Welcome!
  • Socials
    YouTube GitHub Thingiverse Mastodon LinkedIn Google Developer OER Commons Profile
  • Classes
    Introduction to Linux Introduction to Data Introduction to Security Advanced Security Advanced Database Management Linux Administration
  • How to ...
    get a Tech Job
  • Smart Home Project (current)
  • About Me (current)
  • Overview
  • Ethics
  • Intro to Pen Testing
  • Reconnaissance
  • Enumeration
  • The Other Side
  • Exploitation
  • Web Exploitation
  • Firewalls
  • CSIRT/CERT
  • Disaster Recovery
  • Security Audits
  • Links to other Resources


Links to Resources

Search Engines Beyond Google
  • Shodan Search Engine for the Internet of Everything
  • How to Use Shodan
  • Cyber Defense Search Engine
  • Find email addresses and employee lists
  • Find open and unsecured Devices with this Chinese search engine
  • Find information on wireless networks
Magazines, reporters and experts in the field
  • SC Media
  • Infosecurity Group Magazines
  • Dark Reading
  • Information Security Magazine
  • Schneier on Security
  • CyberSecurity and Infrastructure Security Agency(USA Government)
  • Krebs on Security
  • Nicole Perlroth
  • Hacking Tools Cheat Sheet
  • Schneier on Security
Help using some common tools
  • How to use Magic Tree from creators(Reporting Software)
  • Dradis Support Documents from creators(Reporting Software)
  • How to use Magic Tree, Dradis and Metagoofil by Infosec Institute which is part of Cengage Group
  • Curating list of common fuzzing tools
  • Nmap documentation from the creators
  • Video:NMap 101: Fun With Firewalls! HakTip 102
  • Understanding NMap Part 1
  • Understanding NMap Part 2
  • Netcat:The swiss army knife
  • Netcat with examples!
  • Video:How a SQL Injection attack works
Capture the Flag (CTF)
  • Wargame site pwnable.kr (Start with Toddler's Bottle)
  • Hack This Site
  • CTFTime lists CTFs happening around the world
  • PicoCTF out of Carnegie Mellon University
Miscellaneous Resources
  • Deutsche Telekom showing live data on attacks
  • What every browser knows about you
  • SQL Injection Attack Infographics
  • Cheat sheets from OWASP

Creative Commons License
This work is licensed under a CC Attribution-NonCommercial 4.0 International License

Contact me: Email About me

Back to top