Ethical Hacking ressources & and Vulnerabilities
Programming languages for Ethical Hacking
Forensic tools for Ethical Hacking
Ethical Hacking with Hardware
Tools, Software for Ethical Hacking/Auditing/Pentesting/Cracking
Browser Exploitation Framework
Empire is a PowerShell and Python post-exploitation agent.
a free and open source network security tool for man-in-the-middle attacks on LAN
Nikto web server scanner
The Network Mapper
Metasploit Framework
OWASP O-SAFT : SSL advanced forensic tool
Some Hacking/Cybersecurity conferences
Youtube, and videos about Ethical Hacking & good practices
Articles pertinents sur la Cybersécurité
CTF's from Around the World
Sheetcheats
Vulnerable VM - Safe environements for Ethical hacking
Cryptography : Documentations - Ressources
Network : Documentations
Reverse Engineering
WEB flaws : How to prevent & counter them with SQL/Javascript/Python
Entreprises de l'Info-sec
Some must have certifications in Cybersecurity
CISCO Certification
Offensive Security Certified Professional
Cybersec
Burp Suite
Enumeration
Recon
Two Factor Auth
Training & Courses
L2Hack
Ethical Hacking ressources & and Vulnerabilities
Videos
Programming
Programming languages for Ethical Hacking
Forensics
Forensic tools for Ethical Hacking
Tools
Hardware
Ethical Hacking with Hardware
Software
Tools, Software for Ethical Hacking/Auditing/Pentesting/Cracking
BeEF
Browser Exploitation Framework
Empire
Empire is a PowerShell and Python post-exploitation agent.
Ettercap
a free and open source network security tool for man-in-the-middle attacks on LAN
Nikto
Nikto web server scanner
Nmap
The Network Mapper
Metasploit
Metasploit Framework
O-SAFT
OWASP O-SAFT : SSL advanced forensic tool
Conferences
Some Hacking/Cybersecurity conferences
Video Conferences
Youtube, and videos about Ethical Hacking & good practices
Articles
Articles pertinents sur la Cybersécurité
Bug Bounty
CTF's
CTF's from Around the World
Linux Bash command
Sheetcheats
Pentesting
Vulnerable VM - Safe environements for Ethical hacking
Crypto
Cryptography : Documentations - Ressources
PWN
Network : Documentations
RE
Reverse Engineering
WEB
WEB flaws : How to prevent & counter them with SQL/Javascript/Python
Entreprises
Entreprises de l'Info-sec
Law
Gouv
Bonnes pratiques
Certifications
Some must have certifications in Cybersecurity
CISCO
CISCO Certification
O.S.C.P
Offensive Security Certified Professional