Description:
This repository is a collection of cybersecurity resources generated by GPT, including links to articles, tutorials, tools, and other resources. These resources can help you learn about cybersecurity and stay up-to-date on the latest threats.
We Will Add More:
We are constantly adding new resources to this repository. If you find a resource that you think should be included, please let us know by submitting a pull request.
- Cybersecurity Tools
- Vulnerability Databases
- Tools - Malware Scanners
- Resources for Developers
- Competitions and Challenges
- Conferences and Events
- Associations and Organizations
- Meetups and Communities
- Job Boards and Platforms
- Certifications and Credentials
- Research and Academia
- Awareness and Education Resources
- Legislation and Policy
- News
- Career Resources
- Blogs and Podcasts
- Books and Whitepapers
- Contribute
- License
- Burp Suite
- Wireshark
- Nmap
- Metasploit
- Sysinternals Suite
- Revo Uninstaller
- Autoruns
- Process Explorer
- Security Onion
- Snort
- Suricata
- Bro
- SELKS
- OpenVAS
- Nessus
- Acunetix
- National Vulnerability Database (NVD)
- Common Vulnerabilities and Exposures (CVE)
- Exploit-DB
- VulDB
- SecurityFocus
- OSVDB (Open Sourced Vulnerability Database)
- Packet Storm
- Vulnerability-Lab
- CIRCL (Computer Incident Response Center Luxembourg) CVE Search
- Bugtraq
- Full Disclosure Mailing List
- Zero Day Initiative (ZDI)
- Inj3ct0r
- National Vulnerability Database Japan (JVN)
- NIST's National Checklist Program
- Secunia
- US-CERT (United States Computer Emergency Readiness Team)
- CERT/CC (Computer Emergency Response Team Coordination Center)
- Nmap NSE Scripts
- ZeroNights
- National Institute of Standards and Technology (NIST)
- ICS-CERT (Industrial Control Systems Cyber Emergency Response Team)
- Security Tracker
- Common Weakness Enumeration (CWE)
- SecurityWeek
- Common Vulnerability Reporting Framework (CVRF)
- Kaspersky Threat Intelligence Portal
- Tenable SecurityCenter
- Fortinet's FortiGuard Labs
- AlienVault Open Threat Exchange (OTX)
- Avast Threat Intelligence
- ThreatConnect
- Recorded Future
- FireEye Threat Intelligence
- Anomali ThreatStream
- GreyNoise Intelligence
- VirusTotal
- Malwarebytes
- Spybot - Search & Destroy
- AdwCleaner
- CCleaner
- HitmanPro
- Kaspersky VirusDesk
- Emsisoft Emergency Kit
- Avast Free Antivirus
- AVG AntiVirus Free
- Bitdefender Antivirus Free Edition
- Sophos Home
- Windows Defender
- 360 Total Security
- ClamWin
- Comodo Free Antivirus
- ESET Online Scanner
- F-Secure Online Scanner
- Trend Micro HouseCall
- Panda Free Antivirus
- SUPERAntiSpyware
- Zemana AntiMalware
- Windows Malicious Software Removal Tool
- AVG Anti-Spyware (formerly ewido)
- Norton Power Eraser
- MalwareFox
- HijackThis
- RogueKiller
- GridinSoft Anti-Malware
- VoodooShield
- Heimdal Free
- BullGuard Antivirus
- PCKeeper Antivirus
- Avira Free Security
Cybersecurity Resources for Developers
- OWASP Top 10: https://owasp.org/www-community/vulnerabilities/
- SANS Top 25 Most Dangerous Software Errors: https://www.sans.org/security-resources/top-25-software-errors/
- CWE/Common Weakness Enumeration: https://cwe.mitre.org/
- NIST SP 800-53: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- OWASP ZAP: https://owasp.org/www-community/zap/
- MITRE ATT&CK
- CERT Secure Coding Standards
- Open Web Application Security Project (OWASP) Cheat Sheet Series
- NIST Cybersecurity Framework
- NVD National Checklist Program (NCP)
- ISO/IEC 27001:2013
- ISO/IEC 27002:2013
- ISO/IEC 27005:2018
- ISO/IEC 27017:2015
- ISO/IEC 27018:2019
- CIS Critical Security Controls
- Secure Coding Guidelines for Java SE
- Secure Coding Guidelines for C and C++
- Secure Coding Guidelines for Python
- Secure Coding Guidelines for Ruby
- Mozilla Web Security Guidelines
- Microsoft Security Development Lifecycle (SDL)
- Google Cloud Security Foundations Blueprint
- DevSecOps Reference Architectures
- Security Innovation's Application Security Training
- Secure Code Warrior - Learning Platform
- Netsparker Web Application Security Scanner
- Veracode Application Security Testing
- Checkmarx Application Security Testing
- Contrast Security - Application Security Platform
- Fortify Application Security
- Acunetix Web Application Security
- SonarQube - Continuous Code Quality
- ThreadFix - Application Security Orchestration
- SecureAssist - Automated Security Code Review
- SecureStack - Cloud Security
- Schneier on Security
- Troy Hunt's Blog
- Brian Krebs' Blog
- Graham Cluley's Blog
- Bruce Schneier's Blog
- Trend Micro Blog
- FireEye Threat Research
- CrowdStrike Blog
- The CyberWire Blog
- Palo Alto Networks Blog
- Check Point Research
- Secureworks Blog
- Fortinet Blog
- SANS Internet Storm Center Diary
- The CyberWire Podcast
- Defensive Security Podcast
- Smashing Security Podcast
- Risk It! Podcast
- Brakeing Down Security Podcast
- Malicious Life Podcast
- Security In Five Podcast
- Recorded Future Podcast
- Darknet Diaries Podcast
- The Social-Engineer Podcast
- Hackable? Podcast
- Purple Squad Security Podcast
- "Social Engineering: The Science of Human Hacking" by Christopher Hadnagy - Amazon
- "The Web Application Hacker's Handbook" by Dafydd Stuttard and Marcus Pinto - Amazon
- "Network Security Essentials" by William Stallings - Amazon
- "Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" by Kevin Mitnick - Amazon
- "Zero Trust Networks: Building Secure Systems in Untrusted Networks" by Evan Gilman and Doug Barth - Amazon
- "Applied Cryptography: Protocols, Algorithms, and Source Code in C" by Bruce Schneier - Amazon
- "Hacking: The Art of Exploitation" by Jon Erickson - Amazon
- "Security Engineering: A Guide to Building Dependable Distributed Systems" by Ross J. Anderson - Amazon
- "Metasploit: The Penetration Tester's Guide" by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni - Amazon
- "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide" by Mike Chapple, James Michael Stewart, and Darril Gibson - Amazon
- "The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online" by Violet Blue - Amazon
- "The Tangled Web: A Guide to Securing Modern Web Applications" by Michal Zalewski - Amazon
- "CISSP All-in-One Exam Guide" by Shon Harris - Amazon
- "NIST Cybersecurity Framework" - NIST
- "The 2019 Official Annual Cybercrime Report" by Cybersecurity Ventures - Cybersecurity Ventures
- "Verizon Data Breach Investigations Report (DBIR)" - Verizon
- "Cyber Threat Intelligence Integration Center (CTIIC) Annual Report" - CTIIC
- "Cybersecurity and Infrastructure Security Agency (CISA) Insights: Risk Management for Novel Coronavirus (COVID-19)" - CISA
- "Palo Alto Networks: Unit 42 Threat Landscape Report" - Palo Alto Networks
- "McAfee Labs Threats Report" - McAfee
- "SANS Internet Storm Center Daily Network Security and Cyber Security Stormcast" - SANS ISC
- "Cisco Annual Internet Report (2021–2026)" - Cisco
- "Symantec Internet Security Threat Report (ISTR)" - Symantec
- "CrowdStrike Global Threat Report" - CrowdStrike
- "Microsoft Security Intelligence Report (SIR)" - Microsoft
- "Trend Micro Research" - Trend Micro
Cybersecurity Career Resources
- ISC² Career Center
- SANS CyberTalent
- CyberSecJobs
- InfoSec Jobs
- Women in CyberSecurity (WiCyS) Job Board
- LinkedIn Jobs - Cybersecurity
- Indeed Cybersecurity Jobs
- Glassdoor Cybersecurity Jobs
- Dice Cybersecurity Jobs
- SimplyHired Cybersecurity Jobs
- NIST Cybersecurity Workforce Framework
- CyberSeek Cybersecurity Career Pathway
- Cybersecurity Certification Roadmap
- CyberDegrees.org
- INL CyberCore Program
- Cybersecurity & Infrastructure Security Agency (CISA) Career Development
- National Initiative for Cybersecurity Education (NICE) Career Planning
- Federal Virtual Training Environment (FedVTE)
- Cybersecurity Training & Certifications - CompTIA
- Cybersecurity Workforce Framework - NICCS
- Cybersecurity Career Pathway - EC-Council
- CyberSecEd - Cybersecurity Education Resources
- CyberSN - Cybersecurity Job Search
- Security Cleared Jobs - Cybersecurity
- Security Jobs - Infosecurity Magazine
- CyberDegreesEDU - Cybersecurity Careers
- Cyber Talent Hub - Cybersecurity Job Opportunities
- CyberHire - Cybersecurity Jobs
Cybersecurity Competitions and Challenges
- DEF CON CTF: https://www.defcon.org/ctf/
- PicoCTF: https://picoctf.com/
- National Cyber League (NCL): https://www.nationalcyberleague.org/
- CyberPatriot: https://www.uscyberpatriot.org/
- SANS Capture the Flag (CTF) Competitions: https://www.sans.org/cyber-security-training/cybersecurity-competitions-challenges/
Cybersecurity Conferences and Events
- Black Hat USA: https://www.blackhat.com/us-23/
- DEF CON: https://defcon.org/
- RSA Conference: https://www.rsaconference.com/
- InfoSec World: https://www.infosecworld.com/
- Cyber Security Summit: https://www.cybersecuritysummit.com/
- Security BSides: https://www.securitybsides.org/
Cybersecurity Associations and Organizations
- Information Systems Security Association (ISSA): https://www.issa.org/
- American Society for Industrial Security (ASIS): https://www.asisonline.org/
- Open Web Application Security Project (OWASP): https://owasp.org/
- SANS Institute: https://www.sans.org/
- EC-Council: https://www.eccouncil.org/
- CompTIA: https://www.comptia.org/
- IEEE Cybersecurity Initiative: https://cybersecurity.ieee.org/
Cybersecurity Meetups and Communities
- Cybersecurity Meetups: https://www.meetup.com/topics/cybersecurity/
- Cybersecurity Subreddits: https://www.reddit.com/r/cybersecurity/
- Cybersecurity Slack Communities: https://cybersecurityslackcommunities.com/
- Cybersecurity Discord Servers: https://discord.gg/cybersecurity
Cybersecurity Job Boards and Platforms
- Cybersecurity Jobs: https://www.cybersecurityjobs.com/
- Indeed Cybersecurity Jobs: https://www.indeed.com/jobs?q=Cybersecurity&l=
- LinkedIn Cybersecurity Jobs: https://www.linkedin.com/jobs/search/?geoId=104647&keywords=Cybersecurity
- Dice Cybersecurity Jobs: https://www.dice.com/jobs?q=Cybersecurity&l=
- Monster Cybersecurity Jobs: https://www.monster.com/jobs/search/?q=Cybersecurity&where=
Cybersecurity Certifications and Credentials
- CISSP: https://www.isc2.org/certifications/CISSP
- CEH: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
- OSCP: https://www.offensive-security.com/certifications/oscp-offensive-security-certified-professional/
- OSCE: https://www.offensive-security.com/certifications/osce-offensive-security-certified-expert/
- GSEC: https://www.giac.org/certifications/gsec
- GCIH: https://www.giac.org/certifications/gcih
- GCIA: https://www.giac.org/certifications/gcia
Cybersecurity Research and Academia
- Cybersecurity Research Centers: https://www.sans.org/research/cybersecurity-research-centers/
- Cybersecurity Academic Programs: https://www.cisecurity.org/education/cybersecurity-academic-programs/
- Cybersecurity Research Publications: https://dl.acm.org/conference/ccs
- Cybersecurity Research Preprints: https://arxiv.org/abs/cs.CR
Cybersecurity Awareness and Education Resources
- STOP. THINK. CONNECT.: https://www.stopthinkconnect.org/
- National Cyber Security Awareness Month: https://www.cisa.gov/cybersecurity-awareness-month
- Cybersecurity Awareness Alliance: https://www.staysafeonline.org/
- Center for Internet Security (CIS): https://www.cisecurity.org/
Cybersecurity Legislation and Policy
- Cybersecurity and Infrastructure Security Agency (CISA): https://www.cisa.gov/
- National Institute of Standards and Technology (NIST): https://www.nist.gov/cybersecurity
- European Union Agency for Cybersecurity (ENISA): https://www.enisa.europa.eu/
- Cybersecurity and Infrastructure Security Agency (CISA): https://www.cisa.gov/
Cybersecurity News
- Bleeping Computer: https://www.bleepingcomputer.com/
- Dark Reading: https://www.darkreading.com/
- Infosecurity Magazine: https://www.infosecurity-magazine.com/
- CSO Online: https://www.csoonline.com/
- Security Boulevard: https://securityboulevard.com/
- Threatpost: https://threatpost.com/
- Security Week: https://www.securityweek.com/
- SC Media: https://www.scmagazine.com/
- CyberScoop: https://www.cyberscoop.com/
- Security Affairs: https://securityaffairs.co/
Help us grow! If you have suggestions or want to add more resources, follow the guidelines in CONTRIBUTING.md.
This repository is licensed under MIT License.