads
### Pthreads
[Pthread Examples](https://s3.amazonaws.com/content.udacity-data.com/courses/ud923/resources/ud923-p2l3-pthreads.zip)
[An overview of Linux processes - Real world Linux Blog](https://www.ibm.com/developerworks/community/blogs/58e72888-6340-46ac-b488-d31aa4058e9c/entry/an_overview_of_linux_processes21?lang=en) [TLDP - Ch 4 - Processes](https://www.tldp.org/LDP/tlk/kernel/processes.html) [Introduction to Linux Threads – Part I](https://www.thegeekstuff.com/2012/03/linux-threads-intro/) [How to Create Threads in Linux (With a C Example Program)](https://www.thegeekstuff.com/2012/04/create-threads-in-linux/?utm_source=feedburner) [What are Linux Processes, Threads, Light Weight Processes, and Process State](https://www.thegeekstuff.com/2013/11/linux-process-and-threads)
### Linux Kernel and Device Driver Programming
[Linux Device Drivers, 3rd Edition: Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman: 9780596005900: Amazon.com: Books](https://www.amazon.com/Linux-Device-Drivers-Jonathan-Corbet/dp/0596005903/ref=sr_1_4?ie=UTF8&qid=1483650712&sr=8-4&keywords=understanding+linux+kernel) [Linux Kernel Teaching — The Linux Kernel documentation](https://linux-kernel-labs.github.io/master/) [Is linux 'the eudyptula challenge' still alive? - Quora](https://www.quora.com/Is-linux-the-eudyptula-challenge-still-alive)
[The Linux Kernel: Table of Contents](https://www.tldp.org/LDP/tlk/tlk-toc.html) [Embedded Linux, kernel and real-time presentations - Bootlin](https://bootlin.com/docs/) [Semaphores - Advanced Linux Programming - pg 101-103](http://www.makelinux.net/alp/) [The Linux Programmers Guide](https://www.tldp.org/LDP/lpg/index.html) [Linux Kernel Programming Challenge | eudyptula-challenge](https://github.com/agelastic/eudyptula)
### Generic Kernels and Kernel Programming
[Kernels 101 – Let’s write a Kernel - Arjun Sreedharan](https://arjunsreedharan.org/post/82710718100/kernels-101-lets-write-a-kernel) [Kernels 201 - Let’s write a Kernel with keyboard and screen support - Arjun Sreedharan](https://arjunsreedharan.org/post/99370248137/kernels-201-lets-write-a-kernel-with-keyboard)
[Amazing Free OS Book | Operating Systems: Three Easy Pieces](http://pages.cs.wisc.edu/~remzi/OSTEP/) [Intro OS Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/operating_systems.md) [PRIMER - Unix and Internet Fundamentals](http://en.tldp.org/HOWTO/Unix-and-Internet-Fundamentals-HOWTO/index.html) [MikeOS - simple x86 assembly language operating system](http://mikeos.sourceforge.net/) [The Art of Unix Programming](http://catb.org/~esr/writings/taoup/html/) [Operating systems development for Dummies – Leo Whitehead – Medium](https://medium.com/@lduck11007/operating-systems-development-for-dummies-3d4d786e8ac) [Writing a Tiny x86 Bootloader - Joe Bergeron](http://joebergeron.io/posts/post_two.html) [Write an OS from scratch. A book for self-learner.](https://tuhdo.github.io/os01/) [Malloc tutorial](https://danluu.com/malloc-tutorial/) [raspberry-pi-os: Learning operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os) [Writing a Bootloader Part 1 | Alex Parker's Website](http://3zanders.co.uk/2017/10/13/writing-a-bootloader/) [Paging Implementation](https://os.phil-opp.com/paging-implementation/) [x89k - OS Dev for Dummies](http://x89k.cf/operating%20systems/2018/12/10/OSdevfordummies.html) [GitHub - lduck11007/os-tutorial: How to create an OS from scratch](https://github.com/lduck11007/os-tutorial)
### Distributed Systems and Parallel Computing
### CMU - Distributed Systems
[Problem Sets and Solutions](https://www.andrew.cmu.edu/course/15-440/PROBLEMSETS/2015-2018/) [Guide to Reliable Distributed Systems: Building High-Assurance Applications and Cloud-Hosted Services](https://www.amazon.com/Guide-Reliable-Distributed-Systems-High-Assurance-ebook/dp/B007ELT702) [P1-handout.pdf](https://www.andrew.cmu.edu/course/15-440/PROJECTS/15440-p1-handout.pdf) [P2-handout.pdf](https://www.andrew.cmu.edu/course/15-440/PROJECTS/15440-p2-handout.pdf) [P3-handout.pdf](https://www.andrew.cmu.edu/course/15-440/PROJECTS/15440-p3-handout.pdf) [P4-handout.pdf](https://www.andrew.cmu.edu/course/15-440/PROJECTS/15440-p4-handout.pdf) [ProblemSet1.pdf](https://www.andrew.cmu.edu/course/15-440/PROBLEMSETS/ProblemSet1.pdf) [ProblemSet2.pdf](https://www.andrew.cmu.edu/course/15-440/PROBLEMSETS/ProblemSet2.pdf) [ProblemSet3.pdf](https://www.andrew.cmu.edu/course/15-440/PROBLEMSETS/ProblemSet3.pdf) [ProblemSet4.pdf](https://www.andrew.cmu.edu/course/15-440/PROBLEMSETS/ProblemSet4.pdf) [Distributed Systems: Principles and Paradigms](https://www.amazon.com/Distributed-Systems-Principles-Andrew-Tanenbaum/dp/153028175X) [Course Readings](https://www.andrew.cmu.edu/course/15-440/readings.html) [15-440, Fall 2010: Distributed Systems](http://www.cs.cmu.edu/~dga/15-440/F10/index.html)
### UMBC Distributed Systems
[IS651 | Distributed Systems](https://userpages.umbc.edu/~jianwu/is651/651.syll.s18.html) [Distributed Systems Textbook](https://userpages.umbc.edu/~jianwu/is651/651book/is651-toc.php)
[A pattern language for microservices](https://microservices.io/patterns/index.html) [NGINX - Register for free books and info](https://www.nginx.com/) [Waterloo - Programming for Performance](https://github.com/patricklam/p4p-2015) [MIT - Distributed Systems](http://css.csail.mit.edu/6.824/2014/index.html) [CMU - Parallel Computer Architecture and Programming : Parallel Computer Architecture and Programming : 15-418/618 Spring 2015](http://15418.courses.cs.cmu.edu/spring2015/) [Introduction to Parallel Computing](https://www-users.cs.umn.edu/~karypis/parbook/) [Designing Data-Intensive Applications - O'Reilly Media](http://shop.oreilly.com/product/0636920032175.do) [CSEP552: PMP Distributed Systems, Spring 2013](https://courses.cs.washington.edu/courses/csep552/13sp/)
### Functional Programming / Programming Language Design
[Princeton - COS 326: Functional Programming](http://www.cs.princeton.edu/~dpw/courses/cos326-12/info.php) [UC Berkeley - CS164: Hack Your Language!](https://sites.google.com/a/bodik.org/cs164/home) [Cornell - CS 3110 - Functional Programming and DS](http://www.cs.cornell.edu/courses/cs3110/2014fa/course_info.php) [Intro to Programming Languages](https://opendsa-server.cs.vt.edu/ODSA/Books/PL/html/) [15-150 Tools](http://www.cs.cmu.edu/~15150/tools.html) [Programming in Standard ML Book](http://www.cs.cmu.edu/~rwh/isml/book.pdf) [CS 15-150: Principles of Functional Programming (Fall 2015)](https://www.cs.cmu.edu/~iliano/courses/15F-CMU-CS150/schedule.shtml) [CS 5010: Program Design Paradigms](https://course.ccs.neu.edu/cs5010/index.html) [CSCI 334: Principles of Programming Languages](http://www.cs.williams.edu/~dbarowy/cs334s18/#home) [Repl.it - Oak Programming Language](https://repl.it/@cmihai/Oak-Programming-Language)
### Compilers
### Compiler Specific Courses
[UMD - CMSC430: Introduction to Compilers](http://www.cs.umd.edu/class/spring2015/cmsc430/) [Stanford - CS143: Compilers](https://web.stanford.edu/class/cs143/) [UIUC - CS 421 Programming Languages and Compilers](https://courses.engr.illinois.edu/cs421/fa2014/) [Cornell - CS 4120 - Intro to Compilers](http://www.cs.cornell.edu/courses/cs4120/2013fa/) [Compilers and Compiler Generators](http://www.cs.ru.ac.za/compilers/pdfvers.pdf) [compiler construction - What's the difference between parse trees and abstract syntax trees? - Stack Overflow](https://stackoverflow.com/questions/5967888/whats-the-difference-between-parse-trees-and-abstract-syntax-trees) [Linkers and Loaders](http://www.iecc.com/linker/) [CS 738: Advanced Compiler Optimizations](https://karkare.github.io/cs738/) [UT Austin - Advanced Compiler Techniques](http://www.cs.utexas.edu/users/mckinley/380C/)
[Compilers: Principles, Techniques, and Tools --- Second Errata Sheet](http://infolab.stanford.edu/~ullman/dragon/errata.html) [Compilers: Principles, Techniques, and Tools - Wikipedia](https://en.wikipedia.org/wiki/Compilers:_Principles,_Techniques,_and_Tools) [Engineering A Compiler - Google Search](https://www.google.com/search?q=Engineering+A+Compiler&oq=Engineering+A+Compiler&aqs=chrome..69i57j69i65&client=ubuntu&sourceid=chrome&ie=UTF-8) [ELI5: What is LLVM? Can it be used for general purpose programming? : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/t6y74/eli5_what_is_llvm_can_it_be_used_for_general/) [LLVM Language Reference Manual — LLVM 10 documentation](http://llvm.org/docs/LangRef.html) [LLVM Project Blog: Clang is now used to build Chrome for Windows](http://blog.llvm.org/2018/03/clang-is-now-used-to-build-chrome-for.html) [c++ - How to generate assembly code with clang in Intel syntax? - Stack Overflow](https://stackoverflow.com/questions/10990018/how-to-generate-assembly-code-with-clang-in-intel-syntax) [Cocoa Samurai: Understanding the Objective-C Runtime](https://cocoasamurai.blogspot.com/2010/01/understanding-objective-c-runtime.html) [A Guide To Parsing: Algorithms And Terminology](https://tomassetti.me/guide-parsing-algorithms-terminology/#big) [Difference between LL and LR parsing? - Stack Overflow](https://stackoverflow.com/questions/5975741/what-is-the-difference-between-ll-and-lr-parsing) [Good Lectures/Slides: CS143: Compilers](https://web.stanford.edu/class/archive/cs/cs143/cs143.1128/)
### Machine Learning/AI/Data Science
### Intro to Machine Learning?
[7 Steps to Mastering Machine Learning With Python](https://www.kdnuggets.com/2015/11/seven-steps-machine-learning-python.html) [Top 10 Machine Learning Algorithms for Beginners](https://www.kdnuggets.com/2017/10/top-10-machine-learning-algorithms-beginners.html) [8 Fun Machine Learning Projects for Beginners](https://elitedatascience.com/machine-learning-projects-for-beginners) [Andrew NG Intro to Machine Learning](https://www.coursera.org/learn/machine-learning/home/welcome) [scikit-learn: machine learning in Python — scikit-learn 0.19.1 documentation](http://scikit-learn.org/stable/) [Metacademy - Deep learning from the bottom up](https://metacademy.org/roadmaps/rgrosse/deep_learning) [Deep Learning For Coders—36 hours of lessons for free](http://course.fast.ai/start.html) [Machine Learning - complete course notes](http://www.holehouse.org/mlclass/) [Machine Learning Tutorial Part 1 | Machine Learning For Beginners - YouTube](https://www.youtube.com/watch?v=E3l_aeGjkeI)
### Machine Learning Books
[Pattern Recognition and Machine Learning (Information Science and Statistics): Christopher M. Bishop: 9780387310732: Amazon.com: Books](https://www.amazon.com/dp/0387310738?tag=inspiredalgor-20) [Machine Learning: The Art and Science of Algorithms that Make Sense of Data: Peter Flach: 9781107422223: Amazon.com: Books](https://www.amazon.com/dp/1107422221?tag=inspiredalgor-20) [Foundations of Machine Learning (Adaptive Computation and Machine Learning series): Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar: 9780262018258: Amazon.com: Books](https://www.amazon.com/dp/026201825X?tag=inspiredalgor-20) [Introduction to Evolutionary Computing (Natural Computing Series): Agoston E. Eiben, J.E. Smith: 9783642072857: Amazon.com: Books](https://www.amazon.com/Introduction-Evolutionary-Computing-Natural/dp/3642072852/ref=cm_cr_arp_d_product_top?ie=UTF8) [Field Guide to Genetic Programming](http://digitalcommons.morris.umn.edu/cgi/viewcontent.cgi?article=1001&context=cs_facpubs) [Artificial Intelligence: A Modern Approach (3rd Edition)](https://www.ics.uci.edu/~rickl/courses/cs-171/aima-resources/Artificial%20Intelligence%20A%20Modern%20Approach%20(3rd%20Edition).pdf) [Machine Learning Books : MachineLearning](https://www.reddit.com/r/MachineLearning/comments/1jeawf/machine_learning_books/) [Essentials.pdf](https://cs.gmu.edu/~sean/book/metaheuristics/Essentials.pdf) [An Introduction to Genetic Algorithms (Complex Adaptive Systems): Melanie Mitchell: 9780262631853: Amazon.com: Books](https://www.amazon.com/dp/0262631857/?tag=stackoverflow17-20) [Microsoft Word - EvolProg_Introduction.doc](http://www.cse.dmu.ac.uk/~mgongora/csci3405/EvolProg_Intro.pdf) [awesome-machine-learning/books.md at master · josephmisiti/awesome-machine-learning · GitHub](https://github.com/josephmisiti/awesome-machine-learning/blob/master/books.md)
### Machine Learning Courses
### Crash Courses
[https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/](https://ml.berkeley.edu/blog/2016/11/06/tutorial-1/) [Machine Learning & Artificial Intelligence: Crash Course Computer Science #34 - YouTube](https://www.youtube.com/watch?v=z-EtmaFJieY) [Crash Course in Machine Learning – IoT For All – Medium](https://medium.com/iotforall/crash-course-in-machine-learning-4f410018b83) [Machine Learning Crash Course 2015 - YouTube - YouTube](https://www.youtube.com/playlist?list=PLbF0BXX_6CPJ4TgDuCDINRu8hOMw31gRj) [Prof. Lorenzo Rosasco (part 1) - Machine Learning: A basic toolkit - YouTube](https://www.youtube.com/watch?v=vxFNir9yavg&index=9&list=PLyGKBDfnk-iB_rPiS0BbSHefK1HJMrPK_)
### Cornells Machine Learning for Intelligent Systems
[Syllabus | Machine Learning for Intelligent Systems](http://www.cs.cornell.edu/courses/cs4780/2018fa/syllabus/index.html) [CORNELL CS4780 "Machine Learning for Intelligent Systems"](https://www.youtube.com/playlist?list=PLl8OlHZGYOQ7bkVbuRthEsaLr7bONzbXS) [Lecture Notes](http://www.cs.cornell.edu/courses/cs4780/2018fa/lectures/index.html)
[A List of Awesome Machine Learning Courses](https://github.com/prakhar1989/awesome-courses/blob/master/README.md#machine-learning) [Another Awesome List of Machine Learning Courses](https://github.com/josephmisiti/awesome-machine-learning/blob/master/courses.md) [Artificial Intelligence | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-034-artificial-intelligence-fall-2010/) [13\. Learning: Genetic Algorithms - YouTube](https://www.youtube.com/watch?v=kHyNqSnzP8Y) [Deep Learning Summer School, Montreal 2015 - VideoLectures - VideoLectures.NET](http://videolectures.net/deeplearning2015_montreal/) [9.520/6.860, Fall 2017](http://www.mit.edu/~9.520/fall17/) [Stanford University: Tensorflow for Deep Learning Research](http://web.stanford.edu/class/cs20si/index.html) [Columbia - Machine Learning 4771](http://www.cs.columbia.edu/~jebara/4771/index.html) [CS 189/289A: Introduction to Machine Learning](https://people.eecs.berkeley.edu/~jrs/189/) [Stanford University CS224d: Deep Learning for Natural Language Processing](http://cs224d.stanford.edu/) [Stanford University CS231n: Convolutional Neural Networks for Visual Recognition](http://cs231n.stanford.edu/) [oxford-cs-deepnlp-2017](https://github.com/oxford-cs-deepnlp-2017/)
### Meh
[Kaggle: Your Home for Data Science](https://www.kaggle.com/) [Deep Learning](http://deeplearning.net/) [Tutorials « Deep Learning](http://deeplearning.net/reading-list/tutorials/) [Deep Learning Tutorials — DeepLearning 0.1 documentation](http://deeplearning.net/tutorial/) [Creating a genetic algorithm for beginners](http://www.theprojectspot.com/tutorial-post/creating-a-genetic-algorithm-for-beginners/3) [MarI/O - Machine Learning for Video Games - YouTube](https://www.youtube.com/watch?v=qv6UVOQ0F44) [NEATEvolve.lua - Pastebin.com](https://pastebin.com/ZZmSNaHX)
### AI Courses
[Intro AI Resources](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/artificial_neural_network.md) [Berkeley AI Materials](http://ai.berkeley.edu/home.html) [Cornell - CS 4700: Foundations of Artificial Intelligence](http://www.cs.cornell.edu/courses/cs4700/2014fa/) [Cornell - CS 6700: Advanced Artificial Intelligence](http://www.cs.cornell.edu/courses/cs6700/2013sp/) [MIT - The Society of Mind | Electrical Engineering and Computer Science | MIT OpenCourseWare](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-868j-the-society-of-mind-fall-2011/index.htm)
### Data Science
[How to Stream Text Data from Twitch with Sockets in Python – LearnDataSci](https://learndatasci.com/tutorials/how-stream-text-data-twitch-sockets-python/) [Learn Data Science | Free Online Courses | Class Central](https://www.classcentral.com/subject/data-science) [Statistics and R](https://www.edx.org/course/statistics-and-r) [CS109 Data Science](http://cs109.github.io/2015/) [Learning From Data - Online Course (MOOC)](https://work.caltech.edu/telecourse.html) [Algorithms for Big Data (CS 229r)](http://people.seas.harvard.edu/~minilek/cs229r/fall15/index.html)
### Reinforcement Learning
### Q Learning
[A Painless Q-Learning Tutorial](http://mnemstudio.org/path-finding-q-learning-tutorial.htm)
[RL Course](http://www0.cs.ucl.ac.uk/staff/d.silver/web/Teaching.html) [Reinforcement Learning Introduction - Georgia Tech - Machine Learning - YouTube](https://www.youtube.com/watch?v=_ocNerSvh5Y&list=PLAwxTw4SYaPnidDwo9e2c7ixIsu_pdSNp)
[Collection: Getting started with machine learning · GitHub](https://github.com/collections/machine-learning) [GitHub - josephmisiti/awesome-machine-learning: A curated list of awesome Machine Learning frameworks, libraries and software.](https://github.com/josephmisiti/awesome-machine-learning#c) [Topic: evolutionary-computation · GitHub](https://github.com/topics/evolutionary-computation) [A curated list of adversarial machine learning resources](https://github.com/yenchenlin/awesome-adversarial-machine-learning) [AISecurity Resources](https://github.com/RandomAdversary/Awesome-AI-Security) [Machine Learning for Cyber Security Resources](https://github.com/jivoi/awesome-ml-for-cybersecurity) [Introduction To Genetic Algorithms | Codecademy](https://www.codecademy.com/courses/javascript-beginner-en-pqhEw/0/1) [index - MachineLearning](https://www.reddit.com/r/MachineLearning/wiki/index) [Welcome — Theano 1.0.0 documentation](http://deeplearning.net/software/theano/) [TensorFlow](https://www.tensorflow.org/) [Start Here With Machine Learning - Machine Learning Mastery](https://machinelearningmastery.com/start-here/#getstarted) [Choosing the right estimator — scikit-learn 0.19.1 documentation](http://scikit-learn.org/stable/tutorial/machine_learning_map/) [Geoffrey Hinton Neural Networks for Machine Learning](https://www.coursera.org/learn/neural-networks/home/welcome) [[D] What is the best ML paper you read in 2018 and why? : MachineLearning](https://www.reddit.com/r/MachineLearning/comments/a6cbzm/d_what_is_the_best_ml_paper_you_read_in_2018_and/) [/r/Machine Learning](https://www.reddit.com/r/MachineLearning/) [Intro Machine Learning Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/machine_learning.md) [Georgia Tech | Machine Learning](https://classroom.udacity.com/courses/ud262) ### Machine Learning Challenges
[openai Gym](https://gym.openai.com/)
### Computer Vision
[jbhuang0604/awesome-computer-vision: A curated list of awesome computer vision resources](https://github.com/jbhuang0604/awesome-computer-vision) [Intro Computer Vision Resources](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/computer_vision.md)
### Secure Programming
[Electric Fence - eLinux.org](https://elinux.org/Electric_Fence) [GFlags and PageHeap - Windows drivers | Microsoft Docs](https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/gflags-and-pageheap) [Using the Pointer Ownership Model to Secure Memory Management in C and C++](https://insights.sei.cmu.edu/sei_blog/2013/03/using-the-pointer-ownership-model-to-secure-memory-management-in-c-and-c.html)
### Network Programming
[Beej's Guide to Network Programming](https://beej.us/guide/bgnet/html/single/bgnet.html) [Intro Computer Networks Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/computer_networks.md) [Unix Network Programming, Volume 1: The Sockets Networking API (3rd Edition): W. Richard Stevens, Bill Fenner, Andrew M. Rudoff: 0884527655420: Amazon.com: Books](https://www.amazon.com/Unix-Network-Programming-Sockets-Networking/dp/0131411551) [Linux Howtos: C/C++ -> Sockets Tutorial](http://www.linuxhowtos.org/C_C++/socket.htm)
### High Performance Computing
[Agner Fog](https://www.agner.org/) [Gamasutra: Niklas Gray's Blog - Data Structures Part 1: Bulk Data](https://www.gamasutra.com/blogs/NiklasGray/20190724/347232/Data_Structures_Part_1_Bulk_Data.php)
[/r/learnprogramming](https://www.reddit.com/r/learnprogramming/) [/r/csMajors](https://www.reddit.com/r/csMajors) [Making a contribution to an Open Source project on GitHub and whoa! : learnprogramming](https://www.reddit.com/r/learnprogramming/comments/amz6cz/i_just_started_working_on_making_a_contribution/) [Booting an Intel Architecture System, Part I: Early Initialization | Dr Dobb's](http://www.drdobbs.com/parallel/booting-an-intel-architecture-system-par/232300699) [Communications of the ACM](https://cacm.acm.org/) [unicode - What is exactly an overlong form/encoding? - Stack Overflow](https://stackoverflow.com/questions/7113117/what-is-exactly-an-overlong-form-encoding)
### SW Reverse Engineering/Malware Analysis
### Courses/Learning/Challenges
### Books
[Reverse Engineering for Beginners Book (REALLY LONG)](http://beginners.re/RE4B-EN.pdf) [Reversing: Secrets of Reverse Engineering: Eldad Eilam](https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817) [The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler: Chris Eagle](https://www.amazon.com/IDA-Pro-Book-Unofficial-Disassembler/dp/1593272898) [Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming: Kris Kaspersky: 9781931769228: Amazon.com: Books](https://www.amazon.com/Hacker-Disassembling-Uncovered-Techniques-Programming/dp/1931769222) [The Shellcoder's Handbook: Discovering and Exploiting Security Holes: Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte: 9780470080238: Amazon.com: Books](https://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X) [Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation](https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315) [The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory](https://www.amazon.com/gp/product/1118825098/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1118825098&linkId=9e9e956f54ee586491e2a9230b989df5) [Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition](https://www.amazon.com/Gray-Hat-Hacking-Ethical-Handbook/dp/1260108414/ref=dp_ob_title_bk) [The Antivirus Hacker's Handbook](https://www.amazon.com/gp/product/1119028752/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1119028752&linkId=5a831d9a67b3252aad91432dded4bb57) [Exploiting Software: How to Break Code: Greg Hoglund, Gary McGraw: 9780201786958: Amazon.com: Books](https://www.amazon.com/Exploiting-Software-How-Break-Code/dp/0201786958) [Reverse Engineering for Beginners](http://2thi.cc/doc/Reverse_Engineering_For_Beginners-Dennis_Yurichev.pdf)
### Intro Courses
### Good Hands On Intro to Cracking and Basic RE
[Lenas Reversing for Newbies](https://tuts4you.com/e107_plugins/download/download.php?view.2876) [Tutorials « The Legend Of Random](http://octopuslabs.io/legend/blog/sample-page.html) [Cracking Sublime Text 3](http://blog.fernandodominguez.me/cracking-sublime-text-3/) [zerosum0x0: Removing Sublime Text Nag Window](https://zerosum0x0.blogspot.com/2016/09/removing-sublime-text-nag-window.html)
### Video Presentations
[Reverse Engineering 101 - NYU Poly - 2009](https://vimeo.com/6764570) [Reverse Engineering 101 - NYU:Poly 2010](https://prezi.com/a5tm-lf0879-/reverse-engineering-101-nyupoly-2010/) [Reverse Engineering 102 - NYU:Poly 2010](https://prezi.com/e5a2tumdqocj/reverse-engineering-102-nyupoly-2010/) [Reverse Engineering 1 - NYU Poly 2011](https://vimeo.com/30076325) [Reverse Engineering 2 - NYU Poly 2011](https://vimeo.com/30594548)
### Open Security Training
[Open Security Training - Introduction To Reverse Engineering](http://opensecuritytraining.info/IntroductionToReverseEngineering.html) [Open Security Training - Life Of Binaries](http://opensecuritytraining.info/LifeOfBinaries.html)
[Software RE Resources | NSA Codebreaker Challenge](https://codebreaker.ltsnet.net/resources) [Software Reverse Engineering and Malware Analysis](http://www.cs.fsu.edu/~liux/courses/reversing/calendar.html) [Microcorruption - Interactive Intro to RE](https://microcorruption.com/login) [RE for Beginners | Reverse Engineering](https://www.begin.re/) [RPI - CSCI 4971 - Secure Software Principles (RE stuff)](http://www.cs.rpi.edu/academics/courses/spring10/csci4971/) [RE guide for beginners: Methodology and tools - Reverse Engineering - 0x00sec](https://0x00sec.org/t/re-guide-for-beginners-methodology-and-tools/2242) [Reverse Engineering 101 - Reverse Engineering - 0x00sec](https://0x00sec.org/t/reverse-engineering-101/1233) [[Tutorial] Reversing a multi stage binary step-by-step - Reverse Engineering - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/tutorial-reversing-a-multi-stage-binary-step-by-step/2692) [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/06_reverse_engineering.html#1) [How to Reverse Engineer Software (Windows) in a Right Way](https://www.apriorit.com/dev-blog/364-how-to-reverse-engineer-software-windows-in-a-right-way?utm_source=reddit&utm_medium=blog-march19&utm_campaign=feed) [Bootstrapping Understanding: An Introduction to Reverse Engineering](http://www.muppetlabs.com/~breadbox/txt/bure.html)
### Challenges
### Bombs
[RPI Bomb](http://www.cs.rpi.edu/academics/courses/spring10/csci4971/rev2/bomb) [Reversing and Exploiting a Nuclear Bomb ;) - Reverse Engineering - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/reversing-and-exploiting-a-nuclear-bomb/3412) [Linux Bomb Walkthrough – Part1 (Setup) – mcb101](https://mcb101.blog/2019/02/15/linux-binary-bomb-walkthrough-setup/)
### Crackme
[Crackmes.one](https://crackmes.one/) [[KEYGENME - EASY] Cracking Your First Program - Reverse Engineering / Challenges - 0x00sec](https://0x00sec.org/t/keygenme-easy-cracking-your-first-program/1075) [Malwarebytes CrackMe 2 by hasherazade](https://secrary.com/CrackMe/hasherezadeCrackme2/) [Mastermind crackme by Spider](https://secrary.com/CrackMe/mastermind_spider/) [How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs](https://blog.malwarebytes.com/malwarebytes-news/2017/11/how-to-solve-the-malwarebytes-crackme-a-step-by-step-tutorial/)
### Crypto
[The Cryptopals Crypto Challenges](http://cryptopals.com/)
### CTF Writeups/Challenges
[VIDEO: Tips, Tricks, and Clues to Escape the LabyREnth CTF](https://unit42.paloaltonetworks.com/unit42-video-tips-tricks-clues-escape-labyrenth-ctf/) [Palo Alto - LabyREnth](http://blog.labyrenth.com/community/) [[Crackme] ESET Crackme Challenge 2015 - Archived - Tuts 4 You](https://forum.tuts4you.com/topic/36862-crackme-eset-crackme-challenge-2015/) ["ESET - Malware analyst challenge"](http://www.nullsecurity.org/article/eset_malware_anlyst_challenge) [ESET CrackMe Challenge 2015 Walkthrough - UIC Academy](https://quequero.org/2016/01/eset-crackme-challenge-2015-walkthrough/) [Crack me ESET site](https://join.eset.com/en/challenges/crack-me) [SANS 2018 Holiday Hack Writeup](https://www.holidayhackchallenge.com/2018/winners/esnet_hhc18/) [SANS Penetration Testing | SANS 2015 Shmoo Challenge Winners and Official Answer | SANS Institute](https://pen-testing.sans.org/blog/2015/03/23/sans-2015-shmoo-challenge-winners-and-official-answer) [ROOTCON 2019's CTF Writeups for Web Category - InfoSec Write-ups - Medium](https://medium.com/bugbountywriteup/rootcon-2019s-ctf-writeups-for-web-category-753abe95fe15) [SAN 2015 Challenge #ShmooCon - writeup](https://evandrix.github.io/blogpost-20150205-sans-pentest@shmoocon/) [SANS 2017 Holiday Hack Writeup](https://www.holidayhackchallenge.com/2017/winners/ncsa/report.html#orgffbdca3) [2018 Flare-On Challenge Solutions « 2018 Flare-On Challenge Solutions | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/10/2018-flare-on-challenge-solutions.html) [2019 Flare-On Challenge Solutions | FireEye Inc](https://www.fireeye.com/blog/threat-research/2019/09/2019-flare-on-challenge-solutions.html) [Coding | Reversing: Flare-On Challenge 2017 Writeup](https://0xec.blogspot.com/2017/10/flare-on-challenge-2017-writeup.html) [2017 Flare-On Challenge Solutions « 2017 Flare-On Challenge Solutions | FireEye Inc](https://www.fireeye.com/blog/threat-research/2017/10/2017-flare-on-challenge-solutions.html) [Network Forensics Puzzle Contest](http://forensicscontest.com/puzzles) [Network Forensics Puzzle Contest 2014 Walkthrough – Network Forensics Puzzle Contest](http://forensicscontest.com/2014/08/14/network-forensics-puzzle-contest-2014-walkthrough#more-1221) [Network Forensics Puzzle 2014 – BytePuzzles](https://bytepuzzles.com/products/network-forensics-puzzle-2014) [DEFCON 22 Network Forensics Puzzle Contest Walkthrough : netsec](https://www.reddit.com/r/netsec/comments/2dnc8c/defcon_22_network_forensics_puzzle_contest/) [SANS Digital Forensics and Incident Response Challenge](https://digital-forensics.sans.org/community/challenges)
[Reverse Engineering & Exploitation of a “Connected Alarm Clock” – Courk's Blog](https://courk.fr/index.php/2017/09/10/reverse-engineering-exploitation-connected-clock/) [2018 B-day Reverse Engineering Challenge](http://rikaard.io/post/2018-bday-reversing/) [CSAW_2009 RE Challenge](https://github.com/s7ephen/CSAW_2009) [Flareon 5 Challenge 6 - Magic (Walk through - Reverse Engineering) - YouTube](https://www.youtube.com/watch?v=3iYlpYLTn-0) [Reverse Engineering challenges](https://challenges.re/) [pwnable.xyz](https://pwnable.xyz/challenges/) [https://www.reversinghero.com](https://www.reversinghero.com/)
### Programming/Assembly Concepts for RE
[BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)](https://medium.com/@danielabloom/bolo-reverse-engineering-part-1-basic-programming-concepts-f88b233c63b7) [BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)](https://medium.com/@danielabloom/bolo-reverse-engineering-part-2-advanced-programming-concepts-b4e292b2f3e) [Assembly Basics](https://platform.avatao.com/paths/a0dc20fc-f1b5-43c9-89fc-3a5fccfb5f0b/challenges/e63cb4dd-4777-4d2d-b81d-a822277983bc) [Getting ready for Assembly Programming – Anatomy of Intel Processor - Part 2](https://scriptdotsh.com/index.php/2018/05/13/anatomy-of-intel-processor/) [Getting ready for Assembly Language Programming – Part 1](https://scriptdotsh.com/index.php/2018/05/05/linux-asm-32bit-part-1/) [Getting started with Assembly language programming - End of theory - Part 3](https://scriptdotsh.com/index.php/2018/07/14/end-of-theory/) [Assembly Language Programming and Shellcoding - Lab setup and some important things - Part 4](https://scriptdotsh.com/index.php/2018/07/21/labsetup/) [Assembly Language Programming and Shellcoding - Hello World - Part 5](https://scriptdotsh.com/index.php/2018/07/29/hello-world/) [Assembly Language Programming and Shellcoding - Important Functions - Part 6](https://scriptdotsh.com/index.php/2018/10/12/rot1/) [Assembly Language Programming and Shellcoding – Important Functions – Part 7](https://scriptdotsh.com/index.php/2018/10/26/rot2/) [A crash course in x86 Assembly](https://x89k.tk/reverse%20engineering%20basics/2018/06/14/reb3.html) [Guide to x86 Assembly](https://www.cs.virginia.edu/~evans/cs216/guides/x86.html)
### Linux RE - 64bit
[Part 1 - Reverse Engineering Basics - Linux x64](https://scriptdotsh.com/index.php/2018/04/09/ground-zero-part-1-reverse-engineering-basics/) [Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64](https://scriptdotsh.com/index.php/2018/07/26/ground-zero-part-1-2-reverse-engineering-password-protected-reverse-shells-linux-x64/) [Part 3 - Reverse Engineering Basics - Linux on ARM64](https://scriptdotsh.com/index.php/2018/04/26/ground-zero-part-3-reverse-engineering-basics-linux-on-arm64/) [Part 3-2 - Reverse Engineering - Patching Binaries with Radare2 - ARM64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/08/13/reverse-engineering-patching-binaries-with-radare2-arm-aarch64/)
### Windows RE - 64bit
[Part 2 - Reverse Engineering Basics - Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/16/ground-zero-part-2-reverse-engineering-basics/) [Part 2-2 – Reverse Engineering – XOR encryption – Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/05/09/ground-zero-part-2-2-reverse-engineering-xor-encryption-windows-x64/) [Part 2-3 – Reverse Engineering – Building Cracked Binaries – Windows x64 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/06/09/ground-zero-part-2-3-reverse-engineering-building-cracked-binaries-windows-x64/)
### Wargames
[OverTheWire: Maze - exploitation/programming/RE Wargame](http://overthewire.org/wargames/maze/) [OverTheWire: Semtex - Exploitation and RE](http://overthewire.org/wargames/semtex/)
[Shitsco CTF Problem Walkthrough – Georgia Weidman – Medium](https://medium.com/@georgiaweidman/shitsco-ctf-problem-walkthrough-6c6ae4f57599) [Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!](http://0xeb.net/2018/02/blizzard-ctf-2017-the-lichking-reverse-engineering-challenge-walkthrough/) [Beginner RE Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/reverse_engineering.md) [[Tutorial] An example of reversing an undocumented game file format](https://www.unknowncheats.me/forum/general-programming-and-reversing/332048-example-reversing-undocumented-game-file-format.html) [Exam surveillance - the return. (ExamCookie) | vmcall](https://vmcall.github.io/reversal/2019/05/16/exam-surveillance2.html)
### Debugging
### GDB - Debugger
### Record and Replay
[GDB and Reverse Debugging](https://www.gnu.org/software/gdb/news/reversible.html) [gdb record and replay - Google Search](https://www.google.com/search?q=gdb+record+and+replay&oq=gdb+record+and+&aqs=chrome.0.0j69i57.2236j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8) [gdb server - Google Search](https://www.google.com/search?q=gdb+server&oq=gdb+server&aqs=chrome..69i57j0l5.2604j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8) [gdb - How do I use watchpoints?](http://www.unknownroad.com/rtfm/gdbtut/gdbwatch.html) [Debugging with GDB - Set Watchpoints](https://ftp.gnu.org/old-gnu/Manuals/gdb/html_node/gdb_29.html) [GDB Command Reference - Breakpoint and watchpoint management](http://visualgdb.com/gdbreference/commands/breakpoint_commands) [Debugging with GDB: Reverse Execution](https://sourceware.org/gdb/onlinedocs/gdb/Reverse-Execution.html) [reverse-continue gdb - Google Search](https://www.google.com/search?client=ubuntu&hs=69N&ei=s5v_XM3IIJC4ggfgwbCYAw&q=reverse-continue+gdb&oq=reverse+continue+gdb&gs_l=psy-ab.3.0.0i22i30.39266.47490..48623...0.0..0.114.1657.19j1......0....1..gws-wiz.......0i71j0i67j0i131j0j0i10j0i13j0i22i10i30j0i8i13i30j0i30j0i5i10i30j0i5i30j0i8i30.7XeObidt1kE)
[Beej's Quick Guide to GDB](http://beej.us/guide/bggdb/) [RMS's gdb Tutorial](http://www.unknownroad.com/rtfm/gdbtut/gdbtoc.html) [GDB and Pwntools training](https://ocw.cs.pub.ro/courses/cns/labs/lab-01) [Debugging with GDB Introduction | Azeria Labs](https://azeria-labs.com/debugging-with-gdb-introduction/) [longld/peda: PEDA - Python Exploit Development Assistance for GDB](https://github.com/longld/peda) [Using GDB to Develop Exploits - A Basic Run Through](https://www.exploit-db.com/papers/13205/) [GDB Command Reference - x command](http://visualgdb.com/gdbreference/commands/x) [GDB Basics](https://platform.avatao.com/paths/a0dc20fc-f1b5-43c9-89fc-3a5fccfb5f0b/challenges/166366b3-2e89-49ee-86a3-023663d197b7) [Quick Gdb Guide](http://condor.depaul.edu/glancast/373class/docs/gdb.html) [Debugging with GDB: Memory](https://sourceware.org/gdb/onlinedocs/gdb/Memory.html) [tools - How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? - Reverse Engineering Stack Exchange](https://reverseengineering.stackexchange.com/questions/1935/how-to-handle-stripped-binaries-with-gdb-no-source-no-symbols-and-gdb-only-sho) [cs01/gdbgui: Browser-based frontend to gdb (gnu debugger). Add breakpoints, view the stack, visualize data structures, and more in C, C++, Go, Rust, and Fortran. Run gdbgui from the terminal and a new tab will open in your browser.](https://github.com/cs01/gdbgui) [debuggers - Decent GUI for GDB - Reverse Engineering Stack Exchange](https://reverseengineering.stackexchange.com/questions/1392/decent-gui-for-gdb) [How to highlight and color gdb (and other alternatives)](https://stackoverflow.com/questions/209534/how-to-highlight-and-color-gdb-output-during-interactive-debugging/522192) [snare/voltron: A hacky debugger UI for hackers](https://github.com/snare/voltron) [PEDA Slides](http://ropshell.com/peda/Linux_Interactive_Exploit_Development_with_GDB_and_PEDA_Slides.pdf) [Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers: GEF](https://n0where.net/multi-architecture-gdb-enhanced-features-for-exploiters-reverse-engineers-gef) [GNU Debugger Tutorial](http://www.tutorialspoint.com/gnu_debugger) [Guide to Faster, Less Frustrating Debugging](http://heather.cs.ucdavis.edu/~matloff/UnixAndC/CLanguage/Debug.html) [GDB Primer](http://people.cs.pitt.edu/~mosse/gdb-note.html) [Georgia Tech - Debugging with GDB](https://sourceware.org/gdb/onlinedocs/gdb/) [Using GDB to Develop Exploits - A Basic Run Through](https://www.exploit-db.com/papers/13205) [Home - GEF - GDB Enhanced Features documentation](https://gef.readthedocs.io/en/master/) [gdb-refcard.pdf](https://www.cs.princeton.edu/courses/archive/fall16/cos432/hw2/gdb-refcard.pdf) [GDB Cheat Sheet](https://darkdust.net/files/GDB%20Cheat%20Sheet.pdf) [Art of Debugging | No Starch Press](https://nostarch.com/debugging.htm) [Stanford-GDB-Slides.pdf](http://www.scs.stanford.edu/10au-cs144/notes/section/gdb-tutorial.pdf) [CMU-GDB-Slides](http://www.cs.cmu.edu/~gilpin/tutorial/) [Debugging C/C++ Programs Remotely Using Visual Studio Code and gdbserver](https://medium.com/@spe_/debugging-c-c-programs-remotely-using-visual-studio-code-and-gdbserver-559d3434fb78) [Awesome GDB](https://blahcat.github.io/slides/ruxmon-2016-08-gef/?print-pdf#/) [Debugging with GDB - Set Breaks](https://ftp.gnu.org/old-gnu/Manuals/gdb/html_node/gdb_28.html)
### x64dbg - Debugger
[x64dbg](https://x64dbg.com/#start) [Plugins · x64dbg/x64dbg Wiki · GitHub](https://github.com/x64dbg/x64dbg/wiki/Plugins) [GitHub - x64dbg/x64dbg: An open-source x64/x32 debugger for windows.](https://github.com/x64dbg/x64dbg) [x64dbg - Tuts 4 You](https://forum.tuts4you.com/forum/139-x64dbg/) [utkonos/lst2x64dbg: Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database.](https://github.com/utkonos/lst2x64dbg)
### Windbg - Windows Debugger
[New WinDbg available in preview! – Debugging Tools for Windows](https://blogs.msdn.microsoft.com/windbg/2017/08/28/new-windbg-available-in-preview/) [Introduction to Windbg and debugging windows - YouTube](https://www.youtube.com/playlist?list=PLhx7-txsG6t6n_E2LgDGqgvJtCHPL7UFu)
### Immunity Debugger
[Immunity Debugger Downloads / Downloads - Tuts 4 You](https://tuts4you.com/download.php?list.72)
### OllyDbg - Debugger
[OllyDbg 2.0](http://www.ollydbg.de/version2.html) [OllyDbg v1.10](http://www.ollydbg.de/) [danh3707/OllyDbgV1.10-plugins-and-Hlpfile: OllyDbg v1.10 with plugins and help32 file along with windows 10 help32 fix. With a dark color scheme.](https://github.com/danh3707/OllyDbgV1.10-plugins-and-Hlpfile)
[rr: lightweight recording & deterministic debugging](https://rr-project.org/) [Debuggex: Online visual regex tester. JavaScript, Python, and PCRE.](https://www.debuggex.com/) [Introduction to Debuggers](https://www.slideshare.net/saumilshah/introduction-to-debuggers) [Debugging with PTrace](http://www.secretmango.com/jimb/Whitepapers/ptrace/ptrace.html) ### Anti-Debug Stuff
[Anti Debugging Protection Techniques With Examples](https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software)
### Tools (Disassemblers/Decompilers/Hex Editors)
### GHIDRA - Static Analysis - Disassembler/Decompiler
### Ghidra Plugins
[felberj/gotools: Plugin for Ghidra to assist reversing Golang binaries](https://github.com/felberj/gotools) [SVD-Loader for Ghidra: Simplifying bare-metal ARM reverse engineering :: Security for the embedded and connected world](https://leveldown.de/blog/svd-loader/) [Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra](https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html) [OOAnalyzer: Binary Static Analysis of Object Oriented Code](https://insights.sei.cmu.edu/sei_blog/2015/08/the-pharos-framework-binary-static-analysis-of-object-oriented-code.html)
[GitHub - NationalSecurityAgency/ghidra](https://github.com/NationalSecurityAgency/ghidra) [Ghidra](https://ghidra-sre.org/) [Ghidra](https://www.nsa.gov/resources/everyone/ghidra/) [Ghidra Cheat Sheet](https://ghidra-sre.org/CheatSheet.html) [Ghidra Installation Guide](https://ghidra-sre.org/InstallationGuide.html) [Frequently asked questions · NationalSecurityAgency/ghidra Wiki · GitHub](https://github.com/NationalSecurityAgency/ghidra/wiki/Frequently-asked-questions) [First Look at Ghidra (NSA Reverse Engineering Tool) - YouTube](https://www.youtube.com/watch?time_continue=844&v=285b_DEmvHY) [Reversing Android Bluetooth Chipsets with Ghidra - YouTube](https://www.youtube.com/watch?v=UXEfmTE-6QI) [Ghidra: A quick overview for the curious | Shortjump!](http://0xeb.net/2019/03/ghidra-a-quick-overview/) [Ghidra Plugin Development for Vulnerability Research - Part-1 — Somerset Recon](https://www.somersetrecon.com/blog/2019/ghidra-plugin-development-for-vulnerability-research-part-1) [decompiler: Decompiler Analysis Engine](https://ghidra-decompiler-docs.netlify.com/) [Ghidra RSA Presentation](https://www.youtube.com/watch?v=BxMGfcxQfwk&feature=youtu.be) [Ghidra Ninja - YouTube](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) [Using NSA's Ghidra to make a keyboard backlight match in-game graphics of SuperHexagon : programming](https://www.reddit.com/r/programming/comments/bbqg1b/using_nsas_ghidra_to_make_a_keyboard_backlight/) [INFILTRATE 2019 - Three Heads are Better Than One: Mastering Ghidra](https://vimeo.com/335158460) [Working With Ghidra's P-Code To Identify Vulnerable Function Calls - River Loop Security](https://www.riverloopsecurity.com/blog/2019/05/pcode/) [Online Courses – Ghidra](https://ghidra.re/online-courses/) [A Vagrantfile for provisioning a VM with Ghidra and X11 forwarding enabled.](https://gist.github.com/nathanqthai/668f09adbc4b10da600aeaad66b108e9) ### SLEIGH
[decompiler: SLEIGH](https://ghidra-decompiler-docs.netlify.com/sleigh.html) [SLEIGH](https://ghidra.re/courses/languages/html/sleigh.html)
### IDA Pro/HexRays - Static Analysis - Disassembler/Decompiler
[The Basics of IDA Pro - InfoSec Resources](http://resources.infosecinstitute.com/basics-of-ida-pro-2/) [Reversing Basics - A Practical Approach Using IDA Pro | www.SecurityXploded.com](http://securityxploded.com/reversing-basics-ida-pro.php) [ida pro tutorial for beginners - Google Search](https://www.google.com/webhp?sourceid=chrome-instant&rlz=1C1AVNE_enUS658US663&ion=1&espv=2&ie=UTF-8#q=ida%20pro%20tutorial%20for%20beginners) [Basic Dynamic Analysis with IDA Pro and WinDBG - YouTube](https://www.youtube.com/watch?v=_ACDiW2I4ns) [GitHub - patois/IDACyber: Data Visualization Plugin for IDA Pro](https://github.com/patois/IDACyber) [Real-world Decompilation with IDA Pro - Part 1: Introduction - YouTube](https://www.youtube.com/watch?v=vb18UVF4a_o) [Real-world Decompilation with IDA Pro - Part 2: String Handling - YouTube](https://www.youtube.com/watch?v=tVvYsFStPTc) [IDA series, part 2: debugging a .NET executable](https://qmemcpy.github.io/post/ida-series-2-debugging-net) [IDA series, part 1: the Hex-Rays decompiler](https://qmemcpy.github.io/post/ida-series-1-hex-rays) [Marco Ramilli's Blog: How to Patch Binary with IDA Pro](http://marcoramilli.blogspot.com/2011/01/how-to-patch-binary-with-ida-pro.html) [daniel_plohmann / simpliFiRE.IDAscope — Bitbucket](https://bitbucket.org/daniel_plohmann/simplifire.idascope) [GitHub - onethawt/idaplugins-list: A list of IDA Plugins](https://github.com/onethawt/idaplugins-list) [GitHub - Maktm/FLIRTDB: A community driven collection of IDA FLIRT signature files](https://github.com/Maktm/FLIRTDB) [FLARE IDA Pro Script Series: Simplifying Graphs in IDA « FLARE IDA Pro Script Series: Simplifying Graphs in IDA | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/01/simplifying-graphs-in-ida.html) [Binary Cracking & Byte Patching with IDA Pro - CodeProject](https://www.codeproject.com/Articles/833955/Binary-Cracking-Byte-Patching-with-IDA-Pro) [Free IDA Pro Reverse Code Engineering and Binary Auditing Training Material for University Lectures](http://www.binary-auditing.com/) [Using Z3 with IDA to simplify arithmetic operations in functions | Shortjump!](http://0xeb.net/2018/03/using-z3-with-ida-to-simplify-arithmetic-operations-in-functions/) [Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and ... - James Forshaw - Google Books](https://books.google.com/books?id=kLgrDwAAQBAJ&pg=PT215&lpg=PT215&dq=how+to+find+debug+symbol+file+when+reverse+engineering&source=bl&ots=PWvn1aBqJi&sig=sgBk9yoWfZOqDaScAXEBnv16IXI&hl=en&sa=X&ved=0ahUKEwiXmKm3lpfcAhVyg-AKHTRsA64Q6AEIVTAE#v=onepage&q=how%20to%20find%20debug%20symbol%20file%20when%20reverse%20engineering&f=false) [TiGa's Video Tutorial Site](http://www.woodmann.com/TiGa/idaseries.html) [RE for Beginners | Short Intro to IDA](https://www.begin.re/short-intro-to-ida) [IDA Shortcuts [PDF]](file:///home/emtuls/Downloads/IDA_Pro_Shortcuts.pdf) [IDA Pro Malware Analysis Tips - YouTube](https://www.youtube.com/watch?v=qCQRKLaz2nQ) [TiGa Tuts - IDA Pro Disassembler & Debugger - Tuts 4 You](https://tuts4you.com/download/category/67//)
### Binary Ninja - Static Analysis - Disassembler/Decompiler
[Reverse Engineering with Binary Ninja and gdb a key checking algorithm - TUMCTF 2016 Zwiebel part 1 - YouTube](https://www.youtube.com/watch?v=LOrSbtNXBtg) [GitHub - ColdHeat/liil: Linear IL view for Binary Ninja](https://github.com/ColdHeat/liil) [Binary Ninja](https://www.trailofbits.com/research-and-development/binja/) [2000 cuts with Binary Ninja | Trail of Bits Blog](https://blog.trailofbits.com/2016/06/03/2000-cuts-with-binary-ninja/) [binary ninja Defcon 2017](https://blog.trailofbits.com/2017/07/30/an-extra-bit-of-analysis-for-clemency/) [De-obfuscating Jump Chains with Binary Ninja - This is Security :: by Stormshield](https://thisissecurity.stormshield.com/2018/03/20/de-obfuscating-jump-chains-with-binary-ninja/)
### Radare2 - Static Analysis - Disassembler/Decompiler
[dukebarman/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2](https://github.com/dukebarman/awesome-radare2) [GitHub - radare/radare2: unix-like reverse engineering framework and commandline tools](https://github.com/radare/radare2) [A journey into Radare 2 – Part 2: Exploitation – Megabeets](https://www.megabeets.net/a-journey-into-radare-2-part-2/) [Scripting radare2 with python for dynamic analysis - TUMCTF 2016 Zwiebel part 2 - YouTube](https://www.youtube.com/watch?v=y69uIxU0eI8) [Radare2: An Introduction to Visual Mode - MOVEAX.ME](https://moveax.me/radare2-visual-mode/) [Reverse Engineering Using Radare2 – Jacob Pimental – Medium](https://medium.com/@jacob16682/reverse-engineering-using-radare2-588775ea38d5) [Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium](https://medium.com/@jacob16682/reverse-engineering-with-radare2-part-2-83b71df7ffe4) [Crackme0x04 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x04/) [Crackme0x03 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x03/) [Crackme0x05 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x05/) [Crackme0x06 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x06/) [Crackme0x07 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x07/) [Crackme0x08 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x08/) [Debugging Using Radare2… and Windows! – Jacob Pimental – Medium](https://medium.com/@jacob16682/debugging-using-radare2-and-windows-5e58677bf943) [Crackme0x09 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x09/) [Reversing a Self-Modifying Binary with radare2 – Megabeets](https://www.megabeets.net/reversing-a-self-modifying-binary-with-radare2/) [Reverse engineering a Gameboy ROM with radare2 – Megabeets](https://www.megabeets.net/reverse-engineering-a-gameboy-rom-with-radare2/) [BombLab Dissected with Radare2 - MOVEAX.ME](https://moveax.me/bomblab/) [Dr Von Noizeman's Nuclear Bomb defused with Radare2 - MOVEAX.ME](https://moveax.me/dr-von-noizemans-binary-bomb/) [Crackme0x01 Dissected with Radare2 - MOVEAX.ME](https://moveax.me/crackme0x01/) [Conditions and loops – Max Kersten](https://maxkersten.nl/binary-analysis-course/assembly-basics/conditions-and-loops/) [radare2 python scripting - r2wiki](https://r2wiki.readthedocs.io/en/latest/home/radare2-python-scripting/) [radare2-extras/r2snowman at master · radare/radare2-extras](https://github.com/radare/radare2-extras/tree/master/r2snowman) [radareorg/radeco: radare decompiler tool based on radeco-lib](https://github.com/radareorg/radeco) [radareorg/cutter: A Qt and C++ GUI for radare2 reverse engineering framework](https://github.com/radareorg/cutter) [A journey into Radare 2 – Part 1: Simple crackme – Megabeets](https://www.megabeets.net/a-journey-into-radare-2-part-1/)
### Hopper - Linux and MacOS Disassembler/Decompiler
[Hopper - Linux and MacOS Disassembler](https://www.hopperapp.com/)
### Hex Editors
[010 Editor - Professional Text/Hex Editor with Binary Templates](https://www.sweetscape.com/010editor/) [List of Hex Editors](https://github.com/wtsxDev/reverse-engineering#hex-editors)
### Angr - static and dynamic symbolic ("concolic") binary analysis
[angr · GitHub](https://github.com/angr) [angr, a binary analysis framework](http://angr.io/)
### dnSpy (RE tool for .NET)
[dnSpy: .NET decompiler, debugger and assembly editor](https://github.com/0xd4d/dnSpy)
[Compiler Explorer - Programming Language to Assembler Converter](http://godbolt.org/) [x86 Disassembly/Disassemblers and Decompilers - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Disassembly/Disassemblers_and_Decompilers) [Veles - Visual Binary Analysis Tool](https://codisec.com/veles/) [Massive List Of Reverse-Engineering Tools](http://wiki.yobi.be/wiki/Reverse-Engineering) [Programming Z3](https://theory.stanford.edu/~nikolaj/programmingz3.html)
### Assembly Language Stuff
### Intel x86/64
### Open Security Training
[Open Security Training - Intro to X86](http://www.opensecuritytraining.info/IntroX86.html) [Open Security Training - Intro to X86-64](http://opensecuritytraining.info/IntroX86-64.html) [Open Security Training - Intermediate X86](http://opensecuritytraining.info/IntermediateX86.html)
[WORTH READING - x86 Disassembly.pdf](https://www.csee.umbc.edu/courses/undergraduate/CMSC491malware/x86%20Disassembly.pdf) [x86 Assembly - YouTube - YouTube](https://www.youtube.com/playlist?list=PLan2CeTAw3pFOq5qc9urw8w7R-kvAT8Yb) [Breaking the x86 Instruction Set - YouTube](https://www.youtube.com/watch?v=KrksBdWcZgQ) [A Crash Course in x86 Assembly for Reverse Engineers](https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf) [PC Assembly Language Book](http://pacman128.github.io/static/pcasm-book.pdf) [gcc x86 Assembly](https://www.cs.uaf.edu/2005/fall/cs301/support/x86/index.html) [x86 Assembly - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Assembly) [x86 Disassembly - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/X86_Disassembly) [Assembly x86 Emulator](https://carlosrafaelgn.com.br/asm86/) [xorpd | xchg rax,rax](https://www.xorpd.net/pages/xchg_rax/snip_00.html) [jasmin download | SourceForge.net](https://sourceforge.net/projects/tum-jasmin/) [Assembly Language Step-by-Step Third Edition: Jeff Duntemann: 8601400126363: Amazon.com: Books](https://www.amazon.com/gp/product/0470497025/) [Recommended - PC Assembly Book](http://pacman128.github.io/pcasm/) [Assembly Language for x86 Processors (7th Edition): 9780133769401: Computer Science Books @ Amazon.com](https://www.amazon.com/Assembly-Language-x86-Processors-7th/dp/0133769402) [gurugio/book_assembly_8086](https://github.com/gurugio/book_assembly_8086)
### ARM
[Writing ARM Assembly (Part 1) | Azeria Labs](https://azeria-labs.com/writing-arm-assembly-part-1/) [ARM 32-Bit Assembly Basics Cheat Sheet (18" x 24")](https://gumroad.com/l/arm-assembly-cheat-sheet) [Azeria Arm Exploit Lab Guide](https://azeria-labs.com/downloads/Lab-Workbook-v1.0-public.pdf) [Azeria Arm Exploit Slides](https://azeria-labs.com/downloads/Slides-SAS_final.pdf) [Online Arm Assembler by Azeria Labs](https://azm.azerialabs.com/)
### MIPS
[Ring Ø Labs: The Wonderful World of MIPS](https://www.ringzerolabs.com/2018/03/the-wonderful-world-of-mips.html)
[When and how to use an assembler. Assembly programming basics.](https://www.pelock.com/articles/when-and-how-to-use-an-assembler-assembly-programming-basics) [Assembly Programming Exercises](https://github.com/blankwall/asm_prog_ex) [Intro Assembly Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/assembly.md)
### Calling Conventions
### Good Resources
[Stack frame layout on x86-64 - Eli Bendersky's website](https://eli.thegreenplace.net/2011/09/06/stack-frame-layout-on-x86-64)
[WORTH READING - x86 Disassembly.pdf](https://www.csee.umbc.edu/courses/undergraduate/CMSC491malware/x86%20Disassembly.pdf) [C Function Call Conventions, UMBC CMSC 313, Spring 2002](https://www.csee.umbc.edu/~chang/cs313.s02/stack.shtml) [Calling Conventions](https://msdn.microsoft.com/en-us/library/k2b2ssfy.aspx) [x86 In-Depth: CDECL Calling Convention Complete Tutorial - BONUS video - YouTube](https://www.youtube.com/watch?v=im09tdVnYwQ) [What are the calling conventions for UNIX & Linux system calls on i386 and x86-64 - Stack Overflow](https://stackoverflow.com/questions/2535989/what-are-the-calling-conventions-for-unix-linux-system-calls-on-i386-and-x86-6/2538212#2538212) [How Functions Work](https://www.slideshare.net/saumilshah/how-functions-work-7776073) [Calling conventions for different C++ compilers and OS](https://www.agner.org/optimize/calling_conventions.pdf)
### File Format/Protocol Stuff
### File Formats
[Executable and Linkable Format 101\. Part 2: Symbols - Intezer](http://www.intezer.com/executable-linkable-format-101-part-2-symbols/) [Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer](http://www.intezer.com/executable-linkable-format-101-part1-sections-segments/) [Introduction to the ELF Format : The ELF Header (Part I)](https://blog.k3170makan.com/2018/09/introduction-to-elf-format-elf-header.html) [The 101 of ELF files on Linux: Understanding and Analysis - Linux Audit](https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/) ### ELF Stuff
[ELF Walkthrough](https://i.stack.imgur.com/xkGtg.jpg) [r0hi7/BinExp: Linux Binary Exploitation](https://github.com/r0hi7/BinExp) [GitHub - 0xM3R/cgPwn: A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks](https://github.com/0xM3R/cgPwn) [BinExp/README.md at master · r0hi7/BinExp](https://github.com/r0hi7/BinExp/blob/master/Lecture1/README.md) [BinExp/README.md at master · r0hi7/BinExp](https://github.com/r0hi7/BinExp/blob/master/Lecture2/README.md) [Anatomy of a Program in Memory | Many But Finite](https://manybutfinite.com/post/anatomy-of-a-program-in-memory/) [linux - How does ELF file format defines the stack? - Stack Overflow](https://stackoverflow.com/questions/18278803/how-does-elf-file-format-defines-the-stack)
[ELF Tools](http://wiki.yobi.be/wiki/Reverse-Engineering#ELF) [Network Protocols – Programmer's Compendium](https://www.destroyallsoftware.com/compendium/network-protocols?share_key=97d3ba4c24d21147) [Sector 876: Backdooring PE Files - Part 1](http://sector876.blogspot.com/2013/03/backdooring-pe-files-part-1.html)
### Data Structures
[Automatic Reverse Engineering of Data Structures from Binary Execution [PDF]](https://www.isoc.org/isoc/conferences/ndss/10/pdf/23.pdf) [Digging For Data Structures [PDF]](http://ben.ransford.org/srg/papers/cozzie--digging.pdf) [TIE: Principled Reverse Engineering of Types in Binary Programs [PDF]](https://reverse.put.as/wp-content/uploads/2011/06/D1T2-Mark-Dowd-Tarjei-Mandt-iOS6-Security.pdf) [MemPick: High-Level Data Structure Detection in C/C++ Binaries [PDF]](http://www.cs.vu.nl/~herbertb/papers/mempick_wcre13.pdf) [Howard: a dynamic excavator for reverse engineering data structures [PDF]](http://www.isoc.org/isoc/conferences/ndss/11/pdf/5_1.pdf)
### Windows Stuff
[Windows API Index (Windows)](https://msdn.microsoft.com/en-us/library/windows/desktop/ff818516(v=vs.85).aspx) [.NET Reverse Enginering - Part 1 – CodePool – Programming and a bit more](http://codepool.me/NET-Reverse-Enginering-Part-1/) [Getting Started with Windows Debugging - Windows 10 hardware dev](https://msdn.microsoft.com/en-us/library/mt219729.aspx) [WinDbg](http://www.windbg.org/) [Debug Universal Drivers - Step by Step Lab (Echo Kernel-Mode) - Windows 10 hardware dev](https://msdn.microsoft.com/en-us/library/mt269367.aspx) [Exploring Windows virtual memory management](http://www.triplefault.io/2017/08/exploring-windows-virtual-memory.html) [An In-Depth Look into the Win32 Portable Executable File Format - Part 1 - DelphiBasics](http://www.delphibasics.info/home/delphibasicsarticles/anin-depthlookintothewin32portableexecutablefileformat-part1) [An In-Depth Look into the Win32 Portable Executable File Format - Part 2 - DelphiBasics](http://www.delphibasics.info/home/delphibasicsarticles/anin-depthlookintothewin32portableexecutablefileformat-part2) [Visual Studio Documentation | Microsoft Docs](https://docs.microsoft.com/en-us/visualstudio/) [An Introduction to Windows Kernel Debugging | Endgame](https://www.endgame.com/blog/technical-blog/introduction-windows-kernel-debugging) [ReactOS (open source Windows remake)](https://doxygen.reactos.org/) [Vergilius Project | Home](https://www.vergiliusproject.com/) [Terminus Project](http://terminus.rewolf.pl/terminus/) [CVE-2019-8372: Local Privilege Elevation in LG Kernel Driver - @Jackson_T](http://jackson-t.ca/lg-driver-lpe.html)
### Linux OS Stuff
[Searchable Linux Syscall Table for x86 and x86_64 | PyTux](https://filippo.io/linux-syscall-table/)
### Mobile Phones
### iOS
[ivRodriguezCA/RE-iOS-Apps: A completely free, open source and online course about Reverse Engineering iOS Applications.](https://github.com/ivRodriguezCA/RE-iOS-Apps) [Apple/MacOS/iOS Tools](https://github.com/gdbinit)
### Malware Analysis
### VM's and Environments for Malware Analysis
### Apple (MacOS)
[How to Install macOS High Sierra 10.13.6 on VirtualBox on Windows - Techsviewer](https://techsviewer.com/install-macos-high-sierra-virtualbox-windows/)
[Malware Unicorn Environment VM's](https://securedorg.github.io/RE101/section1/) [SIFT Workstation Download](https://digital-forensics.sans.org/community/downloads) [Creating a Simple Free Malware Analysis Environment - MalwareTech](https://www.malwaretech.com/2017/11/creating-a-simple-free-malware-analysis-environment.html) [Creating the Ultimate Tor Virtual Network - MalwareTech](https://www.malwaretech.com/2015/08/creating-ultimate-tor-virtual-network.html) [Malware Sample Sources for Researchers](https://zeltser.com/malware-sample-sources/) [Official Documentation — Viper 2.0-dev documentation](https://viper.li/en/latest/) [phoenix: Cuckoo Sandbox is an automated dynamic malware analysis system](https://github.com/SparkITSolutions/phoenix) [Cuckoo Sandbox - Automated Malware Analysis](https://cuckoosandbox.org/)
### Intro Courses for Malware Analysis
[RPISEC - Malware Analysis 2013](http://security.cs.rpi.edu/courses/malware-spring2013/) [RPISEC - Malware Analysis 2015](https://github.com/RPISEC/Malware) [Malware Unicorn 101](https://securedorg.github.io/RE101/) [Malware Unicorn 102](https://securedorg.github.io/RE102/) [Intro to RE/Malware Analysis](https://www.youtube.com/watch?feature=youtu.be&v=-Ml04jPMH3U&app=desktop) [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/08_creepy_crawlies.html#1) [Open Security Training - Reverse Engineering Malware](http://opensecuritytraining.info/ReverseEngineeringMalware.html) [How to start RE/malware analysis? | hasherezade's 1001 nights](https://hshrzd.wordpress.com/how-to-start/) [Intro to Malware Analysis](http://www.thefengs.com/wuchang/courses/cs492/) [CNIT 126: Practical Malware Analysis -- Sam Bowne](https://samsclass.info/126/126_S17.shtml) [MalwareDynamicAnalysis](http://opensecuritytraining.info/MalwareDynamicAnalysis.html) [malwareunicorn.org](https://malwareunicorn.org/#/workshops) [UMBC CMSC 491/691 Malware Analysis](https://www.csee.umbc.edu/courses/undergraduate/CMSC491malware/) [Condensed Crash Course on Malware Analysis Notes](https://www.csee.umbc.edu/courses/undergraduate/CMSC491malware/cikm2017.html) [The Beginner Malware Analysis Course + VirusBay Access](https://0verfl0w.podia.com/beginner-analysis-course-vb-access)
### Tools for Malware Analysis
[Free Automated Malware Analysis Service - powered by Falcon Sandbox](https://www.hybrid-analysis.com/) [REMnux: A free Linux Toolkit for Reverse-Engineering and Analyzing Malware](https://remnux.org/) [ProcDump - Windows Sysinternals | Microsoft Docs](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) [Overview - Process Hacker](https://processhacker.sourceforge.io/) [PE Tools](http://wiki.yobi.be/wiki/Reverse-Engineering#PE) [Dependency Walker (depends.exe) Home Page](http://www.dependencywalker.com/) [PEview](http://wjradburn.com/software/) [Resource Hacker](http://www.angusj.com/resourcehacker/) [Automated Malware Analysis - Joe Sandbox Cloud Basic](https://www.joesandbox.com/) [GitHub - TheHive-Project/Cortex: Cortex: a Powerful Observable Analysis and Active Response Engine](https://github.com/TheHive-Project/Cortex)
### Books
[Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software](https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901) [Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code](https://www.amazon.com/gp/product/0470613033/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0470613033&linkId=9d2a92127a925e343dca0bc51da20c62)
### Videos to learn from
[Malware Analysis - A Way to Learn Anti-Reversing Tricks - YouTube](https://www.youtube.com/watch?v=cbgZPCjYqcc) [Malware Theory - Basic Structure of PE Files - YouTube](https://www.youtube.com/watch?v=l6GjU8fm8sM&feature=youtu.be) [An Introduction to Dumping Malware with Process Dump - YouTube](https://www.youtube.com/watch?v=dCU7N-Oh3jg) [Colin Hardy - Lots of Malware Analysis Stuff](https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg) [IDA Pro Tutorial - Reverse Engineering Dynamic Malware Imports - YouTube](https://www.youtube.com/watch?v=hM2Zvsak3GM) [Structs and Stuff | Reverse Engineering C++ Malware With IDA Pro - YouTube](https://www.youtube.com/watch?v=o-FFGIloxvE)
### Challenges
[Beginner Malware Reversing Challenges - MalwareTech](https://www.malwaretech.com/beginner-malware-reversing-challenges)
### Encryption in Malware
[Encryption 101: a malware analyst's primer - Malwarebytes Labs | Malwarebytes Labs](https://blog.malwarebytes.com/threat-analysis/2018/02/encryption-101-malware-analysts-primer/)
### Cheatsheets and Tips
[SANS Malware Tips](https://digital-forensics.sans.org/media/SANS_Poster_2018_Hunt_Evil_FINAL.pdf) [malwaretech Cheatsheet.rtf](http://www.malwaretech.com/Cheatsheet.rtf) [GitHub - corkami/docs: documentations, slides decks...](https://github.com/corkami/docs) [corkami/pics · GitHub](https://github.com/corkami/pics/blob/master/binary/README.md) [PE102 | corkami/pics](https://github.com/corkami/pics/tree/master/binary/pe102) [Dr. Fu's Blog: Malware Analysis Tutorial 8: PE Header and Export Table](http://fumalwareanalysis.blogspot.com/2011/12/malware-analysis-tutorial-8-pe-header.html)
### MalwareTech
[MalwareTech - Guides to Reversing Malware](https://www.malwaretech.com/tag/malware) [MalwareTechBlog - Beginner Reverse Engineering - Twitch](https://www.twitch.tv/videos/325654484)
### Malware Samples
[Where can I, as an individual, get malware samples to analyze? - Reverse Engineering Stack Exchange](https://reverseengineering.stackexchange.com/questions/206/where-can-i-as-an-individual-get-malware-samples-to-analyze) [ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.](https://github.com/ytisf/theZoo) [VirusShare.com](https://virusshare.com/) [InQuest/malware-samples: A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net](https://github.com/InQuest/malware-samples)
### Indicators Of Compromise Searching
[Malware Domain List](http://www.malwaredomainlist.com/mdl.php) [Malware-Traffic-Analysis.net](http://www.malware-traffic-analysis.net/index.html) [AutoFocus Intelligence Summary](https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/threat-prevention/learn-more-about-and-assess-threats/assess-firewall-artifacts-with-autofocus/autofocus-intelligence-summary)
[A curated list of malware analysis tools and resources.](https://github.com/rshipp/awesome-malware-analysis#readme) [Open ADB Ports Being Exploited to Spread Possible Satori Variant in Android Devices - TrendLabs Security Intelligence Blog](https://blog.trendmicro.com/trendlabs-security-intelligence/open-adb-ports-being-exploited-to-spread-possible-satori-variant-in-android-devices/) [Stuxnet Decompiled](https://www.virustotal.com/en/file/743e16b3ef4d39fc11c5e8ec890dcd29f034a6eca51be4f7fca6e23e60dbd7a1/analysis/1279281358/) [Interactive Online Malware Analysis Sandbox - ANY.RUN](https://app.any.run/) [ANY.RUN - Interactive Online Malware Sandbox](https://any.run/) ### Anti-Debugging Techniques
### Windows
[Anti-debugging Techniques Cheat Sheet - 0xAA - Random notes on security](http://antukh.com/blog/2015/01/19/malware-techniques-cheat-sheet/) [Windows Anti-Debug Reference | Symantec Connect Community](https://www.symantec.com/connect/articles/windows-anti-debug-reference)
[Macro Malware Analysis](https://spreadsecurity.github.io/2016/08/14/macro-malware-analysis.html) [rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources.](https://github.com/rshipp/awesome-malware-analysis)
### Software Cracking
[CrackWatch](https://www.reddit.com/r/CrackWatch/) [Daily Releases (February 14, 2018) : CrackWatch](https://www.reddit.com/r/CrackWatch/comments/7xmnf1/daily_releases_february_14_2018/) [CS.RIN.RU - Steam Underground Community • Index page](https://cs.rin.ru/forum/) [[Crack Watch] Beginners Guide to Crack Watch : CrackWatch](https://www.reddit.com/r/CrackWatch/comments/7gyt85/crack_watch_beginners_guide_to_crack_watch/) [How the Dreamcast copy protection was defeated](http://fabiensanglard.net/dreamcast_hacking/)
### Game Hacking
### PwnAdventure
[PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks - KitPloit - PenTest Tools for your Security Arsenal ☣](https://www.kitploit.com/2018/06/pwnadventure3-game-open-world-mmorpg.html?m=1) [PwnAdventure3/re-mmorpg-troopers18.pdf at master · beaujeant/PwnAdventure3 · GitHub](https://github.com/beaujeant/PwnAdventure3/blob/master/Workshop/re-mmorpg-troopers18.pdf) [You Have to Hack This Massively Multiplayer Game to Beat It | WIRED](https://www.wired.com/2015/04/multiplayer-hack-to-win/) [GitHub - Vector35/PwnAdventureZ: NES zombie survival game made to be hacked](https://github.com/Vector35/PwnAdventureZ) [Pwn Adventure 3: Pwnie Island](http://www.pwnadventure.com/)
[Intro to Game Hacking](https://drewkestell.us/) [Getting Started With Game Hacking: The Definitive Guide (Part 1)](https://www.unknowncheats.me/forum/programming-beginners/50841-getting-started-game-hacking-definitive-guide-part-1-a.html) [[Tutorial] Getting Started With Programming And Gamehacking](https://www.unknowncheats.me/forum/c-and-c/112372-getting-started-programming-and-gamehacking.html) [[Tutorial] Make your own dll hack | [1] | Memory patching & Editing](https://www.unknowncheats.me/forum/programming-beginners/118141-make-your-own-dll-hack-1-memory-patching-and-editing.html) [[Tutorial] CodeCave with OllyDbg](https://www.unknowncheats.me/forum/general-programming-and-reversing/72327-codecave-ollydbg.html) [[Information] Useful C++/Gamehacking/Programming for beginners threads - Mega thread](https://www.unknowncheats.me/forum/programming-beginners/115037-useful-c-gamehacking-programming-beginners-threads-mega-thread.html) [Game Hacking: WinXP Minesweeper - Reverse Engineering - 0x00sec](https://0x00sec.org/t/game-hacking-winxp-minesweeper/1266) [Finding and exploiting hidden features of Animal Crossing’s NES emulator | jamchamb.github.io](https://jamchamb.github.io/2018/07/11/animal-crossing-nes-emulator-hacks.html) [/r/REGames](https://www.reddit.com/r/REGames/) [Guided Hacking - YouTube](https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw) [stephen chapman - YouTube](https://www.youtube.com/results?search_query=stephen+chapman)
### Crypto
[Basics of Cryptography Part I: RSA Encryption and Decryption](https://sahandsaba.com/cryptography-rsa-part-1.html) [jcryptool/doc: JCrypTool Documentation and Resources](https://github.com/jcryptool/doc) [Base64 Decode and Encode - Online](https://www.base64decode.org/) [The Black Chamber - Chamber Guide](http://www.simonsingh.net/The_Black_Chamber/chamberguide.html) [PyCrypto API Documentation](https://www.dlitz.net/software/pycrypto/api/2.6/)
[Statically Rewriting x86 Binaries Without Heuristics (Paper and GitHub Sources) - ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/8ivhcd/statically_rewriting_x86_binaries_without/) [Rewriting Functions in Compiled Binaries | Trail of Bits Blog](https://blog.trailofbits.com/2019/09/02/rewriting-functions-in-compiled-binaries/) [GitHub - trailofbits/mcsema: Framework for lifting x86, amd64, and aarch64 program binaries to LLVM bitcode](https://github.com/trailofbits/mcsema) [GitHub - trailofbits/fennec: Rewriting functions in compiled binaries](https://github.com/trailofbits/fennec)
### Comp Eng/Hardware/Embedded Systems Hacking
### Books and Research Papers
[Hacking the Xbox: An Introduction to Reverse Engineering](https://www.amazon.com/gp/product/1593270291/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1593270291&linkId=581cb9fe9dee40110a1a283a5d240cbf) [PCB-RE: Tools & Techniques: Mr Keng Tiong Ng: 9781979331388: Amazon.com: Books](https://www.amazon.com/PCB-RE-Techniques-Mr-Keng-Tiong/dp/1979331383) [Software-based Microarchitectural Attacks](https://arxiv.org/ftp/arxiv/papers/1706/1706.05973.pdf) [Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges](https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html) [Precursor to Rowhammer.pdf](http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf)
### Courses
[Hardware Security | Coursera](https://www.coursera.org/learn/hardware-security) [RPI - Hardware Reverse Engineering](http://security.cs.rpi.edu/courses/hwre-spring2014/) [nand2tetris](https://www.nand2tetris.org/) [Simple CPU v1](http://www.simplecpudesign.com/simple_cpu_v1/index.html) [GT - Embedded Systems](https://www.udacity.com/course/embedded-systems--ud169) [Hacking USB on the Cheap with USB-Tools](https://mini.usbc.tf/)
### Computer Engineering Stuff
[Build an 8-bit computer | Ben Eater](https://eater.net/8bit) [8-bit computer update - YouTube](https://www.youtube.com/watch?v=HyznrdDSSGM&list=PLowKtXNTBypGqImE405J2565dvjafglHU) [Learning FPGA And Verilog A Beginner’s Guide Part 1 – Introduction | Numato Lab Help Center](https://numato.com/kb/learning-fpga-verilog-beginners-guide-part-1-introduction/) [Mojo V3 | Alchitry](https://alchitry.com/collections/all/products/mojo-v3) [Verilog | Alchitry](https://alchitry.com/pages/verilog) [Game for Hardware Design - Robot Odyssey Rewired](https://www.robotodyssey.online/) [Icarus Verilog](http://iverilog.icarus.com/) [GTKWave](http://gtkwave.sourceforge.net/) [Reddit comment about FPGA](https://www.reddit.com/r/programming/comments/actvsu/game_in_which_you_develop_your_own_cpu/edb3fd0/) [What Every Programmer Should Know About Memory](https://akkadia.org/drepper/cpumemory.pdf)
### Videos to learn from
[Introduction to Firmware Reversing - YouTube](https://m.youtube.com/watch?feature=youtu.be&v=GIU4yJn2-2A) [34C3 - Reverse engineering FPGAs - YouTube](https://www.youtube.com/watch?v=Y1Wwa8csFjk) [Reverse engineering a simple CMOS chip - YouTube](https://www.youtube.com/watch?v=FMdYuGpPicw) [Hackaday Supercon - Ken Shirriff : Studying Silicon: Reverse Engineering Integrated Circuits - YouTube](https://www.youtube.com/watch?v=TKi1xX7KKOI) [Hardware Hacking on Vimeo](https://vimeo.com/album/1632121) [How safe is a Wifi Cloud Hub Router (from hackers)? - YouTube](https://www.youtube.com/watch?v=FxE2ITDWsNE) [Secrets of the Nintendo CIC Chip - Early Cartridge Anti-Piracy | MVG - YouTube](https://www.youtube.com/watch?v=x8PYE8A-WEw&t=433)
### Tools to Use
[The IoT Hacker's Toolkit · System Overlord](https://systemoverlord.com/2018/04/16/the-iot-hackers-toolkit.html) [Analog Discovery 2 - National Instruments](http://www.ni.com/en-us/shop/select/analog-discovery-2?skuId=162509) [Syonyk's Project Blog: DSO138 Scope, Acrylic Housing Assembly, and USB Power](https://syonyk.blogspot.com/2016/11/dso138-scope-acrylic-housing-assembly.html) [RFID Thief v2.0 - scund00r](https://scund00r.com/all/rfid/tutorial/2018/07/12/rfid-theif-v2.html) [newaetech/chipwhisperer: ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks](https://github.com/newaetech/chipwhisperer) [ChipWhisperer® – NewAE Technology Inc.](https://newae.com/tools/chipwhisperer/) [X-Ray Tool](https://recon.cx/2017/montreal/resources/slides/RECON-MTL-2017-Cant-hide.pdf) [dediprog - chip dumping](https://www.google.com/search?q=dediprog) [Beagle USB 12 Protocol Analyzer - Total Phase](https://www.totalphase.com/products/beagle-usb12/) [BeagleBoard.org - black](https://beagleboard.org/black)
### JTAG
[JTAG Explained (finally!): Why "IoT" Makers, Software Security Folks, and Device Manufacturers Should Care - Senrio](http://blog.senr.io/blog/jtag-explained)
### Lifting and Reversing Firmware
[Reverse Engineering Firmware: Linksys WAG120N – /dev/ttyS0](http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/) [5-Min Tutorial: Lifting Firmware with the Bus Pirate – B-sides](http://konukoii.com/blog/2018/02/13/lifting-firmware-with-the-bus-pirate/) [postmarketOS Low-Level: Tiny Steps Towards Liberating Bootloaders and Cellular Modem Firmware of MediaTek Phones](https://postmarketos.org/blog/2018/04/14/lowlevel/) [Hacking Microcontroller Firmware through a USB | Securelist](https://securelist.com/hacking-microcontroller-firmware-through-a-usb/89919/89919/) [Breaking Bits](https://breaking-bits.gitbook.io/breaking-bits/vulnerability-discovery/reverse-engineering/modern-approaches-toward-embedded-research) [https://media.defcon.org/DEF CON 27/DEF CON 27 presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf](https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Christopher-Roberts-Firmware-Slap.pdf) [GitHub - praetorian-code/DVRF: The Damn Vulnerable Router Firmware Project](https://github.com/praetorian-code/DVRF) [Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1](https://www.praetorian.com/blog/getting-started-with-damn-vulnerable-router-firmware-dvrf-v01) [GitHub - firmadyne/firmadyne: Platform for emulation and dynamic analysis of Linux-based firmware](https://github.com/firmadyne/firmadyne) [GitHub - hugsy/gdb-static: Public repository of static GDB and GDBServer](https://github.com/hugsy/gdb-static) [gdbserver remote debugging - Google Search](https://www.google.com/search?q=gdbserver+remote+debugging&oq=remote+debug+gdb+server&aqs=chrome.1.69i57j0.9404j0j4&client=ubuntu&sourceid=chrome&ie=UTF-8) [gdb - Cross debugging for ARM / MIPS ELF with QEMU/toolchain - Reverse Engineering Stack Exchange](https://reverseengineering.stackexchange.com/questions/8829/cross-debugging-for-arm-mips-elf-with-qemu-toolchain)
### Reversing Integrated Circuits
[ULN2003 - practical example of «reading» microchip schematic : ZeptoBars](http://zeptobars.com/en/read/ULN2003-per-element-die-annotation) [How to crack open some computer chips and take your own die shots - ExtremeTech](http://www.extremetech.com/extreme/141077-how-to-crack-open-some-computer-chips-and-take-your-own-die-shots) [Universal asynchronous receiver-transmitter - Wikipedia](https://en.wikipedia.org/wiki/Universal_asynchronous_receiver-transmitter)
### Video Game Console Reversing
[fail0verflow :: ShofEL2, a Tegra X1 and Nintendo Switch exploit](https://fail0verflow.com/blog/2018/shofel2/) [fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia](https://fail0verflow.com/blog/2018/ps4-aeolia/) [fail0verflow :: PS4 Aux Hax 2: Syscon](https://fail0verflow.com/blog/2018/ps4-syscon/) [fail0verflow :: PS4 Aux Hax 3: Dualshock4](https://fail0verflow.com/blog/2018/ps4-ds4/) [Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP](https://cturt.github.io/ps4.html) [Making a GameCube memory card editor with Raspberry Pi | jamchamb.github.io](https://jamchamb.github.io/2018/12/03/gamecube-memory-card-raspi.html) [The weird and wonderful CIC](https://hackmii.com/2010/01/the-weird-and-wonderful-cic/)
### Reversing IoT Devices
[Embedded Hardware Hacking 101 – The Belkin WeMo Link « Threat Research Blog | FireEye Inc](https://www.fireeye.com/blog/threat-research/2016/08/embedded_hardwareha.html) [Reverse Engineering My Home Security System: Decompiling Firmware Updates](https://markclayton.github.io/reverse-engineering-my-home-security-system-decompiling-firmware-updates.html) [Practical Reverse Engineering Part 1 - Hunting for Debug Ports · Hack The World](http://jcjc-dev.com/2016/04/08/reversing-huawei-router-1-find-uart/) [Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc](https://www.fireeye.com/blog/threat-research/2018/05/rooting-logitech-harmony-hub-improving-iot-security.html) [Heart of Darkness - exploring the uncharted backwaters of HID iCLASS RFID reader security](https://www.openpcd.org/dl/HID-iCLASS-security.pdf) [Bus Pirate - DP](http://dangerousprototypes.com/docs/Bus_Pirate)
### Reversing Protocols
[Syonyk's Project Blog: Reverse Engineering the TEC-06 Serial Protocol](https://syonyk.blogspot.com/2018/01/reverse-engineering-tec-06-serial.html)
[Hackaday | Fresh hacks every day](http://hackaday.com/) [Hardware Hacking for Software People | Don't Stuff Beans Up Your Nose](https://dontstuffbeansupyournose.com/2011/08/25/hardware-hacking-for-software-people/) [Methodologies For Hacking Embedded Security Appliances](https://media.blackhat.com/us-13/US-13-Bathurst-Methodologies-for-Hacking-Embdded-Security-Appliances-Slides.pdf) [bunnie's burrow](http://www.xenatera.com/bunnie/) [bunnie's blog](https://www.bunniestudios.com/) [Changing your MAC address in Windows - inc0x0](https://inc0x0.com/2019/01/changing-mac-address-windows/) [O.MG Cable](http://mg.lol/blog/omg-cable/) [Solder Skills Challenge - SMD Challenge from MakersBox on Tindie](https://www.tindie.com/products/MakersBox/smd-challenge/) [uart protocol - Google Search](https://www.google.com/search?q=uart+protocol&oq=uart+&aqs=chrome.2.69i57j69i65j0l4.3243j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8) [i2c protocol - Google Search](https://www.google.com/search?q=i2c+protocol&oq=i2c+pr&aqs=chrome.0.0j69i57j0l4.1898j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8) [GPIO - Google Search](https://www.google.com/search?q=GPIO&oq=GPIO&aqs=chrome..69i57&client=ubuntu&sourceid=chrome&ie=UTF-8) [Application-Specific Integrated Circuits (ASICs) - Google Search](https://www.google.com/search?q=Application-Specific+Integrated+Circuits+(ASICs)&oq=Application-Specific+Integrated+Circuits+(ASICs)&aqs=chrome..69i57&client=ubuntu&sourceid=chrome&ie=UTF-8) [Field Programmable Gate Arrays (FPGAs) - Google Search](https://www.google.com/search?q=Field+Programmable+Gate+Arrays+(FPGAs)&oq=Field+Programmable+Gate+Arrays+(FPGAs)&aqs=chrome..69i57&client=ubuntu&sourceid=chrome&ie=UTF-8) [Oscilloscope Graphics Editor](http://bummsn.de/osc_txt/) [Hack Correlation](https://hackcorrelation.blogspot.com/) [Cheap IoT Hacking? | SOHOpelesslyBroken](https://www.sohopelesslybroken.com/) [NAND Flash Data Recovery Cookbook](http://adreca.net/NAND-Flash-Data-Recovery-Cookbook.pdf)
### Vulnerability Research and Exploitation
### Good Courses/Challenges/Learning/Books
### Sites/Blog Posts To Learn From
[Project Zero](https://googleprojectzero.blogspot.com/) [Latest hacking topics - 0x00sec](https://0x00sec.org/tags/hacking) [Zero Day Initiative — VMware Exploitation through Uninitialized Buffers](https://www.zerodayinitiative.com/blog/2018/3/1/vmware-exploitation-through-uninitialized-buffers) [In-Memory-Only ELF Execution (Without tmpfs) Mrs Quis Will Think of a Better Title](https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html) [High-Level Approaches for Finding Vulnerabilities - @Jackson_T](http://jackson.thuraisamy.me/finding-vulnerabilities.html) [How do I get started in vulnerability research? : ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/f6f5s/how_do_i_get_started_in_vulnerability_research/) [A bunch of Linux kernel exploitation resources](https://github.com/xairy/linux-kernel-exploitation) [Project Zero - Monorail](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=&sort=-id&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary) [Travel blog of an evil transgirl: Reversing ALPC: Where are your windows bugs and sandbox escapes?](https://sandboxescaper.blogspot.com/2018/10/reversing-alpc-where-are-your-windows.html) [Weaponization of a JavaScriptCore Vulnerability | Ret2 Systems Blog](http://blog.ret2.io/2018/07/11/pwn2own-2018-jsc-exploit/) [Vulnerability Discovery Against Apple Safari | Ret2 Systems Blog](http://blog.ret2.io/2018/06/13/pwn2own-2018-vulnerability-discovery/) [Security Bulletins | Microsoft Docs](https://docs.microsoft.com/en-us/security-updates/securitybulletins/securitybulletins) [Lexfo's security blog](https://blog.lexfo.fr/) [Null Byte Poisoning ~ The Magic Byte - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/null-byte-poisoning-the-magic-byte/3874) [Latest Exploit Development topics - 0x00sec - The Home of the Hacker](https://0x00sec.org/c/exploit-development) [Google Project Zero](https://github.com/googleprojectzero) [Cheat sheet - How Stack Pivots are used in Modern Exploits : ReverseEngineering](https://www.reddit.com/r/ReverseEngineering/comments/84ovyb/cheat_sheet_how_stack_pivots_are_used_in_modern/) [Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research](https://research.checkpoint.com/extracting-code-execution-from-winrar/) [Zero Day Initiative — The Story of Two Winning Pwn2Own JIT Vulnerabilities in Mozilla Firefox](https://www.zerodayinitiative.com/blog/2019/4/18/the-story-of-two-winning-pwn2own-jit-vulnerabilities-in-mozilla-firefox) [Phrack - Javascript Jit Type Confusion](http://phrack.org/papers/jit_exploitation.html) [Phrack - Javascript Engine Basics](http://phrack.org/papers/attacking_javascript_engines.html) [Zero Day Initiative — CVE-2019-0708: A Comprehensive Analysis of a Remote Desktop Services Vulnerability](https://www.thezdi.com/blog/2019/5/27/cve-2019-0708-a-comprehensive-analysis-of-a-remote-desktop-services-vulnerability) [Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!](https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5) [Linux Heap TCache Poisoning](http://blog.infosectcbr.com.au/2019/07/linux-heap-tcache-poisoning.html) [SANS Institute](https://www.sans.org/security-resources/malwarefaq/Ptrace) [Hackers Hut: Local root exploits](https://www.win.tue.nl/~aeb/linux/hh/hh-12.html) [Heartbleed - Wikipedia](https://en.wikipedia.org/wiki/Heartbleed) [Troy Hunt: Everything you need to know about the Heartbleed SSL bug](https://www.troyhunt.com/everything-you-need-to-know-about3/) [Project Zero: The Fully Remote Attack Surface of the iPhone](https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html) [Don't Follow The Masses: Bug Hunting in JavaScript Engines | Bluefrostsecurity](https://labs.bluefrostsecurity.de/blog/2019/04/29/dont-follow-the-masses-bug-hunting-in-javascript-engines/) [Escaping the Chrome Sandbox via an IndexedDB Race Condition | Bluefrostsecurity](https://labs.bluefrostsecurity.de/blog/2019/08/08/escaping-the-chrome-sandbox-via-an-indexeddb-race-condition/) [Project Zero: Down the Rabbit-Hole...](https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html) [Azeria | Write up of iOS exploit - Walking through the underlying exploit development process](https://twitter.com/Fox0x01/status/1168969597799866368?s=20) [Vulnerability Reports || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence](https://www.talosintelligence.com/vulnerability_reports) [Sudoers Bug | Oss-security - Sudo: CVE-2019-14287](https://www.openwall.com/lists/oss-security/2019/10/14/1) [oss-security mailing list](https://www.openwall.com/lists/oss-security/) [CVE security vulnerability database. Security vulnerabilities, exploits, references and more](https://www.cvedetails.com/)
### Books
[The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities](https://www.amazon.com/gp/product/0321444426/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0321444426&linkId=9be67ae2cf0ce1b4c8773811adb2b60e) [Hacking: The Art of Exploitation, 2nd Edition](https://www.amazon.com/gp/product/1593271441/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1593271441&linkId=960bf12ded172d8c205fb7f21dd4f4a8) [Amazon.com: Windows Internals, Part 1: System architecture, processes, threads, memory management, and more (7th Edition)](https://www.amazon.com/Windows-Internals-Part-architecture-management/dp/0735684189/ref=dp_ob_title_bk) [Amazon.com: Windows Internals, Part 2 (6th Edition) (Developer Reference)](https://www.amazon.com/gp/product/0735665877/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0735665877&linkId=338efca921c2947251f10a72e80fb993) [Books to Learn Computer Security](https://www.defcon.org/html/links/book-list.html)
### Courses
[RPISEC - Modern Binary Exploitation](https://github.com/RPISEC/MBE) [Fall 2020 - Georgia Tech Information Security Lab Course](https://tc.gts3.org/cs6265/2018/cal.html) [Modern Binary Exploitation - Spring 2015](http://security.cs.rpi.edu/courses/binexp-spring2015/) [RPISEC INTROSEC - Command Line](https://introsec.backdrifting.net/lectures/2017fall/02_intro_to_command_line.html#1) [RPISEC INTROSEC - Stegonography](https://introsec.backdrifting.net/lectures/2017fall/04_steganography.html#1) [CNIT 127: Exploit Development -- Sam Bowne](https://samsclass.info/127/127_F15.shtml) [Violent Python and Exploit Development](https://samsclass.info/127/127_WWC_2014.shtml) [Exploits1](http://opensecuritytraining.info/Exploits1.html) [SEED Project](http://www.cis.syr.edu/~wedu/seed/Labs_16.04/Software/) [Basic General Vulnerability Course](http://www.cis.syr.edu/~wedu/seed/all_labs.html) [NYU Tandon VR and Pen Test Course](https://github.com/isislab/Hack-Night) [Good Intro to VR - George Mason Security Lab - Google Drive](https://drive.google.com/drive/folders/1evPaqTcLf4cQblMipUkwjatKcOPYwHgz)
### Videos to learn from
[LiveOverflow - Binary Hacking (exploit exercises)](https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN) [How To Hack: Episode 1 - Trampoline Stack Smash - YouTube](https://www.youtube.com/watch?v=5--oQtTj5KQ) [Buffer overflow on a modern system impossible? stack0: part 1 - bin 0x21 - YouTube](https://www.youtube.com/watch?v=4HxUmbOcN6Y&feature=youtu.be)
### Wargames
[Exploit-Exercises: Protostar (v2) ~ VulnHub](https://www.vulnhub.com/entry/exploit-exercises-protostar-v2,32/) [Exploit Education :: Andrew Griffiths' Exploit Education](https://exploit.education/) [OverTheWire: Narnia - Basic Exploitation](http://overthewire.org/wargames/narnia/) [OverTheWire: Behemoth - Common Coding Mistakes](http://overthewire.org/wargames/behemoth/) [OverTheWire: Utumno - Intermediate Difficulty Wargame](http://overthewire.org/wargames/utumno/) [OverTheWire: Maze - Exploitation/Programming/RE Wargame](http://overthewire.org/wargames/maze/) [OverTheWire: Vortex](http://overthewire.org/wargames/vortex/) [OverTheWire: Semtex - Exploitation and RE](http://overthewire.org/wargames/semtex/) [io.netgarage.org](https://io.netgarage.org/) [SmashTheStack Wargaming Network](http://smashthestack.org/wargames.html) [CSAW 365](https://365.csaw.io/) [Binary Exploitation | pwnable.kr](http://pwnable.kr/)
### CVEs to Review
[Analysis of a Chrome Zero Day: CVE-2019-5786 | McAfee Blogs](https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/analysis-of-a-chrome-zero-day-cve-2019-5786/) [One more Steam Windows Client Local Privilege Escalation 0day](https://amonitoring.ru/article/onemore_steam_eop_0day/) [Analysis of CVE-2019-0708 (BlueKeep) - MalwareTech](https://www.malwaretech.com/2019/05/analysis-of-cve-2019-0708-bluekeep.html) [sp0re/Nhttpd-exploits - Sp0re's Git](https://git.sp0re.sh/sp0re/Nhttpd-exploits)
### Chrome Bugs
[Issues - chromium - An open-source project to help move the web forward. - Monorail](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=reporter%3Anedwilliamson%40gmail.com+label%3Areward) [Fuzzing in Chromium](https://chromium.googlesource.com/chromium/src/+/master/testing/libfuzzer/README.md) [google/clusterfuzz: Scalable fuzzing infrastructure.](https://github.com/google/clusterfuzz) [v8 exploit | Sakuraのblog](http://eternalsakura13.com/2018/05/06/v8/)
### External Training
[Trainings | RET2 Systems](https://ret2.io/trainings) [Training :: Exodus Intelligence](https://www.exodusintel.com/training.html) [Android Internals & Others](http://technologeeks.com/courses.jl) [Tactical Network Solutions | IoT Security Training](https://www.tacnetsol.com/) [Windows Internals & Rootkits | Graceful Bits](https://gracefulbits.com/training-courses/)
[h4cker/exploit_development at master · The-Art-of-Hacking/h4cker](https://github.com/The-Art-of-Hacking/h4cker/tree/master/exploit_development) [Intro Exploit Dev Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/exploits.md) [Vulncode-DB](https://www.vulncode-db.com/) [Pwn Adventure 3: Pwnie Island](https://pwnadventure.com/) [Exploits Database by Offensive Security](https://www.exploit-db.com/) [Eli Bendersky's website](https://eli.thegreenplace.net/archives/all) [scwuaptx/HITCON-Training: For Linux binary Exploitation](https://github.com/scwuaptx/HITCON-Training)
### Exploit Development/Shellcoding Stuff
### Tools
[pwntools Documentation](https://media.readthedocs.org/pdf/pwntools/stable/pwntools.pdf) [Installation — pwntools 3.12.0 documentation](http://docs.pwntools.com/en/stable/install.html) [Exploit Development with AFL, PEDA and PwnTools](http://thecyberrecce.net/2017/07/28/exploit-development-with-afl-peda-and-pwntools/) [GitHub - Gallopsled/pwntools: CTF framework and exploit development library](https://github.com/Gallopsled/pwntools) [Weaponization of Nessus Plugins](https://depthsecurity.com/blog/weaponization-of-nessus-plugins) [merrychap/shellen: Interactive shellcoding environment to easily craft shellcodes](https://github.com/merrychap/shellen) [0xdea/tactical-exploitation: Modern tactical exploitation toolkit.](https://github.com/0xdea/tactical-exploitation) [Payload Generation using SharpShooter – MDSec](https://www.mdsec.co.uk/2018/03/payload-generation-using-sharpshooter/) [mdsecactivebreach/SharpShooter: Payload Generation Framework](https://github.com/mdsecactivebreach/SharpShooter) [Art of Anti Detection 3 – Shellcode Alchemy – Pentest Blog](https://pentest.blog/art-of-anti-detection-3-shellcode-alchemy/)
### Courses
[CNIT 127: Exploit Development -- Sam Bowne](https://samsclass.info/127/127_S18.shtml) [Offensive Computer Security 2014 - Lecture 02](https://www.youtube.com/watch?v=lbjS2mXyMEQ)
### Linux Specific Tutorials
[Intermediate Level Linux Exploitation](https://github.com/nnamon/linux-exploitation-course) [Intro Binary Hacking Course - LiveOverflow](http://liveoverflow.com/binary_hacking/index.html) [Open Security - Intro to Software Exploits for Linux](http://www.opensecuritytraining.info/Exploits1.html) [Open Security - Intro to Software Exploits for Linux](https://www.youtube.com/playlist?list=PL96AB65DFCE02EE3E) [Linux (x86) Exploit Development Series – sploitF-U-N](https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/)
### Windows Exploit Development Tutorials
### Fuzzy Security Tutorials
[ExploitDev: Part 1 - Intro to Exploit Development](http://www.fuzzysecurity.com/tutorials/expDev/1.html) [ExploitDev: Part 2 - Saved Return Pointer Overflowing](http://www.fuzzysecurity.com/tutorials/expDev/2.html) [ExploitDev: Part 3 - Structured Exception Handler (SEH)](http://www.fuzzysecurity.com/tutorials/expDev/3.html) [ExploitDev: Part 4 - Egg Hunters](http://www.fuzzysecurity.com/tutorials/expDev/4.html) [ExploitDev: Part 5 - Unicode](http://www.fuzzysecurity.com/tutorials/expDev/5.html) [ExploitDev: Part 6 - Win32 Shellcode](http://www.fuzzysecurity.com/tutorials/expDev/6.html) [ExploitDev: Part 7 - ROP](http://www.fuzzysecurity.com/tutorials/expDev/7.html) [ExploitDev: Part 8 - Heap Spraying](http://www.fuzzysecurity.com/tutorials/expDev/8.html) [ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/11.html) [ExploitDev: Part 10 - Kernal Exploitation - Stack Overflow](http://www.fuzzysecurity.com/tutorials/expDev/14.html) [ExploitDev: Part 11 - Kernel Exploitation - Write-What-Where](http://www.fuzzysecurity.com/tutorials/expDev/15.html) [ExploitDev: Part 12 - Kernel Exploitation - Null Pointer Dereference](http://www.fuzzysecurity.com/tutorials/expDev/16.html) [ExploitDev: Part 13 - Kernel Exploitation - Uninitialized Stack Variable](http://www.fuzzysecurity.com/tutorials/expDev/17.html) [ExploitDev: Part 14 - Kernel Exploitation - Integer Overflow](http://www.fuzzysecurity.com/tutorials/expDev/18.html) [ExploitDev: Part 15 - Kernel Exploitation - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/19.html) [ExploitDev: Part 16 - Kernel Exploitation - Pool Overflow](http://www.fuzzysecurity.com/tutorials/expDev/20.html) [ExploitDev: Part 17 - Kernel Exploitation - GDI Bitmap Abuse](http://www.fuzzysecurity.com/tutorials/expDev/21.html) [ExploitDev: Part 18 - Kernel Exploitation - RS2 Bitmap Necromancy](http://www.fuzzysecurity.com/tutorials/expDev/22.html) [ExploitDev: Part 19 - Kernel Exploitation - Logic bugs in Razer rzpnk.sys](http://www.fuzzysecurity.com/tutorials/expDev/23.html)
[A curated list of Windows Exploitation resources](https://github.com/enddo/awesome-windows-exploitation) [Introduction to Windows Kernel Driver Exploitation (Pt. 1)](https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/) [Starting with Windows Kernel Exploitation – part 1 – setting up the lab | hasherezade's 1001 nights](https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/) [Open Security Videos - Intro to Windows Exploits](https://www.youtube.com/playlist?list=PL9F9E52502327B1CA) [Open Security - Intro to Windows Exploits](http://www.opensecuritytraining.info/Exploits2.html) [GitHub - smgorelik/Windows-RCE-exploits: The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samples are uploaded for education purposes for red and blue teams.](https://github.com/smgorelik/Windows-RCE-exploits)
### Shellcoding
### Books
[The Shellcoder's Handbook: Discovering and Exploiting Security Holes](https://www.amazon.com/dp/047008023X/ref=cm_sw_r_cp_ep_dp_PWTuzbRYFST64?pldnSite=1)
[Shellcoding for Linux and Windows Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) [How to write a (Linux x86) egg hunter shellcode | Adventures in the programming jungle](https://adriancitu.com/2015/10/05/how-to-write-an-egg-hunter-shellcode/) [Shellcode Injection - Dhaval Kapil](https://dhavalkapil.com/blogs/Shellcode-Injection/) [Writing ARM Shellcode | Azeria Labs](https://azeria-labs.com/writing-arm-shellcode/) [Linux Shellcoding (Part 1.0) - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/linux-shellcoding-part-1-0/289) [M34_The_Art_of_Writing_Shellcode.pdf](https://nusplash.learningu.org/download/80cb06219b7fbb3452ed23947c92a929/M34_The_Art_of_Writing_Shellcode.pdf) [Phrack | how to turn any code into alphanumeric code](http://phrack.org/issues/57/15.html#article) [Shellcode limitations - Wikipedia](https://en.wikipedia.org/wiki/Shellcode#Alphanumeric_and_printable_shellcode) [Phrack | Bypassing Unicode Translation That Adds Null Bytes](http://phrack.org/issues/61/11.html#article) [How to Execute Shellcode - Wikipedia](https://en.wikipedia.org/wiki/Shellcode#Shellcode_analysis) [English Text Shellcode.pdf](http://www.cs.jhu.edu/~sam/ccs243-mason.pdf) [Shell-storm Mirror | A collection of shellcode, ripped straight from the shell-storm database. We host this just for easy access, since shell-storm cannot be reached within the Academy's Internet.](https://github.com/USCGA/shellcode) [0x2a0 Writing Shellcode](http://www.dmi.unipg.it/bista/didattica/sicurezza-pg/buffer-overrun/hacking-book/0x2a0-writing_shellcode.html)
[Best books, tutorials and courses to learn about exploit development](http://www.pentest.guru/index.php/2016/01/28/best-books-tutorials-and-courses-to-learn-about-exploit-development/) [Ask HN: What's the prerequisite to become an exploit developer? | Hacker News](https://news.ycombinator.com/item?id=14481686) [A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development](https://github.com/FabioBaroni/awesome-exploit-development) [slimm609/checksec.sh: Checksec.sh](https://github.com/slimm609/checksec.sh) [Corelan Team - Exploit Writing Tutorials](https://www.corelan.be/index.php/articles/#cat_exploit-writing-tutorials) [[Backdoor 101] Backdooring PE File by Adding New Section Header - Hack.Learn.Share](https://capt-meelo.github.io/exploitdev/osceprep/2018/07/16/backdoor101-part1.html) [The Beginners Guide to Codecaves - CodeProject](https://www.codeproject.com/Articles/20240/The-Beginners-Guide-to-Codecaves) [Exploit Development Learning Roadmap : ExploitDev](https://www.reddit.com/r/ExploitDev/comments/7zdrzc/exploit_development_learning_roadmap/)
### Buffer Overflow/Memory Corruption
### GOT/PLT Overwriting (Global Offset Table and Procedure Linkage Table)
[GOT and PLT for pwning. · System Overlord](https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html)
[Memory Corruption 101 - NYU Poly 2011](https://vimeo.com/31348274) [Exploit writing tutorial part 1 : Stack Based Overflows | Corelan Team](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) [Linux ExploitDev: Part 3 - Buffer Overflow](http://www.fuzzysecurity.com/tutorials/expDev/12.html) [0x7 Exploit Tutorial: Bad Character Analysis](http://www.primalsecurity.net/0x7-exploit-tutorial-bad-character-analysis/) [0x0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite](http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/) [0×3 Exploit Tutorial: Buffer Overflow – SEH Bypass](http://www.primalsecurity.net/0x3-exploit-tutorial-buffer-overflow-seh-bypass/) [Binary Exploitation ELI5– Part 1 –Stack/Buffer Overflow/Ret2Libc](https://hackernoon.com/binary-exploitation-eli5-part-1-9bc23855a3d8) [Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations](https://medium.com/@danielabloom/binary-exploitation-eli5-part-2-8fd71bf214b9) [Speedrun Hacking Buffer Overflow - speedrun-001 DC27 - YouTube](https://www.youtube.com/watch?v=gBL6IzwIjuA)
### Return Oriented Programming (ROP)
[ROPgadget](https://github.com/JonathanSalwan/ROPgadget) [ExploitDev: Part 7 - ROP](http://www.fuzzysecurity.com/tutorials/expDev/7.html) [ROP Emporium](https://ropemporium.com/) [ropchain | @kvakil](http://www.kvakil.me/posts/ropchain/) [SROP | Signals, you say? - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/srop-signals-you-say/2890) [Learn ROP through a short series of practical challenges : netsec](https://www.reddit.com/r/netsec/comments/6x1gk4/learn_rop_through_a_short_series_of_practical/) [ROPping to Victory](https://jmpesp.me/rop-emporium-ret2win-with-radare-and-pwntools/) [Hacking the PS4, part 1 - Introduction to PS4's security, and userland ROP](https://cturt.github.io/ps4.html) [0vercl0k/rp: rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested on several OS: Debian / Windows 8.1 / Mac OSX Lion (10.7.3). Moreover, it is x64 compatible and supports](https://github.com/0vercl0k/rp/) [Notes/ret2libc.txt at master · Malformation/Notes](https://github.com/Malformation/Notes/blob/master/ret2libc.txt) [libc - offset - 64-bit Linux stack smashing tutorial: Part 3](https://blog.techorganic.com/2016/03/18/64-bit-linux-stack-smashing-tutorial-part-3/) [ret2libc.pdf](https://www.shellblade.net/docs/ret2libc.pdf) [Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray](https://medium.com/@danielabloom/binary-exploitation-eli5-part-3-d1872eef71b3) [rop emporium - callme64](https://tuonilabs.wordpress.com/tag/rop-emporium/) [Dive into ROP - a quick introduction to Return Oriented Programming](https://www.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming) [Demo6A - Return-Oriented Programming Exploit with ROPgadget 64-bit Variant - YouTube](https://www.youtube.com/watch?v=aEcN7OQcFWY) [Demo6 - Return-Oriented Programming Exploit with ROPgadget - YouTube](https://www.youtube.com/watch?v=MSy0rdi1vbo) [Demo5 - Return-Into-Libc Exploit - YouTube](https://www.youtube.com/watch?v=NCLUm8geskU) [h4cker/exploit_development at master · The-Art-of-Hacking/h4cker](https://github.com/The-Art-of-Hacking/h4cker/tree/master/exploit_development#return-oriented-programming) [Buffer Overflow Practical Examples , ret2libc - protostar stack6 | 0xRick Owned Root !](https://0xrick.github.io/binary-exploitation/bof6/) [acama/xrop: Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC](https://github.com/acama/xrop) [Return Oriented Programming (ROP) Exploit Explained | Rapid7](https://www.rapid7.com/resources/rop-exploit-explained/) [Intro to ROP: ROP Emporium — Split - I See Thieves - Medium](https://medium.com/@iseethieves/intro-to-rop-rop-emporium-split-9b2ec6d4db08) [A Simple ROP Exploit – /bin/sh via syscall | Failing Silently](https://failingsilently.wordpress.com/2017/12/14/rop-chain-shell/)
### Format String Exploitation
[Introduction to format string exploits](http://codearcana.com/posts/2013/05/02/introduction-to-format-string-exploits.html) [Linux ExploitDev: Part 2 - Format String Exploit](http://www.fuzzysecurity.com/tutorials/expDev/10.html) [Demo3A - Format String Vulnerability and Exploit Variant - YouTube](https://www.youtube.com/watch?v=Z-lrvxXYXSs) [Demo3 - Format String Vulnerability and Exploit - YouTube](https://www.youtube.com/watch?v=HyGDezTO4aM) [CNIT 127 Ch 4: Introduction to format string bugs - YouTube](https://www.youtube.com/watch?v=Fm2UPeaBGUc&list=PLR0lm4gEfVFdRalkOpboPgd-vaAaNjzrO&index=5) [Format Strings Exploitation Tutorial](https://www.exploit-db.com/docs/english/28476-linux-format-string-exploitation.pdf) [Format string attack - OWASP](https://www.owasp.org/index.php/Format_string_attack)
### Heap Exploitation
[Heap Exploitation · GitBook](https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details) [Windows Kernel Exploitation Tutorial Part 7: Uninitialized Heap Variable - rootkit](https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/) [sec18-heelan.pdf](https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-heelan.pdf) [Recommended - shellphish/how2heap: A repository for learning various heap exploitation techniques.](https://github.com/shellphish/how2heap) [GitHub - DhavalKapil/heap-exploitation: This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure. https://heap-exploitation.dhavalkapil.com/](https://github.com/DhavalKapil/heap-exploitation) [ExploitDev: Part 8 - Heap Spraying](http://www.fuzzysecurity.com/tutorials/expDev/8.html) [ExploitDev: Part 9 - Heap Spray - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/11.html) [Linux ExploitDev: Part 4 - Use After Free (UAF)](http://www.fuzzysecurity.com/tutorials/expDev/13.html) [Binary Exploitation ELI5 — Part 3 – ROP/Heap Spray](https://medium.com/@danielabloom/binary-exploitation-eli5-part-3-d1872eef71b3) [Demo8 - Heap Spray Example - YouTube](https://www.youtube.com/watch?v=MqDCn0HoTSw) [CNIT 127 Ch 5: Introduction to heap overflows - YouTube](https://www.youtube.com/watch?v=VhwNPdqpmts&index=6&list=PLR0lm4gEfVFdRalkOpboPgd-vaAaNjzrO) [Heap Exploitation Part 1: Understanding the Glibc Heap Implementation | Azeria Labs](https://azeria-labs.com/heap-exploitation-part-1-understanding-the-glibc-heap-implementation/) [Heap Exploitation Part 2: Understanding the Glibc Heap Implementation | Azeria Labs](https://azeria-labs.com/heap-exploitation-part-2-glibc-heap-free-bins/) [xu:collision.pdf](https://gts3.org/~wen/assets/papers/xu:collision.pdf) [Heap Exploitation ~ Abusing Use-After-Free - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/heap-exploitation-abusing-use-after-free/3580) [thread local caching in glibc malloc · Online tukan sanctuary](http://tukan.farm/2017/07/08/tcache/) [Once Upon a free()](http://phrack.org/issues/57/9.html) [Mathy Vanhoef, PhD: Understanding the Heap & Exploiting Heap Overflows](http://www.mathyvanhoef.com/2013/02/understanding-heap-exploiting-heap.html) [dlmalloc: A Memory Allocator](http://gee.cs.oswego.edu/dl/html/malloc.html) [Understanding the Heap by Breaking it](https://www.blackhat.com/presentations/bh-usa-07/Ferguson/Whitepaper/bh-usa-07-ferguson-WP.pdf) [Glibc Adventures: The Forgotten Chunks | Context Information Security UK](https://www.contextis.com/en/resources/white-papers/glibc-adventures-the-forgotten-chunks) [Bugtraq: The Malloc Maleficarum](https://seclists.org/bugtraq/2005/Oct/118) [Phrack - Malloc Des-Maleficarum](http://phrack.org/issues/66/10.html) [Phrack - w00w00 on heap overflows](http://phrack.org/issues/66/6.html) [Phrack - vudu malloc tricks](http://phrack.org/issues/57/8.html) [13.5 Heap Overflows :: Chapter 13\. Application-Level Risks :: Network security assessment :: Networking :: eTutorials.org](http://etutorials.org/Networking/network+security+assessment/Chapter+13.+Application-Level+Risks/13.5+Heap+Overflows/) [Understanding glibc malloc – sploitF-U-N](https://sploitfun.wordpress.com/2015/02/10/understanding-glibc-malloc/) [The Heap: How do use-after-free exploits work? - bin 0x16 - YouTube](https://www.youtube.com/watch?v=ZHghwsTRyzQ) [Unsorted bin attack - CTF Wiki](https://ctf-wiki.github.io/ctf-wiki/pwn/linux/glibc-heap/unsorted_bin_attack/) [ctf/0ctf/pwn/babyheap at master · guyinatuxedo/ctf](https://github.com/guyinatuxedo/ctf/tree/master/0ctf/pwn/babyheap) [Glibc Heap Exploitation Basics : Introduction to ptmalloc2 internals (Part 1)](https://blog.k3170makan.com/2018/11/glibc-heap-exploitation-basics.html) [Glibc Heap Exploitation Basics : ptmalloc2 internals (Part 2) - Fast Bins and First Fit Redirection](https://blog.k3170makan.com/2018/12/glibc-heap-exploitation-basics.html) [children_tcache writeup and tcache overview - Eternal Stories](http://eternal.red/2018/children_tcache-writeup-and-tcache-overview/) [Heap Exploit Development | Azeria Labs](https://azeria-labs.com/heap-exploit-development-part-1/) [How a double-free bug in WhatsApp turns to RCE - Home](https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/) [Double Free · Heap Exploitation](https://heap-exploitation.dhavalkapil.com/attacks/double_free.html) [Understanding the Heap & Exploiting Heap Overflows](https://www.mathyvanhoef.com/2013/02/understanding-heap-exploiting-heap.html) [10_lecture.pdf](http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/17/10_lecture.pdf)
### Fuzzing
[Finding and Understanding Bugs in C Compilers](http://www.cs.utah.edu/~regehr/papers/pldi11-preprint.pdf) [Stateful Runtime Model Checking for Multithreaded Programs](http://llvm.org/devmtg/2010-11/Yang-HardenLLVM.pdf) [Fuzzing with Code Fragments](https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final73.pdf) [funfuzz/src/funfuzz/js/jsfunfuzz at master · MozillaSecurity/funfuzz · GitHub](https://github.com/MozillaSecurity/funfuzz/tree/master/src/funfuzz/js/jsfunfuzz) [Csmith](https://embed.cs.utah.edu/csmith/) [issre13.pdf](http://www.cs.utah.edu/~regehr/papers/issre13.pdf) [The Art of Fuzzing – Slides and Demos | SEC Consult](https://sec-consult.com/en/blog/2017/11/the-art-of-fuzzing-slides-and-demos/index.html) [Automating Web Apps Input fuzzing via Burp Macros - SecureLayer7](http://blog.securelayer7.net/automating-web-apps-input-fuzzing-via-burp-macros/) [Fuzzing: Brute Force Vulnerability Discovery](http://www.fuzzing.org/) [Fuzzing · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Fuzzing) [Generating Software Tests](https://www.fuzzingbook.org/) [american fuzzy lop](http://lcamtuf.coredump.cx/afl/) [Scaling AFL to a 256 thread machine | Gamozo Labs Blog](https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html) [1803.01307.pdf](https://arxiv.org/pdf/1803.01307.pdf) [secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.](https://github.com/secfigo/Awesome-Fuzzing) [hellscape - 6 increasingly difficult buggy tool for testing fuzzer](https://github.com/gamozolabs/hellscape) [Structure-Aware Fuzzing with libFuzzer](https://github.com/google/fuzzing/blob/master/docs/structure-aware-fuzzing.md) [RUB-SysSec/nautilus: a grammar based feedback fuzzer](https://github.com/RUB-SysSec/nautilus) [NDSS19-Nautilus.pdf](https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Nautilus.pdf) [ClusterFuzz - ClusterFuzz](https://google.github.io/clusterfuzz/) [TriforceAFL/limit_memory.sh at master · nccgroup/TriforceAFL · GitHub](https://github.com/nccgroup/TriforceAFL/blob/master/experimental/asan_cgroups/limit_memory.sh) [Implemented new approach for fuzzer synchronization · googleprojectzero/fuzzilli@5aeae9d · GitHub](https://github.com/googleprojectzero/fuzzilli/commit/5aeae9d178da3d57878ec2c1383bf6759802422f) [Impeding Fuzzing Audits of Binary Executables](https://www.usenix.org/system/files/sec19-guler.pdf) [designing_new_operating_primitives_to_improve_fuzzing_performance_vt.pdf](http://iisp.gatech.edu/sites/default/files/images/designing_new_operating_primitives_to_improve_fuzzing_performance_vt.pdf) [libFuzzer – a library for coverage-guided fuzz testing. — LLVM 10 documentation](https://llvm.org/docs/LibFuzzer.html) [AFL-Qemu | fuzzing without source](https://www.google.com/search?q=AFL-Qemu&oq=AFL-Qemu&aqs=chrome..69i57&client=ubuntu&sourceid=chrome&ie=UTF-8) [Good Fuzzing Talk from Talos](https://talos-intelligence-site.s3.amazonaws.com/production/document_files/files/000/041/799/original/anikolic_covnavi_asiasecwest.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAIXACIED2SPMSC7GA%2F20190916%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20190916T140144Z&X-Amz-Expires=3600&X-Amz-SignedHeaders=host&X-Amz-Signature=9ca69acc5ef75f0b79b8a3b6e8d8b9a6afaf5d89c6aeba2dbe9de39400a36007) [Cisco-Talos/crashdog](https://github.com/Cisco-Talos/crashdog) [Cisco-Talos/covnavi](https://github.com/Cisco-Talos/covnavi) [Zoo AFL / Digital Security corporate blog / Habr](https://habr.com/en/company/dsec/blog/449134/)
### Kernel Exploitation
[Linux Kernel CVEs | All CVEs](https://www.linuxkernelcves.com/cves) [(nearly) Complete Linux Loadable Kernel Modules](http://www.ouah.org/LKM_HACKING.html) [Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time](https://jon.oberheide.org/files/source10-linuxkernel-jonoberheide.pdf) [Phrack - Attacking the Core: Kernel Exploitation](http://phrack.org/issues/64/6.html) [Understanding the Linux Kernel, Third Edition - Amazon.com](https://www.amazon.com/Understanding-Linux-Kernel-Third-Daniel/dp/0596005652) [A Guide to Kernel Exploitation: Attacking the Core - Amazon.com](https://www.amazon.com/Guide-Kernel-Exploitation-Attacking-Core/dp/1597494860) [Linux Device Drivers - Amazon](https://www.amazon.com/Linux-Device-Drivers-Jonathan-Corbet/dp/0596005903) [FuzzySecurity | Windows ExploitDev: Part 19](https://www.fuzzysecurity.com/tutorials/expDev/23.html) [Defcon 27](https://eclypsium.com/wp-content/uploads/2019/08/EXTERNAL-Get-off-the-kernel-if-you-cant-drive-DEFCON27.pdf) [ASUS Drivers Elevation of Privilege Vulnerabilities | SecureAuth](https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities) [GIGABYTE Drivers Elevation of Privilege Vulnerabilities | SecureAuth](https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) [Weaponizing vulnerable driver for privilege escalation— Gigabyte Edition!](https://medium.com/@fsx30/weaponizing-vulnerable-driver-for-privilege-escalation-gigabyte-edition-e73ee523598b) [A Guide to Kernel Exploitation: Attacking the Core: Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani: 9781597494861: Amazon.com: Books](https://www.amazon.com/Guide-Kernel-Exploitation-Attacking-Core/dp/1597494860/?_encoding=UTF8&camp=1789&creative=9325&linkCode=ur2&tag=theethhacne0c-20)
### Bug Bounty Stuff
[Adobe Flash Exploitation, Then and Now: From CVE-2015-5119 to CVE-2018-4878 – MDSec](https://www.mdsec.co.uk/2018/02/adobe-flash-exploitation-then-and-now-from-cve-2015-5119-to-cve-2018-4878/) [Hackers Hut](http://www.win.tue.nl/~aeb/linux/hh/hh.html) [HackerOne: Vulnerability Coordination and Bug Bounty Platform](https://www.hackerone.com/) [GitHub - nashcontrol/bounty-monitor: Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains participating in bug bounty programs.](https://github.com/nashcontrol/bounty-monitor) [How to Break Into Security, Miller Edition — Krebs on Security](https://krebsonsecurity.com/2012/08/how-to-break-into-security-miller-edition/) [[lcamtuf.coredump.cx]](http://lcamtuf.coredump.cx/) [Home — Rode0day](https://rode0day.mit.edu/) [Bug Bounty Toolkit – BugBountyHunting – Medium](https://medium.com/bugbountyhunting/bug-bounty-toolkit-aa36f4365f3f) [djadmin/awesome-bug-bounty: A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.](https://github.com/djadmin/awesome-bug-bounty) [Another list of bug bounty write-ups](https://github.com/ngalongc/bug-bounty-reference) [How I could have stolen your photos from Google - my first 3 bug bounty writeups](https://blog.avatao.com/How-I-could-steal-your-photos-from-Google/)
### Mobile Devices
### Android Exploitation
[GitHub - jiayy/android_vuln_poc-exp: This project contains pocs and exploits for android vulneribilities](https://github.com/jiayy/android_vuln_poc-exp) [Android Internals](http://technologeeks.com/course.jl?course=AIRE) [Android Internals: A Confectioner's Cookbook](http://newandroidbook.com/) [Android Internals](http://cecs.wright.edu/~pmateti/Courses/4440/Lectures/Internals/) [AnSec2.0](http://technologeeks.com/files/AnSec2.0.pdf) [Android Internals](http://technologeeks.com/course.jl?course=Android%20Internals) [Android-Excerpt](http://technologeeks.com/Courses/Android-Excerpt.pdf) [M1Con CTF Write up](https://blog.manchestergreyhats.co.uk/2018/03/28/m1con-ctf-writeup/) [YouTube](https://m.youtube.com/watch?v=m9UZnWLLurY&feature=youtu.be) [codemetrix.net - Hacking Android apps with FRIDA I](https://www.codemetrix.net/hacking-android-apps-with-frida-1/) [How to start Reverse Engineering on Android Application by Ankit Mishra - network, host, download | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-ankit-mishra) [How to start Reverse Engineering on Android Application - Part 2 by Ankit Mishra - download, virtual machine, location | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-part-2-ankit-mishra) [How to start Reverse Engineering on Android Application – Part 3 by Ankit Mishra - credentials, vulnerable, knowledge | Peerlyst](https://www.peerlyst.com/posts/how-to-start-reverse-engineering-on-android-application-part-3-ankit-mishra) [ashishb/android-security-awesome: A collection of android security related resources](https://github.com/ashishb/android-security-awesome) [Android Hacker's Handbook](https://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X/ref=dp_rm_img_2) [1942 - Android: Use-After-Free in Binder driver - project-zero - Monorail](https://bugs.chromium.org/p/project-zero/issues/detail?id=1942)
### Tools for Mobile Exploitation
[iOS Pentesting Tools Part 3: Frida and Objection – allysonomalley.com](https://www.allysonomalley.com/2018/12/20/ios-pentesting-tools-part-3-frida-and-objection/) [GitHub - sensepost/objection: 📱 objection - runtime mobile exploration](https://github.com/sensepost/objection)
[The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.](https://github.com/OWASP/owasp-mstg)
### Mitigation Techniques and Bypasses
### Windows CFG
[Control Flow Guard - Windows applications | Microsoft Docs](https://docs.microsoft.com/en-us/windows/desktop/secbp/control-flow-guard) [Exploring Control Flow Guard in Windows 10](https://documents.trendmicro.com/assets/wp/exploring-control-flow-guard-in-windows10.pdf) [Windows 10 Exploit Protection system-level mitigation, Control flow guard (CFG), must be on.](https://www.stigviewer.com/stig/windows_10/2019-01-04/finding/V-77097)
[Binary Exploitation ELI5 — Part 2 – Bypass Stack Mitigations](https://medium.com/@danielabloom/binary-exploitation-eli5-part-2-8fd71bf214b9) [aslur/offensivecon-talk.pdf at master · blackzert/aslur · GitHub](https://github.com/blackzert/aslur/blob/master/offensivecon-talk.pdf) [asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf](https://www.blackhat.com/docs/asia-18/asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf) [Exploit Mitigation Techniques - Stack Canaries - Exploit Development - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/exploit-mitigation-techniques-stack-canaries/5085) [Exploitation Mitigation Techniques · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Exploitation-Mitigation-Techniques) [Bypassing ASLR – Part I – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-i/) [Bypassing ASLR – Part II – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-ii/) [Bypassing ASLR – Part III – sploitF-U-N](https://sploitfun.wordpress.com/2015/05/08/bypassing-aslr-part-iii/) [Epilogues, Canaries, and Buffer Overflows | Many But Finite](https://manybutfinite.com/post/epilogues-canaries-buffer-overflows/)
### Car Hacking
[jaredthecoder/awesome-vehicle-security: 🚗 A curated list of resources for learning about vehicle security and car hacking.](https://github.com/jaredthecoder/awesome-vehicle-security)
### Bluetooth Hacking
[The Practical Guide to Hacking Bluetooth Low Energy](https://blog.attify.com/the-practical-guide-to-hacking-bluetooth-low-energy/) [Draft NIST SP 800-121 Rev. 2, Guide to Bluetooth Security](https://csrc.nist.gov/csrc/media/publications/sp/800-121/rev-2/draft/documents/sp800_121_r2_draft.pdf)
### Emulation
[Writing a simple x86 emulator with IDAPython | Shortjump!](http://0xeb.net/2018/02/writing-a-simple-x86-emulator-with-idapython/) [How to write an emulator (CHIP-8 interpreter) | Multigesture.net](http://www.multigesture.net/articles/how-to-write-an-emulator-chip-8-interpreter/)
### Arm Specific Stuff
[Smashing the ARM Stack: ARM Exploitation Part 1 — Mercked Security](https://www.merckedsecurity.com/blog/smashing-the-arm-stack-part-1)
### Rootkits
[Kernel Rootkits - Dino Zovi](https://www.sans.org/reading-room/whitepapers/threats/paper/449) [Phrack - Linux on-the-fly kernel patching without LKM](http://phrack.org/issues/58/7.html) [Rootkit-based attacks and defenses - Rutgers University](https://www.csa.iisc.ac.in/~vg/talks/rootkits-past-present-future/rootkits.ppsx)
[pwnable.tw - wargame site for hackers to test and expand their binary exploiting skills.](https://pwnable.tw/) [CVE - Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/index.html) [Recreating exploits - Disk Pulse Enterprise 9.9.16 - Remote Buffer Overflow (SEH) - Zero Aptitude](https://zeroaptitude.com/zerodetail/recreating-exploits-disk-pulse-enterprise-9-9-16-remote-buffer-overflow-seh/) [rowhammer + side channel via OS-supported memory deduplication to get arbitrary read+write using javascript in a browser](https://www.cs.vu.nl/~herbertb/download/papers/dedup-est-machina_sp16.pdf) [[1902.05178] Spectre is here to stay: An analysis of side-channels and speculative execution](https://arxiv.org/abs/1902.05178) [Project Zero: 0day "In the Wild"](https://googleprojectzero.blogspot.com/p/0day.html) [How spending our Saturday hacking earned us 20k – intigriti – Medium](https://medium.com/intigriti/how-spending-our-saturday-hacking-earned-us-20k-60990c4678d4)
### Cryptography
### Books
[Introduction to Modern Cryptography](http://www.cs.umd.edu/~jkatz/imc.html)
### Courses/Lectures
[GT - CS6260 - Applied Cryptography](https://www.cc.gatech.edu/~aboldyre/teaching/F11cs6260/notes.html) [Applied Cryptography | Udacity](https://www.udacity.com/course/applied-cryptography--cs387)
[Fuck RSA | Trail of Bits Blog](https://blog.trailofbits.com/2019/07/08/fuck-rsa/) [Stanford Cryptography I | Coursera](https://www.coursera.org/learn/crypto) [Stanford University | Applied Cryptography Group](https://crypto.stanford.edu/) [Stanford | Online Cryptography Course by Dan Boneh](https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/) [Stanford Cryptography II | Coursera](https://www.coursera.org/learn/crypto2) [Stanford CS255 Introduction to Cryptography](https://crypto.stanford.edu/~dabo/cs255/)
### Pen Testing/Red Team/OSINT
### Courses/Learning/Tutorials/Tips
### Courses
[UMD - Intro to Ethical Hacking](https://github.com/UMD-CS-STICs/389Rfall18) [Practice 5 - System Hacking with Examples - Ethical Hacking Course - en.gburu.net](https://en.gburu.net/free-ethical-hacking-course-practice-5-system-hacking-with-examples/) [Module 6 - Hacking Webservers - Free Ethical Hacking Course - en.gburu.net](https://en.gburu.net/free-ethical-hacking-course-module-6-hacking-webservers/) [Tactical Burp Suite | Professionally Evil Training](https://training.secureideas.com/course/tactical-burp/) [Advanced Tactical Burp Suite | Professionally Evil Training](https://training.secureideas.com/course/adv-tactical-burp/) [THXAVET - secureideas military discount](https://twitter.com/secureideas/status/1087893521405759488) [Zero to Hero Pentesting | Cybersecurity Training | The Cyber Mentor](https://www.thecybermentor.com/zero-to-hero-pentesting)
### Videos To Learn From
[PowerShell for Penetration Testing: Nishang](https://n0where.net/powershell-penetration-testing-framework-nishang) [HackerSploit - YouTube](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
### Books
[Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition](https://www.amazon.com/Gray-Hat-Hacking-Ethical-Handbook/dp/1260108414/ref=dp_ob_title_bk)
### Kali Stuff
### Metasploit and Armitage
[Armitage - Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/armitage/) [Armitage | Penetration Testing Tools](https://tools.kali.org/exploitation-tools/armitage) [Step by step Metasploit walkthrough](https://zero-day.io/metasploitwalkthrough/) [How to create metasploitable 3](https://zero-day.io/metasploitable3/) [GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.](https://github.com/rapid7/metasploitable3) [How to setup Metasploitable 3 on Windows 10 - Hacking Tutorials](https://www.hackingtutorials.org/metasploit-tutorials/setup-metasploitable-3-windows-10/) [Metasploitable 2 Exploitability Guide](https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide) [Home · rapid7/metasploitable3 Wiki · GitHub](https://github.com/rapid7/metasploitable3/wiki) [Introduction-to-Metasploit.pdf](https://a.ndronic.us/guides/metasploit/Introduction-to-Metasploit.pdf) [Metasploit Unleashed - Free Online Ethical Hacking Course](https://www.offensive-security.com/metasploit-unleashed/)
[Kali Training Course](https://kali.training/introduction/abstract/)
### Hack The Box
[Hack the Box Challenge: Tally Walkthrough](http://www.hackingarticles.in/hack-the-box-challenge-tally-walkthrough/) [Hack The Box :: Penetration Testing Labs](https://www.hackthebox.eu/) [IppSec - YouTube](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA/videos) [GitHub - Hackplayers/hackthebox-writeups: Writeups for HacktheBox 'boot2root' machines](https://github.com/Hackplayers/hackthebox-writeups)
### Labs
[Virtual Hacking Labs | IT Security Training Labs & Courses](https://www.virtualhackinglabs.com/) [[PentesterLab] Learn Web Penetration Testing: The Right Way](https://pentesterlab.com/)
### Vulnerable VM's and Wargames
[Vulnerable By Design ~ VulnHub](https://www.vulnhub.com/) [GitHub - cliffe/SecGen: Create randomly insecure VMs](https://github.com/cliffe/SecGen) [Vulnerable Web Apps - Home](http://www.vulnerablewebapps.org/) [Hacker101 CTF](https://ctf.hacker101.com/)
### Methodology/Standards
[Red Teaming and Pentesting Tips | synack.blog](http://synack.blog/posts/red-teaming-and-pentesting-tips/index.html) [Pen Testing Standard (READ FOR STUDYING)](http://www.pentest-standard.org/index.php/Main_Page) [Penetration Testing Methodology - 0DAYsecurity.com](http://www.0daysecurity.com/penetration-testing/penetration.html) [Cyber Kill Chain® | Lockheed Martin](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html)
[Shared thoughts after 6+ years in Pentesting - Inspiration - 0x00sec - The Home of the Hacker](https://0x00sec.org/t/shared-thoughts-after-6-years-in-pentesting/2492) [Where to start - 1st Line to Pen Testing : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/8bq83p/where_to_start_1st_line_to_pen_testing/) [Learning The Ropes 101 Posts](https://blog.zsec.uk/tag/ltr101/) [So You Want To Be a Pentester? - Jack Hacks](https://jhalon.github.io/becoming-a-pentester/) [Introduction to Pen Testing](https://xapax.gitbooks.io/security/) [wtsxDev/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things](https://github.com/wtsxDev/Penetration-Testing#windows-utils) [125 Hacking Tools For Penetration Testing in 2019 - CyberX](https://s3.wasabisys.com/web.hosting.cyberx.tech/Hacking%20Tools%20Freebie/HackingToolsCyberX.pdf) [Web Security Academy](https://portswigger.net/web-security) [Interview questions for red team/pentest candidates](https://github.com/WebBreacher/offensiveinterview)
### Other Useful Posts/Blogs/Sites
[Hack Back! A DIY Guide - Pastebin.com](https://pastebin.com/0SNSvyjJ)
### Pen-Testing Cheat Sheets
[ATT&CK™ Navigator](https://mitre.github.io/attack-navigator/enterprise/#) [Most Important Penetration Testing Cheat Sheet Linux Machine](https://techincidents.com/important-penetration-testing-cheat-sheet/) [SANS Penetration Testing Cheat Sheet: PowerShell](https://pen-testing.sans.org/blog/2016/05/25/sans-powershell-cheat-sheet/) [Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual](https://github.com/droberson/rtfm) [Techniques: Enterprise - MITRE ATT&CK](https://attack.mitre.org/techniques/enterprise/)
### OSCP and OSCE Specific Stuff
### Recommended for OSCP
[OSCP Goldmine](http://0xc0ffee.io/blog/OSCP-Goldmine) [Prep guide for Offsec’s PWK – Tulpa Security](https://tulpa-security.com/2016/09/19/prep-guide-for-offsecs-pwk/) [tulpa-pwk-prep-guide1.pdf](https://tulpasecurity.files.wordpress.com/2016/09/tulpa-pwk-prep-guide1.pdf) [offsec_pdfs: your offsec knowledge](https://github.com/jivoi/offsec_pdfs) [abatchy's blog | How to prepare for PWK/OSCP, a noob-friendly guide](https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob) [Offensive Security Training and Professional Services](https://www.offensive-security.com/) [Offensive Security Certified Professional (OSCP) Study Guide Links & Material | Computer Security.org - CyberSecurity News, Information, Education, Certifications, Vulnerabilities and Guides](http://www.computersecurity.org/computer-cyber-security-certifications-education-college-courses/offensive-security-certified-professional-oscp-study-guide-links-material/) [Offensive Security – Godlike Security](http://godlikesecurity.com/index.php/tag/offensive-security/) [Free Advanced Penetration Testing Training Class from Cybrary](https://www.cybrary.it/course/advanced-penetration-testing/) [Next Step After OSCP/OSCE? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/89eksz/next_step_after_oscposce/) [PWK Syllabus Scheduling Question For OSCP Holders : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/89ift6/pwk_syllabus_scheduling_question_for_oscp_holders/) [Advice on Windows pentesting methodology (OSCP) : HowToHack](https://www.reddit.com/r/HowToHack/comments/8cuiol/advice_on_windows_pentesting_methodology_oscp/) [A Detailed Guide on OSCP Preparation - From Newbie to OSCP - Checkmate](http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/) [xMilkPowderx/OSCP: OSCP cheet sheet](https://github.com/xMilkPowderx/OSCP) [x89k - OSCP survival guide](https://lduck11007.github.io/infosec/2018/11/03/oscpsurvivalguide.html) [Cheatsheet-God: Penetration Testing](https://github.com/OlivierLaflamme/Cheatsheet-God) [Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97) [Offensive Security's Guide To Alpha](https://usermanual.wiki/Document/Offensive20Securitys20Complete20Guide20to20Alpha.546296816/view) [Open Broadcaster Software | OBS](https://obsproject.com/)
### Recommended for OSCE
[Exploit Writing Tutorials | Corelan Team - Part 2](https://www.corelan.be/index.php/category/security/exploit-writing-tutorials/page/2/) [Corelan Exploit Development Training](https://www.corelan-training.com/) [0x5 Course Review: Cracking The Perimeter (OSCE)](http://www.primalsecurity.net/course-review-osce/) [Cracking the Perimeter (CTP) + Offensive Security Certified Expert (OSCE)](https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/) [Course Review: Offensive Security AWE (Advanced Windows Exploitation) - EH-Net Online Mag](https://www.ethicalhacker.net/features/root/course-review-offensive-security-awe-advanced-windows-exploitation) [abatchy's blog: OSCE Study Plan](http://www.abatchy.com/2017/03/osce-study-plan.html?m=1) [My OSCE Review - The Coffeegist](https://coffeegist.com/security/my-osce-review/) [abatchy's blog | Posts Tagged “OSCE Prep”](http://www.abatchy.com/tag/OSCE%20Prep/)
### Peoples Experiences of OSCP
[OSCP Review](http://netsec.ws/?p=398) [31 days of OSCP Experience - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/) [The OSCP: A Process Focused Review – Occult Sec](https://occultsec.com/2018/04/27/the-oscp-a-process-focused-review/) [www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html](http://www.techexams.net/forums/security-certifications/120656-osce-jollyfrogs-tale.html) [Zero to OSCP in 292 Days... or How I Accidentally the Whole Thing - Part 2](https://blog.mallardlabs.com/zero-to-oscp-in-292-days-or-how-i-accidentally-the-whole-thing-part-2/) [Check out my review of the OSCP!! Comes with recommendations on how you too can pass the OSCP! I Tried Harder!! Hope this helps! : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/6m76h1/check_out_my_review_of_the_oscp_comes_with/) [Offensive Security Certified Professional (OSCP) Review - Jim Wilbur's Blog](https://www.jimwilbur.com/2017/07/oscp-review/) [Another OSCP Prep Review](https://areyou1or0.blogspot.com/2019/01/finally-oscp-may-force-be-with-you.html) [The Journey to Try Harder: TJNull’s Preparation Guide for PWK/OSCP | NetSec Focus](https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html) [Hakluke’s Ultimate OSCP Guide: Part 3 — Practical hacking tips and tricks](https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97) [Passing OSCP - scund00r](https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html)
### Worth Looking At
[Penetration Testing Tools Cheat Sheet](https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/) [Nmap Cheat Sheet](https://highon.coffee/blog/nmap-cheat-sheet/) [HighOn.Coffee • Security Research • Penetration Testing Blog](https://highon.coffee/) [Linux Commands Cheat Sheet](https://highon.coffee/blog/linux-commands-cheat-sheet/) [Compilation of commands, tips and scripts](https://github.com/adon90/pentest_compilation)
### Vulnerable VMs
[GoldenEye - New Vulnerable OSCP Style Machine - netsecstudents](https://www.reddit.com/r/netsecstudents/comments/8gdsaw/goldeneye_new_vulnerable_oscp_style_machine/?utm_source=reddit-android) [Wintermute OSCP Style Pivot Lab](https://www.reddit.com/r/netsecstudents/comments/8w4dm8/wintermute_new_vulnerable_oscp_style_lab/) [hackfest2016: Quaoar ~ VulnHub](https://www.vulnhub.com/entry/hackfest2016-quaoar%2C180/) [hackfest2016: Sedna ~ VulnHub](https://www.vulnhub.com/entry/hackfest2016-sedna%2C181/) [SecOS: 1 ~ VulnHub](https://www.vulnhub.com/entry/secos-1%2C88/) [SecTalks: BNE0x03 - Simple ~ VulnHub](https://www.vulnhub.com/entry/sectalks-bne0x03-simple%2C141/) [TopHatSec: Freshly ~ VulnHub](https://www.vulnhub.com/entry/tophatsec-freshly%2C118/) [TopHatSec: ZorZ ~ VulnHub](https://www.vulnhub.com/entry/tophatsec-zorz%2C117/) [abatchy's blog | OSCP-like Vulnhub VMs](https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms.html) [CTF Series : Vulnerable Machines](https://bitvijays.github.io/LFC-VulnerableMachines.html) [OSCP like boxes](https://pbs.twimg.com/media/DxeuRS6WoAAnnVm.jpg)
### 1\. Recon/Information Gathering/Enumeration
### NMAP
[Nmap Cheat Sheet](https://www.stationx.net/nmap-cheat-sheet/) [Nmap Tutorial: from the Basics to Advanced Tips](https://hackertarget.com/nmap-tutorial/) [Nmap: the Network Mapper - Free Security Scanner](https://nmap.org/) [NMAP CHEAT-SHEET](https://www.peerlyst.com/posts/nmap-cheat-sheet-sanyam-chawla?trk=search_page_search_result) [21y4d/nmapAutomator: A script that you can run in the background!](https://github.com/21y4d/nmapAutomator)
### Subdomain/DNS Stuff
[FindSubDomains.com — subdomains search service](https://findsubdomains.com/) [Sublist3r: Fast subdomains enumeration tool](https://github.com/aboul3la/Sublist3r) [Another Subdomain List](https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS) [Subdomain Wordlist for Knock](https://gist.githubusercontent.com/cheetz/4d6a26bb122a942592ab9ac21894e57b/raw/f58e82c9abfa46a932eb92edbe6b18214141439b/all.txt) [SubBrute: A DNS meta-query spider that enumerates DNS records, and subdomains.](https://github.com/TheRook/subbrute) [Knock - Subdomain Scanning](https://github.com/guelfoweb/knock) [A penetration tester’s guide to sub-domain enumeration](https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6) [MassDNS: A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)](https://github.com/blechschmidt/massdns) [Domain Name Search | Domain Lookup](https://instantdomainsearch.com/) [Gobuster: Directory/file & DNS busting tool written in Go](https://github.com/OJ/gobuster) [SANS - Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/paper/956) [DNSdumpster.com - dns recon and research, find and lookup dns records](https://dnsdumpster.com/) [dnsrecon: DNS Enumeration Script](https://github.com/darkoperator/dnsrecon/)
[Information-Gathering Resources](https://github.com/nixawk/pentest-wiki/tree/master/1.Information-Gathering) [Discover - Combination of Recon Tools](https://github.com/leebaird/discover) [Th3Inspector 🕵️ best tool for Information Gathering 🔎](https://github.com/Moham3dRiahi/Th3inspector) [sullo/nikto: Nikto web server scanner](https://github.com/sullo/nikto) [Google Dorks for finding Emails, Admin users etc.](https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/) [Recon-ng — Bitbucket](https://bitbucket.org/LaNMaSteR53/recon-ng) [EnumerationVisualized Wiki](https://github.com/DigitalAftermath/EnumerationVisualized/wiki) [SPARTA - scanning and enumeration phase tool](http://sparta.secforce.com/) [Reconnoitre: A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.](https://github.com/codingo/Reconnoitre) [Search - Public Database Directory - Public DB Host](https://databases.today/search.php) [Penetration Testing Methodology - 0DAYsecurity.com](http://www.0daysecurity.com/penetration-testing/enumeration.html) [Recon Video List](https://davyrogers.uk/courses.html#Reconnaissance) [Find email addresses in seconds • Hunter (Email Hunter)](https://hunter.io/) [A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets) | Sequoia](https://www.sequoiacybersolutions.com/a-pentesters-guide-part-1-osint-passive-recon-and-discovery-of-assets/) [We Leak Info - Data Breach Search Engine](https://search.weleakinfo.com/) [Tib3rius/AutoRecon: AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.](https://github.com/Tib3rius/AutoRecon)
### 2\. Vulnerability Assessment
[Vulnerability-Assessment Resources](https://github.com/nixawk/pentest-wiki/tree/master/2.Vulnerability-Assessment) [A curated list of CVE PoCs.](https://github.com/qazbnm456/awesome-cve-poc) [OpenVAS - OpenVAS - Open Vulnerability Assessment System](http://www.openvas.org/) [Nessus Professional™ Vulnerability Scanner](https://www.tenable.com/products/nessus/nessus-professional)
### 3\. Exploitation
[Exploitation Tools and Resources](https://github.com/nixawk/pentest-wiki/tree/master/3.Exploitation-Tools) [Empire Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/Empire.pdf) [LocalFileIncludes Cheat Sheet](https://highon.coffee/blog/lfi-cheat-sheet/) [Local File Inclusion (LFI) [Definitive Guide] - Aptive](https://www.aptive.co.uk/blog/local-file-inclusion-lfi-testing/) [PowerSploit Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/PowerSploit.pdf) [PowerView-2.0 tips and tricks](https://gist.github.com/HarmJ0y/3328d954607d71362e3c) [PowerView-3.0 tips and tricks](https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993) [PHP htaccess injection cheat sheet](https://github.com/sektioneins/pcc/wiki/PHP-htaccess-injection-cheat-sheet) [Reverse Shell Cheat Sheet](https://highon.coffee/blog/reverse-shell-cheat-sheet/) [SQL Injection Cheat Sheet](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/) [SQLite3 Injection Cheat Sheet](http://atta.cked.me/home/sqlite3injectioncheatsheet) [A collection of web attack payloads.](https://github.com/foospidy/payloads) [Useful payloads and bypass for Web App](https://github.com/swisskyrepo/PayloadsAllTheThings) [unicorn: PowerShell downgrade attack and inject shellcode straight into memory](https://github.com/trustedsec/unicorn)
### 4\. Post Exploitation
### Hack Back
[BusyBox](https://www.busybox.net/) [Nmap: the Network Mapper - Free Security Scanner](https://nmap.org/) [Responder: A LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.](https://github.com/SpiderLabs/Responder) [Static-python: A fork of cpython that supports building a static interpreter and true standalone executables](https://github.com/bendmorris/static-python) [TCPDUMP/LIBPCAP public repository](http://www.tcpdump.org/) [dsniff - For sniffing passwords from plaintext protocols like ftp, and for arpspoofing](https://www.monkey.org/~dugsong/dsniff/) [socat - networking swiss army knife](http://www.dest-unreach.org/socat/) [Screen - GNU Project - Free Software Foundation](https://www.gnu.org/software/screen/) [SOCKS Proxy Server - Simple socks5 server in C++](http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html) [tgcd - For forwarding ports, like for the SOCKS server, through the firewall - TCP/IP Gender Changer Daemon](http://tgcd.sourceforge.net/) [Mimikatz: A little tool to play with Windows security](https://github.com/gentilkiwi/mimikatz) [Samba - opening windows to a wider world](https://www.samba.org/) [ProxyChains - TCP and DNS through proxy server. HTTP and SOCKS](http://proxychains.sourceforge.net/) [GitHub - Neohapsis/creddump7](https://github.com/Neohapsis/creddump7)
[Post-Exploitation Resources (Windows)](https://github.com/nixawk/pentest-wiki/tree/master/4.Post-Exploitation) [rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks](https://github.com/rebootuser/LinEnum) [Post-Exploitation - NYU Poly 2011](https://vimeo.com/33344191) [Transferring files from Kali to Windows (post exploitation)](https://blog.ropnop.com/transferring-files-from-kali-to-windows/) [PowerSploit - A PowerShell Post-Exploitation Framework](https://github.com/PowerShellMafia/PowerSploit) [Empire: A PowerShell and Python post-exploitation agent.](https://github.com/EmpireProject/Empire) [Persistence Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-persistence) [Lateral Movement Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-lateral-movement) [enum4Linux: is a Linux alternative to enum.exe](https://github.com/portcullislabs/enum4linux) [enum4linux Cheat Sheet](https://highon.coffee/blog/enum4linux-cheat-sheet/) [PwnWiki.io - TTPs (tools, tactics, and procedures) for what to do after access has been gained](http://pwnwiki.io/#!index.md) [Gaining Access Video List](https://davyrogers.uk/courses.html#GainingAccess)
### 5\. Privilege Escalation
### Linux Privesc
[Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/) [Linux_Exploit_Suggester: Linux Exploit Suggester; based on operating system release number](https://github.com/InteliSecureLabs/Linux_Exploit_Suggester) [Linux-exploit-suggester-2: Next-Generation Linux Kernel Exploit Suggester](https://github.com/jondonas/linux-exploit-suggester-2) [Checksec.sh - Check Securities on a file](https://github.com/slimm609/checksec.sh) [Linux Privilege Escalation via Automated Script](http://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/) [A guide to Linux Privilege Escalation - payatu](https://payatu.com/guide-linux-privilege-escalation/) [Abusing SUDO (Linux Privilege Escalation)](http://touhidshaikh.com/blog/?p=790) [Editing /etc/passwd File for Privilege Escalation](http://www.hackingarticles.in/editing-etc-passwd-file-for-privilege-escalation/) [Linuxprivchecker Script](https://github.com/sleventyeleven/linuxprivchecker/blob/master/linuxprivchecker.py) [Linux Privilege Escalation Using PATH Variable](http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/) [Linux Privilege Escalation using Misconfigured NFS](http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/) [Linux Privilege Escalation via Dynamically Linked Shared Object Library | Context Information Security EN](https://www.contextis.com/en/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library) [Local Linux Enumeration & Privilege Escalation Cheatsheet – Rebootuser](https://www.rebootuser.com/?p=1623) [Privilege-Escalation Scripts](https://github.com/AusJock/Privilege-Escalation/tree/master/Linux) [Privilege Escalation on Linux with Live examples](https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/) [4 Ways to get Linux Privilege Escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/) [Linux Privilege Escalation by Exploiting Cronjobs](http://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/) [Privilege Escalation - Linux · pentestbook](https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_-_linux.html) [Linux elevation of privileges](https://guif.re/linuxeop)
### Windows Privesc
[PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc) [PowerUp Cheat Sheet](https://github.com/HarmJ0y/CheatSheets/blob/master/PowerUp.pdf) [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) [Sherlock: PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.](https://github.com/rasta-mouse/Sherlock) [WindowsExploits](https://github.com/abatchy17/WindowsExploits) [Windows-kernel-exploits](https://github.com/SecWiki/windows-kernel-exploits) [Metasploit Framework](https://github.com/rapid7/metasploit-framework) [Well, That Escalated Quickly… – To Shell And Back: Adventures In Pentesting](https://www.toshellandback.com/2015/11/24/ms-priv-esc/) [OSCP - Windows Priviledge Escalation](http://hackingandsecurity.blogspot.com/2017/09/oscp-windows-priviledge-escalation.html) [Privilege-Escalation Scripts](https://github.com/AusJock/Privilege-Escalation/tree/master/Windows) [Checklists-Windows-Privilege-Escalation](https://github.com/netbiosX/Checklists/blob/master/Windows-Privilege-Escalation.md) [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html) [Windows Privilege Escalation Guide](https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/) [Windows Privilege Escalation Methods for Pentesters – Pentest Blog](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/) [A Virgil's Guide to Pentest: Escalation Time](http://virgil-cj.blogspot.com/2018/02/escalation-time.html) [BeRoot For Windows – Privilege Escalation Project – Haxf4rall](https://haxf4rall.com/2018/07/06/beroot-for-windows-privilege-escalation-project/) [Elevating privileges by exploiting weak folder permissions | GreyHatHacker.NET](http://www.greyhathacker.net/?p=738) [Windows Priv Esc Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-privilege-escalation) [icerbreaker - Priv Escalation - Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment](https://github.com/DanMcInerney/icebreaker) [Windows elevation of privileges](https://guif.re/windowseop) [OneTab shared tabs](https://www.one-tab.com/page/9tuXDg5gT8KBMsI-4fXLkQ) [FuzzySecurity | Windows Privilege Escalation Fundamentals](https://www.fuzzysecurity.com/tutorials/16.html)
[Windows / Linux Local Privilege Escalation Workshop](https://github.com/sagishahar/lpeworkshop) [rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks](https://github.com/rebootuser/LinEnum) [sqlmap-cheatsheet](https://github.com/coreb1t/awesome-pentest-cheat-sheets/blob/master/docs/sqlmap-cheatsheet-1.0-SDB.pdf) [SQLMap Tamper Scripts (SQL Injection and WAF bypass)](https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423) [Privilege Escalation Video List](https://davyrogers.uk/courses.html#PrivilegeEscalation) [Recipe for Root – Your Cookbook for Privilege Escalation](https://recipeforroot.com/) [Privilege Escalation Cheatsheet (Vulnhub)](https://www.hackingarticles.in/privilege-escalation-cheatsheet-vulnhub/)
### 6\. Reporting
[Reporting - The Penetration Testing Execution Standard](http://www.pentest-standard.org/index.php/Reporting) [sample-penetration-testing-report.pdf](https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf) [Curated list of public penetration test reports](https://github.com/juliocesarfort/public-pentesting-reports) [Cure53 – Fine penetration tests for fine websites](https://cure53.de/#publications)
### Active Directory
[Introducing BloodHound](https://wald0.com/?p=68) [My First Go with BloodHound | Strategic Cyber LLC](https://blog.cobaltstrike.com/2016/12/14/my-first-go-with-bloodhound/) [BloodHoundAD - reveal the hidden and often unintended relationships within an Active Directory environment](https://github.com/BloodHoundAD/BloodHound/wiki) [Active Directory Pentesting Archives - ScriptDotSh](https://scriptdotsh.com/index.php/category/active-directory-pentesting/) [Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…](https://adsecurity.org/) [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa) [harmj0y – security at the misfortune of others](https://blog.harmj0y.net/)
### OSINT (Open Source Intelligence)
[A curated list of Threat Intelligence resources](https://github.com/hslatman/awesome-threat-intelligence) [List of Threat Intelligence Stuff](https://github.com/sbilly/awesome-security#threat-intelligence) [GitHub - x0rz/tweets_analyzer: Tweets metadata scraper & activity analyzer](https://github.com/x0rz/tweets_analyzer) [AsINT_Collection - start.me](https://start.me/p/b5Aow7/asint_collection) [Spiderfoot, an Open Source Intelligence Automation Tool](http://securitytrails.com/blog/spiderfoot-osint-automation-tool) [ꓘamerka — Build interactive map of cameras from Shodan](https://medium.com/@woj_ciech/%EA%93%98amerka-build-interactive-map-of-cameras-from-shodan-a0267849ec0a) [Open Source Intelligence Gathering 101 – Appsecco](https://blog.appsecco.com/open-source-intelligence-gathering-101-d2861d4429e3) [crt.sh | Certificate Search](https://crt.sh/) [Shodan](https://www.shodan.io/) [Domain Dossier - Investigate domains and IP addresses, get owner and registrar information, see whois and DNS records](https://centralops.net/co/domaindossier.aspx) [Censys (Discover new threats)](https://censys.io/) [Open Source Intelligence Gathering 201 (Covering 12 additional techniques)](https://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544) [Creepy: A geolocation OSINT tool](https://github.com/ilektrojohn/creepy) [XRay - mapping and OSINT gathering from public networks.](https://github.com/evilsocket/xray) [Geotweet_GUI: Social engineering tool](https://github.com/Pinperepette/Geotweet_GUI) [DataSploit: An OSINT Framework to perform various recon techniques](https://github.com/DataSploit/datasploit) [SpiderFoot](https://www.spiderfoot.net/) [Google Hacking Database, GHDB, Google Dorks](https://www.exploit-db.com/google-hacking-database/) [theHarvester: E-mails, subdomains and names Harvester](https://github.com/laramies/theHarvester) [OSINT Search Tool by IntelTechniques | Open Source Intelligence](https://inteltechniques.com/menu.html) [2019 OSINT Guide](https://www.randhome.io/blog/2019/01/05/2019-osint-guide/) [Google Search Operators: The Complete List (42 Advanced Operators)](https://ahrefs.com/blog/google-advanced-search-operators/) [BelleBytes OSINT Guide - Storm CTF](https://stormctf.ninja/ctf/blog/stormctf/bellebytes-osint-guide) [From Email Address to Phone Number: A New OSINT Approach - Martin Vigo - YouTube](https://www.youtube.com/watch?v=0c92l9v5Sns)
### Credential Cracking and Brute Forcing
### Password Lists
[Recent 1.4 billion password breach compilation as wordlist : netsec](https://www.reddit.com/r/netsec/comments/7kqpx9/recent_14_billion_password_breach_compilation_as/) [philipperemy/tensorflow-1.4-billion-password-analysis: Deep Learning model to analyze a large corpus of clear text passwords.](https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis)
[JohnTheRipper](https://github.com/magnumripper/JohnTheRipper) [hashcat - advanced password recovery](https://hashcat.net/hashcat/) [THC Hydra - brute force crack a remote authentication service](https://sectools.org/tool/hydra/) [Credential Access Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-credential-access) [Patator: is a multi-purpose brute-forcer](https://github.com/lanjelot/patator) [Ophcrack - Windows Password Cracker](http://ophcrack.sourceforge.net/) [Nozzlr: Multithreaded Brute Forcer](https://github.com/intrd/nozzlr) [Decrypt Google Chrome / Chromium passwords and credit cards on macOS / OS X.](https://github.com/manwhoami/OSXChromeDecrypt) [Chrome Password Decryptor : Free Tool to Recover Lost or Forgotten Website Password from Google Chrome Browser](http://securityxploded.com/chromepassworddecryptor.php) [How to Grab All the Passwords « Null Byte :: WonderHowTo](https://null-byte.wonderhowto.com/how-to/grab-all-passwords-0163301/)
### Web Security
### Books
[The Browser Hacker's Handbook](https://www.amazon.com/Browser-Hackers-Handbook-Wade-Alcorn/dp/1118662091/ref=dp_rm_img_4) [The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws](https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/ref=dp_rm_img_1)
### Burp
[Burp Intro](https://github.com/bugcrowd/bugcrowd_university/blob/master/An_introduction_to_Burp_Suite/Bugcrowd%20University%20-%20Burp%20Suite%20Introduction.pdf) [0x2 Exploit Tutorial: Web Hacking with Burp Suite](http://www.primalsecurity.net/0x2-exploit-tutorial-web-hacking-with-burp-suite/)
### XSS
[webGun - XSS Payload Build Tool](https://brutelogic.com.br/webgun/) [Unleashing an Ultimate XSS Polyglot · 0xSobky/HackVault Wiki](https://github.com/0xsobky/HackVault/wiki/Unleashing-an-Ultimate-XSS-Polyglot) [XSS Polyglot Challenge](http://polyglot.innerht.ml/) [Browser's XSS Filter Bypass Cheat Sheet · masatokinugawa/filterbypass Wiki](https://github.com/masatokinugawa/filterbypass/wiki/Browser's-XSS-Filter-Bypass-Cheat-Sheet) [0×1 Exploit Tutorial: XSS](http://www.primalsecurity.net/0x1-exploit-tutorial-xss/) [XSS Payloads](http://www.xss-payloads.com/) [unescape() room](https://unescape-room.jobertabma.nl/) [Useful payloads and bypass for Web App](https://github.com/swisskyrepo/PayloadsAllTheThings)
[$10k host header - Test](https://sites.google.com/site/testsitehacking/10k-host-header) [Web Security · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Web-Security) [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/03_web_exploitation.html#1) [Web Security - Webgoat](https://github.com/WebGoat/WebGoat) [zseano | UK Security Researcher](https://zseano.com/) [High Performance Web Brute-Forcing 🕸🐏 – hiburn8](http://hiburn8.org/index.php/2018/09/13/high-performance-web-brute-forcing/) [The Bug Hunter’s Methodology 2.0 – Jason Haddix](https://jasonhaddix.com/the-bug-hunters-methodology-2-0/) [The Bug Hunters Methodology](https://github.com/jhaddix/tbhm) [Web Hacking Tools List](https://github.com/carpedm20/awesome-hacking#web) [A list of web application security resources](https://github.com/infoslack/awesome-web-hacking) [A curated list of Web Security materials and resources.](https://github.com/qazbnm456/awesome-web-security) [A Methodical Approach to Browser Exploitation | Ret2 Systems Blog](http://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/) [ZAP - Zed Attack Proxy Project](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) [Samurai 3.0 Branch - Web Pen Testing VM](https://sourceforge.net/projects/samurai/files/SamuraiWTF%203.0%20Branch/) [Samurai - Course -Web Pen-testing VM](https://sourceforge.net/projects/samurai/files/SamuraiWTF%20Course/) [OWASP Juice Shop Project - Web Pen Testing Challenge](https://www.owasp.org/index.php/OWASP_Juice_Shop_Project) [Vulnerable Web Applications Directory](https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps)
### Red-Team (C2 Stuff and Other Good Things)
### C2/Infrastructure
[Coalfire-Research/Red-Baron: Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.](https://github.com/Coalfire-Research/Red-Baron) [Red-Team-Infrastructure-Wiki/README.md at master · bluscreenofjeff/Red-Team-Infrastructure-Wiki](https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki/blob/master/README.md) [C2 Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-command-and-control) [Red Team Laptop & Infrastructure (pt 1: Architecture) – Hacking & Coffee](https://hackingand.coffee/2018/02/assessment-laptop-architecture/) [Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike - CyberArk](https://www.cyberark.com/threat-research-blog/red-team-insights-https-domain-fronting-google-hosts-using-cobalt-strike/)
[List of Red Teaming Resources](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) [Initial Access (Phishing/Social Engineering/etc)](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-initial-access) [Defense Evasion Stuff](https://github.com/yeyintminthuhtut/Awesome-Red-Teaming#-defense-evasion)
### Lock Picking
[A curated list of guides, tools, and other resources related to the security and compromise of locks, safes, and keys.](https://github.com/meitar/awesome-lockpicking) [Lock Picking Books](https://github.com/enaqx/awesome-pentest#lock-picking-books) [Super Bump Key Set](http://www.sparrowslockpicks.com/product_p/bkfull.htm)
### Social Engineering
[A curated list of social engineering resources](https://github.com/v2-dev/awesome-social-engineering) [Geotweet_GUI: Social engineering tool](https://github.com/Pinperepette/Geotweet_GUI) [Social Engineering Books](https://github.com/enaqx/awesome-pentest#social-engineering-books)
### CTF Focused Things
### Getting Started
[How to Get Started in CTF | ENDGAME](https://www.endgame.com/blog/how-get-started-ctf) [Introduction | CTF Field Guide](https://trailofbits.github.io/ctf/) [[WeChall] Participating Challenge Sites](https://www.wechall.net/active_sites)
### Twitch Streams and Videos To Learn From
[Play CTF! A Great Way to Learn Hacking - Fsec 2017 - YouTube](https://www.youtube.com/watch?v=rfjV8XukxO8) [KevOrr/ctf-training](https://github.com/KevOrr/ctf-training) [livectf - Twitch](https://www.twitch.tv/livectf) [GynvaelEN - YouTube](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg) [Murmus CTF - YouTube](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A) [LiveOverflow - Awesome to learn Computer Security](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
### Writeups
[Myne-us: From 0x90 to 0x4c454554, a journey into exploitation.](http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html) [writeups/icectf-2016 at master · WCSC/writeups · GitHub](https://github.com/WCSC/writeups/tree/master/icectf-2016) [CTFtime.org / IceCTF 2016 tasks and writeups](https://ctftime.org/event/319/tasks/) [Hackover CTF 2015 – easy-shell - Writeup - f00ls bl0g](https://f00l.de/blog/hackover-ctf-2015-easy-shell/) [Google CTF 2017 Quals Write-up Winners - Google Drive](https://drive.google.com/drive/folders/0BwMPuUHZOj0nZ2dGZS1KbWNGN0E) [Notes - gynvael.coldwind//vx](http://gynvael.coldwind.pl/n/python_sandbox_escape) [Blizzard CTF 2017 – The LichKing Reverse Engineering challenge walkthrough | Shortjump!](http://0xeb.net/?p=34) [Zero Day Initiative — Testing for Truthiness: Exploiting Improper Checks](https://www.zerodayinitiative.com/blog/2018/3/9/testing-for-truthiness-exploiting-improper-checks) [How To Hack - Episode 2: Use-After-Free Triple Bounce - YouTube](https://www.youtube.com/watch?v=6LbMmRyrQpA&feature=youtu.be) [PlaidCTF Write-up: Shop](https://nickcano.com/plaidctf-shop/) [Building up from the Ethereum Bytecode | Ret2 Systems Blog](https://blog.ret2.io/2018/05/16/practical-eth-decompilation/) [DEF CON® 26 Hacking Conference News](https://www.defcon.org/html/defcon-26/dc-26-news.html#dc26ctfwriteups) [RPISEC Blog](https://blog.rpis.ec/) [CTFs](https://github.com/ctfs) [CSAW CTF 2015 - Alexander Taylor – OSIRIS Lab at NYU SOE](http://blog.isis.poly.edu/2015/09/21/csaw-ctf-alexander-taylor/) [Practical case: Secura Grand Slam CTF “Easy Reverse” – Max Kersten](https://maxkersten.nl/binary-analysis-course/introduction/secura-grand-slam-ctf-easy-reverse/) [Capture the Flag Challenges](http://www.hackingarticles.in/capture-flag-challenges/) [GitHub - antihorsey/ctf-writeups: Writeups of problems from past CTFs](https://github.com/antihorsey/ctf-writeups) [CTFs](https://github.com/ctfs/) [write-ups-2015/seccon-quals-ctf-2015/stegano/steganography-2 at master · ctfs/write-ups-2015](https://github.com/ctfs/write-ups-2015/tree/master/seccon-quals-ctf-2015/stegano/steganography-2) [How to Read JPG Height and Width from Binary/Hex data?](https://www.experts-exchange.com/questions/11416918/How-to-Read-JPG-Height-and-Width-from-Binary-Hex-data.html) [ctf-writeups/babypwn.md at master · VulnHub/ctf-writeups · GitHub](https://github.com/VulnHub/ctf-writeups/blob/master/2017/codegate-prequels/babypwn.md) [ctf-writeups/rop2libc.md at master · VulnHub/ctf-writeups · GitHub](https://github.com/VulnHub/ctf-writeups/blob/master/2016/angstrom-ctf/rop2libc.md) [ctf-challenges/pwn/stackoverflow/ret2libc at master · ctf-wiki/ctf-challenges · GitHub](https://github.com/ctf-wiki/ctf-challenges/tree/master/pwn/stackoverflow/ret2libc) [33C3 CTF 2016 -- ESPR « Hacking Tube](http://bruce30262.logdown.com/posts/1255979-33c3-ctf-2016-espr) [write-ups-2016/hackcon-ctf-2016/pwn/easiest-pwn-not-250 at master · ctfs/write-ups-2016](https://github.com/ctfs/write-ups-2016/tree/master/hackcon-ctf-2016/pwn/easiest-pwn-not-250) [google-ctf - solutions](https://github.com/google/google-ctf/blob/master/2018/finals/solutions.pdf) [csaw-ctf-2014 - S3 writeup](https://github.com/ctfs/write-ups-2014/tree/master/csaw-ctf-2014/s3) [ctfs - write-ups-2014](https://github.com/ctfs/write-ups-2014) [Metasploit Community CTF 2018: 2 of Diamonds Write-Up](https://ethicalhackers.club/metasploit-community-ctf-2018-2-of-diamonds-write-up/) [Metasploit Community CTF 2018](https://www.secjuice.com/metasploit-ctf/) [50M_CTF_Writeup/README.md at master · manoelt/50M_CTF_Writeup](https://github.com/manoelt/50M_CTF_Writeup/blob/master/README.md) [CTFtime.org / Google Capture The Flag 2017 (Quals) tasks and writeups](https://ctftime.org/event/455/tasks/) [Flare-on 6 2019 Writeups](https://malwareunicorn.org/workshops/flareon6_2019.html#0) [Google CTF 2019 Write-Up - HackMD](https://hackmd.io/@gzUPn_btRq2TbqRUdfX9Cw/rkfEQo4gH#Google-CTF-2019-Write-Up)
### Tools to Use
[zardus/ctf-tools- Some useful tools for various challenges](https://github.com/zardus/ctf-tools) [INTROSEC - Useful tools for various challenges](https://introsec.backdrifting.net/Assets) [Pip installation](https://pip.pypa.io/en/stable/installing/) [Online Decoder For Esolangs](https://tio.run/#)
### Crypto
[CyberChef (Crypto)](https://gchq.github.io/CyberChef/) [dCode - Solvers, Crypto, Maths, Decoding, Online Tools](https://www.dcode.fr/) [Crypto Tools](https://github.com/apsdehal/awesome-ctf#crypto) [Base64 Decode and Encode - Online](https://www.base64decode.org/) [Cipher Tools](http://rumkin.com/tools/cipher/) [quipquip - Awesome Crypto Solver](https://quipqiup.com/) [The Enigma machine: Encrypt and decrypt online — Cryptii](https://cryptii.com/pipes/enigma-machine) [zweisamkeit/RSHack: RSHack - Tool for RSA CTF's challenges](https://github.com/zweisamkeit/RSHack) [Practice Crypto Challenges - Cryptopals](https://cryptopals.com/) [CyberChef](http://icyberchef.com/) [rot13.com](https://rot13.com/) [Awesome Frequency Analysis Tool](https://crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html) [Some inactive CTF challenge : codes](https://www.reddit.com/r/codes/comments/7yux88/some_inactive_ctf_challenge/) [Skipjack Decoder](http://rumkin.com/tools/cipher/skip.php) [MD5 Cracker Page - Over 312.072 billion cracked MD5 hashes - HashKiller.co.uk](https://hashkiller.co.uk/Cracker/MD5) [SHA1 Cracker Page - Over 312.072 billion cracked SHA1 hashes - HashKiller.co.uk](https://hashkiller.co.uk/Cracker/SHA1)
### Exploitation/PWN
[ROPgadget](https://github.com/JonathanSalwan/ROPgadget) [shell-storm | ROPgadget - Gadgets finder and auto-roper](http://shell-storm.org/project/ROPgadget/) [shell-storm | Shellcodes Database](http://shell-storm.org/shellcode/) [sashs/Ropper: Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC). For disassembly ropper uses the awesome Capstone Framework.](https://github.com/sashs/Ropper) [qira - timeless debugger](http://qira.me/) [Dllinjector: dll injection tool that implements various methods](https://github.com/OpenSecurityResearch/dllinjector) [Libformatstr: Simplify format string exploitation.](https://github.com/hellman/libformatstr) [pwntools — pwntools 3.3.4 documentation](https://docs.pwntools.com/en/stable/) [GitHub - Gallopsled/pwntools: CTF framework and exploit development library](https://github.com/Gallopsled/pwntools) [hugsy/gef: GEF - GDB Enhanced Features for exploit devs & reversers](https://github.com/hugsy/gef) [Playing with rasm2 (for shellcoding)](http://radare.today/posts/playing-with-rasm2/) [Rasm2 · Radare2 Book (for shellcoding)](https://radare.gitbooks.io/radare2book/content/rasm2/intro.html) [zardus/preeny: Some helpful preload libraries for pwning stuff.](https://github.com/zardus/preeny) [Exploitation Practice: An archive of low-level CTF challenges developed over the years](https://github.com/j00ru/ctf-tasks)
### Reversing/Binary Analysis
[Ghidra](https://ghidra-sre.org/) [Boomerang Decompiler - Decompile x86 binaries to C](https://github.com/BoomerangDecompiler/boomerang) [Angr: binary analysis platform!](https://github.com/angr/angr) [Jadx: Dex to Java decompiler (Android)](https://github.com/skylot/jadx) [Java decompiler online](http://www.javadecompilers.com/) [Krakatau: Java decompiler, assembler, and disassembler](https://github.com/Storyyeller/Krakatau) [Pin - A Dynamic Binary Instrumentation Tool | Intel® Software](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool) [Uncompyle: Python decompiler](https://github.com/gstarnberger/uncompyle) [Z3: The Z3 Theorem Prover](https://github.com/Z3Prover/z3) [Getting Started with Z3](https://github.com/Z3Prover/z3/wiki#background) [binary.ninja : a reverse engineering platform](https://binary.ninja/) [IDA Sig Database (FLIRT)](https://github.com/push0ebp/sig-database) [GCC and MSVC C++ Demangler](http://demangler.com/) [gcore(1) - Linux manual page](http://man7.org/linux/man-pages/man1/gcore.1.html) [geohot/qira: QEMU Interactive Runtime Analyser (timeless debugger)](https://github.com/geohot/qira)
### Forensics
[Dnscat - SkullSecurity](https://wiki.skullsecurity.org/Dnscat) [Audacity - Audio Files](https://sourceforge.net/projects/audacity/) [ExifTool - Read Write and Edit Meta Info](https://sno.phy.queensu.ca/~phil/exiftool/) [Foremost - File Recovery](http://foremost.sourceforge.net/) [fsck - Fix Broken File Systems](https://linux.die.net/man/8/fsck.ext3) [NetworkMiner - Network Forensics Analysis Tool ⛏](https://www.netresec.com/index.ashx?page=NetworkMiner) [Dump file analyzer - Memory Extraction](https://github.com/volatilityfoundation/volatility) [Binwalk: Firmware Analysis Tool (forensic) - Extracts Hidden Files](https://github.com/ReFirmLabs/binwalk) [Autopsy Tool](https://www.sleuthkit.org/autopsy/) [Memory Analysis with Volatility Analyzing a RAM Image with Volatility (15 Points)](https://samsclass.info/121/proj/p4-Volatility.htm) [Volatility & Memory-Forensics-Cheat-Sheet-v1_2.pdf](https://blogs.sans.org/computer-forensics/files/2012/04/Memory-Forensics-Cheat-Sheet-v1_2.pdf) [volatility-memory-forensics-cheat-sheet.pdf](https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf)
### Steganography
[ImageMagick](http://www.imagemagick.org/script/convert.php) [Exif - shows EXIF information in JPEG files](http://manpages.ubuntu.com/manpages/trusty/man1/exif.1.html) [exiftool: Read/write meta info in files](https://linux.die.net/man/1/exiftool) [Exiv2 - Image metadata library and tools](http://www.exiv2.org/manpage.html) [outguess - universal tool](https://www.freebsd.org/cgi/man.cgi?query=outguess+&apropos=0&sektion=0&manpath=FreeBSD+Ports+5.1-RELEASE&format=html) [SmartDeblur: Restoration of defocused and blurred photos/images](https://github.com/Y-Vladimir/SmartDeblur) [stegbreak - brute force dictionary on JPEG](https://linux.die.net/man/1/stegbreak) [StegCracker: Steganography brute-force utility to uncover hidden data inside files](https://github.com/Paradoxis/StegCracker) [stegextract: Detect hidden files and text in images](https://github.com/evyatarmeged/stegextract) [Steghide](http://steghide.sourceforge.net/) [Digital Invisible Ink Toolkit](http://diit.sourceforge.net/) [Steganography - A list of useful tools and resources | 0xRick Owned Root !](https://0xrick.github.io/lists/stego/) [CTF Tidbits: Part 1 — Steganography - FourOctets - Medium](https://medium.com/@FourOctets/ctf-tidbits-part-1-steganography-ea76cc526b40) [T9 Predictive Text Input Emulator](https://www.sainsmograf.com/labs/t9-emulator/) [zsteg: detect stegano-hidden data in PNG & BMP](https://github.com/zed-0xff/zsteg)
### Web Challenges
[Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit](https://www.metasploit.com/) [Burp Suite for Web Challenges (cookies)](https://portswigger.net/burp) [example_hashes [hashcat wiki]](https://hashcat.net/wiki/doku.php?id=example_hashes) [Postman](https://www.getpostman.com/downloads/#changelog) [Useful payloads and bypass for Web App](https://github.com/swisskyrepo/PayloadsAllTheThings) [SSH Brute Force | SSH Password Testing With Hydra on Kali Linux - LinuxConfig.org](https://linuxconfig.org/ssh-password-testing-with-hydra-on-kali-linux) [Find VM IP | netdiscover: netdiscover](https://github.com/alexxy/netdiscover)
### FlareOn 2019
[FLARE-On](https://2019.flare-on.com/challenges) [www.flare-on.com](http://www.flare-on.com/) ### Challenge 1
[Building dnSpy · 0xd4d/dnSpy Wiki](https://github.com/0xd4d/dnSpy/wiki/Building-dnSpy)
### Challenge 2
[UTF-8 - Wikipedia](https://en.wikipedia.org/wiki/UTF-8) [Corrigendum #1: UTF-8 Shortest Form](http://www.unicode.org/versions/corrigendum1.html) [UTF-8 and Unicode FAQ](https://www.cl.cam.ac.uk/~mgk25/unicode.html) [Unicode/UTF-8-character table](https://www.utf8-chartable.de/unicode-utf8-table.pl) [Hexadecimal to Binary Converter](https://www.binaryhexconverter.com/hex-to-binary-converter) [From Hex, Decode text - CyberChef](https://gchq.github.io/CyberChef/#recipe=From_Hex('Auto')Decode_text('UTF-8%20(65001)')&input=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)
### Challenge 3
[APK decompiler - decompile Android .apk ✓ ONLINE ✓](http://www.javadecompilers.com/apk) [From Hex, Decode text - CyberChef](https://gchq.github.io/CyberChef/#recipe=From_Hex('Auto')Decode_text('UTF-8%20(65001)')&input=NDlGMDgwODEgOUZDMUExQzEgOUZDMThERTAgODE5RkMxQjQgRjA4MDgxOUYgRjA4MDgxQTggQzE5RkYwODAgODFBNUUwODEgOUZDMUE1RTAgODE5RkYwODAgODFBRUMxOUYgRjA4MDgxODMgQzE5RkUwODEgQUZFMDgxOUYgQzE4NDVGRTAgODFBOUYwODAgODE5RjZFRTAgODE5RkUwODEgQTdFMDgxODAgRjA4MDgxQTYgRjA4MDgxQUMgRTA4MUExQzEgQjJDMUE1RjAgODA4MEFERjAgODA4MUFGNkUgQzBBRUYwODAgODFBMzZGRjAgODA4MUFE)
### Challenge 4
[Wireshark 2.6 Available to Install in Ubuntu 18.04, 16.04 via PPA | UbuntuHandbook](http://ubuntuhandbook.org/index.php/2018/07/wireshark-2-6-available-install-ubuntu-18-04-ppa/) [Download and Installation — Scapy 2.4.3.dev7 documentation](https://scapy.readthedocs.io/en/latest/installation.html#installing-scapy-v2-x) [Reading Pcap files with Scapy | IncognitJoe](https://incognitjoe.github.io/reading-pcap-with-scapy.html) [network manager - How to Add dnsmasq and keep systemd-resolved (18.04) - Ask Ubuntu](https://askubuntu.com/questions/1032450/how-to-add-dnsmasq-and-keep-systemd-resolved-18-04) [How to Configure dnsmasq on Ubuntu Server 18.04 LTS – Linux Hint](https://linuxhint.com/dnsmasq_ubuntu_server/) [How to Install and Configure Dnsmasq on Ubuntu 18.04 LTS - Computing for Geeks](https://computingforgeeks.com/install-and-configure-dnsmasq-on-ubuntu-18-04-lts/) [FreeKB - Understanding the /etc/hosts.allow and /etc/hosts.deny files in Linux](http://www.freekb.net/Article?id=1091)
[CTFtime.org / All about CTF (Capture The Flag)](https://ctftime.org/) [picoCTF - CMU Cybersecurity Competition](https://picoctf.com/) [CTF Beginner notes](https://github.com/jaybosamiya/security-notes) [defcon-challenges-vm](https://github.com/fuzyll/defcon-vm) [Hacker101 CTF](https://ctf.hacker101.com/howtoplay) [Ook! - Esolang](https://esolangs.org/wiki/ook!) [ctf4u](https://ctf.katsudon.org/ctf4u/)
### DFIR/Blue Team/SOC/Network Security
### Books
[The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory](https://www.amazon.com/gp/product/1118825098/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=s4comecom20-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=1118825098&linkId=9e9e956f54ee586491e2a9230b989df5)
### Tools
[The Sleuth Kit (TSK) & Autopsy: Open Source Digital Forensics Tools](http://www.sleuthkit.org/index.php) [TheresAFewConors/Sooty: The SOC Analysts all-in-one CLI tool to automate and speed up workflow.](https://github.com/TheresAFewConors/Sooty)
### SOC Stuff
[MITRE ATT&CK framework - Google Search](https://www.google.com/search?q=MITRE%20ATT%26CK%20framework) [Netflow - Google Search](https://www.google.com/search?q=Netflow) [The Attackers Life cycle - Google Search](https://www.google.com/search?q=The%20Attackers%20Life%20cycle) [SQL Injection - Google Search](https://www.google.com/search?q=SQL%20Injection) [OWASP Top 10 - Google Search](https://www.google.com/search?q=OWASP%20Top%2010) [The Cyber kill chain - Google Search](https://www.google.com/search?q=The%20Cyber%20kill%20chain) [TCP/IP - Google Search](https://www.google.com/search?q=TCP%2FIP) [Diamond model of intrusion analysis - Google Search](https://www.google.com/search?q=Diamond%20model%20of%20intrusion%20analysis) [Free Splunk For Military Vets](https://workplus.splunk.com/veterans)
### Network Analysis/Monitoring/Hacking
### Netcat
[Hacking with Netcat part 1: The Basics - Hacking Tutorials](https://www.hackingtutorials.org/networking/hacking-with-netcat-part-1-the-basics/)
### Wireshark
[Wireshark](https://www.wireshark.org/) [Wireshark_Display_Filters](https://github.com/coreb1t/awesome-pentest-cheat-sheets/blob/master/docs/Wireshark_Display_Filters.pdf) [Termshark • A terminal UI for tshark, inspired by Wireshark](https://termshark.io/) [PCAP Practice - Malware-Traffic-Analysis.net](http://malware-traffic-analysis.net/index.html) [Public PCAP files for download](https://www.netresec.com/?page=PcapFiles)
### Wireless
[Aircrack-ng - Wireless Pen Testing](http://www.aircrack-ng.org/) [Kismet Wireless Detector](https://kismetwireless.net/download.shtml) [WiFiJammer - Continuously jam all wifi clients/routers](https://n0where.net/wifijammer) [20 Popular Wireless Hacking Tools [updated for 2017]](http://resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/#gref) [How To Hack WiFi: The Ultimate Guide (2019) - CyberX](https://cyberx.tech/how-to-hack-wifi/)
### Man In The Middle (MITM)
[Bettercap 2.0 - MITM Tool](https://www.evilsocket.net/2018/02/27/All-hail-bettercap-2-0-one-tool-to-rule-them-all/)
### OSWP
[My experience with OSWP/WiFu v3.2 - ScriptDotSh](https://scriptdotsh.com/index.php/2018/04/30/my-experience-with-oswp-wifu-v3-2/)
[Network Security · isislab/Project-Ideas Wiki](https://github.com/isislab/Project-Ideas/wiki/Network-Security) [Scapy: packet manipulation program & library](https://github.com/secdev/scapy) [RPISEC INTROSEC](https://introsec.backdrifting.net/lectures/2017fall/06_packet_sniffing.html#1) [Online IP CIDR / VLSM Supernet Calculator](http://www.subnet-calculator.com/cidr.php) [TCPDUMP/LIBPCAP public repository](http://www.tcpdump.org/) [GitHub - defuse/sockstress: Sockstress (TCP DoS) implementation.](https://github.com/defuse/sockstress) [OSI model - Wikipedia](https://en.wikipedia.org/wiki/OSI_model) [Moloch - PCAP tool](https://molo.ch/) [Networking - YouTube](https://www.youtube.com/playlist?list=PLR0lm4gEfVFeKhfr9ho6Kcxt9acCKDQl3)
[A curated list of awesome forensic analysis tools and resources](https://github.com/Cugu/awesome-forensics) [www.amanhardikar.com/mindmaps/ForensicChallenges.html](http://www.amanhardikar.com/mindmaps/ForensicChallenges.html) [Software Assurance Reference Dataset](https://samate.nist.gov/SRD/testsuite.php) [The FREE Secure Coding Training Course only at Cybrary](https://www.cybrary.it/course/secure-coding/) [Cyber Defense Presentation - SANS Institute](https://www.sans.org/cyber-security-summit/archives/cyber-defense) [13Cubed - YouTube](https://www.youtube.com/13cubed) [Digital Forensics and Incident Response Cheatsheet](https://jpminty.github.io/cheatsheet/DFIR/#) [Home - DFIR - The Definitive Compendium Project](https://aboutdfir.com/#) [Applied Network Defense | good cheap blue team courses](https://www.networkdefense.io/library/) [SANS Digital Forensics and Incident Response | DFIR Courses | SANS](https://digital-forensics.sans.org/training/courses) [meirwah/awesome-incident-response: A curated list of tools for incident response](https://github.com/meirwah/awesome-incident-response)
### ICS/SCADA
### Courses
[Cyber-Physical Systems Security](https://www.udacity.com/course/cyber-physical-systems-security--ud279) [Cyber-Physical Systems Design & Analysis](https://www.udacity.com/course/cyber-physical-systems-design-analysis--ud9876)
[Resource list – Robert M. Lee](https://www.robertmlee.org/tag/resource-list/)
### Networking
[Cheat Sheets - PacketLife.net](http://packetlife.net/library/cheat-sheets/) [How Does the Internet Work?](https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm) [Intro Computer Networks Resources](https://github.com/the-akira/computer_science_web_resources/blob/master/db/computer_networks.md) [Computer Networking (CN) · OMSCS Notes](https://www.omscs-notes.com/computer-networks/welcome) [The TCP/IP Guide - The TCP/IP Guide](http://www.tcpipguide.com/free/)
### VM's/Virtualization, Home Lab, Cloud Stuff
### Console Virtualization
[How to Build Your Own Mini SNES](http://gizmodo.com/how-to-build-your-own-mini-snes-1790156604) [How to Build a Raspberry Pi Retro Game Console](http://lifehacker.com/how-to-turn-your-raspberry-pi-into-a-retro-game-console-498561192) [RPCS3 - PlayStation 3 Emulator](https://rpcs3.net/)
### Home Lab Stuff (VM's, Hardware, RPi)
### Rasberry Pi Things
### Rasberry Pi VPN
[OpenVPN - Debian Wiki](https://wiki.debian.org/OpenVPN) [GitHub - adrianmihalko/raspberrypiwireguard: Install and configure WireGuard on Raspberry Pi (and others)](https://github.com/adrianmihalko/raspberrypiwireguard) [PiVPN: Simplest setup of OpenVPN](http://www.pivpn.io/) [trailofbits/algo: Set up a personal IPSEC VPN in the cloud](https://github.com/trailofbits/algo)
### bitcamp
[ARM/RaspberryPi - Ubuntu Wiki](https://wiki.ubuntu.com/ARM/RaspberryPi) [Downloads :: Andrew Griffiths' Exploit Education](https://exploit.education/downloads/) [OpenSSH Server](https://help.ubuntu.com/14.04/serverguide/openssh-server.html) [virtualbox - Is it possible to “SSH” into my virtual machine remotely? - Ask Ubuntu](https://askubuntu.com/questions/490872/is-it-possible-to-ssh-into-my-virtual-machine-remotely) [image - How can I convert a .img.xz file to .img to transfer it to my SDCard? - Raspberry Pi Stack Exchange](https://raspberrypi.stackexchange.com/questions/30246/how-can-i-convert-a-img-xz-file-to-img-to-transfer-it-to-my-sdcard) [Installing operating system images - Raspberry Pi Documentation](https://www.raspberrypi.org/documentation/installation/installing-images/README.md) [ethernet - Multiple Simultaneous SSH Connections - Raspberry Pi Stack Exchange](https://raspberrypi.stackexchange.com/questions/87387/multiple-simultaneous-ssh-connections) [SSH (Secure Shell) - Raspberry Pi Documentation](https://www.raspberrypi.org/documentation/remote-access/ssh/) [linux - Find out how much SSH-connections currently exist - Stack Overflow](https://stackoverflow.com/questions/17199089/find-out-how-much-ssh-connections-currently-exist) [Protect SSH Logins with SSH & MOTD Banner Messages<](https://www.tecmint.com/protect-ssh-logins-with-ssh-motd-banner-messages/) [Ubuntu Linux Change Hostname (computer name) - nixCraft](https://www.cyberciti.biz/faq/ubuntu-change-hostname-command/) [How to install Ubuntu on the Raspberry Pi | TechRadar](https://www.techradar.com/how-to/how-to-install-ubuntu-on-the-raspberry-pi) [command to find the SD card](https://www.linuxquestions.org/questions/linux-general-1/command-to-find-the-sd-card-813960/) [How To Install And Configure QEMU In Ubuntu | Unixmen](https://www.unixmen.com/how-to-install-and-configure-qemu-in-ubuntu/) [Run another OS on your RPi3 as a virtualized QEMU guest under KVM (64-bit) - Raspberry Pi Forums](https://www.raspberrypi.org/forums/viewtopic.php?t=224057) [QEMU/Images - Wikibooks, open books for an open world](https://en.wikibooks.org/wiki/QEMU/Images#Mounting_an_image_on_the_host)
[What to do with a Raspberry Pi? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/ab9noe/what_to_do_with_a_raspberry_pi/) [dokuwiki [DokuWiki]](https://www.dokuwiki.org/dokuwiki) [Pi-hole®: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash](https://pi-hole.net/) [The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need](https://mediaexperience.com/raspberry-pi-xbmc-with-raspbmc/) [LibreELEC – Just enough OS for KODI](https://libreelec.tv/) [RPi-youtube, smooth youtube videos on Chromium - Raspberry Pi Forums](https://www.raspberrypi.org/forums/viewtopic.php?t=140985) [How to Enable HDMI-CEC on Your TV, and Why You Should](https://www.howtogeek.com/207186/how-to-enable-hdmi-cec-on-your-tv-and-why-you-should/) [HookTube](https://hooktube.com/) [Puffin Internet Terminal - Turning a tiny Raspberry Pi into a high-end PC](https://www.puffin.com/raspberry-pi/) [cloudflared - Google Search](https://www.google.com/search?q=cloudflared) [pfsense - Google Search](https://www.google.com/search?q=pfsense) [Security-Onion-Solutions/security-onion: Linux distro for intrusion detection, enterprise security monitoring, and log management](https://github.com/Security-Onion-Solutions/security-onion) [AdguardTeam/AdGuardHome: Network-wide ads & trackers blocking DNS server](https://github.com/AdguardTeam/AdGuardHome#comparison-pi-hole) [AdGuard — World's most advanced adblocker!](https://adguard.com/en/adguard-home/overview.html) [Hass.io - Home Assistant](https://www.home-assistant.io/hassio/)
### Hardware
[Intel® Xeon® Processor E5-2670 (20M Cache, 2.60 GHz, 8.00 GT/s Intel® QPI) Product Specifications](https://ark.intel.com/products/64595/Intel-Xeon-Processor-E5-2670-20M-Cache-2-60-GHz-8-00-GT-s-Intel-QPI-) [ASRock EP2C602-4L/D16 SSI EEB Server Motherboard Dual LGA 2011 Intel C602 DDR3 1866 / 1600 / 1333 / 1066 R / LR ECC and UDIMM - Newegg.com](https://www.newegg.com/Product/Product.aspx?Item=N82E16813157350) [SR0KX E5-2670 Xeon Intel 8 Core 2.60Ghz 20M 115W CPU /w Thermal - 670523-001 | eBay](https://www.ebay.com/itm/SR0KX-E5-2670-Xeon-Intel-8-Core-2-60Ghz-20M-115W-CPU-w-Thermal-670523-001/152722328653?hash=item238ef5cc4d:g:PRYAAOSwNnRYk1Z2:rk:2:pf:0) [Amazon.com: Intel E5-2670 2.60Ghz 20M Cache 8-Core 115W Processor SR0KX: Computers & Accessories](https://www.amazon.com/Intel-E5-2670-2-60Ghz-8-Core-Processor/dp/B007H29FRS) [Amazon.com: ASRock Motherboard ATX DDR3 1066 Intel LGA 2011 EP2C602-4L/D16: Computers & Accessories](https://www.amazon.com/gp/product/B00G9TZAIS/ref=as_li_tl?ie=UTF8&tag=liberty0f5-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=B00G9TZAIS&linkId=48544653eeea80c9f619797c6cb6008c) [Samsung 128GB (16 x 8GB) 2Rx4 PC3-10600R M393B1K70CHD-CH9 PowerEdge R710 | eBay](https://www.ebay.com/itm/Samsung-128GB-16-x-8GB-2Rx4-PC3-10600R-M393B1K70CHD-CH9-PowerEdge-R710/333020696306?_trkparms=aid%3D888007%26algo%3DDISC.MBE%26ao%3D1%26asc%3D55675%26meid%3Dc25386cee7c9453d9f0e52e0ae183730%26pid%3D100009%26rk%3D1%26rkt%3D1%26sd%3D351723853480%26itm%3D333020696306&_trksid=p2047675.c100009.m1982) [Cyber Range Build | Liberty](https://liberty-shell.com/sec/2019/02/03/lab-build/) [Amazon.com: Rosewill Gaming 80 Plus Bronze 850W Full Modular Power Supply/PSU, HIVE Series 850 Watt 80 Plus Bronze Certified PSU with Silent 135mm Fan and Auto Fan Speed Control, 3 Year Warranty: Computers & Accessories](https://www.amazon.com/gp/product/B00N2KAOW4/ref=as_li_tl?ie=UTF8&tag=liberty0f5-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=B00N2KAOW4&linkId=edfc166bf159f5f1a68d7ed9015673f4) [Amazon.com: Cooler Master Hyper RR-T4-18PK-R1 CPU Cooler with 4 Direct Contact Heatpipes, INTEL/AMD with AM4 Support: Computers & Accessories](https://www.amazon.com/gp/product/B00BSKY1M4/ref=as_li_tl?ie=UTF8&tag=liberty0f5-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=B00BSKY1M4&linkId=d707bdf457ca85dc3f8e0fca7486ee1d) [Amazon.com: Cooler Master GeminII S524 Version 2 CPU Air Cooler with 5 Direct Contact Heat Pipes (RR-G5V2-20PK-R1): Computers & Accessories](https://www.amazon.com/dp/B00UOIK3FU/ref=emc_b_5_t) [Amazon.com: Cooler Master Hyper 212 Evo (RR-212E-20PK-R2) CPU Cooler with PWM Fan, Four Direct Contact Heat Pipes: Electronics](https://www.amazon.com/dp/B005O65JXI/ref=emc_b_5_t) [Amazon.com: Dell Precision T5500 Workstation Desktop PC Intel Xeon 12 Core 3.33GHz 72GB RAM 2TB Hard Drive NVIDIA Quadro K2000 Graphics Windows 10 Pro 64-bit: Computers & Accessories](https://www.amazon.com/Dell-Precision-T5500-Workstation-Graphics/dp/B07CHS7LMG/ref=olp_product_details?_encoding=UTF8&me=) [128GB (16x 8GB) 10600R ECC REG RAM MEMORY FOR DELL HP SERVERS | eBay](https://www.ebay.com/itm/128GB-16x-8GB-10600R-ECC-REG-RAM-MEMORY-FOR-DELL-HP-SERVERS/351723853480?hash=item51e46016a8:g:i3sAAOSwteFb9GjL:rk:2:pf:0) [hardware - homelab](https://www.reddit.com/r/homelab/wiki/hardware) [buyingguide - homelab](https://www.reddit.com/r/homelab/wiki/buyingguide) [hardware/muffinsguide - homelab](https://www.reddit.com/r/homelab/wiki/hardware/muffinsguide)
### VM's/Virtualization Stuff
### Windows VMs
[Windows Server Free Trial | Microsoft](https://www.microsoft.com/en-us/cloud-platform/windows-server-trial) [Free Virtual Machines from IE8 to MS Edge - Microsoft Edge Development](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/) [Windows 10 App Dev VM](https://developer.microsoft.com/en-us/windows/downloads/virtual-machines)
### Hyper-V
[Hyper-V Provider - Vagrant](https://www.vagrantup.com/docs/hyperv/) [How to make a boot option to turn on/off hyper-v](https://www.hanselman.com/blog/SwitchEasilyBetweenVirtualBoxAndHyperVWithABCDEditBootEntryInWindows81.aspx) [How to create a Linux virtual machine on Windows 10 using Hyper-V](https://www.windowscentral.com/how-run-linux-distros-windows-10-using-hyper-v)
[Installation Guide | Qubes OS](https://www.qubes-os.org/doc/installation-guide/) [Parrot Project - The best choice for security experts, developers and crypto-addicted people.](https://www.parrotsec.org/) [Vagrant by HashiCorp](https://www.vagrantup.com/) [ESXi | Bare Metal Hypervisor | VMware](https://www.vmware.com/products/esxi-and-esx.html) [Using the VMware View Application - Like VMware Player on an Android Tablet!](https://www.brighthub.com/computing/hardware/articles/123014.aspx) [Building Virtual Machine… by Tony Robinson [PDF/iPad/Kindle]](https://leanpub.com/avatar) [VMware Lab setup - A virtualized lab for testing HA and DRS - Simple Talk](https://www.red-gate.com/simple-talk/sysadmin/virtualization/vmware-lab-setup---a-virtualized-lab-for-testing-ha-and-drs/) [Open Source Server Virtualization Training for Proxmox VE](https://www.proxmox.com/en/training) [Proxmox vs. ESXi : homelab](https://www.reddit.com/r/homelab/comments/5vit59/proxmox_vs_esxi/de2oqrd/)
[r/homelab](https://www.reddit.com/r/homelab/) [How to Set up an SSH Server on a Home Computer - DEV Community 👩‍💻👨‍💻](https://dev.to/zduey/how-to-set-up-an-ssh-server-on-a-home-computer) [Know Your Network, Lesson 4: Access Your Home Computers from Anywhere](https://lifehacker.com/5831841/know-your-network-lesson-4-accessing-your-home-computers-from-anywhere) [How to Control Your Linux PC with an Android Device](https://news.softpedia.com/news/How-to-Control-Your-Linux-PC-with-an-Android-Device-396004.shtml) [introduction - homelab](https://www.reddit.com/r/homelab/wiki/introduction) [Building a VMware home lab](http://techgenix.com/vmware-home-lab/) [Setting Up A Penetration Testing Lab](https://kb.help.rapid7.com/docs/setting-up-a-penetration-testing-lab) [Infosec_Reference/Building A Pentest Lab](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Building%20A%20Pentest%20Lab.md) [Building a Home Lab for Offensive Security & Security Research · System Overlord](https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html) [Building-Your-Own-Kickass-Home-Lab-Jeff-McJunkin.pdf](https://files.sans.org/summit/pen_test_hackfest_2016/PDFs/Building-Your-Own-Kickass-Home-Lab-Jeff-McJunkin.pdf) [My semi-humble homelab! : homelab](https://www.reddit.com/r/homelab/comments/91dedg/my_semihumble_homelab/) [Stumbled into /r/homelab? Start Here! : homelab](https://www.reddit.com/r/homelab/comments/5gz4yp/stumbled_into_rhomelab_start_here/) [software - homelab](https://www.reddit.com/r/homelab/wiki/software) [List of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers.](https://github.com/Kickball/awesome-selfhosted) [resources - homelab](https://www.reddit.com/r/homelab/wiki/resources) [My actual "mini-lab" : homelab](https://www.reddit.com/r/homelab/comments/8d2g90/my_actual_minilab/) [UniFi Home Setup - Page 4 - Ubiquiti Networks Community](https://community.ubnt.com/t5/UniFi-Stories/UniFi-Home-Setup/cns-p/1973110/page/4#comments) [Saw this in /r/oddlysatisfying, thought some people here might find it useful : homelab](https://www.reddit.com/r/homelab/comments/664jj9/saw_this_in_roddlysatisfying_thought_some_people/) [E-Ink based status display : homelab](https://www.reddit.com/r/homelab/comments/857eux/eink_based_status_display/) [Intel® Advanced Vector Extensions 512 (Intel® AVX-512) Overview](https://www.intel.com/content/www/us/en/architecture-and-technology/avx-512-overview.html) [Amazon.com: Intel Xeon Phi 7120P Coprocessor: Computers & Accessories](https://www.amazon.com/Intel-Xeon-Phi-7120P-Coprocessor/dp/B00FKG9R2Q) [How can I work on vulnhub VM's in virtualbox in a school setting? : netsecstudents](https://www.reddit.com/r/netsecstudents/comments/9t5831/how_can_i_work_on_vulnhub_vms_in_virtualbox_in_a/) [128GB (16x 8GB) 10600R ECC REG RAM MEMORY FOR DELL HP SERVERS | eBay](https://www.ebay.com/itm/128GB-16x-8GB-10600R-ECC-REG-RAM-MEMORY-FOR-DELL-HP-SERVERS/351723853480)
### Cloud Stuff
### AWS (Amazon Web Services)
[flAWS](http://flaws.cloud/) [AWS in Plain English](https://www.expeditedssl.com/aws-in-plain-english) [GitHub - toniblyx/my-arsenal-of-aws-security-tools: List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.](https://github.com/toniblyx/my-arsenal-of-aws-security-tools) [AWS Management Console](https://us-east-2.console.aws.amazon.com/console/home?region=us-east-2) [https://interactive.linuxacademy.com/diagrams/TheOrionPapers.html](https://interactive.linuxacademy.com/diagrams/TheOrionPapers.html)
[DigitalOcean](https://cloud.digitalocean.com/registrations/new)
### Useful Tools, Tips, & Tricks for OS's
### Linux
### Linux Fixes and Tweaks
### Nvidia Graphics, Reboot Freeze, Purple/Black Screen Fix
[gnome - Freeze after login Ubuntu 18.04 - Ask Ubuntu](https://askubuntu.com/questions/1030060/freeze-after-login-ubuntu-18-04) [Ubuntu 18.04 stuck at shutdown - Ask Ubuntu](https://askubuntu.com/questions/1029068/ubuntu-18-04-stuck-at-shutdown) [Ubuntu 18.04 Live boot leads to blank screen - Ask Ubuntu](https://askubuntu.com/questions/1029624/ubuntu-18-04-live-boot-leads-to-blank-screen) [filesystem - How to fix "sudo: unable to open ... Read-only file system"? - Ask Ubuntu](https://askubuntu.com/questions/197459/how-to-fix-sudo-unable-to-open-read-only-file-system) [dual boot - Cannot update to 18.04 on DualBoot - "EFI System Partition (ESP) not usable" - Ask Ubuntu](https://askubuntu.com/questions/1008974/cannot-update-to-18-04-on-dualboot-efi-system-partition-esp-not-usable) [drivers - Is nomodeset still required? - Ask Ubuntu](https://askubuntu.com/questions/747314/is-nomodeset-still-required) [Ubuntu ugrade 17.10 to 18.04 nvidia black screen - Ask Ubuntu](https://askubuntu.com/questions/1033784/ubuntu-ugrade-17-10-to-18-04-nvidia-black-screen) [Bug #1705369 “Ubuntu 17.10/18.04 boots to black screen when usin...” : Bugs : nvidia-graphics-drivers-384 package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/+bug/1705369) [Bug #1764005 “Black-screen on boot with nvidia 390 for Budgie, M...” : Bugs : nvidia-prime package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1764005) [Bug #1763774 “nvidia-driver-390 GDM black screen / hang after lo...” : Bugs : nvidia-graphics-drivers-390 package : Ubuntu](https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/1763774) [Black screen after boot on 18.04 with nvidia - Support & Help Requests - Ubuntu MATE Community](https://ubuntu-mate.community/t/black-screen-after-boot-on-18-04-with-nvidia/16393/2) [2 Ways to Install Nvidia Driver on Ubuntu 18.04 (GUI & Command Line)](https://www.linuxbabe.com/ubuntu/install-nvidia-driver-ubuntu-18-04) [Trying to install nvidia driver for ubuntu Desktop 18.04 LTS - Ask Ubuntu](https://askubuntu.com/questions/1032938/trying-to-install-nvidia-driver-for-ubuntu-desktop-18-04-lts) [boot - Ubuntu 18.04 stuck at purple screen after login - Ask Ubuntu](https://askubuntu.com/questions/1028665/ubuntu-18-04-stuck-at-purple-screen-after-login) [No GUI after Kubuntu 18.04 LTS upgrade from 17.10 - Ask Ubuntu](https://askubuntu.com/questions/1029509/no-gui-after-kubuntu-18-04-lts-upgrade-from-17-10) [NVIDIA Driver 384.59 Not Installing - Can't load nvidia-drm, can't open display - NVIDIA Developer Forums](https://devtalk.nvidia.com/default/topic/1031159/linux/nvidia-driver-384-59-not-installing-can-t-load-nvidia-drm-can-t-open-display/)
### Kali Things
[kali linux - VMware tools installed but not working - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/258022/vmware-tools-installed-but-not-working) [How to Reset Lost Password of Kali Linux? - Technig](https://www.technig.com/reset-lost-password-of-kali-linux/) [kali linux - proxy timeout, error - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/244272/proxy-timeout-error)
### Airplane mode fix
[Airplane mode stuck on??](https://ubuntuforums.org/showthread.php?t=2155906) [[ubuntu] Ubuntu 18.04 LTS remains in Airplane mode and WIFI not works](https://ubuntuforums.org/showthread.php?t=2392109) [Ubuntu 18.04 LTS remains in Airplane mode](https://ubuntuforums.org/showthread.php?t=2392030) [[SOLVED] Laptop stuck in airplane mode after suspend](https://ubuntuforums.org/showthread.php?t=2290765) [networking - Cannot disable Airplane Mode - Ask Ubuntu](https://askubuntu.com/questions/119195/cannot-disable-airplane-mode) [Newest 'airplane-mode' Questions - Ask Ubuntu](https://askubuntu.com/questions/tagged/airplane-mode) [How can I uninstall flight mode in Ubuntu 18.04 and turn on Wi-Fi? - Quora](https://www.quora.com/How-can-I-uninstall-flight-mode-in-Ubuntu-18-04-and-turn-on-Wi-Fi) [Airplane mode won't turn off [SOLVED] - Linux Mint Forums](https://forums.linuxmint.com/viewtopic.php?t=138459) [centos - Permanently disable airplane mode gnome 3.2 - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/350148/permanently-disable-airplane-mode-gnome-3-2) [10.04 - Prevent wireless from turning off when lid goes down - Ask Ubuntu](https://askubuntu.com/questions/100628/prevent-wireless-from-turning-off-when-lid-goes-down) [Keep Ubuntu 17.10 / 18.04 Desktop Running when Laptop Lid is Closed | Website for Students](https://websiteforstudents.com/keep-ubuntu-17-10-18-04-desktop-running-when-laptop-lid-is-closed/) [Ubuntu Wifi Hardware Disabled after Suspend : MSILaptops](https://www.reddit.com/r/MSILaptops/comments/8vk878/ubuntu_wifi_hardware_disabled_after_suspend/) [Wifi Hard Blocked After Suspend in Ubuntu on GS65 : Ubuntu](https://www.reddit.com/r/Ubuntu/comments/8oifqb/wifi_hard_blocked_after_suspend_in_ubuntu_on_gs65/) [wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu](https://askubuntu.com/questions/1043547/wifi-hard-blocked-after-suspend-in-ubuntu-on-gs65/1058248#1058248) [Airplane mode on resume and no wireless · Issue #181 · linrunner/TLP](https://github.com/linrunner/TLP/issues/181) [linux - Lenovo E320 is in airplane mode, says toggle hardware switch, but has no hardware switch and WiFi is still hard locked - Super User](https://superuser.com/questions/1102652/lenovo-e320-is-in-airplane-mode-says-toggle-hardware-switch-but-has-no-hardwar) [Kernel/MainlineBuilds - Ubuntu Wiki](https://wiki.ubuntu.com/Kernel/MainlineBuilds?action=show&redirect=KernelMainlineBuilds) [MSI GS65 - ArchWiki](https://wiki.archlinux.org/index.php/MSI_GS65#Wifi_is_hardblocked_.28airplane_mode.29_after_waking_up_from_suspend) [wireless - How to know I have to blacklist acer_wmi? - Ask Ubuntu](https://askubuntu.com/questions/922140/how-to-know-i-have-to-blacklist-acer-wmi) [linux - How to turn off Wireless power management permanently - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/269661/how-to-turn-off-wireless-power-management-permanently) [How to Update Ubuntu Kernel - wikiHow](https://www.wikihow.com/Update-Ubuntu-Kernel) [wireless - Wifi Hard Blocked After Suspend in Ubuntu on GS65 - Ask Ubuntu](https://askubuntu.com/questions/1043547/wifi-hard-blocked-after-suspend-in-ubuntu-on-gs65) [SOLUTION: 18.04 MSI GS65 wifi hardware switch disabled after suspend - Ask Ubuntu](https://askubuntu.com/questions/1068054/18-04-msi-gs65-wifi-hardware-switch-disabled-after-suspend?noredirect=1&lq=1)
### Tweaks
[brndnmtthws/conky: Light-weight system monitor for X.](https://github.com/brndnmtthws/conky) [Better audio for ubuntu](https://askubuntu.com/questions/864823/audio-conf-missing/864841#864841) [11 Things To Do After Installing Ubuntu 18.04 LTS 'Bionic Beaver' - OMG! Ubuntu!](https://www.omgubuntu.co.uk/2018/04/things-to-do-after-installing-ubuntu-18-04) [How to Install Desktop Themes on Ubuntu 18.04 LTS](https://www.howtogeek.com/358049/how-to-install-desktop-themes-on-ubuntu-18.04-lts/) [How To Install Numix Theme And Icons In Ubuntu 18.04 | Omgfoss.com](http://omgfoss.com/install-numix-theme-icons-ubuntu-18-04/) [5 Of The Best Linux Desktop Themes Compared](https://www.devpy.me/5-of-the-best-linux-desktop-themes-compared/) [GitHub - arcticicestudio/nord: An arctic, north-bluish color palette.](https://github.com/arcticicestudio/nord) [Where is the "Default Wallpaper" wallpaper stored - Ask Ubuntu](https://askubuntu.com/questions/455800/where-is-the-default-wallpaper-wallpaper-stored) [gnome - Why aren't my pictures appearing in the "pictures" section of the change wallpapers window? - Ask Ubuntu](https://askubuntu.com/questions/960601/why-arent-my-pictures-appearing-in-the-pictures-section-of-the-change-wallpap)
### Sonos on Linux
[ability to stream output of a linux desktop to Sonos · Issue #60 · janbar/noson-app · GitHub](https://github.com/janbar/noson-app/issues/60#issuecomment-464165126) [noson-app: Control your SONOS devices on Linux platforms](https://github.com/janbar/noson-app) [ability to stream output of a linux desktop to Sonos · Issue #60 · janbar/noson-app · GitHub](https://github.com/janbar/noson-app/issues/60) [Delay YT Video](https://github.com/SoCo/SoCo/issues/531#issuecomment-354077099) [Package Missing 1](https://askubuntu.com/questions/374755/what-package-do-i-need-to-build-a-qt-5-cmake-application/724308#724308) [Package missing 2](https://stackoverflow.com/questions/48944407/trouble-using-qml-material-design-qtquick-controls-material-is-not-installed/48998356#48998356) [Package Missing 3](https://github.com/webcamoid/webcamoid/issues/40#issuecomment-204985231) [Package Missing 4](https://packages.ubuntu.com/xenial/libs/qml-module-qt-labs-settings) [Package Missing 5](https://askubuntu.com/questions/450948/module-qtqml-models-is-not-installed) [mkchromecast: Cast macOS and Linux Audio/Video to your Google Cast and Sonos Devices](https://github.com/muammar/mkchromecast) [Use your Chromecast from Linux and MacOS with mkchromecast — The Ultimate Linux Newbie Guide](https://linuxnewbieguide.org/chromecasting-on-linux-with-mkchromecast/) [Mkchromecast](https://mkchromecast.com/) [How to stream from linux to Sonos | Sonos Community](https://en.community.sonos.com/advanced-setups-229000/how-to-stream-from-linux-to-sonos-6790670) [SonosTube](http://www.frontierapp.com/sonostube.html)
[filesystem - How to make read-only file system writable?](https://askubuntu.com/questions/47538/how-to-make-read-only-file-system-writable) [tor - how to verify that proxychains is working - Super User](https://superuser.com/questions/1030559/how-to-verify-that-proxychains-is-working) [Inconsistent and erratic mouse wheel in Linux while moving the mouse pointer - Super User](https://superuser.com/questions/1270811/inconsistent-and-erratic-mouse-wheel-in-linux-while-moving-the-mouse-pointer) [How can I adjust the mouse scroll speed? - Ask Ubuntu](https://askubuntu.com/questions/255890/how-can-i-adjust-the-mouse-scroll-speed) [Generating a new SSH key and adding it to the ssh-agent - User Documentation](https://help.github.com/articles/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent/) [[SOLVED] Error: Unable to correct problems, you have held broken packages](https://ubuntuforums.org/showthread.php?t=2386369) [Install VMware Workstation or VMware Player from a .bundle file | Linuxlookup](http://www.linuxlookup.com/howto/install_vmware_workstation_or_vmware_player_bundle_file) [Could not get vmci driver version: The handle i... |VMware Communities](https://communities.vmware.com/thread/543606) [How to reinstall network manager without internet access? - Ask Ubuntu](https://askubuntu.com/questions/422928/how-to-reinstall-network-manager-without-internet-access) [TLDR pages](https://tldr.sh/) [live usb - How to install the MPEG-4 AAC decoder and the H.264 decoder? - Ask Ubuntu](https://askubuntu.com/questions/214421/how-to-install-the-mpeg-4-aac-decoder-and-the-h-264-decoder) [Unable to forward search Bash history similarly as with CTRL-r - Stack Overflow](https://stackoverflow.com/questions/791765/unable-to-forward-search-bash-history-similarly-as-with-ctrl-r/791800#791800) [How to cycle through reverse-i-search in BASH? - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/73498/how-to-cycle-through-reverse-i-search-in-bash) [My Favorite Command-Line Shortcuts | Henrik Warne's blog](https://henrikwarne.com/2018/08/11/my-favorite-command-line-shortcuts/) [How to Install Deepin Desktop Environment on Ubuntu 18.04 - OMG! Ubuntu!](https://www.omgubuntu.co.uk/2018/06/how-to-install-deepin-desktop-environment-on-ubuntu-18-04) [[ubuntu] How To: Setup DOD Common Access Card (CAC) for service portals](https://ubuntuforums.org/showthread.php?t=1221961) [Gnome Authentication Error When Logging in After Lock - Ask Fedora: Community Knowledge Base and Support Forum](https://ask.fedoraproject.org/en/question/115963/gnome-authentication-error-when-logging-in-after-lock/) [Is there any way to roll back the most recent upgrade? - Ask Ubuntu](https://askubuntu.com/questions/34888/is-there-any-way-to-roll-back-the-most-recent-upgrade) [Bluetooth Headset volume too low (only in arch) / Multimedia and Games / Arch Linux Forums](https://bbs.archlinux.org/viewtopic.php?id=236209)
### Helpful Tools for Linux
### Tmux
[A Gentle Introduction to tmux – Hacker Noon](https://hackernoon.com/a-gentle-introduction-to-tmux-8d784c404340) [tmux/tmux: tmux source code](https://github.com/tmux/tmux) [Tmux not sourcing my .tmux.conf - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/66606/tmux-not-sourcing-my-tmux-conf) [Making tmux Pretty and Usable - A Guide to Customizing your tmux.conf](https://www.hamvocke.com/blog/a-guide-to-customizing-your-tmux-conf/) [tmux-plugins/tmux-logging: Easy logging and screen capturing for Tmux.](https://github.com/tmux-plugins/tmux-logging) [tmux shortcuts & cheatsheet](https://gist.github.com/MohamedAlaa/2961058) [tmux cheatsheet](https://gist.github.com/andreyvit/2921703)
### Other Linux Stuff
[Grep Stuff](https://i.redd.it/huwd7hn63nv01.jpg) [Process Killing](https://pbs.twimg.com/media/DcwearbXkAAnSzm.jpg:large) [Creating SSH keys - Atlassian Documentation](https://confluence.atlassian.com/bitbucketserver/creating-ssh-keys-776639788.html) [[SOLVED] merge pdf files with each file as a index entry in the big pdf](https://www.linuxquestions.org/questions/linux-general-1/merge-pdf-files-with-each-file-as-a-index-entry-in-the-big-pdf-4175453292/) [GouveaHeitor/nipe: Nipe is a script to make Tor Network your default gateway.](https://github.com/GouveaHeitor/nipe) [ebooks - What software can I use to view epub documents? - Ask Ubuntu](https://askubuntu.com/questions/14378/what-software-can-i-use-to-view-epub-documents)
[20 Linux Command Tips and Tricks That Will Save You A Lot of Time - Tips and Tricks](http://www.tipsandtricks.ga/2018/10/20-linux-command-tips-and-tricks-that.html) [how to change hostname ubuntu - Google Search](https://www.google.com/search?client=ubuntu&hs=z4t&ei=JMEwXc7gDpH45gLolJLQCQ&q=how+to+change+hostname+ubuntu&oq=how+to+change+hostname+ubuntu&gs_l=psy-ab.3..0l3j0i7i10i30j0l2j0i8i7i10i30j0i30l2j0i5i30.3243.3816..4179...0.0..0.111.457.3j2......0....1..gws-wiz.......0i71j0i10j0i10i30j0i8i10i30.PRm7Jnc_rEo&ved=0ahUKEwjOgu34kr_jAhURvFkKHWiKBJoQ4dUDCAo&uact=5) [How to compress and extract files using tar command in Linux – Hostway Help Center](https://support.hostway.com/hc/en-us/articles/360000263544-How-to-compress-and-extract-files-using-tar-command-in-Linux) [Home | Linux Journey](https://linuxjourney.com/) [Rosetta Stone for Unix](http://bhami.com/rosetta.html) [Courses - LPI Linux Essentials](https://linuxacademy.com/linux/training/course/name/lpi-linux-essentials) [Table of contents - ArchWiki](https://wiki.archlinux.org/index.php/Table_of_contents) [rsu-client/rsu-client: A git repository for the RuneScape Linux/Unix Client Project](https://github.com/rsu-client/rsu-client) [Linux Command Reference.pdf](http://www.cs.cmu.edu/afs/cs/academic/class/15213-s19/www/recitations/fwunixref.pdf)
### Windows
### Windows Fixes and Tweaks
[How to make a bootable USB on Windows](http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/) [Rainmeter, desktop customization tool](https://www.rainmeter.net/) [Touch Terminal. Months of work finally realized. Downloads and instructions in the comments : Rainmeter](https://www.reddit.com/r/Rainmeter/comments/3xog53/touch_terminal_months_of_work_finally_realized/) [Win10 Widgets - Widgets for Windows 10](https://win10widgets.com/) [Removing Debian Installation Prompt - Unix & Linux Stack Exchange](https://unix.stackexchange.com/questions/62694/removing-debian-installation-prompt) [How to Install and Use the Linux Bash Shell on Windows 10](https://www.howtogeek.com/249966/how-to-install-and-use-the-linux-bash-shell-on-windows-10/)
[Download Windows Commands Reference from Official Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=56846)
[The fastest way to search your Chrome history or bookmarks - CNET](https://www.cnet.com/how-to/the-fastest-way-to-search-your-chrome-history-or-bookmarks/) [how to close a tab in a browser and other things](https://www.google.com/search?q=how+to+close+a+tab+in+a+browser&oq=how+to+clos&aqs=chrome.0.69i59j69i60j69i65l2j69i57j0.1471j0j7&client=ubuntu&sourceid=chrome&ie=UTF-8) [Windows Subsystem for Linux 2 (WSL 2) Released to Insiders](https://www.bleepingcomputer.com/news/microsoft/windows-subsystem-for-linux-2-wsl-2-released-to-insiders/) [The Windows Subsystem for Linux Guide! — Windows Subsystem for Linux Guide documentation](http://wsl-guide.org/en/latest/)
### Electrical Engineering and Math
### EE Stuff
[Semiconductor Physics for Solid State Electronics](http://hyperphysics.phy-astr.gsu.edu/hbase/Solids/sselcn.html)
### Math Stuff
### Statistics
[These Are the Best Books for Learning Modern Statistics—and They’re All Free](https://getpocket.com/explore/item/these-are-the-best-books-for-learning-modern-statistics-and-they-re-all-free?utm_source=pocket-newtab) [Suggested Course: Intro to Statistics | Udacity](https://www.udacity.com/course/intro-to-statistics--st101)
[/r/netsecstudents](https://www.reddit.com/r/netsecstudents/) [/r/netsec](https://www.reddit.com/r/netsec/) [/r/Reverse Engineering](https://www.reddit.com/r/ReverseEngineering/) [VeteranSec – A Veteran Cyber Security Community](https://veteransec.com/) [LiveOverflow - LiveOverflow](http://liveoverflow.com/)