šŸ”“
PURPLEBYTEONE
  • main
  • Notes
    • Education
      • Base
        • Information Technology
          • OpenText
            • Courses
              • Security and Forensics
                • EnCaseā„¢ eDiscovery Series
                  • ED290 - eDiscovery Training with EnCase Information Assurance
                • EnCaseā„¢ Crossover Series
                  • DFIR450 - EnCase EnScript Programming
                  • DFIR370 - Host Intrusion Methodology and Investigation
                  • DFIR350 - Internet-based Investigations
                  • DFIR130 - EnCase Endpoint Investigator
                • EnCaseā„¢ Incident Response Series
                  • IR280 - EnCase Endpoint Security
                  • IR250 - Incident Investigation
                • EnCaseā„¢ Digital Forensics Series
                  • DF420 - Mac Examinations
                  • DF410 - NTFS Examinations
                  • DF320 - Advanced Analysis of Windows Artifacts
                  • DF310 - EnCase Certified Examiner
                  • DF210 - Building an Investigation
                  • DF125 - Mobile Device Examinations
                  • DF120 - Foundations in Digital Forensics
              • Business Network
              • Digital Process Automation
              • Platform Solutions
              • Discovery
              • Digital Experience
              • Analytics
              • Enterprise Content Management
          • Harvard University
            • CS 50
          • LPI
            • Courses
              • Essentials
                • Linux Essentials: 010
                • Security Essentials: 020
                • Web Development Essentials: 030
              • Professional
                • LPIC-1
                  • 101
                  • 102
                • LPIC-2
                  • 201
                  • 202
                • LPIC-3
                  • 300
                  • 303
                  • 305
                  • 306
          • Cloud Orchestration
            • Docker
            • Kubernetes
              • KCNA
              • CKA
              • CKS
          • Google Cloud
            • Path
              • Google Cloud Computing Foundations
              • Network Engineer Learning Path
              • Database Engineer Learning Path
              • Cloud Engineer Learning Path
              • Security Engineer Learning Path
              • Cloud Architect Learning Path
              • Cloud Developer Learning Path
          • VMware
            • Courses
              • Carbon Black
                • Professional
                  • Endpoint Security: Core Technical Skills
                  • App Control Administrator
                  • EDR Administrator
                • Advanced
                  • App Control Advanced Administrator
                  • Advanced Operations and Troubleshooting
                  • Audit and Remediation
                  • Endpoint Standard
                  • Enterprise EDR
                  • EDR Advanced Administrator
                  • EDR Advanced Analyst
          • Amazon
            • Courses
              • Foundation
                • AWS Certified Cloud Practitioner
              • Associate
                • AWS Certified Solutions Architect
              • Professional
                • AWS Certified Solutions Architect
              • Speciality
                • AWS Certified Advanced Networking
                • AWS Certified Security – Specialty
          • Microsoft
            • Courses
              • Azure
                • AZ - 900
                • AZ - 104
                • AZ - 305
                • SC - 900
                • SC - 200
                • SC - 300
                • AZ - 500
                • MS-500
                • SC - 400
                • SC - 100
          • The Code
            • Platform
              • FreeCodeCamp
              • W3
            • Language
              • Python
              • PowerShell
              • JavaScript
              • PHP
              • SQL
              • GO
              • Java
              • Perl
              • Ruby
              • Scala
              • C
              • C#
              • C++
              • Brainfuck
              • CSS
              • JSON
              • Kotlin
              • LOLCODE
              • MISP
              • MongoDB
              • Objective-C
              • Perl
              • Rust
              • SAAS
              • Scala
              • Solidity
              • SWIFT
              • TypeScript
              • WebAssembly
              • XML
              • YAML
              • AngularJS
              • Ansible
              • BASH
              • Docker
              • GIT
              • jQuery
              • VIM
          • OKTA
        • Purple Team
          • Splunk
            • Courses
              • Udemy
            • Notes
          • Security Team Blue
            • Courses
              • BTL v1
              • BTL v2
          • ISC2
            • CC
              • Introduction
              • Security Principles
                • Security Concepts of Information Assurance
                • Risk Management Process
                • Security Controls
                • Governance Elements and Processes
                • Terms and Definitions
              • Incident Response
                • Understand Incident Response
                • Business Continuity
                • Disaster Recovery
              • Access Control Concepts
                • Access Control Concepts
                • Physical Access Controls
                • Logical Access Controls
              • Network Security
                • Computer Networking
                • Threats and Attacks
                • Network Security Infrastructure
              • Security Operations
            • SSCP
            • CISSP
            • CCSP
          • TCM Security
            • Courses
              • Python 101
              • Python 201
              • Linux 101
              • External Pentest Playbook
              • Windows Privilege Escalation
              • Linux Privilege Escalation
              • Movement, Pivoting and Persistence
              • Practical Phishing Assessments
              • Practical Web Application Security
              • Practical Malware Analysis
              • Mobile
              • (OSINT) Fundamentals
              • PEH
            • Certification
              • PNPT
              • PJMR
          • Coursera
            • Courses
              • NYU
                • Introduction to Cyber Security Specialization
              • Google
                • Google Cybersecurity Professional
                  • Foundations of Cybersecurity
                  • Play It Safe: Manage Security Risks
                  • Connect and Protect: Networks and Network Security
                  • Tools of the Trade: Linux and SQL
                  • Assets, Threats, and Vulnerabilities
                  • Sound the Alarm: Detection and Response
                  • Automate Cybersecurity Tasks with Python
                  • Put It to Work: Prepare for Cybersecurity Jobs
          • ICSI Global
          • OccupyTheWeb
            • Courses
              • GSBMH
              • NBFH
              • LBFH
          • CompTIA
            • Courses
              • Core Base
                • A+
                  • Chapter 1
                • Network+
                  • Chapter 1
                • Linux+
                  • Chapter 1
                  • Chapter 2
                • Cloud+
                  • Chapter 1
              • Security
                • Security+
                  • Chapter 1
                    • Risk Terminology
                • Pentest+
                  • Chapter 1
                • CySA+
                  • Chapter 1
                • CSA+
                  • Defending Against Cybersecurity Threats
          • EC-Council
            • Courses
              • CEH
              • CHFI
              • CSA
          • Intel Techniques
            • Courses
              • OSINT Techniques
              • Privacy & Security
          • SANS
            • Courses
              • SEC
                • SEC 401 - Security Essentials
                • SEC 450 - Blue Team Fundamentals
                • SEC 502 - Perimeter Protection In-Depth
                • SEC 503 - Network Monitoring and Threat Detection In-Depth
                • SEC 504 - Hackers Tools, Techniques And Incident Handling
                • SEC 505 - Securing Windows and PowerShell Automation
                • SEC 506 - Securing Linux & UNIX
                • SANS 509 - Securing Oracle Database
                • SEC 511 - Continuous Monitoring and Security Operations
                • SEC 517 - Cutting Edge Hacking Techniques
                • SEC 524 - Cloud Security Fundamentals
                • SEC 531 - Windows Command Line Kung Fu
                • SEC 542 - Web App Penetration Testing
                • SEC 560 - Enterprise Penetration Testing
                • SEC 565 - Red Team Operations and Adversary Emulation
                • SEC 566 - Implementing and Auditing Security Frameworks
                • SEC 573 - Automating Information Security with Python
                • SEC 575: Mobile Device Security
                • SEC 580 - Metasploit for Enterprise Penetration Testing
                • SEC 587 - Advanced Open Source Intelligence
                • SEC 599 - Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
                • SEC 617 - Wireless Penetration Testing and Ethical Hacking
                • SEC 642 - Advanced Web App Penetration Testing
                • SEC 660 - Advanced Penetration Testing
                • SEC 760 - Advanced Exploit Development
                • SEC 554: Blockchain and Smart Contract Security
              • FOR
                • FOR 408 - Windows Forensic Analysis
                • FOR 500 - Windows Forensic Analysis
                • FOR 508 - Advanced Digital Forensics and Incident Response
                • FOR 518 - Mac and iOS Forensic Analysis
                • FOR 526 - Memory Forensics In-Depth
                • FOR 572 - Advanced Network Forensics
                • FOR 577 - Virtualization Security Fundamentals
                • FOR 578 - Cyber Threat Intelligence
                • FOR 610 - Reverse-Engineering Malware
                • FOR 710 - Reverse-Engineering Malware: Advanced Code Analysis
              • AUD
                • AUD 507 - Auditing Systems, Applications, and the Cloud
              • ICS
                • ICS 410 - ICS/SCADA Security Essentials
              • MGT
                • MGT 512 - Security Leadership Essentials for Managers
          • IBM
            • Courses
              • Cybersecurity Analyst Professional
                • Introduction to Cybersecurity Tools & Cyber Attacks
                  • Week 1
                  • Week 2
                  • Week 3
                  • Week 4
          • Cybrary
            • Courses
              • SOC L1
              • SOC L2
              • SOC L3
              • Become an Incident Handler
          • Zero Point Security
            • Courses
              • Red Team Ops [CRTO]
              • C2 Development in C#
          • Web Security Academy
            • Courses
              • Burp Suite Certified Practitioner
          • INE
            • Courses
              • eJPT
                • Blue Team
                  • ePND
                  • eCIR
                  • eCRE
                  • ePWD
                  • eCTHPv2
                  • eCDFP
                  • eCMAP
                • Red Team
                  • eMAPT
                  • eWPT
                  • eCPPTv2
                  • eCXD
                  • eWPTXv2
                  • eCPTXv2
          • Pentester Lab
          • Pentester Academy
            • Courses
              • Pentesting with Metasploit: Beginner Edition
              • Linux Privilege Escalation
          • Offensive Security
            • Courses
              • Fundamental
                • Introduction to Secure Software Development
                • Introduction to Cloud Security
                • Exploit Development Essentials
                • Web Application Assessment Essentials
                • Security Operations Essentials
                • Network Penetration Testing Essentials
              • Security Operations
                • SOC-200: Foundational Security Operations and Defensive Analysis (OSDA)
              • Penetration Testing
                • PEN - 200
                • PEN - 210
                • PEN - 300
              • Web Application
                • WEB-200: Foundational Web Application Assessments with Kali Linux (OSWA)
                • WEB-300: Advanced Web Attacks and Exploitation (OSWE)
              • Exploit Development
                • EXP-301: Windows User Mode Exploit Development (OSED)
                • EXP-312: Advanced macOS Control Bypasses (OSMR)
                • EXP-401: Advanced Windows Exploitation (OSEE)
          • Sektor7
            • Courses
              • Windows Privilege Escalation
              • Windows Persistence
              • Malware Development Essentials
              • Evasion Windows Red Team Ops
          • Black Hat
            • Courses
              • BlackHat - Malware Analysis And Memory Forensics
          • Fortinet
          • VHL
          • DFIRdiva
          • YouTube
            • Channels
          • Udemy
            • Certified in Cybersecurity (CC)
            • CompTIA Security+
          • AntiSyphon
          • THM
            • Room
              • SPLUNK
                • Introduction to SIEM
                • Basics
                • Incident handling
                • Investigating
                • Benign
                • ELK 101
                • PS Eclipse
                • New Hire Old Artifacts
                • Conti
                • BOTS
                  • v1
                  • v2
                  • v3
                • ItsyBitsy
            • Learning Paths
              • Introduction to Cyber Security
                • Introduction to Cyber Security
                  • Intro to Offensive Security
                  • Intro to Defensive Security
                • Introduction to Offensive Security
                • Introduction to Defensive Security
          • HTB
            • HTB Academy
              • Job Role Path
                • Penetration Tester
                  • Getting Started
                    • Infosec Overview
                    • Getting Started with a Pentest Distro
                    • Staying Organized
                    • Connecting Using VPN
                    • Common Terms
                  • Machines
                    • Nibbles
                • SOC Analyst
                  • Incident Handling Process
                    • Incident Handling
                    • Cyber Kill Chain
                    • Incident Handling Process Overview
                      • Preparation Stage
                      • Detection & Analysis Stage
                      • Containment, Eradication, & Recovery Stage
                      • Post-Incident Activity Stage
                  • Security Monitoring & SIEM Fundamentals
                  • Windows Event Logs & Finding Evil
                  • Introduction to Threat Hunting & Hunting With Elastic
                  • Understanding Log Sources & Investigating with Splunk
                  • Windows Attacks & Defense
                  • Intro to Network Traffic Analysis
                  • Intermediate Network Traffic Analysis
                  • Working with IDS/IPS
                  • Introduction to Malware Analysis
                  • JavaScript Deobfuscation
                  • YARA & Sigma for SOC Analysts
                  • Introduction to Digital Forensics
                  • Detecting Windows Attacks with Splunk
                  • Security Incident Reporting
            • Challenges
              • Retired
                • Challenges
                  • Hardware
                    • Very Easy
                      • Gawk
                      • Secure Digital
                  • Web
                    • Very Easy
                      • Trapped Source
                  • Mobile
                    • Very Easy
                      • Don't Overreact
                  • Pwn
                    • Very Easy
                      • Getting Started
                      • Questionnaire
                      • Vault-breaker
                  • Crypto
                    • Very Easy
                      • Ancient Encodings
                  • Reverse
                    • Very Easy
                      • WIDE
                      • Shattered Tablet
                      • Hunting License
                      • Gonna-Lift-Em-All
                  • Misc
                    • Very Easy
                      • Compressor
                  • Forensics
                    • Very Easy
                      • Extraterrestrial Persistence
                      • Alien Cradle
                      • Wrong Spooky Season
                  • OSINT
                  • GamePwn
                  • Blockchain
            • Machines
              • Retired
                • Windows
                  • Easy
                    • Blue
          • Blueteamlabs.online
          • LetsDefend.io
          • CyberDefenders.org
      • Infinity
        • c0//53
          • Leet Code
          • Hacker Rank
        • Tools
          • Red Team
            • OSINT
            • Enumeration
            • Web
            • Exploit Base
              • Linux
            • Post-exploitation
              • Backdoor
          • Blue Team
            • Forensics
            • My scripts
        • Bookmarks
          • Cybersecurity
            • Reverse Engineering
            • Telegram
          • MindHub
            • Job Boards
          • GitHub
          • AI
            • Free
          • Books
            • Cybersecurity
              • Linux
                • Linux Essentials For Cybersecurity
                • The Linux Command Line, 2nd Edition: A Complete Introduction
                • How Linux Works, 3rd Edition: What Every Superuser Should Know
              • OSINT
                • Deep Dive: Exploring the Real-world Value of Open Source Intelligence
              • Networking
                • Wireshark for Security Professionals
              • Social Engineering
                • Practical Social Engineering
          • Writeups
    • Carrier
      • Interview Questions
        • General HR questions
        • Cybersecurity
          • Junior Positions
            • SOC L1
            • Junior Malware Analyst
            • Junior Penetration Tester
            • Junior Red Teamer
            • Junior Forensic Analyst
            • Junior Incident responder
            • Junior Threat hunter
            • Junior Security Analyst
          • Specialist Positions
            • SOC L2
            • Malware Analyst
            • Penetration Tester
            • Red Teamer
            • Forensic Analyst
            • Incident responder
            • Threat hunter
            • Security Analyst
          • Senior Positions
            • SOC L3
            • Senior Malware Analyst
            • Senior Penetration Tester
            • Senior Red Teamer
            • Senior Forensic Analyst
            • Senior Incident responder
            • Senior Threat hunter
            • Senior Security Analyst
          • Random questions
            • PT.1
            • PT.2
            • PT.3
            • PT.4
            • PT.5
            • PT.6
    • Note
      • Read
      • Interview
      • Cheat Sheet
        • Penetration Testing
          • Enumeration
  • Roadmap
    • CTF Track
Powered by GitBook
On this page
  1. Notes
  2. Note

Read

Something that I'm curious to read or check more but did not have time

Last updated 1 year ago

Random
  • https://www.threatcrowd.org/

  • https://lolbas-project.github.io/

  • https://github.com/sbousseaden

  • https://github.com/olafhartong/ThreatHunting

  • https://urlhaus.abuse.ch/browse/

  • https://bazaar.abuse.ch/browse/

  • https://bgp.he.net/

  • https://community.riskiq.com/

  • https://www.threatminer.org/

  • [$]

  • [$]

  • - Xenobite

  • Ć©coute l'Ć¢me

Telegram
  • WE ARE KILLNET šŸ’Ž

  • Purple Team (Priv8)

  • AgainstTheWest / BlueHornet

TOR
  • bookszlibb74ugqojhzhg2a63w5i2atv5bqarulgczawnbmsb6s6qead.onion

  • loginzlib2vrak5zzpcocc3ouizykn6k5qecgj2tzlnab5wcbqhembyd.onion

https://www.youtube.com/watch?v=mWgcJxQ7i2U
https://www.geeksforgeeks.org/python-programming-language/
https://habr.com/ru/articles/423405/
https://www.hackerrank.com/domains/python
https://www.geeksforgeeks.org/python-programming-language/
https://leetcode.com/explore/featured/card/the-leetcode-beginners-guide/678/sql-data-structure/4352/
https://open.kattis.com/contests
https://www.youtube.com/results?search_query=pythin+junior+interview
https://www.youtube.com/results?search_query=ITIL-driven+IT+operations
https://www.youtube.com/watch?v=dDeWWQWMM-Y
https://www.youtube.com/watch?v=wrNEKxlDWlw
https://www.youtube.com/watch?v=0ScITp-jW-s
https://www.youtube.com/watch?v=ZaZj7XJMJv0
https://pittcs.wiki/career/study-plan/
https://erratic-aletopelta-d86.notion.site/Template-Leetcode-Checklist-8246bb89ac0b4016ae61daeebe2cf1ab
https://www.geeksforgeeks.org/
https://neetcode.io/
https://fireship.io/pro/
https://github.com/fareedfauzi/Flare-On-Challenges
https://www.facebook.com/whitehat/hackerplus/
https://guidedhacking.com/
https://microsoft.github.io/PartnerResources/skilling/microsoft-security-academy/sentinel-academy
https://www.unknowncheats.me/forum/index.php
https://shorturl.at/ahtxA
https://openai.com/research/jukebox
https://soundraw.io/create_music
https://married-sneeze-1e4.notion.site/b0f1d6789bf641579fb8d6fbcd88b6e6?v=8469622b5f4842bfa70ae4aff0e25cb8
https://www.coursehero.com/file/170614175/Darknet-OPSEC-Bible-2022-Edition-2pdf/
https://vxug.fakedoma.in/archive/hasherezade/2020/TheSilentNightZloaderZbot.pdf
https://www.forrest-orr.net/blog
https://www.youtube.com/watch?v=PHyIP9g9BQw
https://www.youtube.com/@tempestatorres5243
https://azure.microsoft.com/en-us/products/ai-services/text-to-speech
https://murf.ai/text-to-speech
https://koe.ai/
https://stablediffusionweb.com/
https://github.com/features/preview/copilot-x
https://aws.amazon.com/codewhisperer/
https://www.tabnine.com/
https://codeium.com/
https://www.useblackbox.io/
tps://vxug.fakedoma.in/papers/VXUG/Mirrors/GrowthandCommoditizationofRemoteAccessTrojans.pdf
https://modexp.wordpress.com/2020/07/07/wpi-wm-paste/
https://www.hackingarticles.in/port-forwarding-tunnelling-cheatsheet/
http://lockbit-blog.com/
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/
https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/
http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/
http://hashcrack.in/en
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/
http://5deqglhxcoy3gbx6.onion
http://tmkloc6vhxos3nde.onion
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/
http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person
https://telegra.ph/ReadTeamAPT29-11-07-4
https://github.com/threat9/routersploit
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
https://ddosecrets.com/data/
http://dc7495.org/heap-buffer-overflow/
https://youtu.be/dtyX7XO-GSg
https://explainshell.com/
https://www.youtube.com/watch?v=8TIHbl6I7fc&feature=share
https://telegra.ph/Manual-po-kryakingu-MaltegoXL-06-25
https://www.orderofsixangles.com/
https://github.com/0xInfection/Awesome-WAF
https://jlajara.gitlab.io/posts/2020/02/19/Bypass_WAF_Unicode.html
https://github.com/ropnop/kerbrute
https://github.com/BC-SECURITY/Empire
https://habr.com/ru/post/491088/?utm_campaign=491088&utm_source=habrahabr&utm_medium=rss
https://habr.com/ru/post/491150/?utm_campaign=491150&utm_source=habrahabr&utm_medium=rss
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
https://www.hackthebox.eu
https://www.vulnhub.com
https://practicalpentestlabs.com
https://labs.wizard-security.net
https://pentesterlab.com/
https://www.hackthis.co.uk
https://shellterlabs.com/pt/
https://www.root-me.org/
https://www.zenk-security.com/epreuves.php
https://w3challs.com/
https://www.newbiecontest.org/
https://cryptopals.com/
http://www.amanhardikar.com/mindmaps/Practice.html
https://alf.nu/alert1
https://www.hacksplaining.com/exercises
https://ctf.hacker101.com
https://academy.hackaflag.com.br/
https://lab.pentestit.ru
https://capturetheflag.com.br/
https://picoctf.com
https://exploit.education/
http://ctf.rootinjail.com
https://cmdchallenge.com
https://tryhackme.com/
https://www.hacking-lab.com/index.html
https://pwnable.kr/play.php
https://34.73.111.210
https://capturetheflag.withgoogle.com/
https://immersivelabs.com/
https://attackdefense.com/
http://overthewire.org
https://www.holidayhackchallenge.com/
http://smashthestack.org/wargames.html
https://nomoregoogle.com/
https://m.habr.com/ru/post/134892/
https://pastebin.com/GsgDyxjW
https://pastebin.com/RNnPF5jn
https://grep.app
https://www.hacksplaining.com/lessons
https://github.com/Screetsec/TheFatRat
https://www.guerrillamail.com/en/
https://10minutemail.com
https://www.trash-mail.com/inbox/
https://www.mailinator.com
http://www.yopmail.com/en
https://generator.email
https://en.getairmail.com
http://www.throwawaymail.com/en
https://maildrop.cc
https://owlymail.com/en
https://www.moakt.com
https://tempail.com
http://www.yopmail.com
https://temp-mail.org/en
https://www.mohmal.com
http://od.obagg.com
http://onedrive.readmail.net
http://xkx.me
https://t.odmail.cn
https://www.emailondeck.com
https://smailpro.com
https://anonbox.net
https://M.kuku.lu
https://shorturl.at/iltMZ
https://shorturl.at/eCJKL
https://github.com/deepzec/Bad-Pdf
https://metasleuth.io/
https://explorer.phalcon.xyz/
https://platform.arkhamintelligence.com/
https://www.remove.bg/
https://github.com/machine1337/TelegramRAT
https://www.facct.ru/blog/winrm-incident-response/?utm_source=telegram&utm_campaign=winrm-ir&utm_medium=organic
https://unit42.paloaltonetworks.com/fast-flux-101/
https://www.akamai.com/blog
https://metadefender.opswat.com/
https://www.trellix.com/en-us/about/newsroom/stories/research.html
https://thedfirreport.com/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-200a
https://virus.exchange/
https://geoffchappell.com/
https://cybersec.org/books/polnyj-manual-po-cobalt-strike-shvejczarskom-nozhe-hakera-na-russkom-yazyke.html
https://codeby.net/threads/roadmap-dlja-pentestera.74576/
https://codeby.net/forums/
http://leg-assembly.com/
https://cryptools.github.io/learn/
https://tor1.sharewood.me/
https://sharewood-zerkalo.pro/
http://lamp-ret.club/
http://9board.ksivi.bz/
http://forum.antichat.com/
https://bhf.im/
http://gerki.io/
http://korovka.cc/
http://crdclub.su/
http://procrd.pw/
http://tenec.to/
http://navigator.ws/
http://skynetzone.org/
http://antimigalki.live/
http://piratebuhta-zerkalo.one/
http://zelenka.guru/
http://mipped.com/
http://chitachok.ru/
http://yougame.biz/
http://crdpro.cc/
http://ascarding.com/
http://cardvilla.cc/
http://nulled.to/
http://cracked.to/
http://evilzone.org/
http://crackingx.com/
http://demonforums.net/
http://www.crackingpro.com/
http://greekhacking.gr/
http://www.blackhatworld.com/
http://drdark.ru/
http://evilarmy.in/
http://hackingfather.com/
http://carding.se/
http://eternia.to/
http://eleaks.to/
https://artik.blue/reversing
https://onlinesim.ru/
https://oshi.at/
https://good-proxies.ru/
https://thetechrim.com/how-to-create-free-edu-email/
https://privnote.com/#
https://protonmail.com/
https://tutanota.com/
https://mailfence.com/
https://disroot.org
https://riseup.net/
https://www.autistici.org/
https://webmail.vivaldi.net/
https://cock.li/
https://www.openmailbox.org/
https://www.criptext.com/
https://ctemplar.com/
https://www.msgsafe.io/
https://www.mailo.com
https://paranoid.email/
https://privatemail.com
https://www.guerrillamail.com/zh/inbox
https://www.cs.email/
https://www.moakt.com/zh
https://habr.com/ru/post/334060/
https://therecord.media/an-interview-with-redbear-a-hacker-training-the-next-generation-of-cybercriminals
https://matchthatroleai.com/
https://applyish.com/
https://interviewai.me/
https://interviewprep-ai.com/
https://app.yoodli.ai/
https://www.metaview.ai/
https://www.kickresume.com/en/
https://t.me/kevinmitnick_bot
https://t.me/d3ranged_blog
https://t.me/RuCTF
https://t.me/Quick_OSINT
https://t.me/Hide01Bot
https://t.me/Hide01
https://t.me/xpanamas
https://t.me/in51d3
https://t.me/ShizoPrivacy
https://t.me/antidetect
https://t.me/vschannel
https://t.me/geeekgirls
https://t.me/RedBlueTM
https://t.me/venatorbrowser
https://t.me/cybershit
https://t.me/proxy_bar
https://t.me/intosecurity
https://t.me/pentest_mentor
https://t.me/club1337
https://t.me/antichat
https://t.me/hunteraecom
https://t.me/ikniga
https://t.me/hlfiles
https://t.me/devlib
https://t.me/dataest
https://t.me/AfonVestnik
https://t.me/hackernews_lib
https://t.me/webpwn
https://t.me/johnniytapia
https://t.me/technical_private_cat
https://t.me/cyberyozh_academy
https://t.me/iskra1917
https://t.me/noname05716
https://t.me/noname05716_reserve
https://t.me/KryptonNetworks
https://t.me/KryptonProofs
https://t.me/dataleak
https://t.me/bfbook
https://t.me/OtFront
https://t.me/F_A_C_C_T
https://t.me/Group_IB
https://t.me/azov_media
https://t.me/BeholderIsHereHub
https://t.me/forensictools
https://t.me/hacker_trick
https://t.me/binary_xor
https://t.me/codeibnews
https://t.me/hackgit
https://t.me/Pwn3rzs
https://t.me/freedomf0x
https://t.me/rtechnocom
https://t.me/books_osint
https://t.me/priemniy_pokoi
https://t.me/SecLabNews
https://t.me/secwebinars
https://t.me/Bishop_of_Sourozh
https://t.me/tomhunter
https://t.me/oops_its_china
https://t.me/MY_CRIMES
https://t.me/Digitalntelligence
https://t.me/DC8800
https://t.me/cybred
https://t.me/hitstress
https://t.me/vsembokslive
https://t.me/ccna_nw
https://t.me/anon_russ
https://t.me/killnet_reservs
https://t.me/user_sec
https://t.me/filonikm
https://t.me/irozysk
https://t.me/HNews
https://t.me/fight_space
https://t.me/vxunderground
https://t.me/professor_youtube
https://t.me/shadow_group_tg
https://t.me/g_jobbot
https://t.me/tuckerrus
https://t.me/nnmclub_c
https://t.me/hackerdom_training
https://t.me/OffensiveTwitter
https://t.me/RedBlueHit
https://t.me/offenciveSec
https://t.me/tenevie_twosouls
https://t.me/peoplelivenews
https://t.me/stdvector
https://t.me/comentlentach
https://t.me/F_S_C_P
https://t.me/milinfolive
https://t.me/ru_python_beginners
https://t.me/theaftertimes
https://t.me/lentachold
https://t.me/NeKaspersky
https://t.me/darknet_look_Channel
https://t.me/latgalite
https://t.me/exploitex
https://t.me/hack_cpp
https://t.me/malzoffsgallery
https://t.me/dvachannel
https://t.me/operativnoZSU
https://t.me/+v-P0xT4ViGI4Yzg6
https://t.me/oko_ua
https://t.me/bbbreaking
https://t.me/adonarischannel
https://t.me/boris_rozhin
https://t.me/mig41
https://t.me/gulagru
https://t.me/bpzukraine
https://t.me/hybgl
https://t.me/+PjxM4clam74yNTQ6
https://t.me/ne_caxar_live
https://t.me/poiskistiny8
https://t.me/anti_covid21
https://t.me/n_w_order
https://t.me/Mikle1On
https://t.me/AteoGo
https://t.me/privatnamemarnya
https://t.me/burp_chat
https://t.me/rustroyka1945
https://t.me/guselandrei
https://t.me/theinsider
https://t.me/itexamdump
https://t.me/IT_CERTIFICATIONSS
https://t.me/WarDonbass
https://t.me/tech_b0lt_Genona
https://t.me/+PPJeb2RvCOI3YzEy
https://t.me/a_shtirlitz
https://t.me/APT_Notes
https://t.me/P0x3k
https://t.me/miirs_kingdom
https://t.me/RalfHackerChannel
https://t.me/vchkogpu
https://t.me/NeoficialniyBeZsonoV
https://t.me/warfakes
https://t.me/S_E_Reborn
https://t.me/sudakovstream
https://t.me/chaoss_flame
https://t.me/alukatsky
https://t.me/spbctf
https://t.me/buyanTime
https://t.me/progbook
https://t.me/YourSmartyBro
https://t.me/javaproglib
https://t.me/phpproglib
https://t.me/PRAVDASILNEE
https://t.me/m_andronikos
https://t.me/burpsuite
https://t.me/mediatech
https://t.me/phoenixinform
https://t.me/DC8800_CHAT
https://t.me/awaitforlife
https://t.me/xakep_ru
https://t.me/true_secator
https://t.me/cybersecuritycert
https://t.me/bulbazhor
https://t.me/codeby_sec
https://t.me/investorbiz
https://t.me/ukr_leaks
https://t.me/sprotyv_official
https://t.me/AETemp
https://t.me/AEStorage
https://t.me/gruz_200_rus
https://t.me/cyberyozh_official
https://t.me/itsec_news
https://t.me/cyber_bible
https://t.me/kidok_list
https://t.me/killmilk_rus
https://t.me/killnet_reservs
https://t.me/sharewood_pro
https://t.me/Russian_OSINT
https://t.me/peass
https://t.me/DumpsKart
https://t.me/institut_mipip
https://t.me/black_triangle_tg
https://t.me/the_same_zov
https://t.me/infosecmemes
https://t.me/CybForensics
https://t.me/ukr_sof
https://t.me/profunctor_io
https://t.me/itarmyofukraine2022
https://t.me/hochu_zhyt
https://t.me/pidrozdil4308_chat
https://t.me/haccking
https://t.me/darknet_look_Channel
https://t.me/sharewood_biz
https://t.me/ethicalhackx
https://t.me/zer0daylab
https://t.me/RalfHackerPublicChat
https://t.me/alexmakus
https://t.me/atomicheartofficial
https://t.me/osint_club_channel
https://t.me/IsacaRuSec
https://t.me/kasperskyb2b
https://t.me/sysadm_in_channel
https://t.me/+EYNTgY2dZCZmM2My
https://t.me/CyberJobsRussia
https://t.me/+yHACAsBxEXo4OGEy
https://t.me/Social_engineering
https://t.me/mycroftintel
https://t.me/labart
https://t.me/citaty_svyatyh
https://t.me/osint_data
https://t.me/Legion_Russia
https://t.me/HackerOne
https://t.me/proasm
https://t.me/ctfchat
https://t.me/hacker_frei
https://t.me/hackeronereports
https://t.me/securebyte
https://t.me/vsemboks
https://t.me/physics_lib
https://t.me/data1eaks
https://t.me/reichnews
https://t.me/Red_Team_hacker
https://t.me/books_max
https://t.me/Cobalt_Strike_info
https://t.me/reichnews
https://t.me/DC8044_Info
https://t.me/ishragHamid1
https://t.me/tpxSecurity
https://t.me/PrimeBlock
https://t.me/cyberoffru
https://t.me/bykvaadm
https://t.me/informationsecuritylife
https://t.me/arsenmarkarian
https://t.me/itsecforutel
https://t.me/exitexist
https://t.me/ostrain
https://t.me/HackerDom
https://t.me/britishintelligence
https://t.me/lockpick
https://t.me/himarscourier
https://t.me/brain_dump_etc
https://t.me/oops_its_china
https://t.me/WayToSilkRoad
https://t.me/RuDataLeaksNews
https://t.me/cyberdetectiveLIB_bot
https://t.me/NetSurvivalist
https://t.me/R0_Crew
https://t.me/alexlitreev_channel
https://t.me/kappactf
https://t.me/wannabe_1337
https://t.me/channel_LP
https://t.me/hackerdom_course
https://t.me/DEFCON7495
https://t.me/arvin_club
https://t.me/CyberLeakBez
https://t.me/SecurelyContactingCIA
https://t.me/kkmthack
https://t.me/dc37517
https://t.me/anon_by
https://t.me/cbsctf
https://t.me/theboxsecurity
https://t.me/appstorrent
https://t.me/Phantasm_Lab
https://t.me/pidrozdil4308
https://t.me/lnfosec_group
https://t.me/OffSecPack
https://t.me/netstalking_godnota
https://t.me/mrl_hack
https://t.me/RussianOnionLinks
http://probivurpon3j7nbd4y3tp2mymsoq7ggi3wyiohzkhvrcvr6yx24svqd.onion/
http://darkmonn6oy55o7kgmwr4jny2gi2zj6hyalzcjgl444dvpalannl5jid.onion.ly/index.php
http://rampjcdlqvgkoz5oywutpo6ggl7g6tvddysustfl6qzhr5osr24xxqqd.onion/
https://dublikateyrxbx2wzsoi6bkfp3pso5npxgqqklkjt22rbbmo5vmpxzad.onion/
http://exploitivzcm5dawzhe6c32bbylyggbjvh5dyvsvb5lkuz5ptmunkmqd.onion/
http://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion/
http://wwhclubxlgeb6z6fkyqngrgjfsxlllqytrna6k2ayx3i2zzx4upiezid.onion/
http://verified3vr2kdbnza6c3e5ak4z5xmtti4hx36dfg3kbi6pwekztvsqd.onion/
https://center-club.io/centerxo7yganegjkr7dhwd37lmlqzibn5bqrblpdak7eg2yh7k3pdyd.onion
http://dmlinkbiixl5rwsfiz2mxfcepjciblt6uz2pxufnpwe5ekmvmchjtyyd.onion/
http://vlmisuxhpzkjwgvk.onion/
http://dark2webklvrieo4sg2olixbnod66tvirpec7hxjnkmxbcrtd2jipkad.onion/
http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/
http://breached65xqh64s7xbkvqgg7bmj4nj7656hcb7x4g42x753r7zmejqd.onion/
http://cabyceogpsji73sske5nvo45mdrkbz4m3qd3iommf3zaaa6izg3j2cqd.onion/
http://cryptbbtg65gibadeeo2awe3j7s6evg7eklserehqr4w4e2bis5tebid.onion/
http://avaddongun7rngel.onion/
http://ekbgzchl6x2ias37.onion/
http://htcltkjqoitnez5slo7fvhiou5lbno5bwczu7il2hmfpkowwdpj3q2yd.onion/
http://fylszpcqfel7joif.onion/
http://darksidedxcftmqa.onion/
http://hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad.onion/
http://xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion/
https://mazenews.online
http://hxt254aygrsziejn.onion/
http://wqmfzni2nvbbpk25.onion/partners.html
http://p6o7m73ujalhgkiv.onion/
http://sekhmetleaks.top/
http://nbzzb6sa6xuura2z.onion/
http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion
http://mountnewsokhwilx.onion/
http://egregoranrmzapcv.onion
http://fckilfkscwusoopguhi7i6yg3l6tknaz7lrumvlhg5mvtxzxbbxlimid.onion/
https://godnotaba.org/