Ethical Hacking ressources & and Vulnerabilities
Programming languages for Ethical Hacking
Forensic tools for Ethical Hacking
Ethical Hacking with Hardware
Tools, Software for Ethical Hacking/Auditing/Pentesting/Cracking
Browser Exploitation Framework
Empire is a PowerShell and Python post-exploitation agent.
a free and open source network security tool for man-in-the-middle attacks on LAN
Nikto web server scanner
The Network Mapper
Metasploit Framework
OWASP O-SAFT : SSL advanced forensic tool
Some Hacking/Cybersecurity conferences
Youtube, and videos about Ethical Hacking & good practices
Articles pertinents sur la Cybersécurité
CTF's from Around the World
Sheetcheats
Vulnerable VM - Safe environements for Ethical hacking
Cryptography : Documentations - Ressources
Network : Documentations
Reverse Engineering
WEB flaws : How to prevent & counter them with SQL/Javascript/Python
Entreprises de l'Info-sec
Some must have certifications in Cybersecurity
CISCO Certification
Offensive Security Certified Professional
Cybersec
Burp Suite
-
Web Security Academy: Free Online Training from PortSwigger
portswigger.net
-
Autorize
portswigger.net
-
nccgroup/AutoRepeater
github.com
Burp SuiteEnumeration
-
Mind Mapping Software
xmind.net
-
Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback M...
archive.org
-
pentester-io/commonspeak
github.com
-
blechschmidt/massdns
github.com
-
subfinder/subfinder
github.com
-
OWASP/Amass
github.com
EnumerationRecon
-
tomnomnom/gf
github.com
-
Google dork cheatsheet
gist.github.com
-
BuiltWith
builtwith.com
ReconTwo Factor Auth
-
Krypton makes authentication easy and secure
krypt.co
-
conorpp/u2f-zero
github.com
-
How to Make Your Own Two-Factor Authentication Key
tomsguide.com
Two Factor AuthTraining & Courses
-
How-To: Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty r...
bugcrowd.com
-
Learn to hack and collaborate with other security researchers on bug bounties
bugbountynotes.com
-
Hacking 101
hacker101.com
-
The Complete Ethical Hacking Tutorial - Become An Ethical Hacker Today
youtube.com
-
Be A Cyber Defender With Cybersecurity Courses
netacad.com
-
Create A Connected World With Internet Of Things Courses
netacad.com
-
4 more
Training & CoursesL2Hack
Ethical Hacking ressources & and Vulnerabilities
-
HackerSploit
youtube.com
-
JackkTutorials
youtube.com
-
Hak5
youtube.com
-
Hak5
github.com
-
Comment devenir un hacker
files.jkbockstael.be
-
springboard.com
springboard.com
-
8 more
L2Hack Ethical Hacking ressources & and VulnerabilitiesVideos
-
1 - Disabling Defender With Viss Episode 1 - Hak5 2416
youtube.com
-
2 - Disabling Defender With Viss Episode 2 - Hak5 2417
youtube.com
VideosProgramming
Programming languages for Ethical Hacking
-
Automate the Boring Stuff with Python YT playlist
youtube.com
-
Automate the Boring Stuff with Python
automatetheboringstuff.com
-
PHP: The Right Way
phptherightway.com
-
Learn Python the Hard Way
learnpythonthehardway.org
Programming Programming languages for Ethical HackingForensics
Forensic tools for Ethical Hacking
-
vincentcox/StaCoAn
github.com
-
ReFirmLabs/binwalk
github.com
-
Binwalk Website Security: tech software, apps & online marketing tips | Importance of w...
binwalk.org
Forensics Forensic tools for Ethical HackingTools
-
Observatory by Mozilla
observatory.mozilla.org
-
OUI Lookup Tool
wireshark.org
-
OWASP Zed Attack Proxy Project
owasp.org
-
Proxmark/proxmark3
github.com
-
mame82/P4wnP1
github.com
ToolsHardware
Ethical Hacking with Hardware
-
Protect Your Credit Card By Building a Skimmer Detector with a Raspberry Pi
blog.hackster.io
Hardware Ethical Hacking with HardwareSoftware
Tools, Software for Ethical Hacking/Auditing/Pentesting/Cracking
Software Tools, Software for Ethical Hacking/Auditing/Pentesting/CrackingBeEF
Browser Exploitation Framework
-
beefproject/beef
github.com
BeEF Browser Exploitation FrameworkEmpire
Empire is a PowerShell and Python post-exploitation agent.
-
PowerShell Empire
powershellempire.com
-
EmpireProject/Empire
github.com
Empire Empire is a PowerShell and Python post-exploitation agent.Ettercap
a free and open source network security tool for man-in-the-middle attacks on LAN
-
Ettercap/ettercap
github.com
-
Ettercap Home Page
ettercap-project.org
Ettercap a free and open source network security tool for man-in-the-middle attacks on LANNikto
Nikto web server scanner
-
sullo/nikto
github.com
Nikto Nikto web server scannerNmap
The Network Mapper
-
nmap/nmap
github.com
-
Nmap: the Network Mapper - Free Security Scanner
nmap.org
-
NMap 101: Fun With Firewalls! HakTip 102
youtube.com
-
Advanced NMap Techniques - Hak5 2415
youtube.com
Nmap The Network MapperMetasploit
Metasploit Framework
-
Metasploit commands
hackingtutorials.org
-
Metasploit Unleashed
offensive-security.com
-
rapid7/metasploit-framework
github.com
Metasploit Metasploit FrameworkO-SAFT
OWASP O-SAFT : SSL advanced forensic tool
-
OWASP/O-Saft
github.com
O-SAFT OWASP O-SAFT : SSL advanced forensic toolConferences
Some Hacking/Cybersecurity conferences
-
Cybersecurity Conferences 2018 (Official List | Updated Daily)
infosec-conferences.com
-
.:: leHACK ::. FRENCH HACKERS CONFERENCE
lehack.org
-
BotConf
botconf.eu
-
NUIT DU HACK 16
nuitduhack.com
-
Black Hat USA 2017
blackhat.com
-
Security event in Bordeaux
sthack.fr
-
3 more
Conferences Some Hacking/Cybersecurity conferencesVideo Conferences
Youtube, and videos about Ethical Hacking & good practices
-
Inventing for the world's largest problems: Pablos Holman at TEDxMidwest
youtube.com
-
Hacking 101: Frank Heidt at TEDxMidwest
youtube.com
-
A Node.js Security Roadmap - Mike Samuel - JSConf EU 2018
youtube.com
-
Government Surveillance: Last Week Tonight with John Oliver (HBO)
youtube.com
-
"It's Fine," They Said. "Just Ship It," They Said.
youtube.com
-
How To HACK A Node App
youtube.com
-
2 more
Video Conferences Youtube, and videos about Ethical Hacking & good practicesArticles
Articles pertinents sur la Cybersécurité
-
How Israel Rules The World Of Cyber Security, VICE on HBO, Full Episode
youtube.com
-
GBHackers - Latest Hacking News, Kali Tutorials, Infosec
gbhackers.com
-
Help Net Security - Information Security News
helpnetsecurity.com
-
Avenir de la cybersécurité : 3 scénarios à envisager - HBR
hbrfrance.fr
-
How Do Hacking Challenges and Certifications Differ From An Actual Hacking Job?
medium.com
-
9 Myths of Security Implementation – Hacker Noon
hackernoon.com
-
1 more
Articles Articles pertinents sur la CybersécuritéBug Bounty
-
ethical hacking and managed bug bounty platform
intigriti.com
-
GitHub Security
bounty.github.com
-
Bugcrowd – Vulnerability Disclosure & Bug Bounty Programs
bugcrowd.com
-
Your Elastic Security Team, better security testing through bug bounties and managed se...
bugcrowd.com
-
Première Plateforme Européenne de Bug Bounty | bountyfactory.io
bountyfactory.io
-
Bug Bounty - Hacker Powered Security Testing | HackerOne
hackerone.com
Bug BountyCTF's
CTF's from Around the World
-
Houston, we have a problem!
ctf365.com
-
Endpoint Protection Platform for Enterprises
endgame.com
-
All about CTF (Capture The Flag)
ctftime.org
-
Google Capture The Flag 2018 (Quals) tasks and writeups
ctftime.org
-
Google CTF🍰
capturetheflag.withgoogle.com
-
BSidesBDX
bsidesbdx.org
CTF's CTF's from Around the WorldLinux Bash command
Sheetcheats
-
Idnan/bash-guide
github.com
Linux Bash command SheetcheatsPentesting
Vulnerable VM - Safe environements for Ethical hacking
-
Setting Up A Local Lab
vulnhub.com
-
Web Application Penetration Testing
owasp.org
-
Building a Home Lab Virtual Server Quick and Dirty - Hak5 1819
youtube.com
-
Hack The Box :: Penetration Testing Labs
hackthebox.eu
-
Vulnerable By Design
vulnhub.com
-
Lessons
web.archive.org
Pentesting Vulnerable VM - Safe environements for Ethical hackingCrypto
Cryptography : Documentations - Ressources
-
Cryptography—What Is It and How Does It Work? – Chris Agius – Medium
medium.com
Crypto Cryptography : Documentations - RessourcesPWN
Network : Documentations
-
VLAN Explained
youtube.com
PWN Network : DocumentationsRE
Reverse Engineering
-
MagSpoof - magnetic stripe spoofer / credit card magstripe emulator
youtube.com
RE Reverse EngineeringWEB
WEB flaws : How to prevent & counter them with SQL/Javascript/Python
-
OWASP_Top_10-2017_%28en%29.pdf.pdf
owasp.org
-
bkimminich/juice-shop
github.com
-
Bjoern Kimminich
bkimminich.gitbooks.io
WEB WEB flaws : How to prevent & counter them with SQL/Javascript/PythonEntreprises
Entreprises de l'Info-sec
-
Snyk
snyk.io
-
Heimdal Security - Proactive Cyber Security Software
heimdalsecurity.com
-
Orange Cyberdefense
orange-business.com
Entreprises Entreprises de l'Info-secLaw
-
RGPD
eur-lex.europa.eu
-
Règlement général sur la protection des données
fr.wikipedia.org
LawGouv
-
Accueil
ssi.gouv.fr
-
Dispositif d’assistance aux victimes d’actes de cybermalveillance
cybermalveillance.gouv.fr
GouvBonnes pratiques
-
Thoughts on "Security Through Obscurity"
dev.to
-
Meilleures pratiques de sécurité pour Express en production
expressjs.com
-
OWASP
owasp.org
Bonnes pratiquesCertifications
Some must have certifications in Cybersecurity
Certifications Some must have certifications in CybersecurityCISCO
CISCO Certification
-
Cisco Learning Home: Unsupported Browser
learningnetwork.cisco.com
-
Security
blogs.cisco.com
CISCO CISCO CertificationO.S.C.P
Offensive Security Certified Professional
-
PwK - Penetration Testing Training with Kali Linux
offensive-security.com
-
Offensive Security Certified Professional
offensive-security.com
O.S.C.P Offensive Security Certified Professional