Docker Containers of Intentionally Vulnerable LInks
Docker Containers of Intentionally Vulnerable LInks
## GNU/Linux Utilities
## Hex Editors
## Multi-paradigm Frameworks
## Network Tools
## OSINT Tools
* [Hunter.io](https://hunter.io/) - Data broker providing a Web search interface for discovering the
email addresses and other organizational details of a company.
* [Threat Crowd](https://www.threatcrowd.org/) - Search engine for threats.
* [Virus Total](https://www.virustotal.com/) - Free service that analyzes suspicious files and URLs and
facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
* [surfraw](https://github.com/kisom/surfraw) - Fast UNIX command line interface to a variety of
popular WWW search engines.
## Online Resources
## Periodicals
* [ARIZONA CYBER WARFARE RANGE](http://azcwr.org/) - 24x7 live fire exercises for beginners
through real world operations; capability for upward progression into the real world of cyber warfare.
* [CTF Field Guide](https://trailofbits.github.io/ctf/) - Everything you need to win your next CTF
competition.
* [Cybrary](http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing.
Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured
Environments'.
* [European Union Agency for Network and Information Security](https://www.enisa.europa.eu/topics/
trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training
material.
* [Offensive Security Training](https://www.offensive-security.com/information-security-training/) -
Training from BackTrack/Kali developers.
* [Open Security Training](http://opensecuritytraining.info/) - Training material for computer security
classes.
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification.
## Side-channel Tools
## Static Analyzers
## Vulnerability Databases
* [Bugtraq (BID)](http://www.securityfocus.com/bid/) - Software security bug identification database
compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec,
Inc.
* [CXSecurity](https://cxsecurity.com/) - Archive of published CVE and Bugtraq software
vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
* [China National Vulnerability Database (CNNVD)](http://www.cnnvd.org.cn/) - Chinese
government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre
Corporation.
* [Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/) - Dictionary of common
names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
* [Distributed Weakness Filing (DWF)](https://distributedweaknessfiling.org/) - Federated CNA (CVE
Number Authority) mirroring MITRE's CVE database and offering additional CVE-equivalent numbers
to otherwise out-of-scope vulnerability disclosures.
* [Exploit-DB](https://www.exploit-db.com/) - Non-profit project hosting exploits for software
vulnerabilities, provided as a public service by Offensive Security.
* [Full-Disclosure](http://seclists.org/fulldisclosure/) - Public, vendor-neutral forum for detailed
discussion of vulnerabilities, often publishes details before many other sources.
* [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering
free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
* [Inj3ct0r](https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator.
([Onion service](http://mvfjfugdwgc5uwho.onion/).)
* [Microsoft Security Advisories](https://technet.microsoft.com/en-us/security/advisories#APUMA) -
Archive of security advisories impacting Microsoft software.
* [Microsoft Security Bulletins](https://technet.microsoft.com/en-us/security/bulletins#sec_search) -
Announcements of security issues discovered in Microsoft software, published by the Microsoft
Security Response Center (MSRC).
* [Mozilla Foundation Security Advisories](https://www.mozilla.org/security/advisories/) - Archive of
security advisories impacting Mozilla software, including the Firefox Web Browser.
* [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National
Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List
along with a fine-grained search engine.
* [Packet Storm](https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools,
and other security-related resources aggregated from across the industry.
* [SecuriTeam](http://www.securiteam.com/) - Independent source of software vulnerability
information.
* [US-CERT Vulnerability Notes Database](https://www.kb.cert.org/vuls/) - Summaries, technical
details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated
by the United States Computer Emergency Response Team (US-CERT).
* [Vulnerability Lab](https://www.vulnerability-lab.com/) - Open forum for security advisories
organized by category of exploit target.
* [Vulners](https://vulners.com/) - Security database of software vulnerabilities.
* [Vulmon](https://vulmon.com/) - Vulnerability search engine with vulnerability intelligence features
that conducts full text searches in its database.
* [Zero Day Initiative](http://zerodayinitiative.com/advisories/published/) - Bug bounty program with
publicly accessible archive of published security advisories, operated by TippingPoint.
## Web Exploitation
## Android Utilities
## Windows Utilities