Links
- https://github.com/Hack-with-Github/Awesome-Hacking
- https://github.com/notthehiddenwiki/NTHW
- https://github.com/Berkanktk/CyberSecurity/
- https://github.com/vitalysim/Awesome-Hacking-Resources
- arXiv
- https://insinuator.net/
- https://github.com/Velocidex/WinPmem?tab=readme-ov-file
- https://kb.cert.org/vuls/bypublished/desc/
- https://list.latio.tech/
- https://github.com/jj-vcs/jj
- https://judojj.com/
- https://sec-consult.com/blog/
- https://www.freedesktop.org/wiki/
- https://www.aukfood.fr/
- https://ipwithease.com/tmos-components-of-big-ip/
- https://www.whois.com/
- https://tetragon.io/
- https://www.collaboraonline.com/
- https://workbench.cisecurity.org/
- https://blog.badsectorlabs.com/
- https://grell.dev
- https://pagedout.institue
- https://linuxsecurity.expert
- https://security-soup.net/
- https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide
- https://auditboard.com/blog/generally-accepted-auditing-standards
- OWASP SAMM
- https://reversebrain.github.io/
- https://cs155.stanford.edu/syllabus.html
- https://cs155.stanford.edu/papers/ossecurity.pdf
- https://github.com/owasp-modsecurity/ModSecurity
- Open CRE
- CyBOK – The Cyber Security Body of Knowledge v1.1
- Cybersecurity Toolkits | NCA
- CybersecTools | Find Cybersecurity Tools and Resources
- https://www.secjuice.com/
- https://adamr88.github.io/hacking/
- https://developers.cloudflare.com/
- https://github.com/tidalcyber/cyber-threat-profiling
- https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/detecting-and-remediating-impossible-travel/3366017
- https://vakrangee.in/pdf/Policies-PDF/Information%20Security%20&%20Management%20Policy%20v3.pdf
- https://azteq.com/wp-content/uploads/2021/09/ISO-27001-ISMS-Information-Security-Policy.pdf
- https://alkath.group/wp-content/uploads/2024/08/P-039-Information-Security-Policy-Website-Version.pdf
- https://static.cepi.net/downloads/2024-06/CEPI%20-%20Information%20Security%20Policy%20v2.0%20FINAL.pdf
- https://www.ruskwig.com/docs/iso-27001/Information%20Security%20Policy.pdf
- https://info.lse.ac.uk/staff/services/Policies-and-procedures/Assets/Documents/infSecPol.pdf
- https://wentwest.com.au/wp-content/uploads/2024/05/Information-Security-Policy_1.pdf
- https://info.lse.ac.uk/staff/Services/Policies-and-procedures
- https://info.lse.ac.uk/staff/services/Policies-and-procedures/Assets/Documents/emaEtiGui.pdf
- https://info.lse.ac.uk/staff/services/Policies-and-procedures/Assets/Documents/infSecPol.pdf
- https://info.lse.ac.uk/staff/services/Policies-and-procedures/Assets/Documents/aiLegRegGui.pdf
- https://secureframe.com/blog/iso-27001-information-security-policy
- https://en.wikipedia.org/wiki/BadBIOS
- https://www.sans.org/white-papers
- https://cloudsecurityalliance.org/research/topics
- https://is.docs.wso2.com/en/5.9.0/
- https://wso2.com/identity-server
- https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/
- https://www.dan.me.uk/tornodes
- https://www.sciencedirect.com/topics/computer-science/vulnerability-window
- https://www.winsyslog.com/
- https://blog.trailofbits.com/
- https://jerrygamblin.com/