Skip to content

Latest commit

 

History

History
250 lines (214 loc) · 10.3 KB

README.md

File metadata and controls

250 lines (214 loc) · 10.3 KB

Cybersecurity OS

Study

CyberSecurity links

Check your email or password

Tools

Homepage Documentation Github repository
Nmap logo Official documentation Nmap Github
Wireshark logo Official documentation Nmap Github
Nmap logo Official documentation Crowdsec Github
Nmap logo Official documentation Wifite Github

Lessons

First lesson - Python for Cybersecurity

Cross-site scripting (XSS)

Almost everything you need to know about XSS

Hashes

All Hash Generator

HTTP Strict Transport Security (HSTS)

Wikipedia: link

OSI Model

Layer What does it do? Where is it implemented?
7º Application Where humans process data and information Software
6º Presentation Ensures data is in a usable format Software
5º Session Capable of maintaining connections Software
4º Transport Data is forwarded to a service capable of handling requests Connects the software and hardware layers
3º Network Layer Responsible for which path packets should travel on a network Hardware
2º Data Link Responsible for which physical devices packets should go to Hardware
1º Physical The physical infrastructure to transport data Hardware

Deep Web vs Dark Web vs Darknet

Differences between them

Tutorials

Cybersecurity software

What is a cybersecurity software for?: link

OpenWebinars

Shell Scripting on Windows

Bash shell course

Bash shell course

Online tools

Information security (Ceupe policies)

Blog CEUPE

GitHub repositories

Security for web development

15 Critical Security Tips for Web Development in 2023: Official link

Firewall ports - Windows 10

How to close or open Firewall ports in Windows 10? Official link

Encryption vs firewall

Does encryption make the firewall irrelevant?: Official link

25 types of cyber attacks

How to prevent all them?: Official link

INCIBE

Practice ethical hacking attacks

  • Vulnerable OS: Blog
Recommendations: RedesZone
Hack The Box: Official link
Tryhackme: Official link
Pentester Lab: Official link
VulnHub: Official link
HackThis: Official link
Google Gruyere: Official link
OverTheWire: Official link
bWAPP: Official link
Offensive Security: Official link
Cybrary: Official link
HackThisSite: Official link
Root Me: Official link

Ways to view Real-Time Cyberattack Maps

Live Hacking Attack: Geekflare link

Google Dorking

Google Dorking , also known as Google Haking, is a hacker technique which consists of applying Google's advanced search to find specific information on the Internet by filtering the results with operators (known as dorks).

Youtube legends

Common ports - Cheat Sheet

The Ultimate Ports & Protocols List: Official link

Web Application Security Risks

TOP 10: Official link

TMUX

Microsoft Software Vulnerabilities

Exploit created by the NSA as a cyberattack tool Avast link

CVSS RATINGS

CVSS 2.0 and CVSS 3.0 Ratings

Security Certifications

Security Certification Roadmap: Official link