Favorites

From aldeid
Jump to navigation Jump to search

If you want your site to be added in the list below, feel free to contact me.


https://github.com/swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypasses for Web Application Security
http://carlosrafaelgn.com.br/Asm86/
Online x86 emulator
http://www.woodmann.com/
Great website full of reverse engineering resources
https://github.com/pe3zx/write-ups-2015
Git referencing many 2015 CTF write-ups
http://www.johannesbader.ch/
Great resources about reverse engineering challenges and malware analysis
http://pedump.me
Online PE analysis
http://eureka.cyber-ta.org/
Eureka is a binary static analysis preparation framework. It implements a novel binary unpacking strategy based on statistical bigram analysis and coarse-grained execution tracing. Eureka incorporates advanced API deobfuscation capabilities to facilitate the structural analysis of the underlying malware logic. For each uploaded binary, the Eureka service will attempt to unpack and (for Eureka I, disassemble; for Eureka II (not yet available), decompile) the binary, and will produce an annotated callgraph, subroutine/data index page, strings summary, and a list of embedded DNS entries.
http://vxheaven.org/
Nice collection of malware
http://blog.spiderlabs.com/
Official Blog of Trustwave's SpiderLabs (team of ethical hackers, investigators and researchers)
http://www.wannabrowser.com/
Browse URLs wiht any User-Agent
http://www.url-analyzer.net/
Url Analyzer checks potential malicious URLs by analysing the browser's behavior. It's built on top of Joe Sandbox Light which enables to analyze around 9000 unique URLs per day on a single server.
http://malware.lu
5 millions+ malware database and articles!
http://www.corelan.be
full of articles, tools, ... about security
http://www.cloudflare-watch.org
disclose real IP behind domain using cloudflare
http://www.ipmarker.com/trace-email
trace email
http://ninja-sec.com
Penetration testing courses. Great site!
http://amada.abuse.ch/
Malware database (AMaDa)
http://home2.paulschou.net/tools/xlate/
Very well done online converter. Formats: hex, base64, binary, char/dec
https://crackstation.net/
Great online Password Hash Cracker
http://www.shodanhq.com/
Computers & vulnerabilities search engine
  • search the internet for servers, routers
  • find computers running certain software (HTTP, FTP, ...)
  • filter hosts based on geographic location
http://chr1x.sectester.net/
chr1x (aka Christian Navarrete) security blog
http://www.exploit-db.com/
The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.
http://johnny.ihackstuff.com
Google hacks (Johnny I hack stuff)
http://www.offensive-security.com
Online Professional Information Security Training from the developers of BackTrack.
http://www.cgsecurity.org/wiki/Main_Page
Christophe Grenier's wiki with tools and papers related to security
http://www.metasploit.com
Metasploit official website
http://freeworld.thc.org/releases.php
The Hackers Choice
http://packetstormsecurity.org/
Huge database with exploits, advisories, tools, whitepapers
http://www.remote-exploit.org
Le site officiel de Remote Exploit, à l'origine de BackTrack
http://www.milw0rm.com
Milw0rm references vulnerabilities
http://www.securityfocus.com
Security Focus dedicated to security with lots of articles
http://www.cirt.net/cgi-bin/passwd.pl
List of default passwords for all gears
http://www.ipillion.com/?ip=82.240.150.190
Geo localisation service
http://benjy-blog.blogspot.com
Benjy's blog, mainly Backtrack tools
http://r14970.ovh.net/~fxknetwo/hash/index.php
Online MD5 cracker (18 databases)
http://www.owasp.org
OWASP is an organization dedicated to Web applications security
http://yehg.org/lab/#home
YGN Ethical Hacker Group
http://ha.ckers.org/
ha.ckers.org
http://vulnerabilityassessment.co.uk/
Full mindmap of the pentester
http://www.forensicswiki.org/wiki/Network_forensics
List of tools for network capture and analyze
http://forensicscontest.com/
Challenges about network forensics
http://www.ouah.org/programmes.html
Toolbox for hacking
http://www.darknet.org.uk/
Portal about ethical hacking
http://andrew.triumf.ca/cgi-bin/port
Ports numbers and associated information
http://www.informatica64.com/FOCA/
Online meta information data analysis on documents
http://pagespeed.googlelabs.com/
Page Speed Online (Google Labs)

Comments