Projects STRLCPY Cipherops Commits 2ddd60b5
🤬
  • ■ ■ ■ ■ ■ ■
    30-cybersecurity-search-engines.md
     1 +# 30 cybersecurity search engines
     2 + 
     3 +```markdown
     4 +Here is the list of 30 cybersecurity search engines:
     5 + 
     6 +1. [Dehashed](https://dehashed.com/) — View leaked credentials.
     7 +2. [SecurityTrails](https://securitytrails.com/) — Extensive DNS data.
     8 +3. [DorkSearch](https://dorksearch.net/) — Really fast Google dorking.
     9 +4. [ExploitDB](https://www.exploit-db.com/) — Archive of various exploits.
     10 +5. [ZoomEye](https://www.zoomeye.org/) — Gather information about targets.
     11 +6. [Pulsedive](https://pulsedive.com/) — Search for threat intelligence.
     12 +7. [GrayHatWarefare](https://buckets.grayhatwarfare.com/) — Search public S3 buckets.
     13 +8. [PolySwarm](https://polyswarm.network/) — Scan files and URLs for threats.
     14 +9. [Fofa](https://fofa.so/) — Search for various threat intelligence.
     15 +10. [LeakIX](https://leakix.net/) — Search publicly indexed information.
     16 +11. [DNSDumpster](https://dnsdumpster.com/) — Search for DNS records quickly.
     17 +12. [FullHunt](https://www.fullhunt.io/) — Search and discovery attack surfaces.
     18 +13. [AlienVault](https://www.alienvault.com/) — Extensive threat intelligence feed.
     19 +14. [ONYPHE](https://www.onyphe.io/) — Collects cyber-threat intelligence data.
     20 +15. [Grep App](https://grep.app/) — Search across a half million Git repositories.
     21 +16. [URL Scan](https://urlscan.io/) — Free service to scan and analyze websites.
     22 +17. [Vulners](https://vulners.com/) — Search vulnerabilities in a large database.
     23 +18. [WayBackMachine](https://archive.org/web/) — View content from deleted websites.
     24 +19. [Shodan](https://www.shodan.io/) — Search for devices connected to the internet.
     25 +20. [Netlas](https://netlas.io/) — Search and monitor internet-connected assets.
     26 +21. [CRT.sh](https://crt.sh/) — Search for certificates that have been logged by CT.
     27 +22. [Wigle](https://wigle.net/) — Database of wireless networks, with statistics.
     28 +23. [PublicWWW](https://publicwww.com/) — Marketing and affiliate marketing research.
     29 +24. [Binary Edge](https://www.binaryedge.io/) — Scans the internet for threat intelligence.
     30 +25. [GreyNoise](https://greynoise.io/) — Search for devices connected to the internet.
     31 +26. [Hunter](https://hunter.io/) — Search for email addresses belonging to a website.
     32 +27. [Censys](https://censys.io/) — Assessing attack surface for internet-connected devices.
     33 +28. [IntelligenceX](https://intelx.io/) — Search Tor, I2P, data leaks, domains, and emails.
     34 +29. [Packet Storm Security](https://packetstormsecurity.com/) — Browse latest vulnerabilities and exploits.
     35 +30. [SearchCode](https://searchcode.com/) — Search 75 billion lines of code from 40 million projects.
     36 + 
     37 +Please note that while these search engines provide useful cybersecurity information, it's important to use them responsibly and ethically
     38 +```
     39 + 
  • ■ ■ ■ ■
    SUMMARY.md
    skipped 18 lines
    19 19   
    20 20  ***
    21 21   
     22 +* [OSINT tools collection](osint-tools-collection.md)
    22 23  * [Damn Vulnerabilities List Lab](damn-vulnerabilities-list-lab.md)
    23 24  * [PORT SCANNING](port-scanning.md)
    24 25  * [Offensive virtual machine's](offensive-virtual-machines.md)
    25 26  * [Essential Linux Commands](essential-linux-commands.md)
    26  -* [osint](osint.md)
     27 +* [30 cybersecurity search engines](30-cybersecurity-search-engines.md)
     28 +* [cybersecurity YouTube channels](cybersecurity-youtube-channels.md)
     29 +* [Try-Hack-me Roadmap](try-hack-me-roadmap.md)
    27 30   
  • ■ ■ ■ ■ ■ ■
    cybersecurity-youtube-channels.md
     1 +# cybersecurity YouTube channels
     2 + 
     3 + 
     4 + 
     5 +```markdown
     6 +Here is the list of 44 cybersecurity YouTube channels along with their YouTube links:
     7 + 
     8 +1. [Hak5](https://www.youtube.com/c/Hak5) — General cybersecurity coverage.
     9 +2. [The XSS Rat](https://www.youtube.com/c/TheXSStube) — Everything about bounty hunting.
     10 +3. [ITProTV](https://www.youtube.com/c/ITProTV) — General cybersecurity coverage.
     11 +4. [Infosec Institute](https://www.youtube.com/c/infosecinstitute) — Cybersecurity awareness.
     12 +5. [Cyrill Gössi](https://www.youtube.com/c/CyrillG%C3%B6ssi) — Extensive cryptography videos.
     13 +6. [DC CyberSec](https://www.youtube.com/c/DCCyberSec) — Generic cybersecurity coverage.
     14 +7. [Black Hat](https://www.youtube.com/c/BlackHatOfficialYT) — Technical cybersecurity conferences.
     15 +8. [David Bombal](https://www.youtube.com/c/DavidBombal) — Everything cybersecurity related.
     16 +9. [Outpost Gray](https://www.youtube.com/c/OutpostGray) — Cybersecurity career development.
     17 +10. [Bugcrowd](https://www.youtube.com/c/Bugcrowd) — Bug bounty methodology and interviews.
     18 +11. [Network Chuck](https://www.youtube.com/c/NetworkChuck) — Everything cybersecurity related.
     19 +12. [Professor Messer](https://www.youtube.com/c/ProfessorMesser) — Guides covering certifications.
     20 +13. [Cyberspatial](https://www.youtube.com/c/Cyberspatial) — Cybersecurity education and training.
     21 +14. [OWASP Foundation](https://www.youtube.com/c/OWASPGLOBAL) — Web-application security content.
     22 +15. [Nahamsec](https://www.youtube.com/c/Nahamsec) — Educational hacking and bug bounty videos.
     23 +16. [Computerphile](https://www.youtube.com/c/computerphile) — Covers basic concepts and techniques.
     24 +17. [InfoSec Live](https://www.youtube.com/c/InfosecLive) — Everything from tutorials to interviews.
     25 +18. [InsiderPHD](https://www.youtube.com/c/InsiderPHD) — How to get started with bug bounty hunting.
     26 +19. [Security Weekly](https://www.youtube.com/c/SecurityWeeklyTV) — Interviews with cybersecurity figures.
     27 +20. [Hack eXPlorer](https://www.youtube.com/c/HackeXPlorer)
     28 +21. [Cyber CDH](https://www.youtube.com/c/CyberCDH) — Cybersecurity tools, tactics, and techniques.
     29 +22. [John Hammond](https://www.youtube.com/user/RootOfTheNull) — Malware analysis, programming, and careers.
     30 +23. [SANS Offensive Operations](https://www.youtube.com/c/SANSInstitute) — Technical cybersecurity videos.
     31 +24. [13Cubed](https://www.youtube.com/c/13cubed) — Videos on tools, forensics, and incident response.
     32 +25. [HackerSploit](https://www.youtube.com/c/HackerSploit) — Penetration testing, web-application hacking.
     33 +26. [Z-winK University](https://www.youtube.com/c/ZwinKUniversity) — Bug bounty education and demonstrations.
     34 +27. [Peter Yaworski](https://www.youtube.com/c/PeterYaworski) — Web-application hacking tips and interviews.
     35 +28. [IppSec](https://www.youtube.com/c/IppSec) — Labs and capture-the-flag tutorials, HackTheBox, etc.
     36 +29. [Pentester Academy TV](https://www.youtube.com/c/PentesterAcademyTV) — Discussions and demonstrating attacks.
     37 +30. [BlackPerl](https://www.youtube.com/c/BlackPerl) — Malware analysis, forensics, and incident response.
     38 +31. [Offensive Security](https://www.youtube.com/c/OffsecVideos) — Educational content and lab walkthroughs.
     39 +32. [Day Cyberwox](https://www.youtube.com/c/DayCyberwox) — Useful cloud security content and walkthroughs.
     40 +33. [DEFCONConference](https://www.youtube.com/user/DEFCONConference) — Everything from DEF CON cybersecurity event.
     41 +34. [STÖK](https://www.youtube.com/c/STÖK) — Videos on tools, vulnerability analysis, and methodology.
     42 +35. [MalwareTechBlog](https://www.youtube.com/c/MalwareTechBlog) — Cybersecurity and reverse engineering content.
     43 +36. [The Hated One](https://www.youtube.com/c/TheHatedOne) — Research that explains cybersecurity concepts.
     44 +37. [Simply Cyber](https://www.youtube.com/c/SimplyCyber) — Helps people with cybersecurity career development.
     45 +38. [Black Hills Information Security](https://www.youtube.com/c/BlackHillsInformationSecurity) — Everything cybersecurity related.
     46 +39. [Security Now](https://www.youtube.com/c/SecurityNow) — Cybercrime news, hacking, and web-application security.
     47 +40. [The Cyber Mentor](https://www.youtube.com/c/TheCyberMentor) — Ethical hacking, web-application hacking, and tools.
     48 +41. [Joe Collins](https://www.youtube.com/user/BadEditPro) — Everything Linux related, including tutorials and guides.
     49 +42. [Null Byte](https://www.youtube.com/c/NullByte) — Cybersecurity for ethical hackers and computer scientists.
     50 +43. [LiveOverflow](https://www.youtube.com/c/LiveOverflow) — Involves hacking, write-up videos, and capture-the-flags.
     51 +44. [The PC Security Channel](https://www.youtube.com/c/ThePCSecurityChannel) — Windows security, malware news, and tutorials.
     52 + 
     53 +Please note that the content on these channels may vary, so it's always a good idea to explore the videos and choose the ones that align with your interests and learning goals.
     54 + 
     55 +```
     56 + 
  • osint-tools-collection.md
    Diff is too large to be displayed.
  • ■ ■ ■ ■ ■ ■
    try-hack-me-roadmap.md
     1 +# Try-Hack-me Roadmap
     2 + 
     3 +```markdown
     4 +# Level 1 - Intro
     5 +- [ ] [OpenVPN](https://tryhackme.com/room/openvpn)
     6 +- [ ] [Welcome](https://tryhackme.com/jr/welcome)
     7 +- [ ] [Intro to Researching](https://tryhackme.com/room/introtoresearch)
     8 +- [ ] [Learn Linux](https://tryhackme.com/room/zthlinux)
     9 +- [ ] [Crash Course Pentesting](https://tryhackme.com/room/ccpentesting)
     10 + 
     11 +Introductory CTFs to get your feet wet
     12 + 
     13 +- [ ] [Google Dorking](https://tryhackme.com/room/googledorking)
     14 +- [ ] [OHsint](https://tryhackme.com/room/ohsint)
     15 +- [ ] [Shodan.io](https://tryhackme.com/room/shodan)
     16 + 
     17 +# Level 2 - Tooling
     18 +- [ ] [Tmux](https://tryhackme.com/room/rptmux)
     19 +- [ ] [Nmap](https://tryhackme.com/room/rpnmap)
     20 +- [ ] [Web Scanning](https://tryhackme.com/room/rpwebscanning)
     21 +- [ ] [Sublist3r](https://tryhackme.com/room/rpsublist3r)
     22 +- [ ] [Metasploit](https://tryhackme.com/room/rpmetasploit)
     23 +- [ ] [Hydra](https://tryhackme.com/room/hydra)
     24 +- [ ] [Linux Privesc](https://tryhackme.com/room/linuxprivesc)
     25 +- [ ] [Web Scanning](https://tryhackme.com/room/rpwebscanning)
     26 + 
     27 +More introductory CTFs
     28 +- [ ] [Vulnversity](https://tryhackme.com/room/vulnversity)
     29 +- [ ] [Blue](https://tryhackme.com/room/blue)
     30 +- [ ] [Simple CTF](https://tryhackme.com/room/easyctf)
     31 +- [ ] [Bounty Hacker](https://tryhackme.com/room/cowboyhacker)
     32 + 
     33 +# Level 3 - Crypto & Hashes with CTF practice
     34 +- [ ] [Crack the hash](https://tryhackme.com/room/crackthehash)
     35 +- [ ] [Agent Sudo](https://tryhackme.com/room/agentsudoctf)
     36 +- [ ] [The Cod Caper](https://tryhackme.com/room/thecodcaper)
     37 +- [ ] [Ice](https://tryhackme.com/room/ice)
     38 +- [ ] [Lazy Admin](https://tryhackme.com/room/lazyadmin)
     39 +- [ ] [Basic Pentesting](https://tryhackme.com/room/basicpentestingjt)
     40 + 
     41 +# Level 4 - Web
     42 +- [ ] [OWASP top 10](https://tryhackme.com/room/owasptop10)
     43 +- [ ] [Inclusion](https://tryhackme.com/room/inclusion)
     44 +- [ ] [Injection](https://tryhackme.com/room/injection)
     45 +- [ ] [Vulnversity](https://tryhackme.com/room/vulnversity)
     46 +- [ ] [Basic Pentesting](https://tryhackme.com/room/basicpentestingjt)
     47 +- [ ] [Juiceshop](https://tryhackme.com/room/owaspjuiceshop)
     48 +- [ ] [Ignite](https://tryhackme.com/room/ignite)
     49 +- [ ] [Overpass](https://tryhackme.com/room/overpass)
     50 +- [ ] [Year of the Rabbit](https://tryhackme.com/room/yearoftherabbit)
     51 +- [ ] [DevelPy](https://tryhackme.com/room/bsidesgtdevelpy)
     52 +- [ ] [Jack of all trades](https://tryhackme.com/room/jackofalltrades)
     53 +- [ ] [Bolt](https://tryhackme.com/room/bolt)
     54 + 
     55 +# Level 5 - Reverse Engineering
     56 +- [ ] [Intro to x86 64](https://tryhackme.com/room/introtox8664)
     57 +- [ ] [CC Ghidra](https://tryhackme.com/room/ccghidra)
     58 +- [ ] [CC Radare2](https://tryhackme.com/room/ccradare2)
     59 +- [ ] [CC Steganography](https://tryhackme.com/room/ccstego)
     60 +- [ ] [Reverse Engineering](https://tryhackme.com/room/reverseengineering)
     61 +- [ ] [Reversing ELF](https://tryhackme.com/room/reverselfiles)
     62 +- [ ] [Dumping Router Firmware](https://tryhackme.com/room/rfirmware)
     63 + 
     64 +# Level 6 - PrivEsc
     65 +- [ ] [Sudo Security Bypass](https://tryhackme.com/room/sudovulnsbypass)
     66 +- [ ] [Sudo Buffer Overflow](https://tryhackme.com/room/sudovulnsbof)
     67 +- [ ] [Windows Privesc Arena](https://tryhackme.com/room/windowsprivescarena)
     68 +- [ ] [Linux Privesc Arena](https://tryhackme.com/room/linuxprivescarena)
     69 +- [ ] [Windows Privesc](https://tryhackme.com/room/windows10privesc)
     70 +- [ ] [Blaster](https://tryhackme.com/room/blaster)
     71 +- [ ] [Ignite](https://tryhackme.com/room/ignite)
     72 +- [ ] [Kenobi](https://tryhackme.com/room/kenobi)
     73 +- [ ] [Capture the flag](https://tryhackme.com/room/c4ptur3th3fl4g)
     74 +- [ ] [Pickle Rick](https://tryhackme.com/room/picklerick)
     75 + 
     76 +# Level 7 - CTF practice
     77 +- [ ] [Post Exploitation Basics](https://tryhackme.com/room/postexploit)
     78 +- [ ] [Smag Grotto](https://tryhackme.com/room/smaggrotto)
     79 +- [ ] [Inclusion](https://tryhackme.com/room/inclusion)
     80 +- [ ] [Dogcat](https://tryhackme.com/room/dogcat)
     81 +- [ ] [LFI basics](https://tryhackme.com/room/lfibasics)
     82 +- [ ] [Buffer Overflow Prep](https://tryhackme.com/room/bufferoverflowprep)
     83 +- [ ] [Overpass](https://tryhackme.com/room/overpass)
     84 +- [ ] [Break out the cage](https://tryhackme.com/room/breakoutthecage1)
     85 +- [ ] [Lian Yu](https://tryhackme.com/room/lianyu)
     86 + 
     87 +```
     88 + 
Please wait...
Page is in error, reload to recover