Photo Search:
- https://pimeyes.com
- https://www.betafaceapi.com/demo.html
- https://betaface.com/demo_old.html
- https://findclone.ru
- https://facecheck.id/
- https://search4faces.com/
- Яндекс.Зображення
Image Search:
- http://karmadecay.com
- https://tineye.com/
- https://www.image-search.org/
- https://images.google.com
- https://github.com/GONZOsint/gvision
Court Registries:
- https://court.gov.ua
- https://asvpweb.minjust.gov.ua
- https://xn--90afdbaav0bd1afy6eub5d.xn--p1ai/
- https://reyestr.court.gov.ua
- https://pravosud.com.ua
- https://conp.com.ua
Email and Phone Numbers:
- https://github.com/sundowndev/phoneinfoga
- https://epieos.com
- https://github.com/megadose/holehe
- https://hunter.io
- https://rocketreach.co
- https://emailrep.io/
- https://github.com/alpkeskin/mosint
- https://www.email-format.com/i/browse_letter/
- https://newapp.anymailfinder.com/search/
- https://snov.io
- https://phonebook.cz
- Getcontact
- https://web.truecaller.com/
- https://quickosint.com/
- https://infobazabot.org/
- https://universalsearch.io/
Temp Mail:
Email Analysis:
- https://www.freeedbviewer.com
- https://github.com/scoutforensic/EDB-Viewer
- https://www.mitec.cz/mailview.html
- https://www.systoolsgroup.com/ost-viewer.html
- https://www.systoolsgroup.com/pst-viewer.html
- https://toolbox.googleapps.com/apps/main
- https://mailheader.org
- https://www.iptrackeronline.com
Phishing:
- https://github.com/blark/cli-phisher
- https://github.com/jaykali/maskphish
- https://github.com/rsmusllp/king-phisher
Enumeration:
- dirbuster
- https://github.com/OJ/gobuster
- https://github.com/ffuf/ffuf
- https://github.com/epi052/feroxbuste
- fuzzer
- https://github.com/cddmp/enum4linux-ng
- http://pentestmonkey.net/tools/smtp-user-enum
DNS Tunneling:
- https://github.com/mdornseif/DeNiSe
- https://github.com/alex-sector/dns2tcp
- https://github.com/FedericoCeratto/dnscapy
- https://github.com/iagox86/dnscat2
- http://heyoka.sourceforge.net
- https://code.kryo.se/iodine/
- https://github.com/msantos/sods
- https://pdfs.semanticscholar.org/0e28/637370748803bcefa5b89ce8b48cf0422adc.pdf
- https://chrisdietri.ch/post/feederbot-botnet-using-dns-command-and-control/
Dumps:
- WhatBreach: https://github.com/Ekultek/WhatBreach
- LeakLooker: https://github.com/woj-ciech/LeakLooker
- Buster: https://github.com/sham00n/buster
- Scavenger: https://github.com/rndinfosecguy/Scavenger
- PwnDB: https://github.com/davidtavarez/pwndb
- h8mail: https://github.com/khast3x/h8mail
- https://github.com/MagnetForensics/dumpit-linux
Security Check:
- https://checkshorturl.com
- https://www.urlvoid.com
- https://safeweb.norton.com
- https://transparencyreport.google.com
- https://any.run
- https://mxtoolbox.com/emailhealth/
- https://lots-project.com/
- https://www.virustotal.com/gui/home/upload
- https://haveibeenpwned.com
Browsers:
Source Code:
People:
Usernames:
- https://github.com/TheYahya/enola
- https://github.com/WebBreacher/WhatsMyName/blob/main/INSTALLATION.md
- https://github.com/C3n7ral051nt4g3ncy/WhatsMyName-Python
- https://whatsmyname.app
- https://checkusernames.com
- https://github.com/p1ngul1n0/blackbird
- https://github.com/sherlock-project/sherlock
- https://instantusername.com/#/
- https://namecheckup.com
- https://namechk.com
Comprehensive Search Engines:
- https://x-ray.contact
- https://github.com/smicallef/spiderfoot
- https://github.com/laramies/theHarvester
- https://www.spokeo.com
- https://intelx.io
- https://www.onyphe.io
Vehicle Recognition:
- https://baza-gai.com.ua/
- https://carnet.ai
- https://vehicle-ai.vercel.app
- https://platerecognizer.com
- https://unda.com.ua
- https://bidfax.info
- https://ua.carplates.app/
Traffic:
Instagram:
- https://inflact.com/tools/instagram-search/
- https://storiesig.ninja/storiesdown/
- https://socialcatfish.com
- https://github.com/Datalux/Osintgram
- https://storysnooper.com
- https://github.com/Datalux/Osintgram
- https://instanavigation.com
Net/Servers:
- https://rapiddns.io
- https://dnsdumpster.com
- https://mxtoolbox.com
- https://hackertarget.com/ip-tools/
- https://www.shodan.io
- https://subdomainfinder.c99.nl
- https://www.dan.me.uk/tornodes
- https://ivre.rocks
- https://leakix.net
- https://app.netlas.io/host/
- https://www.vedbex.com/subdomain-finder/
- https://github.com/robertdavidgraham/masscan
Misc Web:
- https://github.com/beefproject/beef
- https://github.com/codebutler/firesheep
- https://lookup.icann.org/en
- https://github.com/aress31/jwtcat
- https://github.com/s0md3v/XSStrike
- https://2ip.ua/ua/
- https://crt.sh
- https://github.com/goclone-dev/goclone
- https://browserleaks.com
- https://github.com/jaeles-project/gospider
- https://github.com/rbsec/sslscan
- https://www.ssllabs.com/ssltest/
Websites:
- https://urlscan.io/
- https://www.ssllabs.com/ssltest/
- https://github.com/wpscanteam/wpscan
- https://crt.sh
Social Networks:
Telegram:
- https://github.com/ItIsMeCall911/Awesome-Telegram-OSINT
- https://web.archive.org/web/20230728130458/https://medium.com/@ibederov_en/active-methods-for-identifying-telegram-users-in-osint-9619d3f3538e
- https://www.telegramdb.org
- https://t.me/telesint_bot
- t.me/+
Telegram Bots:
- @VKHistoryRobot
- @telesint_bot
- @HowToFindRobot
- @HotToFindRU_Robot
- @HowToFind
- @UniversalSearchSuperBot
- https://infobazabot.org
- https://quickosint.org/index_en.php
- https://github.com/soxoj/maigret-tg-bot
Whois:
Social Engineering:
Passwords:
MAC Generator:
VPN Checker:
Malware:
- https://www.hybrid-analysis.com/
- https://github.com/malvuln/RansomLord
- https://www.malwarebytes.com
- https://github.com/marco-liberale/PasteBomb
- https://github.com/fabrimagic72/malware-samples
Foreign Resources:
Car Hacking:
Maps:
Darknet:
Google:
- https://github.com/opsdisk/metagoofil
- https://github.com/dwisiswant0/go-dork
- Google Dorking: site: inurl: intitle: intext: link: daterange: numrange: author: inanchor: cache:
Opendata:
- https://www.publicdatacheck.com
- https://cipher387.github.io/osintmap/
- https://opendatabot.ua
- https://abit-poisk.org.ua/
- https://youcontrol.com.ua
- https://www.lursoft.lv/en/data-bases-of-enterprises
- https://www.clarity-project.info
- https://amcu.clarityapp.pro
- https://vkursi.pro/
- https://claritycheck.com/en
Registries:
- https://usr.minjust.gov.ua/content/free-search
- https://data.gov.ua/
- https://se.diia.gov.ua/opendata
- https://asvpweb.minjust.gov.ua/#/search-debtors
- https://erb.minjust.gov.ua
- https://diia.gov.ua/services/informaciya-z-derzhavnogo-reyestru-rechovih-prav-na-neruhome-majno
- https://molfar.com/useful-apps-registers
- https://courses.prometheus.org.ua/assets/courseware/v1/399c7f8b0d1b550e5e88ca30a3877a62/asset-v1:Prometheus+OSINT101+2024_T3+type@asset+block/Російські_реєстри__1_.pdf
- https://leave-russia.org
- https://public.nazk.gov.ua/
Archives:
Extraction:
- https://github.com/Drew-Alleman/DataSurgeon
- https://github.com/soxoj/socid-extractor
- https://github.com/simsong/bulk_extractor
- https://github.com/denandz/KeeFarce
- https://cloudshot.com
- https://getsharex.com
- https://github.com/syncthing/syncthing
Blockchain:
Forensic Images:
- FTK Imager
- guymager
- Acronis True Image
- https://www.opentext.com/products/encase-forensic
- https://www.opentext.com/products/tableau-tx1-forensic-imager
Hashing:
Images and Disks:
Files:
- https://www.toolsley.com/file.html - file identifier
- https://www.passware.com/encryption-analyzer/
- https://github.com/libyal/libewf
- https://github.com/EricZimmerman/bstrings
Encryption:
- https://www.magnetforensics.com/resources/encrypted-disk-detector/
- https://sourceforge.net/projects/ecryptfs-p/
Browsers:
- https://github.com/eLoopWoo/chrome-url-dumper
- https://github.com/obsidianforensics/hindsight
- https://en.fawproject.com
File Recovery:
- https://www.cgsecurity.org/wiki/PhotoRec
- https://www.ccleaner.com/recuva
- https://www.r-studio.com/index.shtml
- https://github.com/Lazza/RecuperaBit
- https://www.shadowexplorer.com/downloads.html
- https://www.anyrecover.com
- https://www.softperfect.com/products/filerecovery
File Analysis:
Traffic and Network Analysis:
Artifact Search:
Memory Analysis:
Frameworks:
- https://github.com/arxsys/dff
- https://oxygenforensics.com/en/products/oxygen-forensic-detective/
- https://www.sleuthkit.org/autopsy/
Artifacts:
- https://github.com/SekoiaLab/Fastir_Collector
- https://www.pinguin.lu/fred
- https://github.com/PoorBillionaire/USN-Journal-Parser
- https://github.com/Lazza/RecuperaBit
Forensics:
- https://github.com/arxsys/dff
- https://hackyourmom.com/en/kibervijna/instrumenty-dlya-kompyuternoyi-kryminalistyky-forenzyky/
- https://digital-forensics.sans.org/community/downloads
- https://sumuri.com/software/paladin/
- https://www.autopsy.com
- https://www.sleuthkit.org
- https://xpertforensics.in/anti-forensics-techniques/
RAM Analysis:
- https://github.com/friendlyJLee/pmdump
- https://belkasoft.com/ram-capturer
- https://github.com/google/rekall
- https://www.magnetforensics.com/resources/magnet-ram-capture/
- https://fireeye.market/apps/211368
Registry:
Passwords:
Exploits:
Timestamps:
Logs:
Threat Intelligence:
- https://pulsedive.com
- https://binaryedge.io
- https://socradar.io
- https://www.zoomeye.hk
- https://viz.greynoise.io
- https://censys.com
- https://fullhunt.io
- https://fofa.info
- https://search.censys.io
Vulnerabilities:
Vulnerability Scanners:
- https://brakemanscanner.org
- https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
- https://wpscan.org/
- https://github.com/nccgroup/ScoutSuite
- https://wapiti.sourceforge.io/
- https://github.com/andresriancho/w3af
- https://www.open-scap.org/
- https://github.com/six2dez/reconftw
- https://github.com/robertdavidgraham/masscan
- https://learn.microsoft.com/uk-ua/defender-endpoint/safety-scanner-download
- https://github.com/CERT-Polska/Artemis
Threat Libraries:
- https://abuse.ch
- https://bazaar.abuse.ch/browse/
- https://feodotracker.abuse.ch/blocklist/
- https://sslbl.abuse.ch/blacklist/
- https://urlhaus.abuse.ch/browse/
- https://threatfox.abuse.ch/browse/
- https://yaraify.abuse.ch/scan/
- https://misp-galaxy.org/
- https://malpedia.caad.fkie.fraunhofer.de/actors
- https://github.com/TheCyberArcher/Awesome-cyber-criminal-list
- https://macos.checkpoint.com
- https://www.malware-traffic-analysis.net/index.html
- https://search.libraryofleaks.org/
- https://isc.sans.edu
- https://www.exploit-db.com
News:
- https://cert.gov.ua/articles
- https://blog.redteam-pentesting.de
- https://cocomelonc.github.io
- https://cybernews.com
- https://www.securityweek.com
- https://www.technewsworld.com
- https://therecord.media/news/cybercrime
- https://news.ycombinator.com/news
- https://onehack.us
- https://vx-underground.org/tmp
Analytic materials:
- https://cip.gov.ua/ua/statics/analitichni-materiali-derzhspeczv-yazku
- https://media.defense.gov/2025/May/21/2003719846/-1/-1/0/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF
- https://t.me/cricket404_team/1200
- https://t.me/cricket404_team/1202
Opt out:
- https://myactivity.google.com/dark-web-report/setup-profile
- https://justwhatsthedata.github.io
- https://justgetmydata.com/uk/
- https://justdeleteme.xyz
- https://monitor.mozilla.org
- https://haveibeenpwned.com
- https://www.accountkiller.com/en/all-sites
- https://www.optery.com/opt-out-guides/
- https://prism-break.org/en/
- https://github.com/The-Osint-Toolbox/Privacy-Opt-Out
- https://joindeleteme.com
- https://www.kanary.com
- https://tweetdelete.net
- https://blog.withjumbo.com
- https://redact.dev
Misc Networking:
- https://www.whatismyip.com
- https://angryip.org
- https://github.com/tecknicaltom/dsniff
- https://www.winpcap.org/windump/
- https://www.netresec.com/?page=NetworkMiner
- Wireshark, tshark, netstat, Arkime
- https://github.com/byt3bl33d3r/CrackMapExec
- https://github.com/hrbrmstr/silk/tree/master
Wi-Fi:
- https://wigle.net
- https://play.google.com/store/apps/details?id=com.staircase3.opensignal&hl=uk
- https://www.acrylicwifi.com/en/wifi-analyzer/
- https://www.ekahau.com/products/ekahau-connect/ai-pro/
- https://play.google.com/store/apps/details?id=com.wilysis.cellinfolite
- https://kismac-ng.org
- https://github.com/derv82/wifite2
- https://github.com/The-Art-of-Hacking/h4cker/blob/master/wireless_resources/virtual_adapters.md
- https://github.com/s0lst1c3/eaphammer
- https://github.com/aircrack-ng/mdk4
- https://gitlab.com/kalilinux/packages/reaver
- https://gitlab.com/kalilinux/packages/fern-wifi-cracker
- https://github.com/mustafashykh/router-scan
Bluetooth:
- https://gitlab.com/kalilinux/packages/spooftooph
- https://github.com/securing/gattacker
- https://github.com/system-linux/FazJammer
- bluesnarfer
Various Attacks:
- https://github.com/Err0r-ICA/Ransomware
- https://github.com/topics/email-bomber
- https://itarmy.com.ua/instruction/
- https://cyberarmy.com.ua/?docs=windows/ddos-tools
- https://github.com/topics/ddos-attack-tools
- https://github.com/tomac/yersinia
- https://github.com/nottinghamprisateam/pyersinia - DDoS
- https://github.com/swisskyrepo/PayloadsAllTheThings - DDoS
- https://swisskyrepo.github.io/InternalAllTheThings/
- https://swisskyrepo.github.io/HardwareAllTheThings/
- https://www.ettercap-project.org - MitM
- packetforge-ng, scapy - Packets
Keyloggers:
- https://www.keelog.com/ua/keylogger/
- Ardamax Keylogger
- Spyrix
- EliteKeylogger
- KeyGrabber USB
Drainers:
Payloads:
Windows:
- https://github.com/ropnop/windapsearch
- https://windirstat.net
- https://www.microsoft.com/en-us/download/details.aspx?id=50034
- https://massgrave.dev
- https://github.com/lassehauballe/Eternalblue
- https://www.shadowexplorer.com
Lock Screen:
SQL:
RAM:
- https://github.com/ShaneK2/inVtero.net
- https://github.com/volatilityfoundation/volatility3
- https://github.com/google/rekall
- https://github.com/denandz/KeeFarce
Cloud/Containers:
- https://github.com/andresriancho/nimbostratus
- https://github.com/quay/clair
- https://github.com/falcosecurity/falco
- https://github.com/eliasgranderubio/dagda
- https://github.com/anchore/grype
- https://github.com/aquasecurity/kube-hunter
- https://github.com/aquasecurity/kube-bench
- https://github.com/initstring/cloud_enum
- https://github.com/nccgroup/ScoutSuite
- https://github.com/0xsha/CloudBrute
- https://github.com/RhinoSecurityLabs/pacu
- https://cloudcustodian.io
- https://rclone.org
Wordlist Compilers:
Reverse Shell:
- https://github.com/mandiant/flare-vm
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com
IMSI:
- https://github.com/Oros42/IMSI-catcher
- https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
eSIM:
Maps:
- https://livingatlas.arcgis.com/wayback
- https://www.cellmapper.net/
- https://cyber-boroshno.com.ua/
- https://deepstatemap.live
- https://www.arcgis.com/
- https://www.f4map.com/
- https://earth.google.com/
- https://geohints.com/
- https://www.geonames.org/
- https://www.mapbox.com/
- https://meteofrance.com/
- https://earthobservatory.nasa.gov/
- https://firms.modaps.eosdis.nasa.gov/
- https://www.nationsonline.org/oneworld/map/world_map.htm
- https://wikimapia.org
- https://firms.modaps.eosdis.nasa.gov
- https://earthkit.app
- https://cwwp2.dot.ca.gov
- https://geospy.ai
Satellites:
Cell Towers:
- https://www.satphonecity.com/
- https://www.opensignal.com/
- https://www.peeringdb.com/
- https://www.openstreetmap.org/
- https://worldview.earthdata.nasa.gov/
Drones:
Nature:
- https://identify.plantnet.org/
- https://www.outdoormap.com/
- https://disasterscharter.org/
- https://merlin.allaboutbirds.org
- https://ebird.org/home
- https://peakvisor.com/en
- https://www.suncalc.org
- https://github.com/bellingcat/ShadowFinder
- https://play.google.com/store/apps/details?id=com.jurfixapp.devibuh&hl=uk
- https://github.com/VicenteVivan/geo-clip
- https://www.sunsurveyor.com
Steganography and Metadata:
- https://steghide.sourceforge.net
- https://github.com/shankarnarayank/steganography
- https://github.com/chishaxie/BlindWaterMark
- https://github.com/mattkwan-zz/snow
- https://www.abc.se/~re/Coagula/Coagula.html
- https://www.sonicvisualiser.org
- https://github.com/laramies/metagoofil
- https://www.sodapdf.com/pdf-tools/ocr-pdf/
- https://github.com/Jpinsoft/DeepSound
- https://github.com/dasveloper/Scrambly
- https://github.com/tbpaolini/PyJpegDecoder
- https://29a.ch/photo-forensics/
- https://github.com/ImpulseAdventure/JPEGsnoop/
- https://fotoforensics.com
- https://www.openstego.com
- https://exiftool.org
- https://github.com/ElevenPaths/FOCA
System Tools:
- https://www.nirsoft.net
- https://learn.microsoft.com/en-us/sysinternals/downloads/
- https://www.systemtools.com/somarsoft/index.html
- https://sectools.org
- https://labs.ece.uw.edu/nsl/students/alomair/LB-Arabic/general/forensic-tools/index.html
- https://www.aida64.com/downloads
- https://www.ccleaner.com/speccy/download
Debugging Tools:
- https://sourceware.org/gdb/
- https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/
- https://www.ollydbg.de
- https://github.com/eteran/edb-debugger
- https://hex-rays.com/ida-free
- https://github.com/kbandla/ImmunityDebugger
- objdump, IDA, Ghidra, radare2, Binary Ninja, OllyDbg
Fuzzers:
- https://www.sonarsource.com/products/sonarqube/
- https://github.com/google/AFL
- https://find-sec-bugs.github.io
- https://spotbugs.github.io
- https://github.com/calebstewart/peach
- https://github.com/Cisco-Talos/mutiny-fuzzer
PowerShell:
- https://learn.microsoft.com/en-us/powershell/scripting/samples/sample-scripts-for-administration?view=powershell-7.4
- https://github.com/bitsadmin/nopowershell
- https://github.com/PowerShellMafia/PowerSploit
Disk Images:
- https://www.exterro.com/ftk-product-downloads/ftk-imager-4-7-3-81
- https://github.com/orlikoski/Skadi
- https://github.com/ralphje/imagemounter
- https://www.caine-live.net
- dc3dd, dcfldd, guymager, Acronis True Image, libewf, xmount
Misc OSINT:
- https://hunch.ly
- https://osintkit.net
- https://scanbe.io
- https://n9.cl/mjw12q
- https://www.fakenamegenerator.com/
- https://thispersondoesnotexist.com/
Metasploit:
Compilations:
- https://www.molfar.global/useful-apps
- https://osintframework.com
- https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools
- https://github.com/topics/mrrobot
- https://github.com/orgs/bellingcat/repositories?type=all
- https://www.lopseg.com.br/osint
- https://github.com/OWASP/wstg/blob/master/document/6-Appendix/A-Testing_Tools_Resource.md
- https://www.sans.org/tools/?focus-area=digital-forensics&per-page=100
- https://www.sans.org/posters/?focus-area=digital-forensics&content-language=english&per-page=100
- https://github.com/thimbleweed/All-In-USB/tree/master/utilities
- https://www.toolwar.com/search/label/Forensics
- https://www.mitec.cz/index.html
- https://www.systoolsgroup.com/products.html
- https://ericzimmerman.github.io/#!index.md
- https://github.com/topics/hacking-tools
- https://sectools.org
- https://github.com/netstalking-core/netstalking-osint
- http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
- https://www.magnetforensics.com/free-tools/
- https://www.mitec.cz/index.html
- https://github.com/topics/forensics?l=c%23
- https://offsec.tools
- https://github.com/giuliacassara/awesome-social-engineering
- https://github.com/topics/osint
- https://github.com/The-Art-of-Hacking
- https://www.blackhatethicalhacking.com/articles/reverse-engineering-hacking-tools/
- https://github.com/The-Art-of-Hacking/h4cker/tree/master/osint
- https://bellingcat.gitbook.io/toolkit
- https://truth-hounds.org/compendium/
- https://inteltechniques.com/tools/index.html
- https://ericzimmerman.github.io/#!index.md
CTF Tools:
- https://crackstation.net - password hash cracker
- https://www.boxentriq.com/code-breaking/cipher-identifier
- https://qrscanner.net
- https://hexed.it
- https://gchq.github.io/CyberChef/
- https://www.cachesleuth.com/multidecoder/
- https://www.dcode.fr/en
- https://planetcalc.com/2468/ - vigenere cipher
- https://findhow.org/5076-shifr-vizhenera-onlajn.html
- https://databorder.com/transfer/morse-sound-receiver/
- https://dogbolt.org - decompiler explorer
- https://www.base64decode.org
- https://calculatorium.ru/cryptography/atbash-cipher
- https://tools.icoder.uz - steganography
- https://29a.ch/photo-forensics/#forensic-magnifier - metadata
- https://exif.tools
- https://emn178.github.io/online-tools/md5_checksum.html
- https://www.asciitohex.com
- https://mh-nexus.de/en/hxd/ - hex editor
- CTF Tools
AI:
- https://www.aixploria.com/en/ultimate-list-ai/
- https://chatgpt.com/g/g-mGe6Ny2Ej-cybersecurity-nmap-wireshark-metasploit-snort
- https://chatgpt.com/g/g-kox62b9Hu-cybgpt-cyber-security-cybersecurity
- https://github.com/Cinnamon/kotaemon
Misc:
- Subnet Calculator
- Free Web Proxy
- Encrypted File Sharing
- Malware Analysis
- Accounts Removal
- MalwareBytes
- Have I Been Pwned
- Darknet OPSEC 2022
- https://spyware.neocities.org/articles/
- https://www.securemessagingapps.com
- Windows PowerToys
- NIST CSF Framework 2.0
- IT Audit Checklist Templates
- GDPR Documentation Toolkit
- Router Passwords
- Linux Kernel parameters
- Windows Events to Monitor
- https://bellard.org/jslinux/
- Windows GodMode: GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
- https://www.iban.com/iban-checker
- CoreRuleSet for ModSecurity
- MAC Vendors
- Ultra Security
- Windows Rewrite Disks with Zeroes: cipher /w:F:\Test
- Recover TG Account
- https://github.com/nvbn/thefuck
- Interview Questions and Answers
- https://www.sans.org/posters/
- https://github.com/Semperis/EntraGoat
- https://github.com/hackthebox/cyber-apocalypse-2025
- https://github.com/brootware/awesome-cyber-security-university
- https://roadmap.sh/cyber-security
- https://neetcode.io
- https://tryhackme.com/r/hacktivities
- https://www.hackthebox.com
- https://blueteamlabs.online
- https://www.virtualhackinglabs.com
- https://academy.hackthebox.com
- https://ctf.hacker101.com
- https://overthewire.org/wargames/
- https://sourcing.games
- https://owasp.org/www-project-top-ten/
- https://cryptopals.com
- https://portswigger.net/web-security
- https://pentesterlab.com/exercises/web_for_pentester/course
- https://pentesterlab.com/exercises/web_for_pentester_II/course
- https://picoctf.org/index.html#picogym
- https://www.hacksplaining.com/lessons
- https://www.letsdefend.io
- HackTricks
- Free ISO/IEC
- Top 100 Free Red Team Tools
- Metasploit Cheat Sheet
- https://github.com/digininja/DVWA
- https://github.com/opsxcq/docker-vulnerable-dvwa
- https://github.com/OWASP/crAPI
- https://github.com/Morronel/stalker-lab/tree/main
- https://ctftime.org/event/1071/tasks/
- https://github.com/onealmond/hacking-lab/tree/master
- https://ctf.hackthebox.com
- https://www.hackthebox.com/machines
- https://overthewire.org/wargames/
- https://crackmes.one
- https://u.cisco.com/challenges
- https://learn.fortiphyd.com
- https://www.vulnhub.com
- https://www.w3schools.com/sql/trysql.asp?filename=trysql_select_all
- https://sqlpd.com
- https://demo.mt.lv
- https://play.instruqt.com/embed/redhat/tracks/writing-first-playbook
- https://leetcode.com
- https://learngitbranching.js.org
- https://pnetlab.com/
- https://www.geoguessr.com
- https://sourcing.games
- https://openguessr.com
- https://github.com/vinta/awesome-python
- https://www.examcompass.com
- https://www.cyberseek.org/pathway.html
- https://www.cybrary.it
- https://publish.obsidian.md/addielamarr/00+Home+MOC
- https://www.sans.org/mlp/free-cybersecurity-events/
- https://infosec-conferences.com
- https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool
- https://itexamanswers.net/ccna-2-v7-0-curriculum-module-2-switching-concepts.html
- https://echothislabs.com/course/index.php?categoryid=1
- https://ua.udemy.com/course/mikrotik-network-associate-with-labs/
- https://ua.udemy.com/course/nist-cybersecurity-framework/
- https://mikrotik.ua/course/mtcna-online-offline/254
- https://github.com/nixawk/pentest-wiki
- https://iha089.org
- https://yak.dslua.org
- https://microsoft.github.io/SOC/source/content/
- https://github.com/markets/awesome-ruby
- https://github.com/nipunjaswal/networkforensics
- https://aws.amazon.com/architecture/well-architected/
- https://learn.microsoft.com/en-us/azure/well-architected/
- https://forensics.wiki
- https://explore.skillbuilder.aws/learn/signin - AWS Cloud Certifications
- https://learn.microsoft.com/en-us/training/azure/ - Microsoft Learn for Azure
- https://cloud.google.com/learn/training - Google Cloud Training
- https://digitaldefynd.com/best-ccna-security-courses/ - CCNA Security Courses
- https://codered.eccouncil.org/course/network-defense-essentials - Network Defense Essentials by EC Council
- https://codered.eccouncil.org/course/ethical-hacking-essentials - Ethical Hacking Essentials by EC Council
- https://codered.eccouncil.org/course/digital-forensics-essentials - Digital Forensics Essentials by EC Council
- https://www.isc2.org/Certifications/ - Certifications by ISC2
- https://www.splunk.com/en_us/training/free-courses/overview.html - Splunk
- https://training.linuxfoundation.org/training/developing-secure-software-lfd121/ - Secure Software Development
- https://www.classcentral.com/course/software-security-1728 - Maryland Software Security
- https://www.classcentral.com/course/youtube-stanford-seminar-engineering-cyber-resiliency-a-pragmatic-approach-110018/classroom - Stanford Cyber Resiliency
- https://arcx.io/courses/cyber-threat-intelligence-101 - Cyber Threat Intelligence
- https://www.netacad.com/courses/ - Courses by Cisco
- https://training.fortinet.com/ - Network Security Essentials by Fortinet
- https://www.open.edu/openlearn/science-maths-technology/information-security?active-tab=description-tab - Information Security by OpenLearn
- https://www.open.edu/openlearn/digital-computing/network-security?active-tab=description-tab - Network Security by OpenLearn
- https://www.open.edu/openlearn/money-business/risk-management?active-tab=description-tab - Risk Management by Open Learn
- https://www.udacity.com/course/intro-to-information-security--ud459 - Intro to Information Security by Udacity
- https://www.udacity.com/course/network-security--ud199 - Network Security by Udacity
- https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency - Dark Web, Anonymity, and Cryptocurrency by EC Council
- https://www.open.edu/openlearn/science-maths-technology/digital-forensics?active-tab=description-tab - Digital Forensics by Open Learn
- https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat - Android Bug Bounty Hunting: Hunt Like a Rat
- https://www.qualys.com/training/ - Vulnerability Management
- https://www.classcentral.com/course/software-security-1728 - Software Security
- https://training.linuxfoundation.org/training/developing-secure-software-lfd121/ - Developing Secure Software
- https://taggartinstitute.org/p/responsible-red-teaming - RedTeaming
- https://www.nist.gov/cyberframework
- Reverse Engineering for Beginners
- Kali Linux Revealed (2021)
- https://pdfdrive.com.co
- https://llhlf.com
- https://open.umn.edu/opentextbooks
- https://csc-knu.github.io/sys-prog/books/Andrew%20S.%20Tanenbaum%20-%20Computer%20Networks.pdf
- https://toc.cryptobook.us/book.pdf
- https://www.crypto101.io
- https://edu.anarcho-copy.org/Against%20Security%20-%20Self%20Security/Cybersecurity_Ops_with_bash_Attack.pdf
- https://www.r-5.org/files/books/computers/internals/net/Richard_Stevens-TCP-IP_Illustrated-EN.pdf
- https://cryptobook.nakov.com
Defensive Security:
- https://d3fend.mitre.org
- https://airtable.com/app37L1lMD9SoMzn4/shr0dETA6L3yxezjt/tblHGK8EwVCZLE6Mw?viewControls=on
- Firewalls: iptables, firewalld, ufw, Guarddog, Vuurmuur, Gufw, Shorewall, nftables, Firewall Builder
- Security Auditing: auditd, openSCAP, openVAS, Nmap, Nikto, Zenmap, SpiderFoot, skipfish, Nessus, Nexpose, OpenVAS
- Malware Detection: chkrootkit, rkhunter, Lynis, LMD
- Access Control: SELinux, AppArmor, Smack, Grsecurity, Yama, chkacct, tiger, PAM
- Sandboxing: Bubblewrap, Seccomp, Firejail, Flatpak, Snappy, Chroot Jail, CuckooSandbox
- IDS/IPS/SIEM: Snort, Suricata, Zeek, OSSEC, AIDE, Security Onion, OSSIM, CrowdSec, Kismet, Wazuh, splunk, LogRhythm
- File Integrity Monitoring: Tripwire, Auditd, Auditbeat, Samhain, OSSEC, Wazuhm Osquery, Atomic OSSEC
- Antivirus: CrowdStrike, ClamAV, Rspamd
- Log Monitoring: Logwatch, ELK Stack, Netdata, logwatch, Graylog, Sagan, Fluentd, OpenObserve, Dynatrace, logcheck, syslog-ng
- Backups: Déjà Dup, luckyBackup
- Configurations: Ansible, Chef, Puppet, Salt Project, Terraform
- Encryption/Cryptography: openssl, gpg, dm-crypt, fscrypt, EncFS, cryptsetup, Veracrypt, Gocryptfs, eCryptfs, SecureFS, bcrypt, argon2, RSA
- Secure Shell: openssh, SSHGuard, DenyHosts, Knockd, Fail2ban, putty
- Password Security: John the Ripper, Hashcat, KeePassXC, pwgen, GoPass, epasswd
- VPN: IPsec, strongSwan, OpenVPN, WireGuard, Libreswan, SoftEther
- Patch Management: Spacewalk, Katello, RH Satellite, Landscape, NinjaOne
- Network Monitoring: Wireshark, Scapy, tcpdump, tshark
- WAF: ModSecurity, NAXSI, BunkerWeb, Coraza, open-appsec
- Honeypots: Kippo, Cowrie, Dockpot, HonSSH
- EDR: Cortex XDR, Cynet360, FortiEDR
- Incident Management: TheHive, GRR Rapid Response, VERIS
- Threat Intelligence: MISP, MSTICPy
- Mail Security: Proxmox
- OS Analysis: HELK, Volatility, RegRipper, osquery
- Containers: Docker Bench, Calico, Clair, gVisor, Grafeas, Falco, Dagda, Cilium, Dockle
- API: Postman
Offensive Security:
- https://attack.mitre.org
- Reconnaissance: recon-ng, theHarvester, Nmap, Zenmap, DNSRecon, Netdiscover, Maltego, p0f, Zmap, Masscan, Unicornscan, sqlmap, RustScan, Amass,
- Credential Dumping: Mimikatz, Dumpert, nanodump, forkatz, Pypykatz, LaZagne
- Exfiltration: SharpExfiltrate, DNSExfiltrator, Egress-Access
- Vulnerabilities: OpenVAS, w3af, Vuls, Nikto, Nessus
- Networks: Wireshark, pfSense, Arkime, Ettercap, ArpSpoof, NetCat, dsniff, Scapy, hping3, Yersinia, maccanger, iproute2, thc-ssl-dos, Cutwail botnet, db1000n, MHDDoS
- Password Security: John the Ripper, Hashcat, Crunch, Medusa, Hydra, Rainbowcrack, CeWL, crowbar, fcrackzip, Ophcrack, Patator
- Mobile Security: Frida, Drozer, ANdroguard, MobSF, MASTG, NetHunter, Android Tamer, Apktool, Quark Engine, bettercap, Needle, ApkX, objection, APKStudio
- Reverse Engineering: Angr, Ghidra, Radare2
- Wireless Attacks: Kismet, Wifite, Aircrack-ng, airgeddon, WiFi Pumpkin, PixieWPS
- Social Engineering: Gophish, SET, PhishX, King Phisher, EvilURL
- Pentesting: Burp Suite, OWASP ZAP, Arachni, Wfull, Skipfish, Cobalt Strike
- Reporting: Faraday, Serpico, Dradis, DefectDojo, MagicTree, Lair-framework
- Credentials: John the Ripper, Cain and Abel, Hashcat, Hydra, RainbowCrack, Medusa, Ncrack, CeWL, w3af, Mimikatz, Patator, Brute-X
- Exploitation: Metasploit, XSSer, SearchSploit, Pwntools, Exploit-DB, Commix, Ropper, ysoserial, ShellNoob, RouterSploit, BeEF, Armitage, sqlmap, jSQL Injection, PTF, SQL Ninja, Exploit Pack, Pupy
- Post-Exploitation: Mimikatz, Koadic, Meterpreter, BeRoot, Pwncat, Dnscat2, Bloodhound, Pupy, Empire Project, Empire, BeRoot
- Persistence: RDP, Apple Remote Desktop, VNC, X11 Forwarding
- DNS: dig, dnsrecon, dnsx
- C2: Socat, Twittor, WSC2
- Evasion: Veil, TOR
- https://gist.github.com/sundowndev/283efaddbcf896ab405488330d1bbc06
- https://www.exploit-db.com/google-hacking-database
- https://hackyourmom.com/en/osvita/google-dorks-opanovuyemo-mystecztvo-poshukovyh-zapytiv/
- site - обмежує пошук результатами з відповідного вебсайту (site:example.com)
- filetype - шукає файли певного типу (filetype:pdf site:example.com)
- intitle - шукає сторінки, у заголовках яких міститься певне слово (intitle:"index of")
- allintitle - шукає всі слова у заголовку сторінок (allintitle:login password)
- inurl - шукає сторінки, URL яких містить певне слово (inurl:admin)
- cache - відображає кешовану версію вебсторінки (cache:example.com)
- allintext - шукає всі слова в тексті сторінок (allintext:username password filetype:txt)
- related - відображає вебсайти, схожі на вказаний (related:example.com)
- link - шукає сторінки, що містять посилання на вказаний сайт (link:example.com)
- "key phrase" - шукає точну фразу ("admin login")
- &udm=14 - вимкнення ШІ в результатах пошуку
Приклади запитів:
- пошук файлів з паролями - filetype:txt inurl:"password"
- пошук відкритих FTP-директорій - intitle:"index of" inurl:ftp
- пошук конфігураційних файлів з паролями - filetype:config "password"
- пошук камер відеоспостереження - inurl:view/view.shtml
- пошук адмінпанелей - inurl:admin intitle:login
- пошук конфігурацій серверів - intitle:index.of .htaccess
- пошук файлів баз даних - filetype:sql intext:"CREATE TABLE"
- пошук конфіденційних файлів - filetype:xls site:example.com "password"
- inurl:"/private" intext:"index of /" "win64" -litespeed
- Методичні рекомендації щодо підвищення рівня кіберзахисту критичної інформаційної інфраструктури (№601)
- Деякі питання розробки, затвердження та погодження планів захисту об’єктів критичної інфраструктури за проектною загрозою національного рівня «кібератака кіберінцидент» (№627/772)
- План реагування на кіберінциденти та кібератаки (№299)
- Методичні рекомендації щодо реагування суб’єктами забезпечення кібербезпеки на різні види подій у кіберпросторі (№570)
- Документи міжнародних організацій та країн-партнерів у сфері кіберзахисту
- Про затвердження Загальних вимог до кіберзахисту об’єктів критичної інфраструктури
- Інструмент оцінки кібербезпеки CSET
- Рекомендації CERT-UA
- Про затвердження Базових заходів з кіберзахисту та Методичних рекомендацій щодо здійснення базових заходів з кіберзахисту (№54)
- Нормативні документи системи ТЗІ
- Закон України «Про внесення змін до деяких законів України щодо захисту інформації та кіберзахисту державних інформаційних ресурсів, об’єктів критичної інформаційної інфраструктури»
- Закон України «Про інформацію»
- Закон України «Про захист інформації в інформаційно-комунікаційних системах»
- Закон України «Про основні засади забезпечення кібербезпеки України»
- Про затвердження Правил забезпечення захисту інформації в інформаційних, електронних комунікаційних та інформаційно-комунікаційних системах
- Деякі питання захисту інформаційних, електронних комунікаційних, інформаційно-комунікаційних, технологічних систем
- Про затвердження Положення про організаційно-технічну модель кіберзахисту
sudo apt-get update && sudo apt-get upgrade --fix-missing && sudo apt -y full-upgrade && sudo apt-get autoclean && sudo apt-get autoremove
apt-get dist upgrade
neofetch
oneko