This cheat sheet outlines tips and tools for analyzing malicious documents, such as Microsoft Office, RTF, and PDF files.
A curated list of awesome malware analysis tools and resources.
Binary Edge scans the entire public internet, create real-time threat intelligence streams, and reports that show the exposure of what is connected to the Internet.
This course provides comprehensive insights into cloud-based attack surfaces, a step-by-step methodology for compromising cloud environments, and practical guidance on leveraging open-source tools for effective cloud assessments.
CloudSec Tidbits is a blogpost series showcasing interesting bugs found by Doyensec during cloud security testing activities.
An open project to list all known cloud vulnerabilities and CSP security issues
Leaked Credentials
DNS recon & research, find & lookup DNS records
Google dorks are special search terms that are used to access specific sets of information that are not available with normal queries.
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
displays thousands of publicly accessible S3 buckets
Search across a half million git repos
LeakIX is a red-team search engine indexing mis-configurations and vulnerabilities online.
A security bookmarks collection. All that things needed to pass OSCP, maybe
Packet Storm provides around-the-clock information and tools in order to help mitigate both personal data and fiscal loss on a global scale.
Taking the monkey work out of pentesting
An educational pivoting handbook for cyber threat intelligence analysts developed by Amitai Cohen.
Search any domain, IP, or URL and enrich on-demand with passive and active scans to inform your investigation.
DNS data lookup
Shodan is the world's first search engine for Internet-connected devices.
T-Pot is the all in one, optionally distributed, multiarch (amd64, arm64) honeypot plattform, supporting 20+ honeypots and countless visualization options using the Elastic Stack, animated live attack maps and lots of security tools to further improve the deception experience.
A sandbox for the web
Vulhub is an open-source collection of pre-built vulnerable docker environments.
This cheatsheet is aimed at CTF players and beginners to help them understand the fundamentals of privilege escalation with examples.
Explore more than 916 billion web pages saved over time
Wireless Networks Database
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques.
Target search engine