• Stars
    star
    139
  • Rank 262,954 (Top 6 %)
  • Language
  • Created over 7 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

收集了一些安全公司的博客

SecuritySite

收集了一些安全公司的博客,用于安全情报

http://contagiodump.blogspot.com

https://mmd.sougaoqing.com/mmd/index.htm

http://researchcenter.paloaltonetworks.com

https://www.fireeye.com/blog.html

http://www.symantec.com/connect/blogs

https://blog.kaspersky.com

https://labs.bitdefender.com/

http://cybersecurityminute.com/security-blogs/source/Trend+Micro+Blog/

https://securingtomorrow.mcafee.com

http://resources.infosecinstitute.com

https://blog.fortinet.com

https://blog.trustlook.com/

http://www.hackingarticles.in

https://www.offensive-security.com/blog/

http://thehackernews.com/

https://community.rapid7.com/community/metasploit/blog/

https://blog.malwarebytes.com/

https://www.nowsecure.com/blog/

https://security.berkeley.edu/resources/phishing/phishing-examples-archive

http://malware-traffic-analysis.net/

http://www.vantagepoint.sg/blog

https://www.endgame.com/blog

https://www.incapsula.com/blog/

https://crackinglandia.wordpress.com

https://www.pentestpartners.com/

https://www.binarydefense.com/

https://blogs.technet.microsoft.com/

https://astr0baby.wordpress.com/2017/07/

http://blog.sec-consult.com/

https://www.besttechie.com/

https://vallejo.cc

http://nullcon.net/website/

https://r3mrum.wordpress.com/

https://www.bonkersabouttech.com/security

https://n0tty.github.io/

https://www.christophertruncer.com/

https://cybersyndicates.com/

https://www.offensive-security.com/blog/

https://www.scriptjunkie.us/

https://www.rebootuser.com/

https://www.darknet.org.uk/

https://webstersprodigy.net/

https://www.hackingloops.com/

https://pentestlab.wordpress.com

https://parsiya.net/archive/

http://www.ws-attacks.org/Welcome_to_WS-Attacks

http://www.harmj0y.net/blog/

https://enigma0x3.net/

https://bluescreenofjeff.com/

https://leonjza.github.io/

https://chousensha.github.io/

https://stealthsploit.com/

http://rastamouse.me/

https://blog.zsec.uk/

http://www.rvrsh3ll.net/blog/

https://cybersyndicates.com/

https://blog.joelj.org/

http://threat.tevora.com/

http://www.netmux.com/

http://www.floyd.ch/

http://buffered.io/

https://jivoi.github.io/

http://amanda.secured.org/

https://ramblingcookiemonster.github.io/

http://bencane.com/

http://www.sixdub.net/

https://www.darknet.org.uk/

https://labs.mwrinfosecurity.com/

https://blog.kenaro.com/

http://bughunting.guide/

http://michaeldaw.org/

https://pentestlab.blog/

https://enigma0x3.net/

https://www.pentesterlab.com/

http://www.invoke-ir.com/

http://www.labofapenetrationtester.com/

http://subt0x10.blogspot.co.uk/

http://www.kitploit.com/

http://tk-blog.blogspot.com/

https://www.trustedsec.com/

https://room362.com/

https://www.corelan.be/

https://www.us-cert.gov/

https://holidayhackchallenge.com/

https://www.anthonys.io/

https://www.arbornetworks.com/blog/asert/

https://0x00sec.org/

http://blog.malwaremustdie.org

https://www.anquanke.com/

https://www.malware-traffic-analysis.net/

https://sec-wiki.com/

https://pastebin.com/

https://landave.io/

https://threatpost.com/

https://www.peppermalware.com/

工具官网

https://portswigger.net/

https://wiki.wireshark.org/

http://w3af.org/

https://hashcat.net/

http://www.powershellempire.com/?page_id=561

https://blog.cobaltstrike.com/

https://www.metasploit.com/

https://www.netsparker.com/

https://www.bleepingcomputer.com/

IDA插件

https://n0where.net/best-ida-plugins/

IoT

https://arstechnica.com/security/
http://www.devttys0.com
https://github.com/nebgnahz/awesome-iot-hacks
https://www.exploitee.rs/index.php/Main_Page
https://iot.sec-wiki.com/

hack

https://github.com/Hack-with-Github/Awesome-Hacking

PPT

https://www.slideshare.net/

Chart

https://github.com/SecWiki/sec-chart

Penetration Testing

https://github.com/enaqx/awesome-pentest https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/

Wooyun

https://superkieran.github.io/WooyunDrops/#!/
http://cb.drops.wiki/

Kali

https://github.com/tiancode/learn-hacking
http://www.hackfun.org/kali-tools/kali-tools-zh.html

dictionary

https://pan.baidu.com/s/1clxaCA

OWASP

https://www.owasp.org/index.php/Main_Page
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project

Python for penetration testers

https://vulnerablelife.wordpress.com/2017/05/13/python-for-penetration-testers/

Honeypot

https://github.com/SecWiki/ipot
https://ipot.sec-wiki.com/
https://sosly.me/index.php/2017/09/05/jymiguan2/

WiFi Cracker

https://github.com/brannondorsey/wifi-cracking
http://www.freebuf.com/articles/wireless/137641.html
https://klionsec.github.io/2015/04/14/aircrack-hascat/

Radio

http://www.hackrf.net/

Vuln Linux渗透测试

https://www.vulnhub.com/

Metasploit

http://uknowsec.cn/posts/skill/Meatsploit-Framework-%E5%88%A9%E7%94%A8%E6%80%BB%E7%BB%93.html

DDOS

http://uknowsec.cn/posts/skill/%E6%B5%85%E8%B0%88ddos%E7%9A%84%E6%B5%8B%E8%AF%95%E6%96%B9%E6%B3%95.html
http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/
http://www.hackingarticles.in/dos-attack-packet-crafting-using-colasoft/
http://www.hackingarticles.in/dos-attack-penetration-testing-part-2/

Sandbox

https://www.hybrid-analysis.com/

Shodan

http://www.freebuf.com/sectool/121339.html

傻蛋联网搜索

https://www.oshadan.com

ZoomEye

https://www.zoomeye.org/

XMind 思维导图工具

http://www.xmindchina.net/

Exploit

https://www.peerlyst.com/posts/the-best-resources-for-learning-exploit-development?trk=search_page_search_result

PWNDBG

https://github.com/pwndbg/pwndbg

OFFICE MALWARE

https://remnux.org/
https://r3mrum.wordpress.com/2017/06/29/analyzing-malicious-password-protected-office-documents/
https://dfir.it/blog/2015/06/17/analysts-handbook-analyzing-weaponized-documents/

Software-Security-Learning

https://github.com/CHYbeta/Software-Security-Learning

Web-Security-Learning

https://github.com/CHYbeta/Web-Security-Learning

Python爬虫

https://segmentfault.com/p/1210000009117809/read

黑客大会

https://www.defcon.org/

http://www.blackhat.com/

http://www.securitybsides.com/

https://events.ccc.de/congress/

https://www.derbycon.com

http://phreaknic.info

http://shmoocon.org/

http://www.carolinacon.org/

https://chcon.nz

http://www.summercon.org/

https://2016.hack.lu/

https://conference.hitb.org

https://www.troopers.de

http://hack3rcon.org

http://thotcon.org/

http://www.layerone.org/

https://deepsec.net/

http://www.skydogcon.com/

http://secuinside.com

http://def.camp/

https://appsecusa.org/

http://brucon.org

http://www.infosecurityeurope.com/

http://nullcon.net/website/

https://www.rsaconference.com/

https://www.swisscyberstorm.com/

https://www.virusbulletin.com/conference/index

http://www.ekoparty.org

https://44con.com/

https://www.balccon.org

http://fsec.foi.hr

https://www.syscan360.org/

http://kcon.knownsec.com/

在线工具

https://haveibeenpwned.com/

https://www.tineye.com/

http://ddecode.com/phpdecoder/?home

http://www.fuzzysecurity.com/links.html

https://crackstation.net/

http://www.objectif-securite.ch/

Radare2

https://www.megabeets.net/a-journey-into-radare-2-part-1/
https://www.megabeets.net/a-journey-into-radare-2-part-2/

REMnux

REMnux: A Linux Toolkit for Reverse-Engineering and Analyzing Malware https://remnux.org/

Gnuradio

http://eu2-dist.gnuradio.org/

Malware Source

https://github.com/mwsrc

Cheat Sheet for Analyzing Malicious Software

https://zeltser.com/malware-analysis-cheat-sheet/

知道工具之硬件路由相关

https://mp.weixin.qq.com/s/QdiI66ZDsHj7MaMB6c88Ug

Analyzing Malicious Documents Cheat Sheet

https://zeltser.com/analyzing-malicious-documents/
https://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator

Iot Exploit Tools

https://www.attify-store.com/collections/frontpage/products/iot-security-exploitation-training-learning-kit

Objective-C Reveser

https://blog.fortinet.com/2017/09/19/rewriting-idapython-script-objc2-xrefs-helper-py-for-hopper

Metasploitbale2

https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Shodan

http://www.jianshu.com/p/ee22367303d5

蓝牙攻击基础篇

http://www.whitecell-club.org/?p=1524

Kali Docker

http://blog.csdn.net/u013814153/article/details/53925790

DDoS

http://www.freebuf.com/column/132782.html