Giter Site home page Giter Site logo

security-resources's Introduction

Security Resources

🚨This Readme isn't being updated anymore. Check out the Wiki tab for the most up to date lists 🚨

A list of stuff I've found useful over the course of me teaching myself All Of The Security Things. Constantly a work in progress. Things with 🌟are my ride-or-die faves.

Not sure where to start?

i. Android

ii. ARM

iii. Blog Posts

iv. C Code Review

v. Conferences

vi. Course Notes

vii. Cryptography

viii. CTFs

ix. Law and Social Justice

x. Networking

xi. Podcasts

xii. Reverse Engineering

xiii. Security Culture

xiv. Things I've Heard Good Things About But Haven't Read/Listened To/etc

xv. Tools

xvi. Web Security

Where To Start

Not gonna lie, I get this question a lot and I never have a good answer for it. So here's some general tips:


  • If you are reading a blog post, wiki page, book, paper, etc. and you come across something you've never heard of or don't understand, don't continue reading until you understand that thing. (Obviously, this won't work for everyone because everyone learns differently. One of my first year uni prof's gave me this advice and I've found it to be pretty effective.)

  • Be prepared to not understand pretty much everything.

  • Have a decent understanding of programming. If you've never done any sort of programming before, check out Code Academy β€” the Python track is a good place to start.

  • Don't just read about it! Reading about security is all well and good, but coding exploits will solidify your understanding. Check out the CTFs section to get started.

  • Get yourself a bookmarking tool such as Pocket. There will be lots of things you'll want to save for later and you'll need a way to organize them. (Don't be like me and use Twitter likes as your bookmarking tool)
    • This is actually a good opportunity to check out Security Planner to learn more about how to manage your online privacy!

Android

Android Hacker's Handbook

  • A little bit dated but the fundamentals are good

Tutorialspoint Android Penetration Testing

  • Covers basic architecture, security architecture, and walks through DIVA

Vulnerable Android Apps

DIVA

ARM

Very vulnerable ARM application

Blog Posts

Getting Into Security

So, you want to work in Security? By Parisa Tabriz 🌟

So you want to work in security (but are too lazy to read Parisa's excellent essay) by lcamtuf

So you want to work in security? (and for some reason ended up here rather than reading other people’s posts on the topic) by Ivan Fratric

So you want to be a security engineer? by Niru Ragupathy 🌟

C Code Review

CERN Computer Security: Common vulnerabilities guide for C programmers

Smashing The Stack For Fun and Profit

Format String Vulnerabilities (Syracuse University)

C Programming Language 2nd Edition

OWASP Buffer Overruns and Overflows Guide

Conferences

OurSA 2018 🌟

Course Notes

UWaterloo CrySP's CS458

Cryptography

A Stick Figure Guide To The Advanced Encryption Standard (AES)

Classical Cryptography

Coursera Crypto I (taught by Dan Boneh) 🌟

Cryptopals

CTFs

List of permanent CTFs

CTFLearn

Hack This Site

Google Gruyere

Law and Social Justice

The Black Community Needs Encryption by Adrianne Jeffries for Motherboard 🌟

Encryption is a Human Rights Issue from the EFF

CrySP Speaker Series on Privacy

Lex Gill: Rearranging Power Through Law and Code: Deciphering the Canadian Encryption Debate 🌟

Networking

CS456 (UWaterloo) Lecture Slides (2006)

Podcasts

Security Now

  • Good technical content but lacks an intersectional approach to societal implications imo

Notable Episodes

Security Now #65: Why is Security So Difficult?

Security Now #311: Anatomy of a Security Mistake

Reverse Engineering

Introduction to Firmware Reversing

Reverse Engineering Challenges

2017 SIT RE Presentation by TobalJackson

  • Good intro to radare2 (with exercises and a video!)

Security Culture

Hackers (film)

Things I've Heard Good Things About But Haven't Read/Listened To/etc

How To Become A Hacker

The Tangled Web: A Guide To Securing Modern Web Applications

Queer Privacy by Sarah Jamie Lewis

Tools

Burp Suite 🌟

  • The free community edition is fine

hexdump

Hex Fiend

John The Ripper

Wireshark

radare2 🌟

Command Line

A Quick and Practical Reference for tcpdump

Web Security

Google Gruyere

Hack This Site

Web Application Hacker's Handbook

OWASP XSS Guide

OWASP SQL Injection Guide

OWASP Session Hijacking Guide

OWASP Command Injection Guide

OWASP Path Traversal Guide

security-resources's People

Contributors

annalorimer avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

security-resources's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    πŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. πŸ“ŠπŸ“ˆπŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❀️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.