Sie sind auf Seite 1von 2

HOME (/) SEARCH HELP SUBMIT RESOURCES (/resources/)

BLOG (https://blog.vulnhub.com/) ABOUT

Resources

(Free) Virtual Networks (VPNs)


ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN (http://wiki.hamburg.ccc.de/ChaosVPN)
Gh0st Networks: http://www.gh0st.net/ (http://www.gh0st.net/)
Hacking Lab: https://www.hacking-lab.com/ (https://www.hacking-lab.com/)
p0wnlabs: http://p0wnlabs.com/ (http://p0wnlabs.com/)
pwn0: https://pwn0.com/ (https://pwn0.com/)
PentestIT: https://lab.pentestit.ru/ (https://lab.pentestit.ru/)

Custom Personal Targets


Hack A Server: https://hackaserver.com/ (https://hackaserver.com/)
Hack Me: http://hack.me/ (http://hack.me/)
Hack This: https://www.hackthis.co.uk/ (https://www.hackthis.co.uk/levels/)
Smash The Stack: http://smashthestack.org/ (http://smashthestack.org/)
Hack The Box: https://www.hackthebox.gr/ (https://www.hackthebox.gr/)
SecAdvise: https://labs.secadvise.com/ (https://labs.secadvise.com/)
DarkHive: http://darkhive.net/ (http://darkhive.net/)
Avatao: https://avatao.com/ (https://avatao.com/)
Root-Me: https://www.root-me.org/ (https://www.root-me.org/)

Archive/Repository
Security Conference Library: http://archive.liquidmatrix.org/ (http://archive.liquidmatrix.org/)
Shell-Storm.org Repository: http://repo.shell-storm.org/CTF/ (http://repo.shell-storm.org/CTF/)

Books
Assembly Language Step-by-Step: Programming with Linux [ISBN-13: 978-047-04-9702-9]: http://www.amazon.com/Assembly-Language-Step-Step-
Programming/dp/0470497025/ (https://www.amazon.com/Assembly-Language-Step-Step-Programming/dp/0470497025/)
Brute Force Vulnerability Discovery [ISBN-13: 978-032-1-44611-4]: http://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/03214461
(https://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119/)
Bug Hunter's Diary [ISBN-13: 978-1-59327-385-9]: http://nostarch.com/bughunter (http://nostarch.com/bughunter)
Hacking: The Art of Exploitation [ISBN-13: 978-159-327-144-2]: http://www.amazon.co.uk/Hacking-Art-Exploitation-Book-Package/dp/1593271441/
(https://www.amazon.co.uk/Hacking-Art-Exploitation-Book-Package/dp/1593271441/)
Metasploit: The Penetration Tester's Guide [ISBN-13: 978-159-3-27288-3]: http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp
(https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/)
Operating Systems Design and Implementation (3rd Edition) [ISBN-13: 978-013-142-938-3]: http://www.amazon.com/Operating-Systems-Design-Imple
Edition/dp/0131429388/ (https://www.amazon.com/Operating-Systems-Design-Implementation-Edition/dp/0131429388/)
The Art of Exploitation (2nd Edition) [ISBN-13: 978-1-59327-144-2]: http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/
(https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/)
The Shellcoder's Handbook [ISBN-13: 978-0-76454-468-2]: http://www.amazon.com/The-Shellcoders-Handbook-Discovering-Exploiting/dp/076454468
(https://www.amazon.com/The-Shellcoders-Handbook-Discovering-Exploiting/dp/0764544683/)
The Web Application Hacker's Handbook (2nd Edition) [ISBN-13: 978-1-11802-647-2]: http://www.amazon.com/Web-Application-Hackers-Handbook-
Exploiting/dp/1118026470/ (https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/)

Misc
Bug crowd: http://bugcrowd.com/ (https://bugcrowd.com/)
CTF Time: http://ctftime.org/ (http://ctftime.org/)
CTF365: http://ctf365.com/ (http://ctf365.com/)
Hacker Cons: http://hackercons.org/ (http://hackercons.org)
Hat Force: https://www.hatforce.com/ (https://www.hatforce.com/)
Intense School: http://www.intenseschool.com/resources/ (http://www.intenseschool.com/resources/)
SECore: https://secore.info/ (https://secore.info/)
We Chall: https://www.wechall.net/ (https://www.wechall.net/)
WirelessPentest: http://www.wirelesspentest.com/ (WayBackMachine) (https://web.archive.org/web/20140802203941/http://www.wirelesspentest.c

Programming
Codec Ademy: http://www.codecademy.com/ (https://www.codecademy.com/)
Learn {Python,Ruby,C,Regex,SQL,CLI} The Hard Way: http://learnpythonthehardway.org/book/ (http://learnpythonthehardway.org/book/)
Learn {Python,Java,C,JavaScript,PHP,Shell,C#}: http://learn-c.org/ (https://learn-c.org/)
PHP - The Right Way.: http://www.phptherightway.com/ (http://www.phptherightway.com/)
Rails for Zombies: http://railsforzombies.org/ (http://railsforzombies.org/)

Security Courses
ComputerSecurityStudent: https://www.computersecuritystudent.com/ (https://www.computersecuritystudent.com/)
eLearn Security: http://www.elearnsecurity.com/ (https://www.elearnsecurity.com/)
Hacking Dojo: http://hackingdojo.com/ (http://hackingdojo.com/)
MDSec: http://mdsec.net/ (http://mdsec.net/)
Offensive Security: https://www.offensive-security.com/ (https://www.offensive-security.com/)
Security Tube Training: http://securitytube-training.com/ (http://www.securitytube-training.com/)
The Hacker Academy: http://www.thehackeracademy.com/ (http://www.thehackeracademy.com/)

Training Material
nets.ec (used to be called "Blackhat Library"): https://nets.ec/Main_Page (https://nets.ec/Main_Page)
Codecademy: http://www.codecademy.com/ (https://www.codecademy.com/)
Corelan: https://www.corelan.be/index.php/articles/ (https://www.corelan.be/index.php/articles/)
End Game (How to Get Started in CTF): http://www.endgame.com/ (http://www.endgame.com/)
Hacking Cisco: http://hackingcisco.blogspot.com/ (https://hackingcisco.blogspot.com/)
Metasploit Unleashed: http://www.offensive-security.com/metasploit-unleashed/ (https://www.offensive-security.com/metasploit-unleashed/)
N00b pentesting: http://n00bpentesting.com/lessons/ (https://web.archive.org/web/20120412031808/http://n00bpentesting.com/lessons)
Open Security Training: http://opensecuritytraining.info/ (http://opensecuritytraining.info/)
Pentest Standard: http://www.pentest-standard.org/index.php/Main_Page (http://www.pentest-standard.org/index.php/Main_Page)
Router Gods: http://www.routergods.com/ (http://www.routergods.com/)
SWEET (Secure WEb dEvelopment Teaching): http://www.csis.pace.edu/~lchen/sweet/ (http://www.csis.pace.edu/~lchen/sweet/)
SEED: Vulnerability and Attack Labs: http://www.cis.syr.edu/~wedu/seed/all_labs.html/ (http://www.cis.syr.edu/~wedu/seed/all_labs.html)
Security Tube: http://www.securitytube.net/ (http://www.securitytube.net/)

© VulnHub 2012-2019

Das könnte Ihnen auch gefallen