>Links to these materials are provided for reference only. Freeside is not responsible for your use of resources and you should seek permission before performing testing or exploitation systems not owned by yourself.
>
>Freeside will report malicious hacking to the University and/or legal bodies where appropriate.
14. [Syclla.sh](https://scylla.sh/) - community-oriented database leak community that is a useful tool for security researchers.
15. [h8mail](https://github.com/khast3x/h8mail) - Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
16. [TryHackMe](https://tryhackme.com/) - is an online platform for learning cyber security, using hands-on exercises and labs!
17. [Awesome OSINT](https://github.com/jivoi/awesome-osint) - List of OSINT Tools and resources
30. [University of Maryland - Usable Security](https://www.coursera.org/learn/usable-security)
31. [GFTOBins](https://gtfobins.github.io/) - a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
32. [LOLBAS](https://lolbas-project.github.io/) - Living off the land binaries, scripts and libraries.
33. [Attack Navigator](https://github.com/mitre-attack/attack-navigator) - Provides basic navigation and annotation of ATT&CK matrices.