Welcome!
Socials
YouTube
GitHub
Thingiverse
Mastodon
LinkedIn
Google Developer
OER Commons Profile
Classes
Introduction to Linux
Introduction to Data
Introduction to Security
Advanced Security
Advanced Database Management
Linux Administration
Tech Jobs
How to Get a job
Smart Home Project
(current)
About Me
(current)
Search
Overview
Ethics
Intro to Pen Testing
Reconnaissance
Enumeration
The Other Side
Exploitation
Web Exploitation
Firewalls
CSIRT/CERT
Disaster Recovery
Security Audits
Links to other Resources
Links to Resources
Search Engines Beyond Google
Shodan Search Engine for the Internet of Everything
How to Use Shodan
Cyber Defense Search Engine
Find email addresses and employee lists
Find open and unsecured Devices with this Chinese search engine
Find information on wireless networks
Magazines, reporters and experts in the field
SC Media
Infosecurity Group Magazines
Dark Reading
Information Security Magazine
Schneier on Security
CyberSecurity and Infrastructure Security Agency(USA Government)
Krebs on Security
Nicole Perlroth
Hacking Tools Cheat Sheet
Schneier on Security
Help using some common tools
How to use Magic Tree from creators(Reporting Software)
Dradis Support Documents from creators(Reporting Software)
How to use Magic Tree, Dradis and Metagoofil by Infosec Institute which is part of Cengage Group
Curating list of common fuzzing tools
Nmap documentation from the creators
Video:NMap 101: Fun With Firewalls! HakTip 102
Understanding NMap Part 1
Understanding NMap Part 2
Netcat:The swiss army knife
Netcat with examples!
Video:How a SQL Injection attack works
Capture the Flag (CTF)
Wargame site pwnable.kr (Start with Toddler's Bottle)
Hack This Site
CTFTime lists CTFs happening around the world
PicoCTF out of Carnegie Mellon University
Miscellaneous Resources
Deutsche Telekom showing live data on attacks
What every browser knows about you
SQL Injection Attack Infographics
Cheat sheets from OWASP