├── LICENSE ├── README.md └── list1.md /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2021 Henri IV 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # UsefulSources 2 | 3 | ### For the last 1-2 years, I have collected a lot of research articles and useful sites / blogs that I enjoy reading. 4 | 5 | # What kind of things? 6 | 7 | * Ransomware Group's researches, 8 | * APT's,Talks, 9 | * Interesting Doxed CyberCriminals && Interview with Hackers, 10 | * Useful Programming scripts(evil malware tricks,injection techniques etc..), 11 | * Awesome Slides(OPSec and privacy or some amazing slides from DEFCON/Blackhat/RSA Conferences.). 12 | 13 | # Check the list1.md 14 | 15 | -------------------------------------------------------------------------------- /list1.md: -------------------------------------------------------------------------------- 1 | ## OPSEC && PRIVACY 2 | 3 | * https://grugq.github.io/blog/2013/11/06/required-reading/ 4 | * https://restoreprivacy.com/tor/ 5 | * https://www.reddit.com/r/opsec/comments/fnvfvy/how_to_stay_safe_from_stalkers/flbwps2/ 6 | * https://www.hackingarticles.in/firefox-for-pentester-privacy-and-protection-configurations/ 7 | * https://warriorpublications.wordpress.com/2011/11/20/security-counter-surveillance-manual/ 8 | * Что такое OnionCat и GarliCat ▲ Как приручить чесночную кошку - https://www.youtube.com/watch?v=TXwopKblXhg&feature=youtu.be 9 | * Whonix Gateway VS Double SSH tunnel Manager - https://www.youtube.com/watch?v=gfOmkvNrlSA&feature=youtu.be 10 | * https://medium.com/@jonathan.benalii/dark-web-monitoring-part-2-da800c325355 11 | * https://sec.okta.com/articles/2020/08/crimeops-operational-art-cyber-crime 12 | * https://warriorpublications.wordpress.com/2011/11/20/security-counter-surveillance-manual/ 13 | * Understanding and hiding your operations - https://www.slideshare.net/DanielLpezJimnez1/understanding-and-hiding-your-operations 14 | * vOPCDE #8 - CrimeOps: The operational art of cybercrime - https://www.youtube.com/watch?v=E9F7WCO-pZM 15 | * When Cybercriminals with Good OpSec Attack - https://www.youtube.com/watch?v=zXmZnU2GdVk 16 | * Completely Disable & Remove Windows 10 Telemetry 17 | https://encrypt-the-planet.com/completely-disable-windows-10-telemetry/ 18 | 19 | 20 | ## Hackers and Threat Actors Interview && Indictments/Complaint(My favourites) 21 | 22 | * Interview with RU Underground Forum ex-Admin https://dev.by/news/hacker-from-rechitsa ( Ar3s , My best Regards...) 23 | * Another Ar3s Interview - https://therecord.media/an-interview-with-ares-a-russian-coder-who-built-a-swiss-army-knife-for-hackers/ 24 | * TOP10 Botnet https://xakep.ru/2014/09/09/top-10-botnets/#toc06 25 | * RedBear Interview - https://therecord.media/an-interview-with-redbear-a-hacker-training-the-next-generation-of-cybercriminals/ 26 | * Flatl1ne Interview ( Founder of FreedomFox) - https://therecord.media/an-interview-with-russian-hacker-pavel-sitnikov-there-is-no-hacking-scene-now-only-commerce/ 27 | * Its a good read - https://torontolife.com/city/kid-made-millions-hacking-emails-fbi-took/ (Karim Baratov) 28 | * Lazarus Hacker "Park" Complaint - https://www.justice.gov/opa/press-release/file/1092091/download 29 | * north-korean-malicious-cyber-activity - https://us-cert.cisa.gov/ncas/current-activity/2021/02/17/north-korean-malicious-cyber-activity-applejeus 30 | * Same North Korean Hackers - https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and 31 | * SandWorm campaign Analysis - https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-005.pdf 32 | * CyberCriminal Maksim Boiko Complaint - https://www.cyberscoop.com/maksim-boiko-hacking-rapper-russian/ 33 | * Interview with "UNKN" (Operator of REvil) - https://www.advanced-intel.com/post/an-interview-with-unkn-sheds-light-on-revil-s-operations-future-victims 34 | * Another "UNKN" interview with Russian OSINT YouTube Channel - https://intel471.com/blog/revil-ransomware-interview-russian-osint-100-million/ 35 | * Fin7's IT Admin - https://www.cyberscoop.com/fin7-recruiter-andrii-kolpakov-pleads-guilty-role-global-hacking-scheme/ 36 | * More Fin7 Indictments - https://www.justice.gov/opa/pr/three-members-notorious-international-cybercrime-group-fin7-custody-role-attacking-over-100 37 | * FXMSP - https://www.bankinfosecurity.com/hacking-timeline-fxmsps-rise-apparent-fall-a-14519 38 | * FXMSP Doxed - https://www.bleepingcomputer.com/news/security/fxmsp-hackers-made-15m-selling-access-to-corporate-networks/ 39 | * Oldschool hackers Albert Gonzalez and his partners and friends - https://www.rollingstone.com/culture/culture-news/sex-drugs-and-the-biggest-cybercrime-of-all-time-241836/ 40 | * Another PDF of TJX Hack (Albert Gonzalez ) - https://www.sabrinaerdely.com/docs/HackersGoneWild.pdf RIP Wardrive and SQLi ... good old times... 41 | * EvilCorp Members Pictures and Fancy Videos - https://spaces.hightail.com/receive/jqATXDclVG 42 | * Another Evilcorp Pictures and Videos - https://spaces.hightail.com/receive/i4vSqYvRmD 43 | * International law enforcement operation exposes (EvilCorp) - https://public-newsroom-nca-01.azurewebsites.net/news/international-law-enforcement-operation-exposes-the-worlds-most-harmful-cyber-crime-group 44 | * ZeuS Legal Notice and Courts and other law stuffs about ZeuS - https://www.zeuslegalnotice.com/ 45 | * CyberLords Hacker Group Interview - https://j3qx.wordpress.com/2009/01/07/%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%B2%D1%8C%D1%8E-%D1%81-cyberlords-community/ (k0pa is member of this group.) 46 | * about k0pa and his news - https://ria.ru/burkov_israel_261215/ 47 | * Arkady Bukh (Defence Lawyer for The Cybercrime Underground) - https://www.cyberscoop.com/story/arkady-bukh-man-in-the-middle/ 48 | * Legendary Hacker BadB Interview and Video - https://ok.ru/video/301184910644 49 | * Another BadB YouTube Interview with ex carder Sergei - https://www.youtube.com/watch?v=XMOJP-Prrug 50 | * Another Legendary Turkish Hacker Ercan Findikoglu's Indictments - https://www.courtlistener.com/recap/gov.uscourts.nyed.345169/gov.uscourts.nyed.345169.32.0.pdf 51 | and https://www.courtlistener.com/docket/4322734/united-states-v-findikoglu/ 52 | * Interview with Procarder2, a Darknet Vendor Specializing in Stolen Credit Card Data - https://darknetdaily.com/?p=1282 53 | * The rise and fall of a suburban hacker.(darkode) - https://www.milwaukeemag.com/dark-side-darkode-fbi/ 54 | * YEVGENIY ALEXANDROVICH NIKULIN Court - https://s3.documentcloud.org/documents/6793888/Nikulin-pre-trial-filing-alleging-Ieremenko.pdf 55 | * JabberZeus (a.k.a Business Club) Court - https://www.justice.gov/iso/opa/resources/5922014411104621620917.pdf 56 | * FIN7 aka Carbanak Group fourth defendant expected to plead guilty - https://file411.substack.com/p/fin7-aka-carbanak-group-and-navigator?s=r 57 | * Original APT LAPSUS$ - https://krebsonsecurity.com/2022/04/the-original-apt-advanced-persistent-teenagers/ 58 | ## Researches,SLides,Threat Intelligence,Talks && other stuffs 59 | 60 | * CryptoCoreA - Threat Actor Targeting Cryptocurrency Exchanges - https://www.clearskysec.com/wp-content/uploads/2020/06/CryptoCore_Group.pdf 61 | * Leery Turtle Threat Report -(APT) https://cyberstruggle.org/delta/LeeryTurtleThreatReport_05_20.pdf 62 | * REvil Ransomware-as-a-Service: An analysis of a ransomware affiliate operation - https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/ 63 | * How Ryuk Ransomware operators made $34 million from one victim - https://www.bleepingcomputer.com/news/security/how-ryuk-ransomware-operators-made-34-million-from-one-victim/ 64 | * How REvil Used the Underground Ecosystem to Form an Extortion Cartel - https://www.advanced-intel.com/post/the-dark-web-of-intrigue-how-revil-used-the-underground-ecosystem-to-form-an-extortion-cartel 65 | * Understanding the relationship between Emotet, Ryuk and TrickBot - https://intel471.com/blog/understanding-the-relationship-between-emotet-ryuk-and-trickbot/ 66 | * REvil Ransomware-as-a-Service: An analysis of a ransomware affiliate operation - https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/ 67 | * Tracking Down REvil’s “Lalartu” by utilizing multiple OSINT methods - https://underthebreach.medium.com/tracking-down-revils-lalartu-by-utilizing-multiple-osint-methods-2bf3a6c65a80 68 | * REvil Ransomware Gang Deposits $1 Million on RU hacker forum - https://www.cpomagazine.com/cyber-security/revil-ransomware-gang-deposits-1-million-for-recruitment-on-a-russian-speaking-hacker-forum/ 69 | * REvil Ransomware Affiliates Partner with Corporate Intruders - https://www.bleepingcomputer.com/news/security/revil-ransomware-affiliates-partner-with-corporate-intruders/ 70 | * The Bayrob malware gang's rise and fall - https://www.zdnet.com/article/the-bayrob-malware-gangs-rise-and-fall/ 71 | * Security 101 : BEC Schemes - https://www.trendmicro.com/vinfo/tr/security/news/cybercrime-and-digital-threats/business-email-compromise-bec-schemes 72 | * Billion-Dollar Scams: The Numbers Behind BEC - https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/billion-dollar-scams-the-numbers-behind-business-email-compromise 73 | * Olympic Vision Business Email Compromise Campaign Targets Middle East and Asia Pacific Companies - https://blog.trendmicro.com/trendlabs-security-intelligence/olympic-vision-business-email-compromise/?_ga=2.108047559.494480246.1607466049-1169321956.1607466049 74 | * US and European companies Top Targets of CEO Fraud - https://blog.trendmicro.com/trendlabs-security-intelligence/us-european-companies-top-targets-ceo-fraud/?_ga=2.108047559.494480246.1607466049-1169321956.1607466049 75 | * FBI: BEC scams accounted for half of the cyber-crime losses in 2019 - https://www.zdnet.com/article/fbi-bec-scams-accounted-for-half-of-the-cyber-crime-losses-in-2019/ 76 | * Combating the Underground Economy’s Automation Revolution - https://www.recordedfuture.com/underground-economy-automation/ 77 | * User-Friendly Loaders and Crypters Simplify Intrusions and Malware Delivery - https://www.recordedfuture.com/user-friendly-loaders-crypters/ 78 | * PYSA/Mespinoza Ransomware - https://thedfirreport.com/2020/11/23/pysa-mespinoza-ransomware/ 79 | * FBI Flash Indicators of Compromise Ragnar Locker Ransomware - https://beta.documentcloud.org/documents/20413525-fbi-flash-indicators-of-compromise-ragnar-locker-ransomware-11192020-bc 80 | * Digital "Pharmacusa" I: Complexity of Underground Syndicates Behind 2019 Rise of Targeted Ransomware - https://www.advanced-intel.com/post/digital-pharmacusa-complexity-of-underground-syndicates-behind-2019-rise-of-targeted-ransomware 81 | * Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone - https://labs.sentinelone.com/egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone/ 82 | * Anchor Project | The Deadly Planeswalker: How The TrickBot Group United High-Tech Crimeware & APT - https://labs.sentinelone.com/the-deadly-planeswalker-how-the-trickbot-group-united-high-tech-crimeware-apt/ 83 | * Awesome reports are here - https://assets.sentinelone.com/labs 84 | * Tracking Ransomware End-to-end - https://mlab.engineering.nyu.edu/static/oakland-18-slides.pdf 85 | * FBI PIN on intrusions exploiting email forwarding rules - https://beta.documentcloud.org/documents/20418379-fbi-pin-on-intrusions-exploiting-email-forwarding-rules 86 | * FBI 2019 Internet Crime Report - https://pdf.ic3.gov/2019_IC3Report.pdf 87 | * Money from bank hacks rarely gets laundered through cryptocurrencies - https://www.zdnet.com/article/money-from-bank-hacks-rarely-gets-laundered-through-cryptocurrencies/#ftag=RSSbaffb68 88 | * How an FBI informant orchestrated the Stratfor hack - https://www.dailydot.com/debug/hammond-sabu-fbi-stratfor-hack/ 89 | * Deep Dive into an Obfuscation-as-a-Service for Android Malware - https://www.stratosphereips.org/blog/2020/12/03/deep-dive-into-an-obfuscation-as-a-service-for-android-malware 90 | * The current state of China’s cybercrime underground - https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/ 91 | * Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat - https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/ 92 | * Android Hesperbot Malware Analysis - https://www.oguzhantopgul.com/2014/09/android-hesperbot-malware-analysis.html 93 | * https://anubissec.github.io/Analyzing-SpyEye-Malware-For-Fun/# Old but still informative. ( If you love SpyEye,Zeus etc.. Check XyliBox's awesome Blog!) 94 | * FBI warns of Egregor ransomware extorting businesses worldwide - https://www.bleepingcomputer.com/news/security/fbi-warns-of-egregor-ransomware-extorting-businesses-worldwide/ 95 | * Sailing Past Security Measures In ActiveDirectory - https://luemmelsec.github.io/Circumventing-Countermeasures-In-AD/ 96 | * Inside of CL0P’s ransomware operation - https://www.telekom.com/en/blog/group/article/inside-of-cl0p-s-ransomware-operation-615824 97 | * BlakHat - Article-pool_overflow_exploitation_since_windows_10 - https://www.sstic.org/media/SSTIC2020/SSTIC-actes/pool_overflow_exploitation_since_windows_10_19h1/SSTIC2020-Article-pool_overflow_exploitation_since_windows_10_19h1-bayet_fariello.pdf 98 | * Stopping Serial Killer: Catching the Next Strike - https://research.checkpoint.com/2021/stopping-serial-killer-catching-the-next-strike/ 99 | * ApoMacroSploit : Apocalyptical FUD race - https://research.checkpoint.com/2021/apomacrosploit-apocalyptical-fud-race/ 100 | * BitRAT – The Latest in C++ Malware Written by Incompetent Developers - https://krabsonsecurity.com/2020/08/22/bitrat-the-latest-in-copy-pasted-malware-by-incompetent-developers/ 101 | * Remoticon 2020 // Learn How to Hack a Car Workshop - https://www.youtube.com/watch?v=NzgvRictI9o 102 | * Introduction to Reverse Engineering for Penetration Testers – SANS - https://www.youtube.com/watch?v=fnYp2DN_XZc 103 | * Tutorial: Introduction to Reverse Engineering - Mike Anderson - https://www.youtube.com/watch?v=7v7UaMsgg_c 104 | * CamSec - Basic Assembly for Reverse Engineering - https://www.youtube.com/watch?v=NhqAeQB_CZU 105 | * Hacking People’s Mind: When Threat Actors Master Social Engineering - https://www.youtube.com/watch?v=zJOSPjZOAsQ 106 | * Two Weeks with a Russian Ransomware Cell - https://www.youtube.com/watch?v=Oqg20dF8tTA 107 | * Feds Fighting Ransomware: How the FBI Investigates and How You Can Help - https://www.youtube.com/watch?v=LUxOcpIRxmg 108 | * Disobey 2018 - Reverse Engineering on Android 101 (Game protocols) - Giovanni Rocca - https://www.youtube.com/watch?v=EYfrUw7Nt8o 109 | * Mobile Hacking Workshop - Community Day - https://www.youtube.com/watch?v=PMKnPaGWxtg 110 | * How to Apply Reverse Engineering Techniques to Cheat at Video Games - https://www.youtube.com/watch?v=hOiJiHmvJWg 111 | * Beginners Guide to Reverse Engineering Android Apps - https://www.youtube.com/watch?v=7SRfk321I5o 112 | * REVERSING 2020 - Evolution of Cybercrime Intent & Hunting with YARA for Malware Developers - https://www.youtube.com/watch?v=Hjp9JfyLLiY 113 | * Hackerhotel 2020: John Fokker and Rik van Duijn -- REvil Ransomware - https://www.youtube.com/watch?v=QC5Rgu7U1bA 114 | * BSidesCHS 2018: Opening Remarks & Keynote by Vitali Kremez - https://www.youtube.com/watch?v=ptL0aTYzRfM 115 | * #Eko2020 Mobile Hacking | Lukáš Štefanko: Android COVID-19 threats - https://www.youtube.com/watch?v=Dnq3FZwD9IQ 116 | * Cyber criminals are criminals. And it's time to take action | Ilya Sachkov | - https://www.youtube.com/watch?v=9WusyYU7QmE 117 | * The Nemty affiliate model - https://medium.com/csis-techblog/the-nemty-affiliate-model-13f5cf7ab66b 118 | * Another very amazing blog - https://0xthreatintel.medium.com/ 119 | * Awesome APT41 Group by FireEye - https://content.fireeye.com/apt-41/rpt-apt41/ 120 | * THE MALWARE DRIDEX: ORIGINS AND USES - https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-008.pdf 121 | * TRICKBOT NOW OFFERS ‘TRICKBOOT’: PERSIST, BRICK, PROFIT - https://eclypsium.com/wp-content/uploads/2020/12/TrickBot-Now-Offers-TrickBoot-Persist-Brick-Profit.pdf 122 | * CONFidence Online: Hidden Link Between TrickBot "Anchor" & North Korea "Lazarus” (Vitali Kremez) - https://www.youtube.com/watch?v=GuiDTWSHNuU 123 | * Fraud Evolution: Synthetic Identities, COVID-Times Carding & Physical Identity Obfuscation - https://www.advanced-intel.com/post/fraud-evolution-synthetic-identities-covid-times-carding-physical-identity-obfuscation 124 | * ANALYZING APT19 MALWARE USING A STEP-BY-STEP METHOD - https://cybergeeks.tech/analyzing-apt19-malware-using-a-step-by-step-method/ 125 | * The “Silent Night” Zloader/Zbot - https://resources.malwarebytes.com/files/2020/05/The-Silent-Night-Zloader-Zbot_Final.pdf 126 | * Dridex Analysis - https://aaqeel01.wordpress.com/2021/02/07/dridex-malware-analysis/ 127 | * Analysing Lazarus Shellcode Exectuion Method - https://research.nccgroup.com/2021/01/23/rift-analysing-a-lazarus-shellcode-execution-method/ 128 | * Zeoticus Ransom with no C2 reqired ? really? - https://labs.sentinelone.com/zeoticus-2-0-ransomware-with-no-c2-required/ 129 | * ApoMacroSploit : Apocalyptical FUD race - https://research.checkpoint.com/2021/apomacrosploit-apocalyptical-fud-race/ 130 | * Farming for Red Teams: Harvesting NetNTLM - https://www.mdsec.co.uk/2021/02/farming-for-red-teams-harvesting-netntlm/ 131 | * The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day - https://research.checkpoint.com/2021/the-story-of-jian/ 132 | * Money Doesn't Stink - Cybercriminal Business Insight of A New Android Botnet - https://www.youtube.com/watch?v=p7XtZcFrS6g 133 | * «How to pwn Russian Android botnet» by Dmitriy - https://www.youtube.com/watch?v=wWZ6eFuperU 134 | * North Korea Crpyto Access - https://www.washingtonpost.com/business/2022/04/23/north-korea-hack-crypto-access/ 135 | 136 | ## RedTeam,Vulnerability Research && Pentest Blogs and Tools ( Included Malware Source Code Leaks && exploit kits) 137 | 138 | * https://malware-research.org/apt34-hacking-tools-leak/ 139 | * https://0xsp.com/ 140 | * https://www.fireeye.com/blog/threat-research/2020/10/threatpursuit-vm-threat-intelligence-and-hunting-virtual-machine.html 141 | * https://github.com/securitychampions/Awesome-Vulnerability-Research 142 | * https://github.com/paragonie/awesome-appsec 143 | * https://www.reddit.com/r/ReverseEngineering/comments/f6f5s/how_do_i_get_started_in_vulnerability_research/ 144 | * https://samcurry.net/hacking-apple/ 145 | * https://github.com/Jrohy/trojan 146 | * https://github.com/RomaniukVadim/hack_scripts/tree/master/Dark%20soft 147 | * https://github.com/t3rabyt3-zz/Gozi 148 | * https://github.com/defure/ISFB 149 | * https://github.com/m0n0ph1/malware-1 150 | * http://www.rohitab.com/discuss/topic/40881-a-quick-way-to-detect-64-bit-windows/ 151 | * https://packetstormsecurity.com/files/tags/paper/ 152 | * https://gowsundar.gitbook.io/ 153 | * https://github.com/nomi-sec/PoC-in-GitHub 154 | * https://www.hexacorn.com/blog/category/autostart-persistence/ 155 | * https://github.com/Aekras1a/OrionPanel 156 | * https://github.com/Aekras1a/Updated-Carbanak-Source-with-Plugins 157 | * https://github.com/Aekras1a/hackingLibrary 158 | * https://github.com/zer0yu/Awesome-CobaltStrike 159 | * https://github.com/Aekras1a/darkRat_HVNC 160 | * https://github.com/PELock/StringEncrypt-Python 161 | * https://opendata.rapid7.com/sonar.tcp/ (Port scanning or discovering network/RDP etc..) 162 | * https://lospi.net/security/assembly/c/cpp/developing/software/2017/03/04/gargoyle-memory-analysis-evasion.html 163 | * https://modexp.wordpress.com/2020/07/07/wpi-wm-paste/ 164 | * https://modexp.wordpress.com/2020/07/31/wpi-cmdline-envar/ 165 | * https://blog.whtaguy.com/2019/04/vulnerability-research-dictionary.html 166 | * https://github.com/tuvtran/project-based-learning 167 | * https://feed.prelude.org/p/everything-you-need-to-know-about 168 | * https://github.com/FlatL1neAPT 169 | * https://gowthams.gitbook.io/bughunter-handbook/ 170 | * https://github.com/H4xl0r/Necro-Stealer 171 | * https://github.com/Tlgyt/The-Collection 172 | * https://github.com/OWASP/owasp-mstg 173 | * http://www.rohitab.com/discuss/topic/35415-c-getrawinputdata-keylogger/ 174 | * https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques 175 | * https://theevilbit.github.io/posts/getting_started_in_macos_security/ 176 | * https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/ 177 | * https://owasp.org/www-pdf-archive/Introduction_to_shellcode_development.pdf 178 | * https://mobexler.com/checklist.htm 179 | * https://github.com/k1000o23/cheat_sheets 180 | * From a C project, through assembly, to shellcode - https://vxug.fakedoma.in/papers/VXUG/Exclusive/FromaCprojectthroughassemblytoshellcodeHasherezade.pdf 181 | * https://shogunlab.gitbook.io/building-c2-implants-in-cpp-a-primer/chapter-3-basic-implant-and-tasking 182 | * https://github.com/odzhan/injection 183 | * The Ultimate List of SANS Cheat Sheets - https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/ 184 | * https://medium.com/malware-buddy/reverse-engineering-tips-name-mangling-59c4ee2d77c4 185 | * https://www.aldeid.com/wiki/Cobalt-Strike/Beacon-Commands 186 | --------------------------------------------------------------------------------