secbug / Infosec_Reference

An Information Security Reference That Doesn't Suck

Home Page:https://rmusser.net/docs

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Infosec_Reference

๐Ÿข An Information Security Reference That Doesn't Suck ๐Ÿข

Goal:

  • Be an awesome Information Security Reference โ˜‘๏ธ
  • List of techinques, tools and tactics to learn from/reference. โ˜‘๏ธ
  • Rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches OR as a reference/recall method for stuff.
    • Something like a "Yellow Pages" in the sense of you know something exists, but what was it called....
    • 'if you give a man a fish he is hungry again in an hour. If you teach him to catch a fish you do him a good turn.'
  • Always accepting more links/stuff. Feel free to make a pull request or complaint.

Why Do You Care?

  • Don't have to constantly google for tools/reminder.
  • Easily browsable list of tools, techniques, papers, and research in all sorts of areas.
  • Want to read some good info.

Why Do I Care?

  • I do this as a resource for myself(to teach others from) and offer it publicly as a way of giving back to the general community.
  • To be clear, these aren't personal notes. I keep this repo maintained as a way of having pointers to information that I feel help build someone's skillset or increase understanding of attacks/methods/defenses.
This page
  • This page isn't the best terrible on mobile. Use https://rmusser.net/docs for better mobile formatting.
    • At some point I will sort the sections into a grid alphabetically.
  • For latest content updates, check here: Things added since last update
    • This will have all links added to the other pages sorted according to topic, making it easier to see new stuff.
  • All links on this page should work. Last tested 7/15
  • Contributions are welcome, format is pretty simple/easy to pick up, add anything not already in it that fits.

Index - Table of Contents


Infosec_Reference

Anonymity/OpSec/Privacy Cryptography & Encryption ๐ŸŒˆ Exploit Development ๐ŸŒˆ Passwords Rootkits
๐Ÿ”ฐ Basic Security Information ๐Ÿ”ฐ Darknets Forensics & Incident Response ๐ŸŸ Phishing ๐ŸŸ Social Engineering
BIOS/UEFI/Firmware Attacks/Defense Data Anaylsis & Visualization ๐Ÿ› Fuzzing & Bug Hunting ๐Ÿ› Physical Security ๐Ÿ”ฉ System Internals (Linux/Windows) ๐Ÿ”ฉ
Building a Testing Lab ๐ŸŒ… Defense ๐ŸŒ… ๐ŸŽฎ Game Hacking ๐ŸŽฎ Privilege Escalation and Post-Exploitation Threat Modeling
๐Ÿš— Car hacking ๐Ÿš— Disclosure Interesting Things & Useful Information AppSec/Programming Stuff * UI/UX Design
Cheat Sheets Disinformation Malware Rants & Writeups ๐ŸŒป Web ๐ŸŒป
๐Ÿ CTFs & Wargames ๐Ÿ ๐Ÿ“ฐ Documentation & Reporting ๐Ÿ“ฐ Network Attacks & Defense ๐Ÿฎ Red Teaming/Penetration Testing Stuff ๐Ÿฎ ๐Ÿ“ถ Wireless Networks and RF Devices ๐Ÿ“ถ
Conferences/Recordings Embedded Device Security Network Security Monitoring & Logging Reverse Engineering
Courses & Training Exfiltration Open Source Intelligence Gathering - OSINT REMATH Reverse Engineering

About

An Information Security Reference That Doesn't Suck

https://rmusser.net/docs

License:MIT License


Languages

Language:Python 76.3%Language:Batchfile 9.5%Language:Makefile 7.4%Language:JavaScript 6.9%