Clone of . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

7.9 KiB


🐢 An Information Security Reference That Doesn't Suck 🐢


  • Be an awesome Information Security Reference ☑️
  • List of techinques, tools and tactics to learn from/reference. ☑️
  • Rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches OR as a reference/recall method for stuff.
    • Something like a "Yellow Pages" in the sense of you know something exists, but what was it called....
    • 'if you give a man a fish he is hungry again in an hour. If you teach him to catch a fish you do him a good turn.'
  • Always accepting more links/stuff. Feel free to make a pull request or complaint.

Why Do You Care?

  • Don't have to constantly google for tools/reminder.
  • Easily browsable list of tools, techniques, papers, and research in all sorts of areas.
  • Want to read some good info.

Why Do I Care?

  • I do this as a resource for myself(to teach others from) and offer it publicly as a way of giving back to the general community.
  • To be clear, these aren't personal notes. I keep this repo maintained as a way of having pointers to information that I feel help build someone's skillset or increase understanding of attacks/methods/defenses.
This page
  • This page isn't the best terrible on mobile. Use for better mobile formatting.
    • At some point I will sort the sections into a grid alphabetically.
  • For latest content updates, check here: Things added since last update
    • This will have all links added to the other pages sorted according to topic, making it easier to see new stuff.
  • All links on this page should work. Last tested 12/31
  • Contributions are welcome, format is pretty simple/easy to pick up, add anything not already in it that fits.

Index - Table of Contents