>Links to these materials are provided for reference only. Freeside is not responsible for your use of resources and you should seek permission before performing testing or exploitation systems not owned by yourself.
>
>Freeside will report malicious hacking to the University and/or legal bodies where appropriate.
- [h8mail](https://github.com/khast3x/h8mail) - Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
- [TryHackMe](https://tryhackme.com/) - is an online platform for learning cyber security, using hands-on exercises and labs!
- [Awesome OSINT](https://github.com/jivoi/awesome-osint) - List of OSINT Tools and resources
- [SSL Labs](https://ssllabs.com) - Test the HTTPS configuration of your web server online
- [testssl.sh](https://testssl.sh/) - TLS configuration tester like SSL Labs, but runs locally
- [Pentestlab](https://pentestlab.blog/) Blog.
- [Securityaffairs](https://securityaffairs.co/wordpress/) Blog of Pierluigi Paganini.
- [University of Maryland - Hardware Security](https://www.coursera.org/learn/hardware-security)
- [University of Maryland - Software Security](https://www.coursera.org/learn/software-security)
- [University of Maryland - Usable Security](https://www.coursera.org/learn/usable-security)
- [GFTOBins](https://gtfobins.github.io/) - a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
- [LOLBAS](https://lolbas-project.github.io/) - Living off the land binaries, scripts and libraries.
- [Attack Navigator](https://github.com/mitre-attack/attack-navigator) - Provides basic navigation and annotation of ATT&CK matrices.