Clone of https://github.com/rmusser01/Infosec_Reference . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
Robert 96fc94d3bb Changes(changed .txt to .md :p ) 7 years ago
Draft/Draft Changes(changed .txt to .md :p ) 7 years ago
_site Added Stuff/cleaned up some more sections 7 years ago
.gitattributes 💥🐫 Added .gitattributes & .gitignore files 8 years ago
.gitignore Changes(changed .txt to .md :p ) 7 years ago
README.md Update README.md 7 years ago

README.md

Infosec_Reference

Information Security Reference That Doesn't Suck

####Goal:

  • Make it informal, list of techniques by grouping, references, better version of RTFM
  • End goal is for it to be a rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches within infosec, or as a reference/recall method for other things.

#####This page

  • This page has links to some of the content on here. This is still very much a WIP. More content is within the Draft folder. If you want to contribute, feel free.
Offense(mostly) Defense(mostly) Other
Attacking/Defending Android Anonymity & Opsec & Privacy Building a Pen Test Lab
Attacking/Defending iOS Basic Security Information CTFs & Wargames
BIOS/UEFI/Firmware Attacks/Defense Counter Surveillance Cryptography & Encryption
Embedded Device Security Forensics & Incident Response Cheat sheets
Exfiltration Home Security Conference Recordings
Exploit Dev Honeypots Courses
Google Hacking CryptoCurrencies
Fuzzing Network Security Monitoring/Incident Response Darknets10
Lockpicking Threat Modeling Data Analysis/Visualization
Malware Disclosure
Network Attacks and Defense Disinformation
_ Documentation and Reporting
OSINT _ Interesting Things & Useufl Information
Passwords _ Programming Courses/References/Guides/Useful libs
Privilege Escalation and Post-Exploitation Sandboxes
Reverse Engineering SysAdmin Stuff
REMATH Reversse Engineering System Internals(not sysinternals Tools)
Rootkits UX Design
Social Engineering Steal Everything, Kill Everyone, Profit.
Wireless Networks & RF
Web Applications & Browsers
Wireless Networks and RF Devices