![Freeeside Logo](https://camo.githubusercontent.com/8824210474b9586405f0b11e210ea266599c9f83/68747470733a2f2f63646e2e7261776769742e636f6d2f467265657369646548756c6c2f4c6f676f732f6d61737465722f66726565736964655f7371756172655f706174682e737667 "Freeside Logo") ## Contents 1. [Introduction](README.md#introduction) - [Contributing](README.md#contributing) 2. [Hull University Resources](README.md#hulluniversity) - [Student Discount/Free Stuff](README.md#freestuff) 3. [Hull Resources (Non University)](README.md#hull) 4. [Business/Career](README.md#business) 5. [Services](README.md#services) 6. [Software](README.md#software) 7. [Programming](Programming.md) 8. [Ethics, Law & Professionalism](Ethics_Law_Professionalism.md) - [Ethics](Ethics_Law_Professionalism.md#ethics) - [Professionalism & Standards](Ethics_Law_Professionalism.md#standards) - [Law](Ethics_Law_Professionalism.md#law) 9. [Learning Resources](README.md#education) 10. [Linux Distributions](README.md#linux) 11. [Electronics](Electronics.md) 12. [Hypervisors and virtual machines](Virtualisation.md#virtualisation) - [Andrew Hancock, VMware Expert PRO](Virtualisation.md#andrewhancock) 13. [Cyber Security Resources](CyberSecurity.md) 14. [Other Interesting Stuff](README.md#misc) # Cyber Security List > ## Disclaimer: >Hacking without authorisation is illegal. > >Links to these materials are provided for reference only. Freeside is not responsible for your use of resources and you should seek permission before performing testing or exploitation systems not owned by yourself. > >Freeside will report malicious hacking to the University and/or legal bodies where appropriate. 1. [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q) (Youtube Channel) 2. [Capture the Flag Playlist](https://www.youtube.com/playlist?list=PLBf0hzazHTGOyRReqMyE-CDMWAQ5AgXO-). 3. [Metasploit Introduction Playlist](https://www.youtube.com/playlist?list=PLBf0hzazHTGN31ZPTzBbk70bohTYT7HSm). 4. [Ethical Hacking Introduction Playlist](https://www.youtube.com/playlist?list=PLBf0hzazHTGOEuhPQSnq-Ej8jRyXxfYvl). 5. [Python3 for Penetration Testing Playlist](https://www.youtube.com/playlist?list=PLBf0hzazHTGM_dncTqO9l-0zUQYP0nNPU) 6. [Hunchly](https://www.hunch.ly/) - The Only Web Capture Tool Designed For Online Investigations. 7. [Have I Been Pwned](https://haveibeenpwned.com/) 8. [Authy](https://authy.com) 9. [GCHQ Cyberchef](https://github.com/gchq/CyberChef) 10. [DuckDuckGo Smarter Encryption](https://github.com/duckduckgo/smarter-encryption) 11. [CIS Benchmarking](https://www.cisecurity.org/cis-benchmarks/) - Benchmarking tools to protect your environment 12. [Cyber Essentials Certificaton](https://www.ncsc.gov.uk/cyberessentials/overview) 13. [Privacy Tools](https://privacytools.io) 14. [Syclla.sh](https://scylla.sh/) - community-oriented database leak community that is a useful tool for security researchers. 15. [h8mail](https://github.com/khast3x/h8mail) - Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email 16. [TryHackMe](https://tryhackme.com/) - is an online platform for learning cyber security, using hands-on exercises and labs! 17. [Awesome OSINT](https://github.com/jivoi/awesome-osint) - List of OSINT Tools and resources 18. [Dark Reading](https://www.darkreading.com/) - Cyber Security News. 19. [Data Breach Today](https://www.databreachtoday.com/) - Data Breach News. 20. [Help Net Security](https://www.helpnetsecurity.com/) - Cyber Security News. 21. [Hackaday](https://hackaday.com/) - New hacks every day & interesting projects. 22. [Infosec Institute](https://www.infosecinstitute.com/resource-center/) - Info sec best practices & updates. 23. [Wireshark Packet Analysis](https://youtu.be/ZO46H_kI1bc) 24. [SSL Labs](https://ssllabs.com) - Test the HTTPS configuration of your web server online 25. [testssl.sh](https://testssl.sh/) - TLS configuration tester like SSL Labs, but runs locally 26. [Pentestlab](https://pentestlab.blog/) Blog. 27. [Securityaffairs](https://securityaffairs.co/wordpress/) Blog of Pierluigi Paganini. 28. [University of Maryland - Hardware Security](https://www.coursera.org/learn/hardware-security) 29. [University of Maryland - Software Security](https://www.coursera.org/learn/software-security) 30. [University of Maryland - Usable Security](https://www.coursera.org/learn/usable-security) 31. [GFTOBins](https://gtfobins.github.io/) - a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. 32. [LOLBAS](https://lolbas-project.github.io/) - Living off the land binaries, scripts and libraries. 33. [Attack Navigator](https://github.com/mitre-attack/attack-navigator) - Provides basic navigation and annotation of ATT&CK matrices.