├── .github
└── ISSUE_TEMPLATE
│ ├── improvement-request.md
│ └── submit-a-general-issue.md
├── CONTRIBUTING.md
├── LICENSE
├── PULL_REQUEST_TEMPLATE.md
└── README.md
/.github/ISSUE_TEMPLATE/improvement-request.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Improvement request
3 | about: Suggest an idea for this project
4 | title: ''
5 | labels: ''
6 | assignees: ''
7 |
8 | ---
9 |
10 | (Please read CONTRIBUTING.md before posting issues)
11 |
12 | **Is your feature request related to a problem? Please describe.**
13 | A clear and concise description of what the problem is.
14 |
15 | **Describe the solution you'd like**
16 | A clear and concise description of what you want to happen.
17 |
18 | **Describe alternatives you've considered**
19 | A clear and concise description of any alternative solutions you've considered.
20 |
21 | **Additional context**
22 | Add any other context or screenshots about the improvement request here.
23 |
--------------------------------------------------------------------------------
/.github/ISSUE_TEMPLATE/submit-a-general-issue.md:
--------------------------------------------------------------------------------
1 | ---
2 | name: Submit a general issue
3 | about: Default template
4 | title: ''
5 | labels: ''
6 | assignees: ''
7 |
8 | ---
9 |
10 | **Related content :** Guide|Tools
11 | **Issue with the content :** Yes|No
12 |
13 | *Your comments here. Please read CONTRIBUTING.md before posting issues.*
14 |
--------------------------------------------------------------------------------
/CONTRIBUTING.md:
--------------------------------------------------------------------------------
1 | # Contributing
2 |
3 | Before contributing or comment, please note that I am not a professional infosec or pen tester. I am just a student who want to learn and teach to others. Other contributors might be students as well, so be patient and indulgent with everyone. Do not forget that the main goal here is to write about ethical hacking and teach to others. Tools that are just about malicious hacking and not useful for a professional pen tester will not be added to the README.
4 |
5 | **Please don't open an issue to get help with a tool.**
6 |
7 | We learn ethical hacking here, for discussions about hacking in general please refers to the *[#discussions](https://github.com/sundowndev/hacker-roadmap#discussions)* section in the README.
8 |
9 | ### Before submitting a new tool
10 |
11 | Please don't submit unverified or untested tools. We only want to share tools that have good community of contributors. If you've created a tool, be sure the code is stable and will be maintained.
12 |
13 | Thank you for sharing and contributing ! :tada:
14 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2018 Raphael Cerveaux
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/PULL_REQUEST_TEMPLATE.md:
--------------------------------------------------------------------------------
1 | **Content Update :** Yes|No
2 |
3 | **Related Content :** Guide|Tools
4 |
5 | *Explain your changes here. Please read CONTRIBUTING.md before creating pull requests.*
6 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 |
4 |
5 | This repository is an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and open source.
6 |
7 | ## Before you start
8 |
9 | - If you're new to information security, forget everything you know about hacking.
10 | - Don't start using tools without reading about pen testing and how it works (see [Additional resources](#additional-resources) section).
11 | - Don't download or use tools if you haven't audited its code.
12 | - Don't use these tools to do stupid things like investigating/hacking without consent on your friends, or worst, your recruiter.
13 | - Read books, manuals, articles, be curious and not just a [script kiddie](https://www.wikihow.com/Avoid-Becoming-a-Script-Kiddie).
14 | - I wish you don't use these tools for illegal purposes, but if you do, I sure hope you know what you're doing.
15 | - Practice using [challenges](#challenges), not real targets!
16 |
17 | # Table of Contents
18 |
19 | - [Introduction](#introduction)
20 | - [What is penetration testing?](#what-is-penetration-testing)
21 | - [Want to become a penetration tester?](#want-to-become-a-penetration-tester)
22 | - [Some vocabulary](#some-vocabulary)
23 | - [Difference between hacking and ethical hacking](#difference-between-hacking-and-ethical-hacking)
24 | - [Languages](#languages)
25 | - [Content Management Systems](#content-management-systems)
26 | - [Basic steps of pen testing](#basic-steps-of-pen-testing)
27 | - [Tools by category](#tools-by-category)
28 | - [:male_detective: Information Gathering](#male_detective-information-gathering)
29 | - [:lock: Password Attacks](#lock-password-attacks)
30 | - [:memo: Wordlists](#memo-wordlists)
31 | - [:globe_with_meridians: Wireless Testing](#globe_with_meridians-wireless-testing)
32 | - [:wrench: Exploitation Tools](#wrench-exploitation-tools)
33 | - [:busts_in_silhouette: Sniffing & Spoofing](#busts_in_silhouette-sniffing--spoofing)
34 | - [:rocket: Web Hacking](#rocket-web-hacking)
35 | - [:tada: Post Exploitation](#tada-post-exploitation)
36 | - [:package: Frameworks](#package-frameworks)
37 | - [Additional resources](#additional-resources)
38 | - [Books / Manuals](#books--manuals)
39 | - [Discussions](#discussions)
40 | - [Security Advisories](#security-advisories)
41 | - [Challenges](#challenges)
42 | - [License](#license)
43 |
44 | (TOC made with [nGitHubTOC](https://imthenachoman.github.io/nGitHubTOC/))
45 |
46 | # Introduction
47 |
48 | ## What is penetration testing?
49 |
50 | Penetration testing is a type of security testing that is used to test the security of an application. It is conducted to find a security risk which might be present in a system.
51 |
52 | If a system is not secure, then an attacker may be able to disrupt or take unauthorized control of that system. A security risk is normally an accidental error that occurs while developing and implementing software. For example, configuration errors, design errors, and software bugs, etc. [Learn more](https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm)
53 |
54 | ## Want to become a penetration tester?
55 |
56 | Knowing about risks on the internet and how they can be prevented is very useful, especially as a developer. Web hacking and penetration testing is the v2.0 of self-defense! But is knowing about tools and how to use them really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. They must be able to identify the technology behind and test every single door that might be open to hackers.
57 |
58 | This repository aims first to establish a reflection method on penetration testing and explain how to proceed to secure an application. And secondly, to regroup all kind of tools or resources pen testers need. **Be sure to know basics of programming languages and internet security before learning pen testing.**
59 |
60 | Also, this is important to inform yourself about the law and what you are allowed to do or not. According to your country, the computer laws are not the same. First, check laws about privacy and surveillance: [Nine eyes countries](https://en.wikipedia.org/wiki/Five_Eyes#Other_international_cooperatives), [Five eyes](https://en.wikipedia.org/wiki/Five_Eyes) and Fourteen Eyes. Always check if what you're doing is legal. Even when it's not offensive, information gathering can also be illegal!
61 |
62 | ([Table of Contents](#table-of-contents))
63 |
64 | # Some vocabulary
65 |
66 | **Infosec**: Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. [Wikipedia](https://en.wikipedia.org/wiki/Information_security)
67 |
68 | **Opsec**: Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. [Wikipedia](https://en.wikipedia.org/wiki/Operations_security)
69 |
70 | **Black/grey/white hat hacker**: Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if they're a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is *usually* a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, they might want to be malicious if it can be benefit (data breach, money, whistleblowing ...).
71 |
72 | **Red team**: According to Wikipedia, a red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective in organizations with strong cultures and fixed ways of approaching problems. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders. Little formal doctrine or publications about Red Teaming in the military exist. In infosec exercises, Red teamers are playing the role of attackers. [Wikipedia](https://en.wikipedia.org/wiki/Red_team)
73 |
74 | **Blue team**: A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation. As a result, blue teams were developed to design defensive measures against red team activities. In infosec exercises, Blue teamers are playing the role of defenders. [Wikipedia](https://en.wikipedia.org/wiki/Blue_team_(computer_security))
75 |
76 | **Penetration tester**: An ethical hacker who practices security, tests applications and systems to prevent intrusions or find vulnerabilities.
77 |
78 | **Security researcher**: Someone who practices pen testing and browses the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. They can work for a company as a security consultant and are most likely a Blue teamer.
79 |
80 | **Reverse engineering**: Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. Similar to scientific research, the only difference being that scientific research is about a natural phenomenon. [Wikipedia](https://en.wikipedia.org/wiki/Reverse_engineering)
81 |
82 | **Social engineering**: In the context of information security, it refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. [Wikipedia](https://en.wikipedia.org/wiki/Social_engineering_(security))
83 |
84 | **Threat analyst**: A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems. Threat hunters aim to uncover incidents that an enterprise would otherwise not find out about, providing chief information security officers (CISOs) and chief information officers (CIOs) with an additional line of defense against advanced persistent threats (APTs). [SearchCIO](https://searchcio.techtarget.com/definition/threat-hunter-cybersecurity-threat-analyst)
85 |
86 | ([Table of Contents](#table-of-contents))
87 |
88 | # Difference between hacking and ethical hacking
89 |
90 | A black hat is practicing penetration testing, but unlike a white hat, this is not ethical hacking. Ethical hacking is about finding vulnerabilities and improve the security of a system. An ethical hacker is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems, just like a malicious hacker (a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in. An ethical hacker is basically a white hat hacker.
91 |
92 | ([Table of Contents](#table-of-contents))
93 |
94 | # Languages
95 |
96 | Learning programming is the very first way to start learning about security. There's a lot of languages, most people start with Python, it's the easiest and the most popular one. PHP and Go are the less popular to write security-related stuff, but any of these can still be used in such context. Bash and Powershell are mostly about scripting and writing simple CLI applications.
97 |
98 | Since not all languages work the same way, you need to look at how they work and what you want to learn. For example, C++ and Java compile, PHP and Python do not, they are interpreted languages. This definitely changes what you should use them for. Each language also has its own design patterns.
99 |
100 | ### Scripting
101 |
102 | - Bash
103 | - Powershell
104 |
105 | ### Software & mobile apps
106 |
107 | - Java
108 | - Swift
109 | - C / C++ / C#
110 |
111 | ### General purpose
112 |
113 | - Python
114 | - Ruby
115 | - Perl
116 | - PHP
117 | - Go
118 |
119 | ([Table of Contents](#table-of-contents))
120 |
121 | # Content Management Systems
122 |
123 | - Wordpress
124 | - Joomla
125 | - Drupal
126 | - SPIP
127 |
128 | These are the most used Content Management Systems (CMS). See a complete list [here](https://en.wikipedia.org/wiki/List_of_content_management_systems).
129 |
130 | ([Table of Contents](#table-of-contents))
131 |
132 | # Basic steps of pen testing
133 |
134 |
135 |
136 |
137 |
138 | *Source: [tutorialspoint](https://www.tutorialspoint.com/penetration_testing/index.htm)*
139 |
140 | [Read more about pen testing methodology](https://www.tutorialspoint.com/penetration_testing/penetration_testing_method.htm)
141 |
142 | ([Table of Contents](#table-of-contents))
143 |
144 | # Tools by category
145 |
146 | A more complete list of tools can be found on [Kali Linux official website](https://tools.kali.org/tools-listing).
147 |
148 | #### :male_detective: Information Gathering
149 |
150 | Information Gathering tools allows you to collect host metadata about services and users. Check informations about a domain, IP address, phone number or an email address.
151 |
152 | | Tool | Language | Support | Description |
153 | | ----------- |-------------------------|----------|----------------|
154 | | [theHarvester](https://github.com/laramies/theHarvester) | **Python** | `Linux/Windows/macOS` | E-mails, subdomains and names Harvester. |
155 | | [CTFR](https://github.com/UnaPibaGeek/ctfr) | **Python** | `Linux/Windows/macOS` | Abusing Certificate Transparency logs for getting HTTPS websites subdomains. |
156 | | [Sn1per](https://github.com/1N3/Sn1per) | **bash** | `Linux/macOS` | Automated Pentest Recon Scanner. |
157 | | [RED Hawk](https://github.com/Tuhinshubhra/RED_HAWK) | **PHP** | `Linux/Windows/macOS` | All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers. |
158 | | [Infoga](https://github.com/m4ll0k/Infoga) | **Python** | `Linux/Windows/macOS` | Email Information Gathering. |
159 | | [KnockMail](https://github.com/4w4k3/KnockMail) | **Python** | `Linux/Windows/macOS` | Check if email address exists. |
160 | | [a2sv](https://github.com/hahwul/a2sv) | **Python** | `Linux/Windows/macOS` | Auto Scanning to SSL Vulnerability. |
161 | | [Wfuzz](https://github.com/xmendez/wfuzz) | **Python** | `Linux/Windows/macOS` | Web application fuzzer. |
162 | | [Nmap](https://github.com/nmap/nmap) | **C/C++** | `Linux/Windows/macOS` | A very common tool. Network host, vuln and port detector. |
163 | | [PhoneInfoga](https://github.com/sundowndev/PhoneInfoga) | **Go** | `Linux/macOS` | An OSINT framework for phone numbers. |
164 |
165 | #### :lock: Password Attacks
166 |
167 | Crack passwords and create wordlists.
168 |
169 | | Tool | Language | Support | Description |
170 | | ----------- |-------------------------|----------|----------------|
171 | | [John the Ripper](https://github.com/magnumripper/JohnTheRipper) | **C** | `Linux/Windows/macOS` | John the Ripper is a fast password cracker. |
172 | | [hashcat](https://github.com/hashcat/hashcat) | **C** | `Linux/Windows/macOS` | World's fastest and most advanced password recovery utility. |
173 | | [Hydra](https://github.com/vanhauser-thc/thc-hydra) | **C** | `Linux/Windows/macOS` | Parallelized login cracker which supports numerous protocols to attack. |
174 | | [ophcrack](https://gitlab.com/objectifsecurite/ophcrack) | **C++** | `Linux/Windows/macOS` | Windows password cracker based on rainbow tables. |
175 | | [Ncrack](https://github.com/nmap/ncrack) | **C** | `Linux/Windows/macOS` | High-speed network authentication cracking tool. |
176 | | [WGen](https://github.com/agusmakmun/Python-Wordlist-Generator) | **Python** | `Linux/Windows/macOS` | Create awesome wordlists with Python. |
177 | | [SSH Auditor](https://github.com/ncsa/ssh-auditor) | **Go** | `Linux/macOS` | The best way to scan for weak ssh passwords on your network. |
178 |
179 | ###### :memo: Wordlists
180 |
181 | | Tool | Description |
182 | | ----------- |----------------|
183 | | [Probable Wordlist](https://github.com/berzerk0/Probable-Wordlists) | Wordlists sorted by probability originally created for password generation and testing. |
184 |
185 | #### :globe_with_meridians: Wireless Testing
186 |
187 | Used for intrusion detection and wifi attacks.
188 |
189 | | Tool | Language | Support | Description |
190 | | ----------- |-------------------------|----------|----------------|
191 | | [Aircrack](https://github.com/aircrack-ng/aircrack-ng) | **C** | `Linux/Windows/macOS` | WiFi security auditing tools suite. |
192 | | [bettercap](https://github.com/bettercap/bettercap) | **Go** | `Linux/Windows/macOS/Android` | bettercap is the Swiss army knife for network attacks and monitoring. |
193 | | [WiFi Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) | **Python** | `Linux/Windows/macOS/Android` | Framework for Rogue Wi-Fi Access Point Attack. |
194 | | [Airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) | **Shell** | `Linux/Windows/macOS` | This is a multi-use bash script for Linux systems to audit wireless networks. |
195 | | [Airbash](https://github.com/tehw0lf/airbash) | **C** | `Linux/Windows/macOS` | A POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. |
196 |
197 | #### :wrench: Exploitation Tools
198 |
199 | Acesss systems and data with service-oriented exploits.
200 |
201 | | Tool | Language | Support | Description |
202 | | ------------------------------------------------------- | ---------- | --------------------- | ------------------------------------------------------------ |
203 | | [SQLmap](https://github.com/sqlmapproject/sqlmap) | **Python** | `Linux/Windows/macOS` | Automatic SQL injection and database takeover tool. |
204 | | [XSStrike](https://github.com/UltimateHackers/XSStrike) | **Python** | `Linux/Windows/macOS` | Advanced XSS detection and exploitation suite. |
205 | | [Commix](https://github.com/commixproject/commix) | **Python** | `Linux/Windows/macOS` | Automated All-in-One OS command injection and exploitation tool. |
206 | | [Nuclei](https://github.com/projectdiscovery/nuclei) | **Go** | `Linux/Windows/macOS` | Fast and customisable vulnerability scanner based on simple YAML based DSL. |
207 |
208 | #### :busts_in_silhouette: Sniffing & Spoofing
209 |
210 | Listen to network traffic or fake a network entity.
211 |
212 | | Tool | Language | Support | Description |
213 | | ----------- |-------------------------|----------|----------------|
214 | | [Wireshark](https://www.wireshark.org) | **C/C++** | `Linux/Windows/macOS` | Wireshark is a network protocol analyzer. |
215 | | [WiFi Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) | **Python** | `Linux/Windows/macOS/Android` | Framework for Rogue Wi-Fi Access Point Attack. |
216 | | [Zarp](https://github.com/hatRiot/zarp) | **Python** | `Linux/Windows/macOS` | A free network attack framework. |
217 |
218 | #### :rocket: Web Hacking
219 |
220 | Exploit popular CMSs that are hosted online.
221 |
222 | | Tool | Language | Support | Description |
223 | | ----------- |-------------------------|----------|----------------|
224 | | [WPScan](https://github.com/wpscanteam/wpscan) | **Ruby** | `Linux/Windows/macOS` | WPScan is a black box WordPress vulnerability scanner. |
225 | | [Droopescan](https://github.com/droope/droopescan) | **Python** | `Linux/Windows/macOS` | A plugin-based scanner to identify issues with several CMSs, mainly Drupal & Silverstripe. |
226 | | [Joomscan](https://github.com/rezasp/joomscan) | **Perl** | `Linux/Windows/macOS` | Joomla Vulnerability Scanner. |
227 | | [Drupwn](https://github.com/immunIT/drupwn) | **Python** | `Linux/Windows/macOS` | Drupal Security Scanner to perform enumerations on Drupal-based web applications. |
228 | | [CMSeek](https://github.com/Tuhinshubhra/CMSeek) | **Python** | `Linux/Windows/macOS` | CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and 130 other CMSs. |
229 |
230 | #### :tada: Post Exploitation
231 |
232 | Exploits for after you have already gained access.
233 |
234 | | Tool | Language | Support | Description |
235 | | ----------- |-------------------------|----------|----------------|
236 | | [TheFatRat](https://github.com/Screetsec/TheFatRat) | **C** | `Linux/Windows/macOS` | Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack, dll. |
237 |
238 | #### :package: Frameworks
239 |
240 | Frameworks are packs of pen testing tools with custom shell navigation and documentation.
241 |
242 | | Tool | Language | Support | Description |
243 | | ----------- |-------------------------|----------|----------------|
244 | | [Operative Framework](https://github.com/graniet/operative-framework) | **Python** | `Linux/Windows/macOS` | Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules. |
245 | | [Metasploit](https://github.com/rapid7/metasploit-framework) | **Ruby** | `Linux/Windows/macOS` | A penetration testing framework for ethical hackers. |
246 | | [cSploit](https://github.com/cSploit/android) | **Java** | `Android` | The most complete and advanced IT security professional toolkit on Android. |
247 | | [radare2](https://github.com/radare/radare2) | **C** | `Linux/Windows/macOS/Android` | Unix-like reverse engineering framework and commandline tools. |
248 | | [Wifiphisher](https://github.com/wifiphisher/wifiphisher) | **Python** | `Linux` | The Rogue Access Point Framework. |
249 | | [Beef](https://github.com/beefproject/beef) | **Javascript** | `Linux/Windows/macOS` | The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. |
250 | | [Mobile Security Framework (MobSF)](https://github.com/MobSF/Mobile-Security-Framework-MobSF) | **Python** | `Linux/Windows/macOS` | Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. |
251 | | [Burp Suite](https://portswigger.net/burp) | **Java** | `Linux/Windows/macOS` | Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research. **This tool is not free and open source** |
252 |
253 | ([Table of Contents](#table-of-contents))
254 |
255 | # Additional resources
256 |
257 | - [Devbreak on Twitter](https://twitter.com/DevbreakFR)
258 | - [The Life of a Security Researcher](https://www.alienvault.com/blogs/security-essentials/the-life-of-a-security-researcher)
259 | - [Find an awesome hacking spots in your country](https://github.com/diasdavid/awesome-hacking-spots)
260 | - [Awesome-Hacking Lists](https://github.com/Hack-with-Github/Awesome-Hacking/blob/master/README.md)
261 | - [Crack Station](http://crackstation.net/)
262 | - [Exploit Database](http://www.exploit-db.com/)
263 | - [Hackavision](http://www.hackavision.com/)
264 | - [Hackmethod](https://www.hackmethod.com/)
265 | - [Packet Storm Security](http://packetstormsecurity.org/)
266 | - [SecLists](http://seclists.org/)
267 | - [SecTools](http://sectools.org/)
268 | - [Smash the Stack](http://smashthestack.org/)
269 | - [Don't use VPN services](https://gist.github.com/joepie91/5a9909939e6ce7d09e29)
270 | - [How to Avoid Becoming a Script Kiddie](https://www.wikihow.com/Avoid-Becoming-a-Script-Kiddie)
271 | - [2017 Top 10 Application Security Risks](https://www.owasp.org/index.php/Top_10-2017_Top_10)
272 | - [Starting in cybersecurity ?](https://blog.0day.rocks/starting-in-cybersecurity-5b02d827fb54)
273 |
274 | ## Books / Manuals
275 |
276 | **Warning :** I haven't read them all so do not consider I am recommending as I liked them. They just seem to provide useful resources.
277 |
278 | - [Penetration Testing: A Hands-On Introduction to Hacking](https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641) (2014)
279 | - [Kali Linux Revealed](https://www.amazon.com/Kali-Linux-Revealed-Penetration-Distribution/dp/0997615605) - [PDF](https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf) (2017)
280 | - [Blue Team Field Manual (BTFM)](https://www.amazon.com/Blue-Team-Field-Manual-BTFM/dp/154101636X) (2017)
281 | - [Cybersecurity - Attack and Defense Strategies](https://www.amazon.com/Cybersecurity-Defense-Strategies-Infrastructure-security/dp/1788475291) (2018)
282 | - [NMAP Network Scanning : Official Discovery](https://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717) (2009)
283 | - [Social Engineering : The Art of Human Hacking](https://www.amazon.com/Social-Engineering-Art-Human-Hacking/dp/0470639539) (2010)
284 | - [Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous](https://www.amazon.com/Incognito-Toolkit-Communicating-Publishing-Researching/dp/0985049146) (2013)
285 |
286 | ## Discussions
287 | - [Reddit/HowToHack](https://www.reddit.com/r/HowToHack/) Learn and ask about hacking, security and pen testing.
288 | - [Reddit/hacking](https://www.reddit.com/r/hacking) Discuss about hacking and web security.
289 | - [ax0nes](https://ax0nes.com/) Hacking, security, and software development forum.
290 | - [0Day.rocks on discord](https://discord.gg/WmYzJfD) Discord server about the 0day.rocks blog for technical and general InfoSec/Cyber discussions & latest news.
291 | - [Reddit/AskNetsec](https://www.reddit.com/r/AskNetsec/) Discuss about network security, ask professionals for advices about jobs and stuff.
292 |
293 | ## Security Advisories
294 |
295 | - [CVE](http://cve.mitre.org/)
296 | - [CWE](http://cwe.mitre.org/)
297 | - [NVD](http://web.nvd.nist.gov/)
298 |
299 | ## Challenges
300 |
301 | - [Vulnhub](https://www.vulnhub.com/) - Has a lot of VMs to play with. Some are beginner friendly, some aren't.
302 | - [Itsecgames](http://www.itsecgames.com/) - bWAPP or buggy web app is a deliberately insecure web application.
303 | - [Dvwa](http://www.dvwa.co.uk/) - Damn Vulnerable Web Application is another deliberately insecure web application to practice your skills on.
304 | - [Hackthissite](https://www.hackthissite.org/) - A site which provides challenges, CTFs, and more to improve your hacking skills.
305 | - [Defend the Web](https://defendtheweb.net/) - Defend the Web is an interactive security platform where you can learn and challenge your skills.
306 | - [Root-me](https://www.root-me.org/) - Another website which hosts challenges to test your hacking skills.
307 | - [HackTheBox](https://www.hackthebox.eu/) - An online platform to test and advance your skills in penetration testing and cyber security.
308 | - [Overthewire](http://overthewire.org/wargames/) - Learn and practice security concepts in the form of fun-filled games.
309 | - [Ctftime](https://ctftime.org/) - The de facto website for everything CTF related.
310 | - [TryHackMe](https://tryhackme.com/) - TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs.
311 | - [PicoCTF](https://picoctf.org/) - Provides you with fun CTF challenges of varying levels of difficulty to practice on.
312 |
313 | ([Table of Contents](#table-of-contents))
314 |
315 | # License
316 |
317 | This repository is under MIT license.
318 |
319 | ([Table of Contents](#table-of-contents))
320 |
--------------------------------------------------------------------------------