Welcome to the Cybersecurity Resources Repository! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field.
This repository contains a comprehensive collection of resources, including:
- Tools: Essential utilities for penetration testing, vulnerability scanning, threat detection, and network security.
- Tutorials: Step-by-step guides for learning and mastering various cybersecurity techniques.
- Articles & Research: In-depth educational materials to help expand your understanding of complex topics.
- Best Practices: Recommendations on maintaining a secure digital environment and following industry standards.
- Emerging Trends: Insights into the latest cybersecurity threats, technologies, and defense strategies.
If you find this repository helpful, please consider giving it a star! Your support helps increase the visibility of the project and encourages others to contribute. Starring the repository helps it grow and ensures that it remains an up-to-date and valuable resource for the entire cybersecurity community.
- Tools
- Utility
- Miscellaneous
- OSINT
- News
- Search Engines
- DNS/IP
- Post Explotation
- Deobfuscators
- Decompilers
- Disassembler and debuggers
- Web
- Network
- Cryptography
- Forensic
- Hex editors
- Execution logging and tracing
- System
- Social Networks
- Steganographic
- Steganalysis
- Cryptocurrency
- Delete Your Trace
- Playbooks
- Malware Analysis
- SIEM
- Password Managers
- VPNs
- Learning
- Colaborate
- Credits
↑ 🛠️ Tools
1. ↑ Utility
Tool | Description |
---|---|
Hashcat Pass Recovery | Password recovery utility for cracking hashes. |
BrowserLeaks | Suite of tools to test the security and privacy of your web browser. |
Have I Been Pwned | Check if your email address was compromised in data breaches. |
Hudson Rock | Check if your email address or domain was compromised in global Infostealer malware attacks |
Gravwell Community Edition | Full featured unstructured log SIEM/Security Data Lake with raw binary/pcap support |
2. ↑ Miscellaneous
Tool | Description |
---|---|
osint.rocks | A resource for locating and investigating individuals. |
Pim Eyes | Facial recognition tool for reverse image searches. |
IntelTechniques | Search engine tailored for OSINT investigations across multiple data types. |
Cybdetective | Visual global directory of OSINT tools. |
Face Comparison | Compare facial images to find matches. |
OSINT Framework | Extensive repository of OSINT tools and techniques. |
FaceCheckID | Reverse image lookup specialized in facial recognition. |
Social Catfish | Find people using names, images, or other details. |
Google Lens | AI-powered tool to analyze and extract information from images. |
LensoAI | AI-driven platform for reverse image searching. |
GetAllURLs (gau) | Collects existing URLs for a domain from sources like Wayback Machine, URLScan, and AlienVault. |
Guardey | Offers gamified training and content for improving cybersecurity awareness. |
NightShade | Framework for designing and executing CTF challenges with a focus on security. |
Smali/Baksmali mode for Emacs | Improves Emacs usability for reading Smali code, aiding Android reverse engineering. |
Ctf-writeups | Detailed explanations and solutions for Capture the Flag (CTF) challenges. |
Secrets of a High Performance Security-Focused Agile Team | Best practices for incorporating security into agile development processes. |
Dalvik Opcodes | A guide to Dalvik VM instructions, useful for analyzing Android applications. |
AWS Config | Evaluates and audits AWS resource configurations for compliance and security. |
3. ↑ OSINT
3.1 ↑ Username Search
Tool | Description |
---|---|
WhatsMyName | Locate usernames across numerous platforms. |
NameCheck | Check username availability on various websites. |
UserSearch | Free tool to search usernames on 2000+ websites. |
BlackBird | Advanced tool for OSINT username searches. |
CheckUser | Search for usernames across social networks. |
Cupidcr4wl | Crawls adult content platforms to search for specific usernames. |
Digital Footprint Check | Free tool to verify usernames registered on hundreds of sites. |
IDCrawl | Find usernames on popular social networks. |
Maigret | Collect detailed information on individuals using their username. |
Name Chk | Verify usernames on over 90 social media platforms and 30 domain extensions. |
Name Checkr | Search for domains and usernames across multiple platforms. |
Name Checkup | Check username and domain availability across social media and websites. |
NameKetchup | Explore domain name and username availability on popular platforms. |
NexFil | Identify usernames across nearly all social network sites. |
Seekr | Multi-tool for OSINT data management, note-taking, and username checking. |
Sherlock | Search for usernames across various platforms. |
SherlockEye | Discover publicly available information tied to a username. |
Snoop | Search for nicknames and usernames on the web within the OSINT domain. |
3.2 ↑ Email Search
Tools | Description |
---|---|
Industries OSINT | Offers a variety of tools for investigating email addresses. |
BlackBird | Comprehensive search platform for email investigation. |
Epieos | Analyze and investigate email addresses. |
ScanIdentity | Verify identities and scan for security risks. |
LeakPeak | Identify whether email addresses have been leaked. |
BreachDirectory | Explore databases of breached email accounts. |
0t.rocks | OSINT tool dedicated to email searches. |
MailTester | Locate email addresses and optimize email deliverability. |
MXToolbox | Troubleshoot and investigate email server issues using free tools. |
DeHashed | Prevent account takeovers with breach notifications and data analysis. |
Email Address Validator | Enhance email deliverability, reduce bounce rates, and prevent fraud. |
Email Format | Discover the email formats used by different organizations. |
Email Permutator | Generate potential email addresses for targeted contacts. |
EmailHippo | Verify if an email address exists with accuracy. |
Ghunt | Investigate Google-related emails and associated documents. |
Gitrecon | Scan GitHub repositories for exposed emails and names. |
h8mail | Perform local or premium email OSINT and password breach hunting. |
Have I Been Pwned | Check whether an email address has been exposed in data breaches. |
Holehe | Discover accounts linked to email addresses across various platforms. |
Hunter | Find email addresses quickly and connect with business contacts. |
LeakCheck | Search over 7.5B breached entries for emails, usernames, and other data. |
LeakRadar | Monitors stealer logs to identify compromised domains and email addresses, providing real-time alerts and proactive protection against breaches. |
Telegram Group | A Telegram bot that allows you to search people's names in more than 3000 websites. |
3.3 ↑ GEOINT
Tools | Description |
---|---|
Bellingcat | Geospatial intelligence and analysis. |
OhShint | Geospatial OSINT tools. |
GeoSpy | The World's Best AI Geolocation Tool |
Picarta | We find where a photo has been taken in the world using Artificial Intelligence. |
IPLogger | IP Logger link shortener with geolocalizaction with advanced analytics. |
GeoNames | The GeoNames geographical database with over 11 million placenames. |
Geoseer.net | Search over 3.5 million spatial GIS datasets hosted on over 40k live services. |
GeoINT Search | Custom Google search for geographical-related queries. |
Earth Engine Dataset | Public data archive with over 40 years of imagery and scientific datasets. |
GeoPlatform Portal | Cross-agency collaborative effort for geospatial data sharing and transparency. |
FAO Map Catalog | Collection of geographical maps from the FAO. |
Geocreepy | Geolocation OSINT tool for gathering location data from social networks. |
US Crisis Monitor | In-depth coverage of political violence trends in the US. |
Toronto Live | Provides live information about public schools, traffic, bike shares, etc. |
GeoProtests API | Query and visualize protests worldwide with spatial aggregations. |
GeoINT-py | A collection of geospatial intelligence workflows implemented in Python. |
4. ↑ News
Tools | Description |
---|---|
WolrdEinnwes | News and search engine tools. |
IT Security Guru | IT Security Guru is a top resource for the latest cybersecurity news, covering threats, data breaches, and expert insights to help you stay informed and secure. |
5. ↑ Search Engines
Tools | Description |
---|---|
True People Search | Search for people's information. |
Webmii | Aggregate search for personal information. |
Usa-Oficial | Official USA search tools. |
Ussearch | Search for people in the USA. |
ThatsThem | Comprehensive search for personal information. |
Shodan Search | Search engine for Internet-connected devices. |
Maltego | Tool for link analysis and data visualization. |
Spiderfoot | An OSINT automation tool. |
Google Advanced Search | A tool to filter and refine search results based on specific needs. |
Google Scholar | Search engine for scholarly articles, theses, books, and other academic resources. |
Bing | Microsoft’s search engine with intelligent features and integrated services. |
Yandex | Popular Russian search engine offering web, image, and video search capabilities. |
MetaGer | Privacy-focused search engine combining results from multiple indexes. |
DuckDuckGo | Privacy-oriented search engine that doesn’t track user activity. |
Startpage | Privacy-friendly search engine offering anonymous browsing. |
Swisscows | Anonymous search engine that protects user privacy and filters inappropriate content. |
Qwant | Privacy-respecting search engine with a European origin. |
Ecosia | Eco-friendly search engine that uses ad revenue to plant trees worldwide. |
Mojeek | Independent search engine with a no-tracking policy. |
Brave Search | Privacy-centric search engine integrated with the Brave browser. |
Yahoo Search | Yahoo’s search engine offering web, image, and video search. |
Baidu | China’s leading search engine. |
Dogpile | Metasearch engine that aggregates results from multiple search engines. |
Million Short | A search engine that filters out top-ranked websites for deeper web discovery. |
MetaCrawler (Zoo Search) | Combines results from multiple search engines into a unified format. |
Carrot2 | Organizes search results into topic-based clusters for better navigation. |
Ask | Combines a search engine with a news feed. |
Search Engines Index | Directory of search engines for different countries worldwide. |
CachedViews | Access cached versions of web pages from various sources. |
LibGen | The largest free digital library of books. |
2lingual | Allows simultaneous Google searches in two languages. |
6. ↑ DNS/IP
Tools | Description |
---|---|
DnsEnum | Multithreaded Perl script for DNS enumeration and identifying non-contiguous IP blocks. |
Amass | Tool for subdomain enumeration using data sources, brute force, web archives, and machine learning. |
Columbus Project | Advanced subdomain discovery service with a fast, user-friendly API. |
findsubdomains | Automatically collects subdomains from various online sources. |
Merklemap | Enumerates subdomains, including hidden ones, by analyzing certificate transparency logs. |
Subdomains Top 1 Million (5000) | List of subdomains from the top 1 million domains, ideal for large-scale enumeration. |
Shubs Subdomains | Subdomain list gathered by Shubs, valuable for reconnaissance purposes. |
DNS Jhaddix List | Curated list of subdomains by Jhaddix, tailored for penetration testing. |
Domain Digger | Explore DNS records, WHOIS data, SSL/TLS certificates, subdomains, and more. |
DNSlytics | Search for domain IPs, IPv4, IPv6, or associated providers. |
DNSTwist | Scan for phishing domains and related risks. |
SecurityTrails | Search for domain names, IPs, keywords, or hostnames to assess cybersecurity risks. |
Shodan | Search for internet-connected servers and devices using advanced filters. |
InternetDB | View open ports and device types linked to specific IP addresses. |
GreyNoise Intelligence | Identify internet scanners and common business activities in your security logs. |
FOFA | Explore internet-connected devices for reconnaissance and vulnerability analysis. |
ZoomEye | A freemium tool for security reconnaissance, scanning for vulnerable devices online. |
Censys | Assess the attack surface of internet-connected devices and platforms. |
ViewDNS.info | Perform reverse IP and Whois lookups to find hosted websites and domain owner details. |
Internet Census 2012 | Access service probe records from a large-scale 2012 internet scan. |
ONYPHE | Cyber defense search engine that indexes exposed assets from the internet and dark web. |
IPLeak | Test for leaks in your IP address, DNS, and WebRTC during online activity. |
Robtex | Research IP numbers, domains, and other online assets for deeper analysis. |
Wappalyzer | Identify the technology stack behind any website, including CMS, e-commerce, and more. |
Photon | A fast web crawler designed for OSINT (Open Source Intelligence) collection. |
Technology Lookup | Check which technologies a website is built with, including frameworks and tools. |
BuiltWith | Discover the technologies used to build any website, from CMS to hosting platforms. |
OSINT.SH | A suite of OSINT tools for comprehensive information gathering. |
Nmap Checker Tool | Analyze network infrastructure and devices using Nmap’s powerful scanning features. |
Free Network Tools | Offers network diagnostics such as traceroute, nslookup, ping, and DNS lookups. |
Google Transparency Report | Reports on HTTPS encryption across the web. |
Certificate Search | Lookup and analyze SSL certificates and their associated domains. |
CRT | Search and analyze SSL certificates for cybersecurity insights. |
LeakIX | Scan for exposed internet services and find relevant vulnerabilities. |
URLScan.io | A tool to scan and analyze websites, recording all interactions during page navigation. |
DNSDumpster | A free DNS research tool that identifies hosts related to a domain for security analysis. |
Domain Codex | Perform private investigations and legal case research, including digital piracy analysis. |
SimilarWeb | Analyze website traffic sources and compare competitors’ online performance. |
IP Search | Access a network reputation database to find malicious IP addresses. |
Reverse Domain | Discover domain names based on keyword searches. |
IANA - Root Zone Database | Provides delegation details for top-level domains (TLDs) like .com, .uk, and more. |
PunkSpider | Search for vulnerable websites to assess security risks. |
Metabigor | Offers various OSINT tools without requiring an API key for access. |
URLDNA | Gather information about URLs, such as SSL certificates, IP, and metadata. |
Check-The-Sum | A database of malicious files, IPs, and domains collected from honeypots. |
Adalanche | Open Source Active Directory ACL Visualizer and Explorer. |
7. ↑ Post Explotation
Tools | Description |
---|---|
Empire | A post exploitation framework for powershell and python. |
Silentrinity | A post exploitation tool that uses iron python to get past powershell restrictions. |
PowerSploit | A PowerShell post exploitation framework. |
ebowla | Framework for Making Environmental Keyed Payloads. |
8. ↑ Deobfuscators
Tools | Description |
---|---|
JS Nice | Web service guessing JS variables names and types based on the model derived from open source. |
de4dot | .NET deobfuscator and unpacker. |
9. ↑ Decompilers
Tools | Description |
---|---|
uncompyle6 | Decompiler for the over 20 releases and 20 years of CPython. |
Hopper | A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables. |
Karkatau | The best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully. |
dnSpy | .NET assembly editor, decompiler, and debugger |
ILSpy | An open-source .NET assembly browser and decompiler |
DotPeek | A free-of-charge .NET decompiler from JetBrains |
JADX | Decompiler for Android apps. Not related to JAD. |
JAD | JAD Java Decompiler (closed-source, unmaintained) |
Luyten | One of the best, though a bit slow, hangs on some binaries and not very well maintained. |
R2Dec | Decompiler plugin for radare2 |
Decai | LLM-based decompiler for radare2 |
10. ↑ Disassembler and debuggers
Tools | Description |
---|---|
IDA | Multi-platform disassembler and debugger for Windows, Linux, and macOS. |
Olly | 32-bit assembler-level debugging tool for Windows. |
plasma | Interactive disassembler for x86, ARM, and MIPS, with indented pseudo-code and syntax coloring. |
radare2 | Portable and versatile reverse engineering framework. |
iaito | Graphical interface for the radare2 reverse engineering framework. |
x64dbg | Open-source debugger for x64 and x32 applications on Windows. |
ScratchABit | Customizable and hackable disassembler with support for IDAPython-compatible plugins. |
Ghidra | Comprehensive reverse engineering suite developed by the NSA. |
11. ↑ Web
Web | Description |
---|---|
Cyberbro | A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services (API and scraping). |
recon-ng | Web reconnaissance framework for gathering OSINT. |
SpySe | Data gathering service offering detailed information on IPs, domains, ports, technologies, and more through OSINT. |
FindSubdomains | Subdomain discovery tool that gathers and validates subdomains from open-source internet sources. |
Git-Scanner | Tool for bug hunting or penetration testing to find exposed .git repositories. |
Keyscope | Key and secret auditing tool that checks secrets against multiple SaaS platforms. |
VHostScan | Virtual host scanner that performs reverse lookups and detects dynamic default pages, aliases, and catch-all configurations. |
Shodan | Search engine for finding servers and devices connected to the internet. |
SubFinder | Tool for discovering valid subdomains through passive online sources. |
sqlmap | Automatic SQL injection tool for database takeover. |
URLVoid | Website reputation checker that scans URLs for safety using multiple security engines and blocklists. |
12. ↑ Network
Tools | Description |
---|---|
NetworkMiner | Network Forensic Analysis Tool (NFAT) for analyzing network traffic. |
Paros | Java-based HTTP/HTTPS proxy for web application vulnerability assessment. |
pig | Linux-based packet crafting tool. |
findsubdomains | Fast subdomain scanning service using OSINT for discovery. |
cirt-fuzzer | Simple TCP/UDP protocol fuzzer for vulnerability testing. |
ASlookup | Tool for exploring autonomous systems with related data (CIDR, ASN, Org). |
ZAP | Integrated penetration testing tool for identifying vulnerabilities in web applications. |
mitmsocks4j | Man-in-the-middle SOCKS proxy for Java. |
ssh-mitm | SSH/SFTP man-in-the-middle tool for logging sessions and passwords. |
nmap | Security scanner for network exploration and vulnerability scanning. |
Aircrack-ng | WEP and WPA-PSK cracking tool for 802.11 wireless networks. |
Nipe | Script to route traffic through the Tor network. |
Habu | Python toolkit for network hacking. |
Wifi Jammer | Program to jam all Wi-Fi clients in range. |
Firesheep | HTTP session hijacking attack tool. |
Scapy | Python tool for creating and manipulating network packets. |
Amass | Subdomain enumeration tool with scraping, brute forcing, crawling, and reverse DNS capabilities. |
sniffglue | Multithreaded secure packet sniffer. |
Netz | Tool for discovering internet-wide misconfigurations using zgrab2. |
RustScan | Fast port scanner using Rust, designed for quick scanning and integration with Nmap. |
PETEP | Extensible TCP/UDP proxy for traffic analysis and modification with SSL/TLS support. |
13. ↑ Cryptography
Tools | Description |
---|---|
xortool | A tool to analyze multi-byte XOR cipher |
John the Ripper | A fast password cracker |
Aircrack | Aircrack is 802.11 WEP and WPA-PSK keys cracking program. |
Ciphey | Automated decryption tool using artificial intelligence & natural language processing. |
14. ↑ Forensic
Tools | Description |
---|---|
Autopsy | Digital forensics platform and graphical interface for The Sleuth Kit and other tools. |
sleuthkit | A collection of command-line digital forensics tools and library. |
EnCase | Suite of digital investigation products by Guidance Software. |
malzilla | Malware hunting tool for analysis and detection. |
IPED - Indexador e Processador de Evidências Digitais | Brazilian Federal Police forensic investigation tool. |
CyLR | NTFS forensic image collector for forensic investigations. |
CAINE | Ubuntu-based tool that provides a complete forensic environment with a graphical interface. |
Volatility | Framework for memory forensics and analysis of volatile memory. |
Redline | Host investigation and data acquisition tool. |
REKALL | Memory analysis and forensics framework. |
Log2Timeline (Plaso) | Tool for creating timelines for forensic analysis. |
Cyber Triage | Automated DFIR software for investigating malware, ransomware, and account takeovers. |
Dumpzilla | Tool to extract forensic data from Firefox, Iceweasel, and Seamonkey browsers. |
DFTimewolf | Framework for orchestrating forensic collection, processing, and export. |
IPED Digital Forensic Tool | Open-source tool for analyzing disk images and file systems. |
Volatility 3 | Framework for extracting data from volatile memory for system state analysis. |
Binalyze AIR | Digital forensics platform for comprehensive incident response. |
TestDisk | Data recovery software for recovering lost partitions and undeleting files. |
WinHex | Universal hex editor for forensics, data recovery, and IT security tasks. |
Skadi | Open-source tools for forensic artifact and image analysis. |
Hoarder | Tool for collecting and parsing Windows artifacts for digital forensics. |
libregf | Library for accessing and parsing Windows NT Registry files. |
Radare2 | Powerful framework for reverse engineering and binary analysis. |
Silk Guardian | Anti-forensic Linux kernel module that acts as a USB port kill-switch. |
evtkit | Tool for fixing acquired Windows Event Log files. |
Pancake Viewer | DFVFS-backed viewer for file extraction and viewing. |
Mobile Verification Toolkit (MVT) | Forensic tool for gathering traces from Android and iOS devices. |
Turbinia | Framework for automating forensic processing in cloud environments. |
Skadi | Free, open-source toolset for analyzing forensic artifacts and images. |
Belkasoft Evidence Center | Comprehensive digital forensics and incident response platform. |
libevt | Library for parsing Windows Event Logs for forensic analysis. |
15. ↑ Hex editors
Tools | Description |
---|---|
HxD | A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size |
WinHex | A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security |
wxHexEditor | |
Synalize It | |
Hexinator |
16. ↑ Execution logging and tracing
Tools | Description |
---|---|
Wireshark | A free and open-source packet analyzer for network protocol analysis. |
tcpdump | A powerful command-line packet analyzer, along with libpcap for network traffic capture. |
mitmproxy | An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface. |
Charles Proxy | A cross-platform GUI web debugging proxy for viewing intercepted HTTP and HTTPS/SSL live traffic. |
usbmon | USB capture tool for Linux, used for monitoring USB traffic. |
USBPcap | USB capture tool for Windows, useful for monitoring USB traffic. |
dynStruct | A tool for structure recovery via dynamic instrumentation. |
drltrace | A tool for tracing shared library calls. |
17. ↑ System
Tools | Description |
---|---|
Metasploit | A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. |
mimikatz | A tool for Windows security that can extract plaintext passwords, hashes, and other secrets from memory. |
Hackers tools | A YouTube playlist offering tutorials on various hacking tools. |
OBEX_common.txt | A list of common OBEX (Object Exchange) paths, useful for targeting OBEX servers. |
OBEX_rare.txt | A list of rare OBEX (Object Exchange) paths, useful for targeting OBEX servers. |
Everything | A fast file and folder search tool for Windows, allowing instant results with minimal system resource usage. |
18. ↑ Social Networks
18.1 ↑ Instagram
Tools | Description |
---|---|
Aware Online: Instagram Search Tool | Instagram Search Tool |
Combin | Instagram marketing tool for managing and growing your account. |
Comment Picker | Tool for selecting random winners from comments. |
Display Purposes | Tool for finding hashtags related to your content. |
DownAlbum | Chrome extension for downloading photos and videos from Instagram. |
Engagement-calculator | Tool for calculating engagement rates on Instagram. |
Export Comments | Tool for exporting Instagram comments. |
Find-instagram-user-id | Tool to find Instagram user IDs. |
Gramfind | Tool for finding Instagram profiles and posts. |
Hashtagify | Tool for finding and analyzing hashtags. |
Hashtags for Likes | Tool for finding the best hashtags for Instagram. |
Helper Tools for Instagram | Chrome extension to enhance Instagram functionalities. |
HypeAuditor | Tool for analyzing the authenticity of influencers and their engagement. |
Iconosquare | Tool for managing and analyzing Instagram accounts. |
IGSuperStar | Tool for finding Instagram influencers. |
Imgbunk | Tool for searching and downloading Instagram photos. |
ImgInn | Tool for viewing and downloading Instagram stories anonymously. |
In Tags | Tool for finding the best tags for your Instagram posts. |
INSSIST | Chrome extension for posting photos and stories on Instagram from desktop. |
InstaFollowers | Tool for gaining followers and engagement on Instagram. |
Instagram Crawler | Tool for scraping Instagram data. |
Instagram Explorer | Tool for exploring Instagram profiles and posts. |
Instagram OSINT | Open-source intelligence tool for Instagram. |
Instagram Scraper | Tool for scraping Instagram posts and profiles. |
Instagram Search Tool (Aware Online) | Tool for searching Instagram profiles and posts. |
InstaLoader | Tool for downloading Instagram photos, videos, and metadata. |
instaloctrack | Tool for tracking Instagram locations. |
InstaLooter | Tool for downloading photos and videos from Instagram profiles. |
Izuum | Instagram search engine. |
Keyhole | Tool for tracking and analyzing social media campaigns. |
Leetags | Tool for finding the best hashtags for Instagram posts. |
MetaHashtags | Tool for generating and analyzing hashtags. |
Minter.io | Tool for Instagram analytics and reporting. |
noninstagram | Tool for Instagram data analysis. |
Osi.ig | Tool for Instagram OSINT. |
Osintgram | OSINT tool for analyzing Instagram profiles and posts. |
Otzberg.net | Tool for finding Instagram user IDs. |
Panoramiq | Tool for scheduling and managing Instagram posts. |
Phantom Buster | Automation tool for social media platforms. |
Phlanx: Instagram Engagement Calculator | Tool for calculating Instagram engagement rates. |
Picker | Tool for selecting random winners from Instagram comments. |
Picodash | Tool for searching and organizing Instagram content. |
Scylla | Tool for Instagram OSINT and data scraping. |
Skimagram | Tool for tracking Instagram activity. |
Social-alerts | Tool for setting up social media alerts. |
SocialInsider | Tool for social media analytics and competitive analysis. |
socid_extractor | Tool for extracting social media IDs. |
SoIG | Tool for Instagram OSINT. |
tailwind | Tool for scheduling and managing Instagram posts. |
ThumbTube | Tool for downloading Instagram profile pictures. |
trendHERO | Tool for influencer marketing and analytics. |
Webstagram | Instagram web viewer and search tool. |
Flufi | A tool for exploring public stories, posts, reels, tags, followers, and more.. |
Find Instagram User ID | A tool to find the Instagram user ID for any profile. |
18.2 ↑ Linkedin
Tools | Description |
---|---|
IntelligenceX: Linkedin | LinkedIn search tool by IntelligenceX. |
BridgeKeeper | Tool for OSINT on LinkedIn profiles. |
CrossLinked | LinkedIn enumeration tool. |
Email Reverse Lookup | Tool for reverse email lookup on LinkedIn. |
Free People Search Tools | Comprehensive people search tool. |
FTL | Chrome extension for LinkedIn OSINT. |
osint.support | Collection of OSINT tools for LinkedIn. |
InSpy | LinkedIn enumeration tool. |
Linkedin Bookmarklet | Bookmarklet tools for LinkedIn OSINT. |
Linkedin Profile Scraper | Tool for scraping LinkedIn profiles. |
Linkedin Search TGC | Tool for searching LinkedIn profiles. |
LinkedInt | LinkedIn intelligence and OSINT tool. |
Osint Support Linkedin | Support tools for LinkedIn OSINT. |
Phantom Buster | Automation tool for LinkedIn tasks. |
raven | LinkedIn enumeration and scraping tool. |
Recruitin.net | Tool for recruiting on LinkedIn. |
Recruitment Geek | LinkedIn search tool for recruiters. |
ScrapedIn | Tool for scraping LinkedIn profiles. |
18.3 ↑ TikTok
Tools | Description |
---|---|
Exolyt.com | Tool for analyzing TikTok profiles and videos. |
Hashtags for Likes | Tool for finding the best hashtags for TikTok posts. |
HypeAuditor | Tool for analyzing the authenticity of TikTok influencers. |
Influence Grid | Tool for finding TikTok influencers. |
InstaFollowers | Tool for finding TikTok user IDs. |
Mavekite.com | Tool for managing and analyzing TikTok campaigns. |
OSINT Combine TikTok Quick Search | Quick search tool for TikTok profiles. |
Savefrom.net | Tool for downloading TikTok videos. |
Sinwindie TikTok Bookmarklet Tools | Bookmarklet tools for TikTok OSINT. |
Snaptik.app | Tool for downloading TikTok videos. |
socid_extractor | Tool for extracting social media IDs. |
Tikbuddy | Tool for analyzing TikTok profiles and content. |
TikTok API | API for interacting with TikTok. |
TikTok Creative Center Statistics | Tool for finding trending hashtags and content on TikTok. |
TikTok Downloader | Tool for downloading TikTok videos. |
TikTok Hashtags | Tool for generating TikTok hashtags. |
TikTok Scraper | Tool for scraping TikTok profiles and videos. |
TikTok Timestamp | Tool for analyzing timestamps on TikTok videos. |
TikView | Tool for searching TikTok profiles and content. |
tikvstock | Tool for stock and analyzing TikTok videos. |
Tokvid | Tool for downloading TikTok videos. |
TubeHi | Tool for analyzing TikTok and YouTube content. |
Vidnice | Tool for analyzing TikTok profiles and content. |
18.4 ↑ OnlyFans
Tools | Description |
---|---|
fansmetrics.com | Tool for analyzing OnlyFans metrics. |
Onlysearch.com | Search tool for finding OnlyFans profiles. |
onlyfinder.com | Tool for finding OnlyFans creators. |
hubite.com/onlyfans-search/ | OnlyFans search tool. |
SimilarFans | Tool for finding similar OnlyFans profiles. |
FanSearch | Comprehensive search tool for OnlyFans. |
18.5 ↑ Discord
Tools | Description |
---|---|
ASTRAAHOME | A collection of all-in-one tools for Discord. |
Discord History Tracker | A tool for tracking and saving chat histories in Discord. |
DISBOARD | A platform to discover and list Discord servers. |
Discord Bots (Community) | A collection of publicly available Discord bots created by community members, serving various functions. |
Discord ID Lookup | An unofficial tool for looking up Discord user information. |
Discord Bots (Exploration) | A vast collection to explore millions of Discord bots for different purposes. |
DiscordServers | A curated selection of popular and interesting public Discord servers. |
Discord Me | A site for finding public Discord servers and bots. |
DiscordOSINT | Provides resources for conducting research and OSINT investigations related to Discord accounts, servers, and bots. |
Discord Bots | A comprehensive directory of top Discord bots, apps, and servers, including popular music and economy bots. |
18.6 ↑ Twitch
Tools | Description |
---|---|
Twitch Tools | Tool for viewing follower lists on Twitch. |
Twitch Tracker | Tool for tracking Twitch statistics and analytics. |
Sully Gnome | Tool for analyzing Twitch stream statistics. |
Twitch Stream Filter | Tool for filtering and previewing Twitch streams. |
Untwitch.com | Tool for downloading Twitch videos. |
Twitch Overlap | Tool for analyzing viewer overlap between Twitch streamers. |
Justlog | Tool for viewing Twitch chat logs. |
Twitch Recover | Tool for recovering deleted Twitch videos. |
Twitch Database | Database for tracking Twitch followings. |
Twitch Insights | Tool for analyzing Twitch trends and statistics. |
Twitch Followage Tool | Tool for checking how long users have been following a Twitch channel. |
18.7 ↑ Tinder
Tools | Description |
---|---|
Badoo | Social discovery and dating app. |
Bumble | Dating app where women make the first move. |
Coffee Meets Bagel | Dating app that curates matches for users. |
eHarmony | Dating site focused on long-term relationships. |
Grindr | Social networking app for gay, bi, trans, and queer people. |
happn | Dating app that shows users people they've crossed paths with. |
HER | Dating and social app for LGBTQ+ women and non-binary people. |
Heybaby | Dating app for single parents and those open to dating them. |
Hinge | Dating app designed to be deleted. |
The Inner Circle | Exclusive dating app for ambitious professionals. |
The League | Dating app for professionals. |
Match.com | One of the largest dating sites. |
MeetMe | Social discovery app for meeting new people. |
OkCupid | Dating app with a detailed questionnaire for matching. |
Plenty of Fish | Dating site with a large user base. |
Scruff | Social app for gay, bi, trans, and queer people. |
Tastebuds | Dating app that matches people based on music taste. |
Tinder | Popular dating app for meeting new people. |
zoosk | Dating site with a behavioral matchmaking algorithm. |
↑ 19. Steganographic
Tools | Description |
---|---|
110 steganographic tools | A comprehensive list of 110 steganographic tools. |
Cloakify | A tool for disguising data to bypass data loss prevention mechanisms. |
Stego_Dropper | A steganography-based dropper written in Python. |
silenteye | A cross-platform application for steganography. |
deep-steg | Deep learning based steganography tool. |
StegX | A Python-based steganography tool. |
js-steg | A steganography tool using JavaScript. |
steg | A simple steganography tool. |
StegoProxy | A proxy tool that implements steganography. |
Video-Steganography-for-Piracy-Prevention | A video steganography tool to prevent piracy. |
openstego | An open-source steganography tool. |
steg | Another steganography tool. |
Stegbook | A steganography tool for Facebook messages. |
PDF_steganography | A tool for hiding data within PDF files. |
steganography_talk | A presentation on steganography. |
ascii-steganography | A tool for hiding data within ASCII text. |
voices | A tool for audio steganography. |
stego-retweet | A tool for hiding data within retweets. |
ARMS | Another steganography tool. |
stegosaurus | A simple steganography tool. |
Outguess | A universal steganography tool. |
BitStegNet | A neural network based steganography tool. |
stego-wave | A steganography tool for hiding data in audio files. |
StegoMP3 | A tool for MP3 steganography. |
jSteganographiX | A steganography tool written in Java. |
LSB-Steganography | A tool for least significant bit steganography. |
jsteg | A steganography tool written in Go. |
stego-toolkit | A collection of steganography tools. |
f5-steganography | An implementation of the F5 steganography algorithm. |
Matroschka | A steganography tool. |
Deep-Steganography | A deep learning based steganography tool. |
AudioStego | A tool for audio steganography. |
audio-steganography-algorithms | Algorithms for audio steganography. |
StegCracker | A steganography brute-force tool. |
StegExpose | A steganalysis tool for detecting hidden data. |
jphs | A steganography tool. |
StegDroid | A steganography tool for Android. |
SteCoSteg | A steganography tool. |
PNG-Mask | A tool for hiding data in PNG images. |
chess-steg | A steganography tool for hiding data in chess games. |
strogonoff | Another steganography tool. |
Pictograph | A steganography tool for images. |
stegoVeritas | A steganography tool. |
secretbook | A steganography tool for Facebook messages. |
snow10 | A steganography tool. |
mp3stego | A tool for MP3 steganography. |
stego_video | A video steganography tool. |
diit | A steganography tool. |
stegosploit | A tool for embedding exploits in images. |
stegolab | A steganography tool. |
stego-book-2014 | A collection of steganography tools from 2014. |
timeshifter | A tool for covert channels based on time. |
covertele | A tool for covert communication. |
CCEAP | A steganography tool. |
cloud-covert-channels | A tool for covert channels in the cloud. |
DNSExfiltrator | A tool for data exfiltration via DNS. |
StegPage | A source for various steganography tools. |
CameraShy | A steganography tool. |
stegUnicode | A steganography tool using Unicode. |
stelin | Another steganography tool. |
Hydan | A steganography tool for binary files. |
deogol | A steganography tool. |
Hugo source code | Source code for a steganography tool. |
WOW | Steganography algorithms. |
stegify | A simple steganography tool. |
Steganography 101 | An introductory guide to steganography. |
Invoke-PSImage | A tool for embedding PowerShell scripts in images. |
instegogram | A tool for steganography in Instagram images. |
↑ 20. Steganalysis
Tool | Description |
---|---|
VSL | A steganographic tool that helps in hiding and detecting messages within digital images. |
HackTricks - Stego Tricks | A comprehensive guide on various steganography techniques and tricks used in cybersecurity. |
zsteg | A tool for detecting hidden data in PNG and BMP files. |
StegOnline | An online tool for hiding and extracting hidden messages in images. |
Stegsolve | A steganography analysis tool that can analyze images for hidden data. |
StegCracker | A tool for brute-forcing passwords of hidden data in steganographic images. |
StegSeek | A lightning-fast steganography brute-force tool for hidden data in images. |
JJTC Steganalysis | A resource for various steganalysis techniques and tools. |
Guillermito's Steganography | An informative site on steganography tools and techniques. |
Stegdetect | A popular steganography detection tool capable of detecting hidden data in images. |
Spy Hunter | A tool designed to detect steganography usage and hidden data. |
Stegkit | A steganography kit used for hiding and extracting hidden messages in images. |
Stegalyzer | A tool designed for detecting and analyzing steganographic content in digital images. |
Stego Suite | A suite of tools for hiding and detecting steganographic content. |
Stegsecret | An open-source steganography tool for embedding and extracting hidden messages in images. |
StegExpose | A tool for detecting hidden data in images using statistical analysis. |
Cryptonibbles - Mr. Robot Steganography | A blog post discussing steganography in the context of the TV show Mr. Robot. |
Forensics Analysis of Video Steganography Tools | A research paper on forensic analysis of video steganography tools. |
Aletheia | A tool for image steganalysis using state-of-the-art machine learning techniques. |
Danielle Lerch's Papers | A collection of research papers on steganalysis and related topics. |
Steganalysis with CNN for Same Key Images | A project for steganalysis using convolutional neural networks (CNN) for same key images. |
DeepSteg | Deepsteg performs visual, structural, and statistical attacks (including deep learning-based attacks) to detect files hidden within images and other files. |
tf_audio_steganalysis | A project for steganalysis of audio files using TensorFlow. |
SteganalysisCNN | A steganalysis project using convolutional neural networks (CNN). |
ALASKA | A large-scale image steganalysis dataset. |
IStego100K | A large-scale image steganalysis dataset. |
StegOnline | An online tool for hiding and extracting hidden messages in images. |
Steganabara | A tool for steganography analysis. |
Stegasawus | A steganography analysis tool. |
UDSS | A project for universal deep steganalysis systems. |
BreakingSteganalysisGAN | A project on breaking steganalysis using generative adversarial networks (GAN). |
Steganalyse | A steganalysis tool. |
StegCracker | A tool for brute-forcing passwords of hidden data in steganographic images. |
Welloganography Solver | A steganography analysis tool. |
McAfee Free Tools - Steganography | A collection of free steganography tools provided by McAfee. |
Mistica | A steganography analysis tool. |
Cookie Stego | A steganography tool for hiding and extracting hidden messages in images. |
AperiSolve | A steganography analysis tool. |
Steganalysis | A steganalysis project. |
YeNet-Pytorch | A project for steganalysis using YeNet and PyTorch. |
Steganalysis with CNN - Yedroudj-Net | A steganalysis project using convolutional neural networks (CNN) - Yedroudj-Net. |
Pytorch implementation of SRNet | A project for steganalysis using SRNet and PyTorch. |
LSB Toolkit | A toolkit for steganography using least significant bit (LSB) techniques. |
CAECNNcode | A project for steganalysis using convolutional neural networks (CNN). |
Stegolab | A steganography and steganalysis toolkit. |
DL Steganalysis | A project for steganalysis using deep learning techniques. |
Audio Steganalysis | A project for steganalysis of audio files. |
Audio Steganalysis CNN | A project for steganalysis of audio files using convolutional neural networks (CNN). |
DeepSteg | A steganalysis tool for detecting hidden data in images using deep learning techniques. |
Stegasaurus2 | A steganography analysis tool. |
↑ 21. Cryptocurrency
Tool | Description |
---|---|
CryptoID | This site provides blockchain explorers for several crypto-currencies. |
CoinTracker | Platform that connects your crypto wallets |
Coinwink | Receive alerts for significant cryptocurrency price changes. |
Flowscan | Blockchain explorer and analytics for various cryptocurrencies. |
Bitcoin Explorer | Explore Bitcoin's blockchain, tracking all transactions in its public ledger. |
Ethereum Block Explorer | Etherscan is a comprehensive block explorer and analytics platform for Ethereum. |
Blockchain Explorer | A platform offering various services, starting with Bitcoin blockchain exploration. |
Blockcypher | A blockchain explorer that provides additional information not found elsewhere. |
Bitcoin Forums Search Engine | Custom Google search engine focused on Bitcoin forums and discussions. |
Addresschecker.eu | Tool for verifying and checking the validity of cryptocurrency addresses. |
Cryptocurrency Alerting | Real-time customizable price alerts for cryptocurrencies, stocks, and coins. |
↑ 22. Delete Your Trace
Tool | Description |
---|---|
Redact | Delete all you comments, likes... of your social acounts. |
DeleteMe | Delete your information on all your accounts. |
incogni | Delete your information of databrokers. |
JustDeleteMe | Delete your accounts. |
↑ 23. Playbooks
Tool | Description |
---|---|
IRP-AccountCompromised | A guide for handling compromised accounts. |
IRP-Critical | Playbook for critical incidents requiring immediate attention. |
IRP-DataLoss | Steps for addressing data loss incidents. |
IRP-Malware | Playbook for responding to malware infections. |
IRP-Phishing | A guide for investigating phishing attacks. |
IRP-Ransom | Playbook for handling ransomware incidents. |
Hive-Templates | Templates for incident tracking in Hive. |
↑ 24. Malware Analysis
Tool | Description |
---|---|
Yabin | Creates Yara signatures from malware to identify similar samples. |
Any Run | Interactive malware sandbox for real-time analysis and threat intelligence. |
Bluepot | Bluetooth honeypot for monitoring and capturing malicious activity. |
Elastic Security YARA Rules | Signature-based YARA rules for detecting threats across multiple platforms. |
YARA-Signator | Automatically generates YARA rules for malware repositories. |
CAPE | Malware sandbox for executing malicious files in an isolated environment. |
MalShare | Platform for uploading, searching, and downloading malware samples. |
The DFIR Report | In-depth threat intelligence reports and services. |
Mobile Audit | SAST and malware analysis tool for Android APKs. |
Mastiff | Static analysis framework for extracting key characteristics from files. |
Malheur | Tool for automatic analysis of malware behavior using machine learning. |
PyaraScanner | Multithreaded YARA scanner for incident response or malware zoos. |
Static File Analyzer (SFA) | A deep analysis tool for malicious files using ClamAV and YARA rules. |
Yara Decompressor | Tool to decompress malware samples for running YARA rules. |
Shotgunyara | Generates YARA rules for various string and encoded malware variations. |
VxSig | Automatically generates AV byte signatures for similar binaries. |
Hybrid-Analysis | Provides in-depth static and dynamic analysis of files. |
Findom-XSS | A simple DOM-based XSS vulnerability scanner. |
Dalfox | Powerful open-source XSS scanner for automation. |
PyLibEmu | Python wrapper for Libemu for shellcode analysis. |
Yara Station | Management portal for LoKi scanner with a centralized database. |
NodeYara | Yara module for Node.js for scanning with Yara rules. |
Malware Traffic Analysis | Analyzes malicious network traffic to detect malware activity. |
Yara-Rust | Yara bindings for Rust supporting various features like rule compilation. |
Yara Rule Generator | A tool for creating YARA rules quickly to isolate malware families. |
StringSifter | A machine learning tool for ranking strings for malware analysis. |
Inlyse | AI-based IT security platform for identifying and stopping advanced malware. |
yarGen | Generates YARA rules by extracting strings from malware files. |
Cuckoo Sandbox | Automated malware analysis and detection in an isolated environment. |
Vaya-Ciego-Nen | Tool to detect and exploit Blind XSS vulnerabilities. |
BruteXSS | Finds Cross-Site Scripting (XSS) vulnerabilities in web applications. |
Findsploit | Instantly find exploits from local and online databases. |
xssor2 | Tool for testing and exploiting XSS vulnerabilities. |
CFR | Java decompiler supporting features up to Java 14. |
ReFlutter | Framework for reverse engineering Flutter apps. |
Dwarf Debugger | A debugger for reverse engineers and security analysts. |
Triton | Dynamic binary analysis library with emulation capabilities. |
Klara | Distributed Python system to help hunt for new malware using Yara rules. |
Android Malware Sandbox | Sandbox for analyzing Android malware. |
Fabric Platform | Automates cybersecurity reporting with open-source tools and templates. |
Wiz | Cloud-native security platform for detecting and preventing security threats. |
XSSCon | A simple XSS scanner for detecting vulnerabilities. |
GitHunter | Searches Git repositories for sensitive data. |
jwt-key-id-injector | Python script to test for JWT vulnerabilities. |
qsfuzz | Fuzzes query strings to identify security vulnerabilities. |
Weaponised-XSS-payloads | A collection of XSS payloads for exploiting web vulnerabilities. |
XSSor | A tool for exploiting and testing XSS vulnerabilities in web apps. |
KLara | Distributed Yara rule tool for malware research. |
ReClass | A reverse engineering tool for Windows executable analysis. |
Malwover | Malware detection and prevention for advanced cyber threats. |
Odin | Malware analysis platform with advanced threat detection. |
Distribute | Malware analysis tool that helps distribute files for analysis. |
YaraStation | Management portal for Yara rule-based malware scanning. |
CAPE | Malware sandbox designed for executing and analyzing malicious files. |
↑ 25. SIEM
Tool | Description |
---|---|
LogRhythm Axon | A cloud-native SIEM platform with security analytics and simplified incident response. |
syslog-ng | A log management solution that optimizes SIEM performance and meets compliance requirements. |
Graylog | Advanced log management and SIEM for enhancing security and compliance across industries. |
Matano Open Source Security Data Lake | Open-source security data lake for AWS with real-time log normalization and detection capabilities. |
LogESP | A minimalistic SIEM system focused on security analysis. |
LogSlash | Log volume reduction tool that maintains analytical capability. |
LastActivityView | Collects and displays user activity and system events on a Windows system. |
WELA | Windows Event Log Analyzer with a logon timeline generator for fast forensics. |
Python-evtx | A pure Python parser for Windows Event Log files with access to headers and event entries. |
GrokEVT | Tool for reading Windows event log files and converting them into a human-readable format. |
OpenSOC | A centralized tool for security monitoring and analysis integrating open-source big data tools. |
Apache Metron | A centralized platform for security monitoring, using big data technologies. |
Panther Detections | A collection of SIEM detections for Panther with detailed setup instructions. |
Alterix | Converts Sigma and Yara rules to CRYPTTECH's SIEM query language. |
Elastic SIEM | SIEM solution within the Elastic Stack, providing powerful data indexing and analysis. |
Sumo Logic | A cloud-native SIEM tool offering analytics, monitoring, and real-time data processing. |
QRadar | IBM's SIEM solution providing real-time threat detection and incident response. |
Splunk | Industry-leading platform for log management and SIEM analytics, used for security intelligence. |
Sleuth | SIEM tool that provides scalable and flexible event log monitoring for security teams. |
SolarWinds | A suite of monitoring and security tools with SIEM capabilities to detect and manage threats. |
EventLog Analyzer | Log management software with real-time event log collection and SIEM analysis. |
LogPoint | A SIEM solution focused on real-time security intelligence and compliance reporting. |
InsightIDR | Rapid threat detection and SIEM tool by Rapid7, known for its user behavior analytics. |
OSSEC | Open-source HIDS and SIEM that provides intrusion detection and monitoring. |
McAfee Enterprise Security Manager | A scalable SIEM solution designed for enterprise-level security operations. |
XpoLog | A platform designed to help manage log data with machine learning insights. |
Falcon SIEM | CrowdStrike’s cloud-native SIEM offering integrated threat detection, investigation, and response. |
Logz.io | SIEM platform built on open-source technologies, using machine learning for threat detection. |
ThreatConnect | A threat intelligence platform integrated with SIEM tools for enhanced security operations. |
Secureworks | Managed detection and response platform with integrated SIEM capabilities. |
Arcsight | Advanced SIEM solution for large enterprises, offering real-time event correlation and analysis. |
Palo Alto Networks Cortex XSOAR | Security automation and orchestration platform with SIEM integrations. |
Vormetric Data Security | SIEM integration for data security, providing centralized log management and threat detection. |
ThreatHunter | Security threat hunting tool with real-time log analysis and monitoring. |
Corelight | Network monitoring tool providing security intelligence for SIEM platforms. |
Exabeam | Advanced SIEM platform using behavioral analytics for rapid threat detection. |
Verint | A comprehensive security intelligence and SIEM platform for real-time analysis and monitoring. |
Tenable | Vulnerability management platform with SIEM integration for comprehensive threat detection. |
DataDome | SIEM tool designed to detect and prevent bot attacks in real-time. |
Edgewise | Security posture management tool for monitoring and preventing attacks across various endpoints. |
Tanium | SIEM and endpoint security platform that simplifies real-time detection and management. |
Splunk UBA | User behavior analytics solution integrated with Splunk SIEM for detecting insider threats. |
Logz.io | A comprehensive open-source log management platform with machine learning-based threat detection. |
Sumo Logic Cloud SIEM | Real-time log management and SIEM solution for large-scale cloud infrastructures. |
Yara | A tool for creating and using custom rules to detect malware and integrate with SIEM systems. |
AWS CloudTrail | AWS-specific service for monitoring and storing logs, integrated into cloud SIEM systems. |
Siemless | A simple, lightweight open-source SIEM tool for event log aggregation. |
LogDNA | Real-time cloud log management tool that integrates with SIEM for threat detection. |
Kaspersky Security | A cybersecurity platform that integrates with SIEM solutions for centralized threat management. |
↑ 26. Password Managers
Resource | Price | Description |
---|---|---|
Keepass | Free | Available on windows, linux, mac, IOS and Android. |
↑ 27. VPNs
Resource | Price | Description |
---|---|---|
Mullvad VPN | 5€/month | A privacy-focused VPN service that offers anonymous internet browsing with no personal information required for registration. |
Proton VPN | Free & Paid (Subscription) | A secure VPN service that prioritizes privacy, offering both free and premium plans with strong encryption and no-logs policy. |
IVPN | Paid (Subscription) | A privacy-focused VPN service offering strong encryption, a strict no-logs policy, and advanced features like multi-hop VPN for enhanced security. |
↑ 📖 Learning
↑ 🗂 Resources
Resource | Description |
---|---|
Wiki - AddieLamarr | Wikipedia form AddieLamarr of his 14 years cyber carrer. |
PowerShell - Notes | A readme.md about PowerShell Commands and learning. |
PowerShell Guide | We will unravel the secrets of PowerShell for Quick Guide Hackers and strengthen your skills in the world of hacking! |
DuckyScript™ Quick Reference | DuckyScript™ is the programming language of the USB Rubber Ducky™, Hak5® hotplug attack gear and officially licensed devices. The quick reference to start programming with ducky. |
BadUSB File Format | Document that explains how badusb works on Flipper Zero |
Osint-Dojo | Project that aims to guide those new to Open Source Intelligence (OSINT) |
OSTIN Attack Surface Diagrams | Diagram of diferent types of attacks on OSINT. |
AN1305 MIFARE Classic as NFC Type MIFARE Classic Tag | NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type MIFARE Tag |
Security related Operating Systems @ Rawsec | Complete list of security related operating systems |
Best Linux Penetration Testing Distributions @ CyberPunk | Description of main penetration testing distributions |
Security @ Distrowatch | Website dedicated to talking about, reviewing and keeping up to date with open source operating systems |
Pentest Cheat Sheets | Collection of cheat sheets useful for pentesting |
Anna's Achive | The world’s largest open-source open-data library. Mirrors Sci-Hub, Library Genesis, Z-Library, and more. |
PDFdrive | PDF Drive is your search engine for PDF files. |
↑ 📚 Courses
Courses | Description |
---|---|
cs50 - Harvard | CS50’s Introduction to Computer Science. Even if you are not a student at Harvard, you are welcome to “take” this course for free via this OpenCourseWare by working your way through the course’s eleven weeks of material. |
overthewire.org | The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. |
HTB-Academy | HTB Academy is cybersecurity learning the HTB way. |
HackTheBox | Hack The Box is a training platform where you can find matchines and CTFs to practice. |
Coursera | Plataform where there are open online courses. |
TryHackMe | TryHackMe goes way beyond textbooks and focuses on fun interactive lessons that make you put theory into practice. |
EC-Council - Learning | Get started with a free account and gain immediate access to 20+ complete cybersecurity courses from the creators of the Certified Ethical Hacker (CEH) program. |
Security Blue Team | Plataform to learn with courses orientated to the blue team. |
Cybrary | Offers free and paid courses with hands-on labs for certificatitions like Security+, CISSP and CEH. |
Udemy | Affordable courses with video lectures, quizzes, and practice exams for various certifications. |
Professor Messer | Free video lessons and practice exams for CompTIA certifications. |
Roppers Practical Networking | Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world. |
VirusTotal | Malware analysis. |
Root the Box | A CTF (Capture The Flag) platform for practicing hacking and learning real-world cybersecurity skills. |
edX | Online security courses. |
Hybrid Analysis | Advanced malware sandboxing. |
AbuseIPDB | IP address threat intelligence. |
HackerOne | Bug bounty platform. |
Bugcrowd | Crowdsourced cybersecurity. |
Open Bug Bounty | Open-source bug bounty program. |
RangeForce | Hands-on blue team exercises. |
Free Education Web | We are Sharing the Knowledge for Free of Charge and Help Students and Learners all Over the World. |
elHacker | All hacking courses for free. |
↑ 📝 Certifications
Certifications | Description |
---|---|
Cisco CCNA | Validate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more. |
CompTIA Security+ | CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. |
↑ 🎥 Tutorials
↑ 🚩 CTFs - Training
CTFs | Category | Description |
---|---|---|
Kase Scenarios | OSINT | Imagine diving headfirst into captivating OSINT scenarios that mirror real-world investigations. You must apply OSINT techniques to solve intricate cases and mysteries. |
TraceLabs | OSINT | The Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons |
Geolocating Images (THM) | OSINT | A room to understand how to geolocate images |
Google Dorking (THM) | OSINT | Explaining how Search Engines work and leveraging them into finding hidden content. |
OhSINT | OSINT | What information can you possible get with just one image file? |
Sakura Room | OSINT | Use a variety of OSINT techniques to solve this room created by the OSINT Dojo. |
Searchlight-IMINT | OSINT | OSINT challenges in the imagery intelligence category. |
KafeeSec-SoMeMINT | OSINT | An intro to SOCMINT (Social Media Intelligence/Investigation) techniques and tooling. Use your awesome OSINT skills to perform an online investigation of a mysterious husband! |
Stego-toolkit | Steganography | |
Top CTF challenges | Steganography | |
awesome-ctf | Steganography | |
Flipper Zero BadUSB Mastery | BadUSB | Learn how to craft and deploy BadUSB payloads for the Flipper Zero using DuckyScript. This room focuses on automating keystroke attacks for ethical hacking and testing purposes. |
↑ 🕸️ Practice Webs
Web Practice | Category | Description |
---|---|---|
Codeforces | Problems Solving | Codeforces is a project joining people interested in and taking part in programming contests. |
DevChallenges | Challenges | Platform to improve your coding skills through practical projects and build an outstanding portfolio. |
↑ 🎤 Events
Event | Description |
---|---|
BSides Calendar | The calendar of BSides events arround the world. |
↑ 🎙️ Podcasts
Podcasts | Language | Description |
---|---|---|
Tierra de Hackers | Spanish | Podcast recorded by Martin Vigo and Alexis Porros, they inform about all the news on the cybersecurity world. |
ISC | English | The ISC StormCast is a daily short-form podcast that provides a summary of current network security-related events. |
Cyberwire Daily | English | Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. |
↑ 👤 Community
Community | Description |
---|---|
RedProtect | Our community was born out of the shared passion of three students: bst04, Gabriel Grigor, and Luu. United by our interest in the fascinating world of cybersecurity, we decided to create a space where we can learn, share knowledge, and grow together in this dynamic and crucial field. |
cybersources | The community about this repository. |
Harden the World | A community-driven project focused on developing security best practices and guidelines for configuring systems securely. |
↑ 📺 Documentaries
Documentaries | Genere | Year | Rating |
---|---|---|---|
BBS: The Documentary | Documentary | 2005 | 8.7/10 |
Citizenfour | Documentary - Biography | 2014 | 8.1/10 |
Code 2600 | Documentary | 2012 | 7.4/10 |
Deep Web | Documentary | 2015 | 7.1/10 |
DEFCON: The Documentary | Documentary | 2013 | 5.7/10 |
DSKNECTD | Documentary | 2013 | 7.4/10 |
Downloaded | Documentary | 2013 | 6.8/10 |
Freedom Downtime | Documentary | 2001 | 7.6/10 |
Good Copy Bad Copy | Documentary | 2007 | 7.2/10 |
Hackers: Wizards of the Electronic Age | Documentary | 1984 | 7.7/10 |
Hackers Are People Too | Documentary - Short Film | 2008 | 6.1/10 |
Hacking Democracy | Documentary | 2006 | 7.9/10 |
Hackers Wanted | Documentary/Indie Film | 2009 | 6.5/10 |
In the Realm of the Hackers | Documentary | 2003 | 7.4/10 |
Indie Game: The Movie | Documentary | 2012 | 7.7/10 |
Kim Dotcom: Caught in the Web | Documentary | 2017 | 7.0/10 |
Pirates of Silicon Valley | Documentary - Drama - TV Film | 1999 | 7.3/10 |
Plug and Pray | Documentary | 2010 | 7.2/10 |
Revolution OS | Documentary - Indie Film | 2001 | 7.3/10 |
Silk Road: Drugs, Death and the Dark Web | Documentary | 2017 | 7.4/10 |
Softwaring Hard | Documentary | 2014 | 8.2/10 |
Steal This Film | Documentary - Short Film | 2006 | 7.1/10 |
TPB AFK: The Pirate Bay Away from Keyboard | Documentary | 2013 | 7.6/10 |
Terms and Conditions May Apply | Documentary | 2013 | 7.4/10 |
The Code | Documentary | 2001 | 7.5/10 |
The Great Hack | Documentary | 2019 | 7.0/10 |
The Hacker Wars | Documentary | 2014 | 6.6/10 |
The Internet's Own Boy: The Story of Aaron Swartz | Documentary | 2014 | 8.1/10 |
The KGB, the Computer and Me | Documentary | 1990 | 8.3/10 |
The Secret History Of Hacking | Documentary | 2001 | 7.6/10 |
The Singularity | Drama - Science Fiction | 2012 | 7.3/10 |
War for the Web | Documentary | 2015 | 7.4/10 |
We Are Legion: The Story of the Hacktivists | Documentary | 2012 | 7.3/10 |
↑ 📖 Books & Papers/Articles
Title | Category | Description |
---|---|---|
non | non | non |
↑ 🖥️ TV Shows
Title | Genere | Year | Rating |
---|---|---|---|
Black Mirror | Drama - Science Fiction | 2011 | 8.9/10 |
CSI: Cyber | Drama - Crime - Mystery | 2015 | 5.4/10 |
Dark Net | Documentary - Series | 2016 | 7.3/10 |
Devs | Drama - Mystery - Sci-Fi | 2020 | 7.9/10 |
Halt and Catch Fire | Drama | 2014 | 8.3/10 |
Mr. Robot | Thriller - Drama | 2015 | 8.7/10 |
Person of Interest | Action - Crime - Drama | 2011 | 8.5/10 |
Scorpion | Action - Drama | 2014 | 7.2/10 |
Serial Experiments Lain | Cyberpunk - Animation | 1998 | 8.2/10 |
Silicon Valley | Comedy | 2014 | 8.5/10 |
StartUp | Thriller - Crime | 2016 | 8.1/10 |
The Code | Drama | 2014 | 7.6/10 |
The IT Crowd | Comedy | 2006 | 8.6/10 |
Travelers | Science Fiction | 2016 | 8.0/10 |
Valley of the Boom | Documentary - Drama | 2019 | 6.5/10 |
Westworld | Drama - Mystery | 2016 | 9.0/10 |
You Are Wanted | Thriller - Drama | 2017 | 6.1/10 |
↑ 📙 Open-Source Repositories
Title | Description |
---|---|
OWASP | Tools and resources for web application security. |
Mitre ATT&CK | Adversarial tactics and techniques. |
TheHive Project | Incident response tools. |
Awesome OSINT | Awesome list of tools OSINT. |
awesome-osint-for-everything | Awesome for some tools OSINT |
Playbooks | Repository of playbooks. |
CyberSecTools | The Largest Hub of Cybersecurity Tools |
awesome-hacking | Awesome list of hacking. |
awesome-osint | A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources. |
awsome-CVE PoCs | A curated list of CVE PoCs. |
↑ 🛣️ Learning Path
Roadmap | Description |
---|---|
Cybersecurity | Learn to become a Cyber Security Expert. |
Linux | Step by step guide to learn Linux in 2024. |
Ethical Hacking | Community driven roadmaps, articles and guides for developers to grow in their career. |
↑ 🖌️ Projects Based
Projects | Description |
---|---|
Fynd Academy | 30 Cyber Projects on 2025 (With Source Code. |
CyberAcademy - Project Ideas | List of ideas for your cyber projects. |
↑ 💬 Colaborate
- If you have some tool, resource or course that you want to share, contact me or create an pull request.