Skip to content

Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.

Notifications You must be signed in to change notification settings

dctootall/cybersources

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

🔐 Cybersecurity Tools - Resources - Learning

Welcome to the Cybersecurity Resources Repository! This project serves as a central hub for a wide range of tools, resources, and educational materials designed for cybersecurity professionals, enthusiasts, and learners. Whether you're just starting out or an experienced expert, you'll find everything you need to enhance your skills, stay updated with industry trends, and deepen your knowledge in this fast-evolving field.

Hits

🛠️ What You’ll Find Here

This repository contains a comprehensive collection of resources, including:

  • Tools: Essential utilities for penetration testing, vulnerability scanning, threat detection, and network security.
  • Tutorials: Step-by-step guides for learning and mastering various cybersecurity techniques.
  • Articles & Research: In-depth educational materials to help expand your understanding of complex topics.
  • Best Practices: Recommendations on maintaining a secure digital environment and following industry standards.
  • Emerging Trends: Insights into the latest cybersecurity threats, technologies, and defense strategies.

Show Your Support

If you find this repository helpful, please consider giving it a star! Your support helps increase the visibility of the project and encourages others to contribute. Starring the repository helps it grow and ensures that it remains an up-to-date and valuable resource for the entire cybersecurity community.

📋 Content

🛠️ Tools

1. Utility

Tool Description
Hashcat Pass Recovery Password recovery utility for cracking hashes.
BrowserLeaks Suite of tools to test the security and privacy of your web browser.
Have I Been Pwned Check if your email address was compromised in data breaches.
Gravwell Community Edition Full featured unstructured log SIEM/Security Data Lake with raw binary/pcap support

2. Miscellaneous

Tool Description
osint.rocks Tool for searching and finding people.
Pim Eyes Reverse image search for face recognition.
IntelTechniques OSINT search engine tool for various data types.
Cybdetective Global map of OSINT tools.
Face Comparison Tool for comparing facial images.
OSINT Framework Comprehensive collection of OSINT resources.
FaceCheckID Reverse image search focused on facial recognition.
Social Catfish Locate people by names, images, or other identifiers.
Google Lens AI-powered tool for finding information about images.
LensoAI AI-based reverse image search.

3. Username Search

Tool Description
WhatsMyName Search for usernames across multiple platforms.
NameCheck Verify username availability on various websites.
UserSearch Locate user profiles and associated online activity.
BlackBird Advanced username search tool for OSINT.

4. Email Search

Tools Description
Industries OSINT Various OSINT tools for email investigation.
BlackBird Comprehensive email search tool.
Epieos Investigate email addresses.
ScanIdentity Identity scanning and verification tool.
LeakPeak Check if email addresses have been leaked.
BreachDirectory Directory of breached emails.
0t.rocks OSINT tool for email search.

5. GEOINT

Tools Description
Bellingcat Geospatial intelligence and analysis.
OhShint Geospatial OSINT tools.
GeoSpy The World's Best AI Geolocation Tool
Picarta We find where a photo has been taken in the world using Artificial Intelligence.
IPLogger IP Logger link shortener with geolocalizaction with advanced analytics.

6. News

Tools Description
WolrdEinnwes News and search engine tools.

7. Search Engines

Tools Description
True People Search Search for people's information.
Webmii Aggregate search for personal information.
Usa-Oficial Official USA search tools.
Ussearch Search for people in the USA.
ThatsThem Comprehensive search for personal information.
Shodan Search Search engine for Internet-connected devices.
Maltego Tool for link analysis and data visualization.
Spiderfoot An OSINT automation tool.

8. DNS

Tools Description
DnsEnum Multithreaded perl script to enumerate DNS information of a domain and to discover non-contiguous ip blocks.

9. Post Explotation

Tools Description
Empire A post exploitation framework for powershell and python.
Silentrinity A post exploitation tool that uses iron python to get past powershell restrictions.
PowerSploit A PowerShell post exploitation framework.
ebowla Framework for Making Environmental Keyed Payloads.

10. Deobfuscators

Tools Description
JS Nice Web service guessing JS variables names and types based on the model derived from open source.
de4dot .NET deobfuscator and unpacker.

11. Decompilers

Tools Description
uncompyle6 Decompiler for the over 20 releases and 20 years of CPython.
Hopper A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.
Karkatau The best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
dnSpy .NET assembly editor, decompiler, and debugger
ILSpy An open-source .NET assembly browser and decompiler
DotPeek A free-of-charge .NET decompiler from JetBrains
JADX Decompiler for Android apps. Not related to JAD.
JAD JAD Java Decompiler (closed-source, unmaintained)
Luyten One of the best, though a bit slow, hangs on some binaries and not very well maintained.
cutter A decompiler based on radare2.

12. Disassembler and debuggers

Tools Description
IDA IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
Olly A 32-bit assembler level analysing debugger for Windows
plasma Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
radare2 A portable reversing framework
x64dbg An open-source x64/x32 debugger for Windows
ScratchABit Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
Ghidra A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

13. Web

Web Description
recon-ng A web reconnaissance framework.
SpySe Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
FindSubdomains A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
Git-Scanner A tool for bug hunting or pentesting for targeting websites that have open .git repositories available in public
Keyscope An extensible key and secret validation tool for auditing active secrets against multiple SaaS vendors
VHostScan A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
Shodan A web-crawling search engine that lets users search for various types of servers connected to the internet.
SubFinder SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
sqlmap Automatic SQL injection and database takeover tool

14. Network

Tools Description
NetworkMiner A Network Forensic Analysis Tool (NFAT)
Paros A Java-based HTTP/HTTPS proxy for assessing web application vulnerability.
pig A Linux packet crafting tool
findsubdomains really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
cirt-fuzzer A simple TCP/UDP protocol fuzzer.
ASlookup A useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
ZAP The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
mitmsocks4j Man-in-the-middle SOCKS Proxy for Java
ssh-mitm An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
nmap Nmap (Network Mapper) is a security scanner
Aircrack-ng An 802.11 WEP and WPA-PSK keys cracking program
Nipe A script to make Tor Network your default gateway.
Habu Python Network Hacking Toolkit
Wifi Jammer Free program to jam all wifi clients in range
Firesheep Free program for HTTP session hijacking attacks.
Scapy A Python tool and library for low level packet creation and manipulation
Amass In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
sniffglue Secure multithreaded packet sniffer
Netz Discover internet-wide misconfigurations, using zgrab2 and others.
RustScan Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.
PETEP Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.

15. Cryptography

Tools Description
xortool A tool to analyze multi-byte XOR cipher
John the Ripper A fast password cracker
Aircrack Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
Ciphey Automated decryption tool using artificial intelligence & natural language processing.

16. Forensic

Tools Description
Autopsy A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools
sleuthkit A library and collection of command-line digital forensics tools
EnCase The shared technology within a suite of digital investigations products by Guidance Software
malzilla Malware hunting tool
IPED - Indexador e Processador de Evidências Digitais Brazilian Federal Police Tool for Forensic Investigation
CyLR NTFS forensic image collector
CAINE CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This tool can be integrated into existing software tools as a module. It automatically extracts a timeline from RAM.
Volatility Memory forensics framework.
Redline Host investigation and data acquisition tool.
REKALL Memory analysis and forensics.
Log2Timeline (Plaso) Timeline creation for forensic analysis.

17. Hex editors

Tools Description
HxD A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
WinHex A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
wxHexEditor
Synalize It
Hexinator

18. Execution logging and tracing

Tools Description
Wireshark A free and open-source packet analyzer
tcpdump A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture.
mitmproxy An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface.
Charles Proxy A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic.
usbmon USB capture for Linux.
USBPcap USB capture for Windows.
dynStruct structures recovery via dynamic instrumentation.
drltrace shared library calls tracing.

19. System

Tools Description
Metasploit A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
mimikatz A little tool to play with Windows security
Hackers tools Tutorial on tools.

20. Social Networks

20.1 Instagram
Tools Description
Aware Online: Instagram Search Tool Instagram Search Tool
Combin Instagram marketing tool for managing and growing your account.
Comment Picker Tool for selecting random winners from comments.
Display Purposes Tool for finding hashtags related to your content.
DownAlbum Chrome extension for downloading photos and videos from Instagram.
Engagement-calculator Tool for calculating engagement rates on Instagram.
Export Comments Tool for exporting Instagram comments.
Find-instagram-user-id Tool to find Instagram user IDs.
Gramfind Tool for finding Instagram profiles and posts.
Hashtagify Tool for finding and analyzing hashtags.
Hashtags for Likes Tool for finding the best hashtags for Instagram.
Helper Tools for Instagram Chrome extension to enhance Instagram functionalities.
HypeAuditor Tool for analyzing the authenticity of influencers and their engagement.
Iconosquare Tool for managing and analyzing Instagram accounts.
IGSuperStar Tool for finding Instagram influencers.
Imgbunk Tool for searching and downloading Instagram photos.
ImgInn Tool for viewing and downloading Instagram stories anonymously.
In Tags Tool for finding the best tags for your Instagram posts.
INSSIST Chrome extension for posting photos and stories on Instagram from desktop.
InstaFollowers Tool for gaining followers and engagement on Instagram.
Instagram Crawler Tool for scraping Instagram data.
Instagram Explorer Tool for exploring Instagram profiles and posts.
Instagram OSINT Open-source intelligence tool for Instagram.
Instagram Scraper Tool for scraping Instagram posts and profiles.
Instagram Search Tool (Aware Online) Tool for searching Instagram profiles and posts.
InstaLoader Tool for downloading Instagram photos, videos, and metadata.
instaloctrack Tool for tracking Instagram locations.
InstaLooter Tool for downloading photos and videos from Instagram profiles.
Izuum Instagram search engine.
Keyhole Tool for tracking and analyzing social media campaigns.
Leetags Tool for finding the best hashtags for Instagram posts.
MetaHashtags Tool for generating and analyzing hashtags.
Minter.io Tool for Instagram analytics and reporting.
noninstagram Tool for Instagram data analysis.
Osi.ig Tool for Instagram OSINT.
Osintgram OSINT tool for analyzing Instagram profiles and posts.
Otzberg.net Tool for finding Instagram user IDs.
Panoramiq Tool for scheduling and managing Instagram posts.
Phantom Buster Automation tool for social media platforms.
Phlanx: Instagram Engagement Calculator Tool for calculating Instagram engagement rates.
Picker Tool for selecting random winners from Instagram comments.
Picodash Tool for searching and organizing Instagram content.
Scylla Tool for Instagram OSINT and data scraping.
Skimagram Tool for tracking Instagram activity.
Social-alerts Tool for setting up social media alerts.
SocialInsider Tool for social media analytics and competitive analysis.
socid_extractor Tool for extracting social media IDs.
SoIG Tool for Instagram OSINT.
tailwind Tool for scheduling and managing Instagram posts.
ThumbTube Tool for downloading Instagram profile pictures.
trendHERO Tool for influencer marketing and analytics.
Webstagram Instagram web viewer and search tool.
20.2 Linkedin
Tools Description
IntelligenceX: Linkedin LinkedIn search tool by IntelligenceX.
BridgeKeeper Tool for OSINT on LinkedIn profiles.
CrossLinked LinkedIn enumeration tool.
Email Reverse Lookup Tool for reverse email lookup on LinkedIn.
Free People Search Tools Comprehensive people search tool.
FTL Chrome extension for LinkedIn OSINT.
osint.support Collection of OSINT tools for LinkedIn.
InSpy LinkedIn enumeration tool.
Linkedin Bookmarklet Bookmarklet tools for LinkedIn OSINT.
Linkedin Profile Scraper Tool for scraping LinkedIn profiles.
Linkedin Search TGC Tool for searching LinkedIn profiles.
LinkedInt LinkedIn intelligence and OSINT tool.
Osint Support Linkedin Support tools for LinkedIn OSINT.
Phantom Buster Automation tool for LinkedIn tasks.
raven LinkedIn enumeration and scraping tool.
Recruit’em Tool for finding profiles on LinkedIn.
Recruitin.net Tool for recruiting on LinkedIn.
Recruitment Geek LinkedIn search tool for recruiters.
ScrapedIn Tool for scraping LinkedIn profiles.

20.3 TikTok

Tools Description
Exolyt.com Tool for analyzing TikTok profiles and videos.
Hashtags for Likes Tool for finding the best hashtags for TikTok posts.
HypeAuditor Tool for analyzing the authenticity of TikTok influencers.
Influence Grid Tool for finding TikTok influencers.
InstaFollowers Tool for finding TikTok user IDs.
Mavekite.com Tool for managing and analyzing TikTok campaigns.
OSINT Combine TikTok Quick Search Quick search tool for TikTok profiles.
Savefrom.net Tool for downloading TikTok videos.
Sinwindie TikTok Bookmarklet Tools Bookmarklet tools for TikTok OSINT.
Snaptik.app Tool for downloading TikTok videos.
socid_extractor Tool for extracting social media IDs.
Tikbuddy Tool for analyzing TikTok profiles and content.
TikTok API API for interacting with TikTok.
TikTok Creative Center Statistics Tool for finding trending hashtags and content on TikTok.
TikTok Downloader Tool for downloading TikTok videos.
TikTok Hashtags Tool for generating TikTok hashtags.
TikTok Scraper Tool for scraping TikTok profiles and videos.
TikTok Timestamp Tool for analyzing timestamps on TikTok videos.
TikView Tool for searching TikTok profiles and content.
tikvstock Tool for stock and analyzing TikTok videos.
Tokvid Tool for downloading TikTok videos.
TubeHi Tool for analyzing TikTok and YouTube content.
Vidnice Tool for analyzing TikTok profiles and content.

20.4 OnlyFans

Tools Description
fansmetrics.com Tool for analyzing OnlyFans metrics.
Onlysearch.com Search tool for finding OnlyFans profiles.
onlyfinder.com Tool for finding OnlyFans creators.
hubite.com/onlyfans-search/ OnlyFans search tool.
SimilarFans Tool for finding similar OnlyFans profiles.
FanSearch Comprehensive search tool for OnlyFans.

20.5 Discord

Tools Description
ASTRAAHOME A collection of all-in-one tools for Discord.
Discord History Tracker A tool for tracking and saving chat histories in Discord.

20.6 Twitch

Tools Description
Twitch Tools Tool for viewing follower lists on Twitch.
Twitch Tracker Tool for tracking Twitch statistics and analytics.
Sully Gnome Tool for analyzing Twitch stream statistics.
Twitch Stream Filter Tool for filtering and previewing Twitch streams.
Untwitch.com Tool for downloading Twitch videos.
Twitch Overlap Tool for analyzing viewer overlap between Twitch streamers.
Justlog Tool for viewing Twitch chat logs.
Twitch Recover Tool for recovering deleted Twitch videos.
Twitch Database Database for tracking Twitch followings.
Twitch Insights Tool for analyzing Twitch trends and statistics.
Twitch Followage Tool Tool for checking how long users have been following a Twitch channel.

20.7 Tinder

Tools Description
Badoo Social discovery and dating app.
Bumble Dating app where women make the first move.
Coffee Meets Bagel Dating app that curates matches for users.
eHarmony Dating site focused on long-term relationships.
Grindr Social networking app for gay, bi, trans, and queer people.
happn Dating app that shows users people they've crossed paths with.
HER Dating and social app for LGBTQ+ women and non-binary people.
Heybaby Dating app for single parents and those open to dating them.
Hinge Dating app designed to be deleted.
The Inner Circle Exclusive dating app for ambitious professionals.
The League Dating app for professionals.
Match.com One of the largest dating sites.
MeetMe Social discovery app for meeting new people.
OkCupid Dating app with a detailed questionnaire for matching.
Plenty of Fish Dating site with a large user base.
Scruff Social app for gay, bi, trans, and queer people.
Tastebuds Dating app that matches people based on music taste.
Tinder Popular dating app for meeting new people.
zoosk Dating site with a behavioral matchmaking algorithm.

21. Steganographic

Tools Description
110 steganographic tools A comprehensive list of 110 steganographic tools.
Cloakify A tool for disguising data to bypass data loss prevention mechanisms.
Stego_Dropper A steganography-based dropper written in Python.
silenteye A cross-platform application for steganography.
deep-steg Deep learning based steganography tool.
StegX A Python-based steganography tool.
js-steg A steganography tool using JavaScript.
steg A simple steganography tool.
StegoProxy A proxy tool that implements steganography.
Video-Steganography-for-Piracy-Prevention A video steganography tool to prevent piracy.
openstego An open-source steganography tool.
steg Another steganography tool.
Stegbook A steganography tool for Facebook messages.
PDF_steganography A tool for hiding data within PDF files.
steganography_talk A presentation on steganography.
ascii-steganography A tool for hiding data within ASCII text.
voices A tool for audio steganography.
stego-retweet A tool for hiding data within retweets.
ARMS Another steganography tool.
stegosaurus A simple steganography tool.
Outguess A universal steganography tool.
BitStegNet A neural network based steganography tool.
stego-wave A steganography tool for hiding data in audio files.
StegoMP3 A tool for MP3 steganography.
jSteganographiX A steganography tool written in Java.
LSB-Steganography A tool for least significant bit steganography.
jsteg A steganography tool written in Go.
stego-toolkit A collection of steganography tools.
f5-steganography An implementation of the F5 steganography algorithm.
Matroschka A steganography tool.
Deep-Steganography A deep learning based steganography tool.
AudioStego A tool for audio steganography.
audio-steganography-algorithms Algorithms for audio steganography.
StegCracker A steganography brute-force tool.
StegExpose A steganalysis tool for detecting hidden data.
jphs A steganography tool.
StegDroid A steganography tool for Android.
SteCoSteg A steganography tool.
PNG-Mask A tool for hiding data in PNG images.
chess-steg A steganography tool for hiding data in chess games.
strogonoff Another steganography tool.
Pictograph A steganography tool for images.
stegoVeritas A steganography tool.
secretbook A steganography tool for Facebook messages.
snow10 A steganography tool.
mp3stego A tool for MP3 steganography.
stego_video A video steganography tool.
diit A steganography tool.
stegosploit A tool for embedding exploits in images.
stegolab A steganography tool.
stego-book-2014 A collection of steganography tools from 2014.
timeshifter A tool for covert channels based on time.
covertele A tool for covert communication.
CCEAP A steganography tool.
cloud-covert-channels A tool for covert channels in the cloud.
DNSExfiltrator A tool for data exfiltration via DNS.
StegPage A source for various steganography tools.
CameraShy A steganography tool.
stegUnicode A steganography tool using Unicode.
stelin Another steganography tool.
Hydan A steganography tool for binary files.
deogol A steganography tool.
Hugo source code Source code for a steganography tool.
WOW Steganography algorithms.
stegify A simple steganography tool.
Steganography 101 An introductory guide to steganography.
Invoke-PSImage A tool for embedding PowerShell scripts in images.
instegogram A tool for stegan

22. Steganalysis

Tool Description
VSL A steganographic tool that helps in hiding and detecting messages within digital images.
HackTricks - Stego Tricks A comprehensive guide on various steganography techniques and tricks used in cybersecurity.
zsteg A tool for detecting hidden data in PNG and BMP files.
StegOnline An online tool for hiding and extracting hidden messages in images.
Stegsolve A steganography analysis tool that can analyze images for hidden data.
StegCracker A tool for brute-forcing passwords of hidden data in steganographic images.
StegSeek A lightning-fast steganography brute-force tool for hidden data in images.
JJTC Steganalysis A resource for various steganalysis techniques and tools.
Guillermito's Steganography An informative site on steganography tools and techniques.
Stegdetect A popular steganography detection tool capable of detecting hidden data in images.
Spy Hunter A tool designed to detect steganography usage and hidden data.
Stegkit A steganography kit used for hiding and extracting hidden messages in images.
Stegalyzer A tool designed for detecting and analyzing steganographic content in digital images.
Stego Suite A suite of tools for hiding and detecting steganographic content.
Stegsecret An open-source steganography tool for embedding and extracting hidden messages in images.
StegExpose A tool for detecting hidden data in images using statistical analysis.
Cryptonibbles - Mr. Robot Steganography A blog post discussing steganography in the context of the TV show Mr. Robot.
Forensics Analysis of Video Steganography Tools A research paper on forensic analysis of video steganography tools.
Aletheia A tool for image steganalysis using state-of-the-art machine learning techniques.
Danielle Lerch's Papers A collection of research papers on steganalysis and related topics.
Steganalysis with CNN for Same Key Images A project for steganalysis using convolutional neural networks (CNN) for same key images.
DeepSteg Deepsteg performs visual, structural, and statistical attacks (including deep learning-based attacks) to detect files hidden within images and other files.
tf_audio_steganalysis A project for steganalysis of audio files using TensorFlow.
SteganalysisCNN A steganalysis project using convolutional neural networks (CNN).
ALASKA A large-scale image steganalysis dataset.
IStego100K A large-scale image steganalysis dataset.
StegOnline An online tool for hiding and extracting hidden messages in images.
Steganabara A tool for steganography analysis.
Stegasawus A steganography analysis tool.
UDSS A project for universal deep steganalysis systems.
BreakingSteganalysisGAN A project on breaking steganalysis using generative adversarial networks (GAN).
Steganalyse A steganalysis tool.
StegCracker A tool for brute-forcing passwords of hidden data in steganographic images.
Welloganography Solver A steganography analysis tool.
McAfee Free Tools - Steganography A collection of free steganography tools provided by McAfee.
Mistica A steganography analysis tool.
Cookie Stego A steganography tool for hiding and extracting hidden messages in images.
AperiSolve A steganography analysis tool.
Steganalysis A steganalysis project.
YeNet-Pytorch A project for steganalysis using YeNet and PyTorch.
Steganalysis with CNN - Yedroudj-Net A steganalysis project using convolutional neural networks (CNN) - Yedroudj-Net.
Pytorch implementation of SRNet A project for steganalysis using SRNet and PyTorch.
LSB Toolkit A toolkit for steganography using least significant bit (LSB) techniques.
CAECNNcode A project for steganalysis using convolutional neural networks (CNN).
Stegolab A steganography and steganalysis toolkit.
DL Steganalysis A project for steganalysis using deep learning techniques.
Audio Steganalysis A project for steganalysis of audio files.
Audio Steganalysis CNN A project for steganalysis of audio files using convolutional neural networks (CNN).
DeepSteg A steganalysis tool for detecting hidden data in images using deep learning techniques.
Stegasaurus2 A steganography analysis tool.

23. Cryptocurrency

Tool Description
CryptoID This site provides blockchain explorers for several crypto-currencies.
CoinTracker Platform that connects your crypto wallets

🗂️ Resources

Resource Description
Wiki - AddieLamarr Wikipedia form AddieLamarr of his 14 years cyber carrer.
PowerShell - Notes A readme.md about PowerShell Commands and learning.
PowerShell Guide We will unravel the secrets of PowerShell for Quick Guide Hackers and strengthen your skills in the world of hacking!
DuckyScript™ Quick Reference DuckyScript™ is the programming language of the USB Rubber Ducky™, Hak5® hotplug attack gear and officially licensed devices. The quick reference to start programming with ducky.
BadUSB File Format Document that explains how badusb works on Flipper Zero
Osint-Dojo Project that aims to guide those new to Open Source Intelligence (OSINT)
OSTIN Attack Surface Diagrams Diagram of diferent types of attacks on OSINT.
awesome-osint A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.
awsome-CVE PoCs A curated list of CVE PoCs.
AN1305 MIFARE Classic as NFC Type MIFARE Classic Tag NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type MIFARE Tag
Security related Operating Systems @ Rawsec Complete list of security related operating systems
Best Linux Penetration Testing Distributions @ CyberPunk Description of main penetration testing distributions
Security @ Distrowatch Website dedicated to talking about, reviewing and keeping up to date with open source operating systems
Pentest Cheat Sheets Collection of cheat sheets useful for pentesting

📖 Learning

📚 Courses

Courses Description
cs50 - Harvard CS50’s Introduction to Computer Science. Even if you are not a student at Harvard, you are welcome to “take” this course for free via this OpenCourseWare by working your way through the course’s eleven weeks of material.
overthewire.org The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
HTB-Academy HTB Academy is cybersecurity learning the HTB way.
HackTheBox Hack The Box is a training platform where you can find matchines and CTFs to practice.
Coursera Plataform where there are open online courses.
TryHackMe TryHackMe goes way beyond textbooks and focuses on fun interactive lessons that make you put theory into practice.
EC-Council - Learning Get started with a free account and gain immediate access to 20+ complete cybersecurity courses from the creators of the Certified Ethical Hacker (CEH) program.
Security Blue Team Plataform to learn with courses orientated to the blue team.
Cybrary Offers free and paid courses with hands-on labs for certificatitions like Security+, CISSP and CEH.
Udemy Affordable courses with video lectures, quizzes, and practice exams for various certifications.
Professor Messer Free video lessons and practice exams for CompTIA certifications.
Roppers Practical Networking Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world.
VirusTotal Malware analysis.
edX Online security courses.
Hybrid Analysis Advanced malware sandboxing.
AbuseIPDB IP address threat intelligence.
HackerOne Bug bounty platform.
Bugcrowd Crowdsourced cybersecurity.
Open Bug Bounty Open-source bug bounty program.
RangeForce Hands-on blue team exercises.

📝 Certifications

Certifications Description
Cisco CCNA Validate your knowledge and skills in network fundamentals and access, IP connectivity, IP services, security fundamentals, and more.
CompTIA Security+ CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

🎥 Tutorials

Tutorials
Corelan Team's Exploit writing tutorial
Exploit Writing Tutorials for Pentesters
Understanding the basics of Linux Binary Exploitation
Shells
Missing Semester
Begin RE: A Reverse Engineering Tutorial Workshop
Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Unicorn Reverse Engineering Tutorial
Lena151: Reversing With Lena

🚩 CTFs - Training

CTFs Category Description
Kase Scenarios OSINT Imagine diving headfirst into captivating OSINT scenarios that mirror real-world investigations. You must apply OSINT techniques to solve intricate cases and mysteries.
TraceLabs OSINT The Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons
Geolocating Images (THM) OSINT A room to understand how to geolocate images
Google Dorking (THM) OSINT Explaining how Search Engines work and leveraging them into finding hidden content.
OhSINT OSINT What information can you possible get with just one image file?
Sakura Room OSINT Use a variety of OSINT techniques to solve this room created by the OSINT Dojo.
Searchlight-IMINT OSINT OSINT challenges in the imagery intelligence category.
KafeeSec-SoMeMINT OSINT An intro to SOCMINT (Social Media Intelligence/Investigation) techniques and tooling. Use your awesome OSINT skills to perform an online investigation of a mysterious husband!
Stego-toolkit Steganography
Top CTF challenges Steganography
awesome-ctf Steganography
Flipper Zero BadUSB Mastery BadUSB Learn how to craft and deploy BadUSB payloads for the Flipper Zero using DuckyScript. This room focuses on automating keystroke attacks for ethical hacking and testing purposes.

🕸️ Practice Webs

Web Practice Category Description
Codeforces Problems Solving Codeforces is a project joining people interested in and taking part in programming contests.
DevChallenges Challenges Platform to improve your coding skills through practical projects and build an outstanding portfolio.

🎤 Events

Event Description
BSides Calendar The calendar of BSides events arround the world.

🎙️ Podcasts

Podcasts Language Description
Tierra de Hackers Spanish Podcast recorded by Martin Vigo and Alexis Porros, they inform about all the news on the cybersecurity world.
ISC English The ISC StormCast is a daily short-form podcast that provides a summary of current network security-related events.
Cyberwire Daily English Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

👤 Community

Community Description
RedProtect Our community was born out of the shared passion of three students: bst04, Gabriel Grigor, and Luu. United by our interest in the fascinating world of cybersecurity, we decided to create a space where we can learn, share knowledge, and grow together in this dynamic and crucial field.

📺 Documentaries

Documentaries Genere Year Rating
BBS: The Documentary Documentary 2005 8.7/10
Citizenfour Documentary - Biography 2014 8.1/10
Code 2600 Documentary 2012 7.4/10
Deep Web Documentary 2015 7.1/10
DEFCON: The Documentary Documentary 2013 5.7/10
DSKNECTD Documentary 2013 7.4/10
Downloaded Documentary 2013 6.8/10
Freedom Downtime Documentary 2001 7.6/10
Good Copy Bad Copy Documentary 2007 7.2/10
Hackers: Wizards of the Electronic Age Documentary 1984 7.7/10
Hackers Are People Too Documentary - Short Film 2008 6.1/10
Hacking Democracy Documentary 2006 7.9/10
Hackers Wanted Documentary/Indie Film 2009 6.5/10
In the Realm of the Hackers Documentary 2003 7.4/10
Indie Game: The Movie Documentary 2012 7.7/10
Kim Dotcom: Caught in the Web Documentary 2017 7.0/10
Pirates of Silicon Valley Documentary - Drama - TV Film 1999 7.3/10
Plug and Pray Documentary 2010 7.2/10
Revolution OS Documentary - Indie Film 2001 7.3/10
Silk Road: Drugs, Death and the Dark Web Documentary 2017 7.4/10
Softwaring Hard Documentary 2014 8.2/10
Steal This Film Documentary - Short Film 2006 7.1/10
TPB AFK: The Pirate Bay Away from Keyboard Documentary 2013 7.6/10
Terms and Conditions May Apply Documentary 2013 7.4/10
The Code Documentary 2001 7.5/10
The Great Hack Documentary 2019 7.0/10
The Hacker Wars Documentary 2014 6.6/10
The Internet's Own Boy: The Story of Aaron Swartz Documentary 2014 8.1/10
The KGB, the Computer and Me Documentary 1990 8.3/10
The Secret History Of Hacking Documentary 2001 7.6/10
The Singularity Drama - Science Fiction 2012 7.3/10
War for the Web Documentary 2015 7.4/10
We Are Legion: The Story of the Hacktivists Documentary 2012 7.3/10

📖 Books & Papers/Articles

Title Category Description
Information Hiding Techniques for Steganography and Digital Watermarking Steganography Techniques for steganography and digital watermarking.
Practical Network Defense Best practices for securing networks.
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography Attacks and countermeasures in steganography and watermarking.
Digital Watermarking and Steganography Steganography Digital watermarking and steganography techniques.
Hiding in Plain Sight: Steganography and the Art of Covert Communication Steganography Steganography and covert communication techniques.
Steganography in Digital Media: Principles, Algorithms, and Applications Steganography Principles and applications of steganography in digital media.
Investigator's Guide to Steganography Steganography A guide for investigators on steganography.
Disappearing Cryptography: Information Hiding: Steganography and Watermarking Steganography Information hiding techniques including steganography and watermarking.
Publications by Fridrich Steganography Publications on steganography by Fridrich.
Privacidad y ocultación de información digital. Esteganografía. Protegiendo y atacando redes informáticas Steganography Privacy and information hiding in digital networks.
Esteganografía lingüística y canales encubiertos - libro Steganography Linguistic steganography and covert channels.
Privacidad y protección: Lección 7 Steganography Lesson on privacy and protection in information hiding.
Buscando stegomalware en un océano de apps Steganography Searching for stegomalware in a sea of apps.
Steganography tools on Wikipedia Steganography Wikipedia page on steganography tools.
Steganography reference by Gary Kessler Steganography Reference on steganography by Gary Kessler.
Covert channel on Wikipedia Steganography Wikipedia page on covert channels.
Gray World projects Steganography Various projects on steganography and security.
A guide to understanding cover channels analysis of trusted systems Steganography Guide on covert channel analysis in trusted systems.
MITRE ATT&CK Technique T1029 Steganography MITRE ATT&CK framework on techniques related to steganography.
The Web Application Hacker's Handbook Comprehensive guide to web security.
Practical Malware Analysis Guide to reverse engineering malware.

🖥️ TV Shows

Title Genere Year Rating
Black Mirror Drama - Science Fiction 2011 8.9/10
CSI: Cyber Drama - Crime - Mystery 2015 5.4/10
Dark Net Documentary - Series 2016 7.3/10
Devs Drama - Mystery - Sci-Fi 2020 7.9/10
Halt and Catch Fire Drama 2014 8.3/10
Mr. Robot Thriller - Drama 2015 8.7/10
Person of Interest Action - Crime - Drama 2011 8.5/10
Scorpion Action - Drama 2014 7.2/10
Serial Experiments Lain Cyberpunk - Animation 1998 8.2/10
Silicon Valley Comedy 2014 8.5/10
StartUp Thriller - Crime 2016 8.1/10
The Code Drama 2014 7.6/10
The IT Crowd Comedy 2006 8.6/10
Travelers Science Fiction 2016 8.0/10
Valley of the Boom Documentary - Drama 2019 6.5/10
Westworld Drama - Mystery 2016 9.0/10
You Are Wanted Thriller - Drama 2017 6.1/10

📙 Open-Source Repositories

Title Description
OWASP Tools and resources for web application security.
Mitre ATT&CK Adversarial tactics and techniques.
TheHive Project Incident response tools.

💬 Colaborate

  • If you have some tool, resource or course that you want to share, contact me or create an pull request.

About

Cybersources is a repository that curates a comprehensive collection of cybersecurity tools and resources, aiming to enhance knowledge, skills, and collaboration within the cybersecurity community.

Resources

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published