No description
Find a file
2020-09-05 21:35:02 +00:00
buffer_overflow_example Create additional_examples.md 2020-09-03 22:23:39 -04:00
bug-bounties Update README.md 2020-08-15 23:40:51 -04:00
build_your_own_lab Update README.md 2020-09-03 23:08:09 -04:00
capture_the_flag Update encrypt.py 2020-05-11 01:59:25 -04:00
cheat_sheets Delete poster.pdf 2020-07-02 15:13:46 -04:00
cloud_resources Adding Additional AWS Pen Testing References 2018-04-23 22:47:18 -04:00
cracking_passwords Update 10-million-passwords.txt 2020-07-20 15:09:09 -04:00
crypto Update crypto_algorithms.md 2019-07-12 07:50:07 -04:00
cyberops Create mikey-trojan-threat-report.json 2020-06-11 22:09:56 -04:00
devsecops Create README.md 2020-08-30 23:34:14 -04:00
dfir Update README.md 2020-04-08 23:58:25 -04:00
exploit_development Update README.md 2019-05-30 15:20:45 -04:00
fuzzing_resources Update README.md 2018-07-25 22:20:05 -04:00
game_hacking Create README.md 2019-02-06 13:03:34 -05:00
IoT Update README.md 2019-01-14 19:00:37 -05:00
metasploit_resources adding metasploit info 2018-01-17 22:57:47 -05:00
mobile_security Update output.json 2018-06-18 23:34:43 -04:00
osint Update README.md 2020-08-26 20:09:25 -04:00
pcaps Create README.md 2020-07-28 21:27:08 -04:00
pen_testing_reports Update README.md 2019-01-31 23:02:57 +01:00
post_exploitation Update msfvenom.md 2020-01-07 13:49:25 -05:00
python_ruby_and_bash Create logalyzer.py 2020-07-31 12:57:42 -04:00
recon Update README.md 2020-06-23 20:17:19 -04:00
reverse_engineering Update crackme03.64 2020-06-07 00:10:27 -04:00
SCOR Delete testing_again.md 2020-03-14 18:48:19 -04:00
social_engineering adding post exploitation, social engineering, and exploit development resources 2018-04-06 18:04:32 -04:00
streamers-and-youtube Merge branch 'master' into patch-1 2020-08-15 21:43:30 -04:00
threat_hunting adding threat hunting references 2018-05-09 11:33:10 -04:00
useful_commands_and_scripts Update letmeout.sh 2018-09-06 14:31:40 -04:00
virl_topologies adding VIRL topology 2018-06-02 01:19:42 -04:00
vulnerability_scanners Create README.md 2018-11-27 13:15:43 -05:00
vulnerable_servers adding nodegoat and railsgoat 2020-08-31 00:06:37 -04:00
web_application_testing Update README.md 2020-09-04 00:46:30 -04:00
windows Adding Resources for Windows-based Assessments 2018-06-06 17:23:15 -04:00
wireless_resources Update virtual_adapters.md 2018-11-27 23:15:04 -05:00
.gitignore update 2018-09-16 22:41:51 -04:00
CONTRIBUTING.md Update CONTRIBUTING.md 2018-11-18 22:52:59 -05:00
LICENSE Update LICENSE 2020-03-28 00:22:15 -04:00
more_tools.md Update more_tools.md 2020-03-23 13:17:52 -04:00
new_tools.md Adding new tools 2020-09-05 21:35:02 +00:00
README.md Update README.md 2019-09-04 00:00:11 -04:00

Cyber Security Resources

This repository includes thousands of cybersecurity-related references and resources and it is maintained by Omar Santos. This GitHub repository has been created to provide supplemental material to several books, video courses, and live training created by Omar Santos and other co-authors. It provides over 7,000 references, scripts, tools, code, and other resources that help offensive and defensive security professionals learn and develop new skills. This GitHub repository provides guidance on how build your own hacking environment, learn about offensive security (ethical hacking) techniques, vulnerability research, exploit development, reverse engineering, malware analysis, threat intelligence, threat hunting, digital forensics and incident response (DFIR), includes examples of real-life penetration testing reports, and more.

The Art of Hacking Series

The Art of Hacking Series is a series of video courses and live training that help you get up and running with your cybersecurity career. The following are the different video courses that are part of the Art of Hacking series:

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), CompTIA PenTest+ and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series Omar Santos.

Live Training

Other Live Training and Video Courses: https://h4cker.org/training