My LinkedIn: https://www.linkedin.com/in/joas-antonio-dos-santos/ >> Contains more than 170 articles by Red and Blue Team
nmap -sV -Pn --top-ports 1000 --min-rate 200 --max-rate 400 -T5 192.168.0.1/24 = High Fast Nmap Scan
nmap -v -sV -T5 --top-ports 1000 --min-rate 200 --max-rate 400 --scan-delay 2 --max-scan-delay 4 --min-rtt-timeout 2 --max-rtt-timeout 3 initial-rtt-timeout 1 192.168.0.1/24 = Ultra High Fast Nmap Scan
nmap --top-ports 1000 -sV -v --ttl 10 --badsum TCP -f --mtu 16 192.168.0.1/24 = Evasion Firewall
nmap --top-ports 1000 -sV -v --ttl 10 -f --mtu 16 192.168.0.1/24 = Evasion Firewall 2
https://www.liquidweb.com/kb/using-nmap-pro-tips-and-tricks/
https://blog.urfix.com/10-cool-nmap-tricks-techniques/
https://medium.com/@iphelix/nmap-scanning-tips-and-tricks-5b4a3d2151b3
http://www.dimz-it.com/berkas/Nmap_Firewall_Evasion_Techniques.pdf
https://nmap.org/book/firewall-subversion.html
https://dzone.com/articles/firewall-bypassing-techniques-with-nmap-and-hping3
https://www.youtube.com/watch?v=d5-wBkMRPQU (Hak5 Evade Firewall)
https://www.youtube.com/watch?v=4t4kBkMsDbQ&ab_channel=NetworkChuck (Network Chuck Nmap)
https://github.com/jasonniebauer/Nmap-Cheatsheet
https://github.com/KingOfBugbounty/KingOfBugBountyTips
https://github.com/djadmin/awesome-bug-bounty
https://github.com/Muhammd/awesome-bug-bounty
https://github.com/ngalongc/bug-bounty-reference
https://github.com/djadmin/awesome-bug-bounty
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
https://github.com/EdOverflow/bugbounty-cheatsheet
https://github.com/EdOverflow/bugbountyguide
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
https://github.com/1hack0/Facebook-Bug-Bounty-Write-ups
https://pentester.land/list-of-bug-bounty-writeups.html
https://medium.com/bugbountywriteup
CSRF Poc Generator (https://github.com/merttasci/csrf-poc-generator)
SubOver (https://github.com/Ice3man543/SubOver)
Knock SubDomain (https://github.com/guelfoweb/knock)
XSS Payloads (https://gist.github.com/rvrsh3ll/09a8b933291f9f98e8ec)
SQL Injection Payloads (https://github.com/payloadbox/sql-injection-payload-list)
Trick Recon (https://www.linkedin.com/pulse/tricks-de-recon-ataide-junior/?trackingId=lo%2FwG4h%2FSemwGplcWrHIhA%3D%3D)
https://github.com/infosecn1nja/Red-Teaming-Toolkit
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
https://github.com/m0nad/awesome-privilege-escalation
https://github.com/D35m0nd142/LFISuite
https://github.com/P0cL4bs/kadimus.git
https://github.com/MrPineMan/Awesome-Reverse-Shell
https://github.com/xl7dev/WebShell
https://portswigger.net/web-security
https://github.com/alphaSeclab/awesome-burp-suite
https://github.com/snoopysecurity/awesome-burp-extensions
https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html
https://sushant747.gitbooks.io/total-oscp-guide/list_of_common_ports.html
https://github.com/jakejarvis/awesome-shodan-queries
https://github.com/danielmiessler/SecLists
https://github.com/0x4D31/awesome-oscp
https://github.com/Aadi-0110/awesome-oscp
https://github.com/coolx28/Awesome-Oscp
https://github.com/JoaoPauloF/OSCP/blob/master/OSCPnotes.md
https://github.com/husnainfareed/Awesome-Ethical-Hacking-Resources
https://github.com/codeinthedark/awesome-power-mode/commits?author=ceh
https://github.com/Optixal/CEHv10-Notes
https://github.com/g0rbe/CEH
https://github.com/CyberSecurityUP/Guide-CEH-Practical-Master
https://drive.google.com/drive/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU (e-books Joas)
https://www.exploit-db.com/google-hacking-database
https://www.youtube.com/watch?v=LgBcFpusC7A
https://www.blackhat.com/presentations/bh-europe-05/BH_EU_05-Long.pdf
https://www.oakton.edu/user/2/rjtaylor/cis101/Google%20Hacking%20101.pdf
https://ipok.com.br/blog/usando-dig-para-pesquisas-de-dns-parte-1/
https://www.cloudns.net/blog/10-most-used-nslookup-commands/
https://www.somosagility.com.br/como-solucionar-problemas-de-dns-com-dig-e-nslookup-2/
https://www.youtube.com/watch?v=2KzpGjn7M9s
https://github.com/rebootuser/LinEnum
https://github.com/Arr0way/linux-local-enumeration-
https://highon.coffee/blog/linux-local-enumeration-/
https://github.com/Z3R0th-13/Enum
https://github.com/411Hall/JAWS
https://411hall.github.io/JAWS-Enumeration/
https://hakin9.org/privesccheck-privilege-escalation-enumeration--for-windows/
https://www.youtube.com/watch?v=WW6myutKBYk
https://www.youtube.com/watch?v=zemNLx0-LRw
https://www.youtube.com/watch?v=xlxpfvlUZLA
https://www.youtube.com/watch?v=Q8hAjEaAgE8
https://www.youtube.com/watch?v=z2EUhV11QB4
https://www.youtube.com/watch?v=Hk-21p2m8YY
https://www.youtube.com/watch?v=GlVb44dD-dA
https://www.youtube.com/watch?v=7XMIFTRiAGA
https://null-byte.wonderhowto.com/how-to/hack-like-pro-advanced-nmap-for-reconnaissance-0151619/
https://www.youtube.com/watch?v=krnpQWDkf_c
https://hackertarget.com/nmap-tutorial/
https://www.youtube.com/watch?v=VFJLMOk6daQ
https://awesomeopensource.com/projects/information-gathering
https://github.com/topics/information-gathering
https://www.hindawi.com/journals/scn/2019/2627608/
https://blog.rapid7.com/2016/12/06/introduction-to-honeypots/
https://ccdcoe.org/uploads/2018/10/d3r2s4_haltas.pdf
https://www.incibe-cert.es/en/blog/honeystation-en
https://www.youtube.com/watch?v=fQqWe8br2Gw
https://securityonline.info/adrecon-active-directory-gathering-information-tool/
https://www.youtube.com/watch?v=ze1UcSLOypwMitre Attack Discoverys
https://attack.mitre.org/techniques/T1010/
https://attack.mitre.org/techniques/T1046/
https://attack.mitre.org/techniques/T1007/
https://attack.mitre.org/techniques/T1033/
https://attack.mitre.org/techniques/T1049/
https://attack.mitre.org/techniques/T1063/
https://attack.mitre.org/techniques/T1018/
https://attack.mitre.org/techniques/T1069/
https://attack.mitre.org/techniques/T1201/
https://attack.mitre.org/matrices/enterprise/linux/
Wsus Exploit: Realizar movimento lateral e manipular componentes do WSUS
https://pentestit.com/wsuxploit-weaponized-wsus-exploit-/
https://github.com/AlsidOfficial/WSUSpendu
https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md
Linux Exploitation: Exploração avançadas, métodos de enumeração avançada, escalação de privilégio, pivoting e até exploração de serviços.
https://attack.mitre.org/techniques/T1184/
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://www.youtube.com/watch?v=dk2wsyFiosg
https://tools.kali.org/tools-listing
https://www.youtube.com/watch?v=SyE4y6qZPjM
https://www.youtube.com/watch?v=B2xu0QXXx54
https://www.youtube.com/watch?v=SjwjxQndOs8
https://www.youtube.com/watch?v=_wdESwXdMYg
https://www.youtube.com/watch?v=sZ_-KD5Dksw
https://www.youtube.com/watch?v=gsEvrdcn-DI
https://kalilinuxtutorials.com/infog-information-gathering-tool/
https://www.hackingloops.com/information-gathering-using-kali-linux-for-penetration-testing/
https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md
https://medium.com/@aptbughunter/my-oscp-experience-0xapt-4fff90a8d408
https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md
https://github.com/xairy/linux-kernel-exploitation
https://www.youtube.com/watch?v=Hrlc3GZQ4bA
https://artkond.com/2017/03/23/pivoting-guide/
https://resources.infosecinstitute.com/pivoting-exploit-system-another-network/#gref
https://payatu.com/guide-linux-privilege-escalation
https://medium.com/@falconspy/oscp-approved-tools-b2b4e889e707
https://www.cybrary.it/blog/0p3n/pivot-network-port-forwardingredirection-hands-look/
https://0xdf.gitlab.io/2019/01/28/pwk-notes-tunneling-update1.html
https://www.youtube.com/watch?v=mQ1hRS8scWM
Windows Exploitation:Vulnerability scanning, pivoting and sideways movement, password cracking and privilege escalation
https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
https://hackersguru.in/windows-exploitation-and-hacking/
https://pt.slideshare.net/utdcsg/advanced-windows-exploitation
https://www.offensive-security.com/offsec/microsoft-dll-hijacking-exploit-in-action/
https://www.youtube.com/watch?v=Pt9a6EQFs9s
https://www.youtube.com/watch?v=XR1F467LTrs
https://www.youtube.com/watch?v=2-kJ7Kh_5C4
https://www.youtube.com/watch?v=FJhVoXwoX_w
https://www.youtube.com/watch?v=keFx6yYA_WY
Mitre Attack:
https://attack.mitre.org/matrices/enterprise/windows/
https://attack.mitre.org/techniques/T1077/
https://attack.mitre.org/techniques/T1111/
https://attack.mitre.org/techniques/T1174/
https://attack.mitre.org/techniques/T1534/
https://attack.mitre.org/techniques/T1175/
https://attack.mitre.org/techniques/T1075/
https://github.com/gentilkiwi/mimikatz
https://www.varonis.com/blog/what-is-mimikatz/
https://www.youtube.com/watch?v=bTYR_xYSDIk
https://www.youtube.com/watch?v=0TBCzaBklcE
https://www.youtube.com/watch?v=FfoQFKhWUr0
https://blogs.jpcert.or.jp/en/2016/01/windows-commands-abused-by-attackers.html
Desenvolvimento de exploits: Buffer Overflow, Bypass Software Protectors, Binary Exploitation, ROP, Shell codes, Fuzzing, Reverse Engineering, Egg Hunters, Debuggers and etc.
https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/mxamusic/awesome-exploit-development
https://www.youtube.com/watch?v=1S0aBV-Waeo&t=1s
https://www.youtube.com/watch?v=1TNecxUBD1w
https://www.youtube.com/watch?v=H2ZTTQX-ma4
https://www.youtube.com/watch?v=59_gjX2HxyA
https://www.youtube.com/watch?v=hrjdAv-aHCY
https://www.youtube.com/watch?v=VX27nq6EcjI&list=PLcKsaFvYl4l87C8_HhxkcFaoNhzC9bRw6
https://www.youtube.com/channel/UCXHBFtUcbhIssuuXXud2WcQ
https://www.youtube.com/watch?v=8Dcj19KGKWM
https://www.youtube.com/watch?v=wDosab_Y4Hs
https://www.youtube.com/watch?v=5FJxC59hMRY
https://www.youtube.com/watch?v=gIJOtP1AC3A&t=9s
https://www.youtube.com/watch?v=4_xSGvD0GNk
https://www.youtube.com/watch?v=6JBRXqT3USI
https://www.youtube.com/watch?v=YgezGxzwD8A
https://www.youtube.com/watch?v=7PMw9GIb8Zs&list=PLBf0hzazHTGPoP8BjixXswrM01ttNkfnp
https://github.com/secfigo/Awesome-Fuzzing
https://github.com/wtsxdev/fuzzing-resources
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/babys-first-nxplusaslr-bypass/
https://medium.com/@dontsmokejoints/bypass-nx-and-aslr-with-rop-38a0e46a62da
https://intx0x80.blogspot.com/2018/04/bypass-aslrnx-part-1.html
https://www.youtube.com/watch?v=mPbHroMVepM
https://www.youtube.com/watch?v=BI_fO4gMW4Q
https://awesomeopensource.com/projects/shellcode
https://0x00sec.org/t/linux-shellcoding-part-1-0/289
https://www.exploit-db.com/papers/18273
https://www.exploit-db.com/shellcodes
https://www.offensive-security.com/metasploit-unleashed/payloads/
https://www.offensive-security.com/metasploit-unleashed/payload-types/
https://www.youtube.com/watch?v=a2EkORFcSZo
https://www.youtube.com/watch?v=Ps3mZWQz01s&list=PLIfZMtpPYFP4MaQhy_iR8uM0mJEs7P7s3
https://www.youtube.com/watch?v=RF3-qDy-xMs&list=PLIfZMtpPYFP6_YOrfX79YX79I5V6mS0ci
https://www.fuzzysecurity.com/tutorials/expDev/4.html
https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/
https://www.securitysift.com/windows-exploit-development-part-5-locating-shellcode-egghunting/
https://www.shogunlab.com/blog/2017/09/02/zdzg-windows-exploit-3.html
https://securityimpact.net/2017/02/15/exploit-development-4-egg-hunting/
https://connormcgarr.github.io/Exception-Handlers-and-Egg-Hunters/
https://rastating.github.io/creating-a-custom-shellcode-encoder/
https://medium.com/syscall59/writing-a-custom-shellcode-encoder-31816e767611
https://medium.com/@habibiefaried/slae-0x4-combined-method-for-encoding-shellcode-x86-2f8637d87ed9
https://www.offensive-security.com/metasploit-unleashed/alphanumeric-shellcode/
https://www.youtube.com/watch?v=vpzpuzqhOCI
https://www.youtube.com/watch?v=IMnKb3BaUvM
http://www-inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf
https://www.youtube.com/watch?v=Y-4WHf0of6Y
Command and Control (C2): Command and control consists of techniques that opponents can use to communicate with systems under their control in a network of victims. Opponents usually try to mimic normal and expected traffic to avoid detection. There are many ways in which an adversary can establish command and control with varying levels of stealth, depending on the structure of the network and the victim's defenses.
https://attack.mitre.org/tactics/TA0011/
https://pentestit.com/list-of-open-source-c2-post-exploitation-frameworks/
https://pentestlab.blog/2017/11/14/command-and-control-website/
https://www.youtube.com/watch?v=bUqu8fh7xUg
https://www.youtube.com/watch?v=eTA7weRp2yk
https://www.youtube.com/watch?v=cK16knLi1Vk
https://www.youtube.com/watch?v=Wk6xobVsZf4
https://www.youtube.com/watch?v=2G5B8uhku78
https://www.youtube.com/watch?v=S_ejYRTM8J0
https://www.youtube.com/watch?v=_L-VW_1tYHA
https://www.trendmicro.com/vinfo/us/security/definition/command-and-control-server
https://www.paloaltonetworks.com/cyberpedia/command-and-control-explained
Web Attacks: Ataques avançados de injeção de SQL, Comando de Sistema, Execução de código remoto, deserialization, XSS impactante, SQL to RCE, XSS to RCE, Bypass File Extensions, IDOR, Open redirect e etc. Ataques que tem grande impactos em aplicações web.
https://owasp.org/www-project-top-ten/
https://github.com/infoslack/awesome-web-hacking
https://github.com/latestalexey/awesome-web-hacking
https://libraries.io/github/infoslack/awesome-web-hacking
https://www.exploit-db.com/papers/13646
https://www.youtube.com/watch?v=zs30qw4CF2U
http://devfuria.com.br/seguranca-da-informacao/owasp-topten-2010/a02-cross-site-ing/
https://www.youtube.com/watch?v=T-EQfydIxu4
https://www.youtube.com/watch?v=O3hb6HV1ZQo&t
https://www.youtube.com/watch?v=FTeE3OrTNoA&t=1s
https://www.youtube.com/watch?v=0dgmeTy7X3I
https://www.youtube.com/watch?v=L5l9lSnNMxg
https://www.youtube.com/watch?v=eDfGpu3iE4Q
https://github.com/pwntester/ysoserial.net
https://www.youtube.com/watch?v=nkTBwbnfesQ
https://medium.com/@notsoshant/a-not-so-blind-rce-with-sql-injection-13838026331e
https://medium.com/bugbountywriteup/sql-injection-to-lfi-to-rce-536bed29a862
https://pwnrules.com/flickr-from-sql-injection-to-rce/
https://medium.com/@knownsec404team/the-analysis-of-mybb-18-20-from-stored-xss-to-rce-7234d7cc0e72
https://github.com/xapax/xss-to-rce
https://blog.ripstech.com/2019/mybb-stored-xss-to-rce/
https://github.com/timip/OSWE
https://github.com/nicolauns/hunter-php-java-obfuscator
https://github.com/tholu/php-packer
https://github.com/java-obfuscator/java-obfuscator
https://owasp.org/www-pdf-archive/XML_Based_Attacks_-_OWASP.pdf
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
https://gist.github.com/mgeeky/4f726d3b374f0a34267d4f19c9004870
https://www.acunetix.com/blog/articles/xml-external-entity-xxe-vulnerabilities/
https://www.netsparker.com/blog/web-security/xxe-xml-external-entity-attacks/
https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf
https://pentestlab.blog/2012/11/29/bypassing-file-upload-restrictions/
https://www.youtube.com/watch?v=Ue3wtxR9s0E
https://owasp.org/www-community/vulnerabilities/Unrestricted_File_Upload
https://github.com/attackercan/REGEXP-SECURITY-CHEATSHEET
https://nvisium.com/blog/2015/06/11/regex-regularly-exploitable.html
https://medium.com/@somdevsangwan/exploiting-regular-expressions-2192dbbd6936
https://portswigger.net/support/sql-injection-bypassing-common-filters
https://owasp.org/www-community/attacks/Session_hijacking_attack
https://cheatsheetseries.owasp.org/cheatsheets/Deserialization_Cheat_Sheet.html
https://www.youtube.com/watch?v=fxrCJNQ96Kg
https://www.youtube.com/watch?v=OtlaTf9065w
https://www.youtube.com/watch?v=jYcx7WtbB0A
https://www.geeksforgeeks.org/session-hijacking/
https://www.venafi.com/blog/what-session-hijacking
https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
https://www.youtube.com/watch?v=iUbqJy_MOiE
https://www.youtube.com/watch?v=DkKUDbEt46A
https://www.youtube.com/watch?v=Bdpc-LjmKLc
https://portswigger.net/kb/issues/00100500_ldap-injection
https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/
https://websec.files.wordpress.com/2010/11/sqli2.pdf
https://medium.com/@Pentestit_ru/bypassing-waf-4cfa1aad16bf
https://www.youtube.com/watch?v=iQqwQXHwQk0
https://www.youtube.com/watch?v=Z8K_13jzITk
https://www.youtube.com/watch?v=tSf_IXfuzXk
https://www.youtube.com/watch?v=3K1-a7dnA60&t
https://www.youtube.com/watch?v=rloqMGcPMkI
https://www.youtube.com/watch?v=4Jk_I-cw4WE
https://www.youtube.com/watch?v=-nOih7rolX8
https://www.youtube.com/watch?v=HZaYmeOGCmI&list=PLy8t3TIwSh3tMEAjyldNNbjtTmm5G7kFl
https://www.linkedin.com/pulse/t%C3%A9cnica-anti-forenses-para-pentesters-1-b%C3%A1sicas-dos-santos/
https://pentester.land/list-of-bug-bounty-writeups.html
https://www.facebook.com/ExWareLabs/
https://twitter.com/hashtag/bugbountywriteup
https://medium.com/search?q=bug%20bounty
https://github.com/infoslack/awesome-web-hacking
https://github.com/latestalexey/awesome-web-hacking
https://awesomeopensource.com/project/infoslack/awesome-web-hacking
https://owasp.org/www-project-top-ten/
https://owasp.org/www-project-mobile-top-10/
https://github.com/vaib25vicky/awesome-mobile-security
https://www.youtube.com/results?search_query=mobile+hacking
https://www.linkedin.com/pulse/bug-bounty-como-se-tornar-um-especialista-em-ataques-web-dos-santos/
https://www.linkedin.com/pulse/advanced-web-attacks-joas-antonio-dos-santos/
https://www.linkedin.com/pulse/como-se-tornar-um-elliot-alderson-do-ctf-pt2-joas-antonio-dos-santos/
https://github.com/b1n4ry4rms/RedTeam-Pentest-Cheatsheets/tree/master/OSCE
https://tulpa-security.com/2017/07/18/288/
https://jhalon.github.io/OSCE-Review/
https://drive.google.com/drive/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU (My Ebooks)
https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440
https://www.offensive-security.com/offsec/my-philosophical-approach-to-oscp/
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XSS%20Injection
https://github.com/payloadbox/xss-payload-list
https://medium.com/@pravinponnusamy/xss-payloads-7079c53c8559
https://owasp.org/www-community/xss-filter-evasion-cheatsheet
https://twitter.com/xsspayloads
https://github.com/payloadbox/sql-injection-payload-list
https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
https://support.rackspace.com/how-to/email-spoofing-best-practices/
http://hackwithbrain.blogspot.com/2016/01/email-spoofing-tutorial.html
https://www.trustzone.com/how-to-produce-a-phishing-email-in-5-minutes/
https://www.youtube.com/watch?v=iPfL6n9TzOE (Email Spoofing)
https://www.youtube.com/watch?v=FH3sxFl-4is (Email Intercept)
https://dminc.com/blog/social-engineering-in-advanced-persistent-threat/
https://www.kaspersky.com/resource-center/definitions/advanced-persistent-threats
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
https://www.proofpoint.com/us/threat-reference/advanced-persistent-threat
https://www.youtube.com/watch?v=YjQhS_95t7s
https://null-byte.wonderhowto.com/how-to/make-your-own-bad-usb-0165419/
https://devcraze.com/tutorials/cyber-security/create-a-rubber-ducky-using-arduino/
https://hackaday.com/tag/badusb/
https://medium.com/@rokolabrovic/bad-arduino-leonardo-16a712faebcb
https://www.offensive-security.com/labs/
https://www.elearnsecurity.com/
https://www.pentesteracademy.com/
https://www.offensive-security.com/
https://www.youtube.com/channel/UCxHzA-Z97sjfK3OISjkbMCQ (RoadSec)
https://www.youtube.com/channel/UC2QgCedRNj_tLDrGWSM3GsQ (Mindthesec)
https://www.youtube.com/channel/UCz1PsqIhim7PUqQfuXmD-Bw (Hackaflag)
https://www.youtube.com/user/BlackHatOfficialYT (Blackhat)
https://www.youtube.com/channel/UCqGONXW1ORgz5Y4qK-0JdkQ (Joe Grand)
https://www.youtube.com/user/DEFCONConference (Defcon)
https://www.youtube.com/channel/UC4dxXZQq-ofAadUWbqhoceQ (DeviantOllam)
https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ (Hak5)
https://www.youtube.com/channel/UCimS6P854cQ23j6c_xst7EQ (Hacker Warehouse)
https://www.youtube.com/channel/UCe8j61ABYDuPTdtjItD2veA (OWASP)
https://www.youtube.com/channel/UC42VsoDtra5hMiXZSsD6eGg/featured (The Modern Rogue)
https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw (Stack Mashing)
https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w (Live Overflow)
https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A (PwnFunction)
https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA (IppSec)
https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A (Murmus CTF)
https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg (Colin Hardy)
https://www.youtube.com/user/GynvaelEN (GynvaelEN)
https://www.youtube.com/channel/UCBcljXmuXPok9kT_VGA3adg (Robert Baruch)
https://www.youtube.com/channel/UCGISJ8ZHkmIv1CaoHovK-Xw (/DEV/NULL)
https://www.youtube.com/user/RootOfTheNull (John Hammond)
https://www.youtube.com/channel/UCDbNNYUME_pgocqarSjfNGw (Kacper)
https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw (The Cyber Mentor)
https://www.youtube.com/channel/UCdNLW93OyL4lTav1pbKbyaQ (Mentorable)
https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA (Derek Rook)
https://www.youtube.com/channel/UCFvueUEWRfQ9qT9UmHCw_og (Prof. Joas Antonio)
https://www.youtube.com/user/ricardolongatto (Ricardo Longatto)
https://www.youtube.com/user/daybsonbruno (XTREME Security)
https://www.youtube.com/user/eduardoamaral07 (Facil Tech)
https://www.youtube.com/channel/UC70YG2WHVxlOJRng4v-CIFQ (Gabriel Pato)
https://www.youtube.com/user/Diolinux (Diolinux)
https://www.youtube.com/user/greatscottlab (Great Scott!)
https://www.youtube.com/user/esecuritytv (eSecurity)
https://www.youtube.com/channel/UCzWPaANpPISEE_xvJm8lqHA (Cybrary)
https://www.youtube.com/user/DanielDonda (Daniel Donda)
https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg (STOK)
https://www.youtube.com/user/ZetaTwo (Calle Svensson)
https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ (Georgia Wedman)
https://www.youtube.com/channel/UCqDLY9WFoJWqrhycW8cbv1Q (Manoel T)
https://www.youtube.com/channel/UCNRM4GH-SD85WCSqeSb4xUA (Bug Bounty Public Disclousere)
https://www.youtube.com/channel/UCwTH3RkRCIE35RJ16Nh8V8Q (Kindred)
https://www.youtube.com/channel/UCySphP8k4rv7Jf-7v3baWIA(Vinicius Vieira)
https://www.youtube.com/channel/UCVImyGhRATNFGPmJfxaq1dw (Bsides)
https://www.youtube.com/user/Wraiith75 (Wraiith)
https://www.youtube.com/user/genxweb (Michael LaSalvia)
https://www.youtube.com/channel/UCi8P9S-PW7AF71g8Pi0W6Jw (AcadiTI)
https://www.youtube.com/channel/UCuQ8zW9VmVyml7KytSqJDzg (Mente Binária)
https://www.youtube.com/channel/UC_JW_5_3XnGR6IdqKmZD7Rg (Cryptoroot)
https://www.youtube.com/user/adsecf (Guia Anônima)
https://www.youtube.com/channel/UCXHBFtUcbhIssuuXXud2WcQ (Helvio Junior)
https://www.youtube.com/user/securitycast (Security Cast)
https://www.youtube.com/channel/UCcYYP7JizTd24W9Mr7FIhxw (Hack N' Roll Academy)
https://www.cisoadvisor.com.br/
https://www.digitalhealth.net/
https://cio.economictimes.indiatimes.com/
https://www.kaspersky.com.br/blog/
https://blog.trendmicro.com.br/
https://www.bleepingcomputer.com/
https://cyware.com/cyber-security-news-articles
https://exchange.xforce.ibmcloud.com/
https://www.scmagazine.com/home/security-news/
https://www.infosecurity-magazine.com/news/
https://www.securitymagazine.com/topics/2236-cyber-security-news
https://www.linkedin.com/pulse/base-para-ingressar-mercado-de-seguran%C3%A7a-da-joas-antonio-dos-santos/ (A base para ingressar no mercado de segurança da informação)
https://www.linkedin.com/pulse/iniciando-e-aprimorando-sua-carreira-na-%C3%A1rea-de-soc-dos-santos/ - Iniciando e aprimorando sua carreira na área de SOC (Security Operation Center)
https://www.linkedin.com/pulse/sou-iniciante-na-%C3%A1rea-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-por-onde-dos-santos/ (Sou iniciante na área de segurança da informação, por onde eu devo começar?)
https://www.linkedin.com/pulse/o-colapso-do-mercado-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-dos-santos/ (O Colapso do Mercado de Segurança da Informação?)
https://www.linkedin.com/pulse/como-se-qualificar-para-novas-vagas-de-seguran%C3%A7a-da-que-dos-santos/ (Como se qualificar para as novas vagas de segurança da informação que estão abrindo?)
https://www.linkedin.com/pulse/os-requisitos-para-trabalhar-mercado-de-seguran%C3%A7a-da-dos-santos/ (Os requisitos para trabalhar no mercado de segurança da informação)
https://www.linkedin.com/pulse/aprimorando-seu-conhecimento-para-se-tornar-um-em-da-dos-santos/ (Aprimorando seu conhecimento para se tornar um Especialista em Segurança da Informação)
https://www.linkedin.com/pulse/forma%C3%A7%C3%A3o-completa-para-se-tornar-um-cyber-security-dos-santos/ (Formação completa para se tornar um Cyber Security Analyst)
https://www.linkedin.com/pulse/se-tornando-um-offensive-defensive-security-joas-antonio-dos-santos/ (Se tornando um Engenheiro de Segurança Defensiva e Ofensiva)
https://www.linkedin.com/pulse/aprimore-agora-suas-habilidades-t%C3%A9cnicas-na-%C3%A1rea-de-da-dos-santos/ (Aprimore agora suas habilidades tecnicas na área de segurança da informaçãl)
https://www.linkedin.com/pulse/como-se-tornar-um-mestre-jedi-ctf-joas-antonio-dos-santos/ (Como se tornar um Mestre Jedi no CTF)
https://www.linkedin.com/pulse/ser%C3%A1-que-realmente-vale-pena-gastar-dinheiro-com-na-%C3%A1rea-dos-santos/ (Vale a pena gastar dinheiro com certificação?)
https://www.linkedin.com/pulse/qual-caminho-trilhar-na-%C3%A1rea-de-seguran%C3%A7a-da-joas-antonio-dos-santos/ (Qual caminho trilhar na área de segurança?)
https://www.linkedin.com/pulse/aonde-eu-posso-estudar-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-nessa-dos-santos/ (Aonde eu posso estudar segurança da informação?)
https://www.linkedin.com/pulse/como-estudar-e-desenvolver-suas-habilidades-em-pt2-dos-santos/ (Como estudar e desenvolver suas habilidades em segurança da informação PT2)
https://www.linkedin.com/pulse/como-ser-um-%C3%B3timo-profissional-de-ti-joas-antonio-dos-santos/ (Como ser um ótimo profissional de TI)
https://www.linkedin.com/pulse/desenvolvendo-o-autodidatismo-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Desenvolvendo o autodidatismo na área de segurança da informação)
https://www.linkedin.com/pulse/qualquer-um-pode-trabalhar-com-seguran%C3%A7a-da-joas-antonio-dos-santos/ (Qualquer um pode trabalhar com segurança da informação)
https://www.linkedin.com/pulse/guia-b%C3%A1sico-sobre-soc-security-operation-center-dos-santos/ (Guia básico sobre SOC - Security Operation Center)
https://www.linkedin.com/pulse/como-estudar-para-certifica%C3%A7%C3%B5es-sem-dinheiro-pt1-dos-santos/ (Como estudar para certificações sem dinheiro PT1)
https://www.linkedin.com/pulse/construa-seu-laborat%C3%B3rio-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-e-dos-santos/ (Construa seu laboratorio de segurança da informação)
https://www.linkedin.com/pulse/fundamentos-qual-real-necessidade-de-aprender-joas-antonio-dos-santos/ (Fundamentos qual a real necessidade de aprender?)
https://www.linkedin.com/pulse/como-ingressar-mercado-de-seguran%C3%A7a-da-informa%C3%A7%C3%A3o-dos-santos/ (Como ingressar no mercado de segurança da informação?)
https://www.linkedin.com/pulse/se-tornando-um-pentester-ou-hacker-n%C3%ADvel-elliot-dos-santos/ (Se tornando um Hacker ou PenTest nivel Elliot)
https://www.linkedin.com/pulse/desenvolvendo-suas-habilidades-em-seguran%C3%A7a-da-dos-santos/ (Desenvolvendo suas habilidades em segurança da informação)
https://www.linkedin.com/pulse/expandindo-sua-mente-para-se-tornar-um-mestre-na-arte-dos-santos/ (Expandindo sua mente para se tornar um mestre na arte de PenTest)
https://www.linkedin.com/pulse/como-ser-um-mestre-jedi-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Como ser um mestre jedi na área de segurança da informação)
https://www.linkedin.com/pulse/como-aproveitar-o-hack-box-para-seu-desenvolvimento-dos-santos/ (Como aproveitar o Hack the Box para seu desenvolvimento pessoal?)
https://www.linkedin.com/pulse/estou-perdido-por-onde-come%C3%A7ar-na-%C3%A1rea-de-seguran%C3%A7a-da-dos-santos/ (Estou perdido! Por onde começar na área de segurança)
https://www.linkedin.com/pulse/pentest-z3r0-h3r0-1-joas-antonio-dos-santos/ (PenTest Z3R0 TO H3R0)
https://www.linkedin.com/pulse/como-se-tornar-um-elliot-alderson-ctf-joas-antonio-dos-santos/ (Como se tornar um elliot alderson no CTF
https://www.linkedin.com/pulse/entenda-o-ataque-do-primeiro-epis%C3%B3dio-de-mr-robot-dos-santos-/ (Entenda o primeiro ataque da série Mr. Robot - Bônus)
https://www.linkedin.com/pulse/tudo-sobre-profiss%C3%A3o-analista-de-seguran%C3%A7a-da-dos-santos-/ (Tudo sobre a profissão de analista de segurança da informação)