Skip to content
/ sec-res Public

Useful resources for hackers ;)

Notifications You must be signed in to change notification settings

h0ek/sec-res

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

Hacker resources {under construction}

Useful resources for security analysts/researchers/hacker/bountyhunter/weirdos.

OS

Links to websites offering operating systems and virtual environments tailored for security analysts/bounty hunters.

Privacy & Security OS

Operating systems designed to prioritize user privacy and security.

Zero Days

Platforms dedicated to the exploration and disclosure of zero-day vulnerabilities.

CVE

Features websites related to Common Vulnerabilities and Exposures (CVE) information.

Device search engine

Consists of platforms specialized in scanning and indexing internet-connected devices.

Data analysis

Includes tools and platforms focused on processing and analyzing data.

Sandbox

Platforms dedicated to the analysis of suspicious files and behavior in a controlled environment.

URL/File/Hash Analysis

A variety of platforms dedicated to meticulously analyzing URLs, files, and cryptographic hashes for the purpose of enhancing security measures. These platforms play a critical role in identifying potential threats, assessing risks, and safeguarding against various cybersecurity risks.

Threat Intelligence

A diverse range of platforms dedicated to gathering, analyzing, and disseminating comprehensive information about potential cyber threats. These platforms serve as invaluable resources for security professionals, researchers, and organizations seeking to enhance their cybersecurity posture and stay ahead of evolving threats in the digital landscape.- Intelligence X

Phishing/Spam

Includes platforms that specialize in detecting and mitigating phishing attacks and spam emails. These platforms play a crucial role in maintaining online security by identifying fraudulent websites, malicious emails, and other deceptive tactics used by cybercriminals to steal sensitive information or spread malware.

Leaks/Passwords

Platforms dedicated to monitoring and providing information about data breaches and compromised passwords, helping individuals and organizations assess their exposure to cybersecurity risks.

Threat Database/Alerts

Platforms and resources dedicated to providing information about cybersecurity threats, vulnerabilities, and exploits. These platforms serve as valuable repositories of knowledge for security professionals, researchers, and organizations seeking to stay informed about emerging threats and vulnerabilities.

Honeypots

Focuses on platforms and solutions dedicated to deploying and managing honeypots, which are decoy systems designed to lure and detect malicious actors.

IP/Domain check

Platforms dedicated to examining and assessing the reputation and potential threat level associated with IP addresses and domains.

Network Tools

Platforms offering a variety of utilities and services for analyzing and managing network-related tasks.

Online Browser

Platforms that provide web-based browser emulation services, allowing users to access and interact with web content without installing additional software.

Mail Server checker

Platforms dedicated to assessing the reputation and reliability of mail servers by analyzing various factors such as spam reports, blacklists, and other indicators.

SSL Checker

Includes platforms designed to assess and analyze the security configuration of SSL/TLS certificates used by websites.

Web technology check

Platforms and tools dedicated to analyzing and identifying the technologies and frameworks used in websites and web applications.

Reverse Image Search

Platforms dedicated to searching for images based on their content rather than text-based queries.

Website stats and performance

Platforms dedicated to assessing the performance, security, and overall health of websites.

Web Archive

Platforms dedicated to archiving and preserving historical snapshots of web pages and websites.

DNS

Platforms and tools focused on analyzing, testing, and troubleshooting Domain Name System (DNS) configurations and records.

Browser leaks

Platforms and tools designed to detect and analyze potential information leaks from web browsers, helping users assess their online privacy and security.

Password hashes

Platforms and tools dedicated to decrypting and cracking password hashes, aiding in password recovery and security testing.

Decoders

Platforms and tools dedicated to decoding and converting encoded data into human-readable formats.

OSINT

Open-Source Intelligence category comprises platforms and resources dedicated to gathering, analyzing, and utilizing publicly available information for intelligence and investigative purposes.

Labs

Online platforms that provide hands-on cybersecurity training and practical learning environments for aspiring ethical hackers, penetration testers, and security professionals.

Ransomware Decrypt

Platforms and tools dedicated to identifying and decrypting ransomware-encrypted files, aiding victims of ransomware attacks in recovering their data.

Cloud

Platforms and tools focused on analyzing and discovering publicly accessible data stored in cloud storage services.

Living off the land binaries

Platforms and resources dedicated to documenting and exploring legitimate system binaries and utilities that can be abused by attackers for malicious purposes.