Security Resources#

A curated collection of tools, platforms, and resources for CTF competitions and security research.


Learning Platforms#

ResourceDescription
HackTheBoxOnline platform for practicing penetration testing skills
TryHackMeGuided cybersecurity training with hands-on labs
PortSwigger Web Security AcademyFree web security training from Burp Suite creators
PentesterLabHands-on web penetration testing exercises
OverTheWireWargames to learn security concepts
picoCTFBeginner-friendly CTF platform
Root-MeChallenges and virtual environments
pwnable.krPwn challenges for binary exploitation

Web Security#

ToolDescription
Burp SuiteWeb application security testing
OWASP ZAPOpen source web app scanner
SQLMapAutomatic SQL injection tool
NiktoWeb server scanner
GobusterDirectory/DNS busting tool
ffufFast web fuzzer
CSP EvaluatorContent Security Policy analyzer
JWT.ioJWT decoder and debugger
RequestBinHTTP request collector
Webhook.siteWebhook testing and debugging

Cryptography#

ToolDescription
CyberChefThe cyber swiss army knife - encoding, encryption, compression
dCodeCipher identifier and decoder
CrackStationOnline hash cracking
FactorDBInteger factorization database
RsaCtfToolRSA attack tool
QuipQiupSubstitution cipher solver
BoxentriqCode breaking tools collection
SageMathMathematical software for crypto

Forensics & Steganography#

ToolDescription
Aperi’SolveOnline steganography analysis
StegOnlineOnline image steganography tool
StegsolveImage analysis for hidden data
BinwalkFirmware analysis and extraction
ForemostFile recovery tool
VolatilityMemory forensics framework
AutopsyDigital forensics platform
WiresharkNetwork protocol analyzer
ExiftoolMetadata reader/writer
zstegPNG/BMP steganography detector

OSINT#

ToolDescription
ShodanSearch engine for Internet-connected devices
CensysInternet-wide scanning and search
Wayback MachineInternet archive for historical snapshots
Hunter.ioEmail finder tool
SherlockUsername search across social networks
theHarvesterOSINT gathering tool
OSINT FrameworkCollection of OSINT tools
MaltegoInteractive data mining

Reverse Engineering#

ToolDescription
GhidraNSA’s reverse engineering suite
IDA FreeInteractive disassembler
Binary NinjaReverse engineering platform
Radare2Open source RE framework
DogboltOnline decompiler explorer
GDBGNU debugger
pwndbgGDB plugin for exploit dev
x64dbgWindows debugger

Password Cracking#

ToolDescription
HashcatAdvanced password recovery
John the RipperPassword cracker
CrackStationOnline hash lookup
Hashes.comHash decryption service
SecListsSecurity wordlists collection
RockYouFamous password wordlist

CTF Platforms & Wargames#

PlatformDescription
HackTheBoxPenetration testing labs
TryHackMeGuided learning paths
VulnHubVulnerable VMs for practice
CTFtimeCTF event calendar and rankings
picoCTFEducational CTF
CryptoHackCryptography challenges
Pwnable.xyzPwn challenges
Exploit EducationBinary exploitation learning

Useful Utilities#

ToolDescription
CyberChefData transformation tool
Regex101Regular expression tester
RevShellsReverse shell generator
GTFOBinsUnix binary exploitation
LOLBASWindows living-off-the-land binaries
PayloadsAllTheThingsPayload collection
HackTricksHacking tricks encyclopedia
ExploitDBExploit database

Cheatsheets#

ResourceDescription
Cheatsheet-GodMassive cheatsheet collection
CTF ToolsCTF tools compilation
PayloadsAllTheThingsWeb attack payloads
HackTricksPentesting methodology
OWASP Cheat SheetSecurity best practices
Search CTF WriteupsCTF DataBase

“The quieter you become, the more you can hear.” - Ram Dass