- Alain Riccobene -

Aller au contenu | Aller au menu | Aller à la recherche

jeudi, janvier 12 2023

Alain RICCOBENE. "Que dois-je faire pour n'avoir aucun regret avant de mourir ?" Hommage, la vie est courte, mais nous sommes unique. Merci à vous.

Barre personnelle

 * Google [https://www.google.com/
 * Duck [https://duckduckgo.com/
 * s [https://jumps.io/
 * Gestionnaire de modules complémentaires [about:addons
   ToDo
 * Cyber Aces - System Administration | SANS Institute
   [https://www.sans.org/cyberaces/system-administration/
 * CS50's Introduction to Computer Science | edX
   [https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
 * All of the Best Links and Resources on Cyber Security. - s0cm0nkey's
   Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * ANSIBLE - 2. NOTIONS ET DEFINITIONS - YouTube
   [https://www.youtube.com/watch?v=tirjpYSMkkM&list=PLn6POgpklwWoCpLKOSw3mXCqbRocnhrh-&index=3
 * xavki - YouTube [https://www.youtube.com/c/xavki-linux/playlists
 * Kali Linux LXC/LXD Images | Kali Linux Documentation
   [https://www.kali.org/docs/containers/kalilinux-lxc-images/
 * Exercices de théorie de la musique | Musicca
   [https://www.musicca.com/fr/exercices
 * Python Programming Language - GeeksforGeeks
   [https://www.geeksforgeeks.org/python-programming-language/?ref=ghm
 * Logiciels PAM (Privileged Access Management) - Meilleurs logiciels
   et outils gratuits | GetApp France 2022
   [https://www.getapp.fr/directory/1181/privileged-access-management/pricing/free/software
 * A strategy to land your first pentest job | by PentesterLab |
   PentesterLab
   [https://blog.pentesterlab.com/a-strategy-to-land-your-first-pentest-job-25209a351689
 * Basics of Authentication
   [https://roadmap.sh/guides/basics-of-authentication
 * PYTHON - 1. INTRO ET LES STRINGS - YouTube
   [https://www.youtube.com/watch?v=4PcdtrBtHrM&list=PLn6POgpklwWr7m35ZLEul4lFJQfO4PfGQ&index=1
 * futurecoder [https://fr.futurecoder.io/course/#IntroducingTheShell
 * Login | Skills for All with Cisco
   [https://auth.socialgoodplatform.com/auth/realms/skillsforall/protocol/openid-connect/auth?client_id=b2e-marketplace&redirect_uri=https%3A%2F%2Fskillsforall.com%2F%2Fdashboard&state=af914074-6ac7-49e3-80b0-ba1bfc12cfbc&response_mode=fragment&response_type=code&scope=openid&nonce=3b12f5fc-29f8-4485-ba81-ff75cbacee5e&ui_locales=en-US
   EnCours
 * Learn Python - Free Interactive Python Tutorial
   [https://www.learnpython.org/fr/
 * trainingèview [https://fr.tradingview.com/chart/?symbol=OANDA%3AXAUUSD
 * Pick a Vulnerability to Learn About
   [https://www.hacksplaining.com/lessons
 * 58m:20s - FreeBitco.in - Win free bitcoins every hour!
   [https://freebitco.in/?op=home#
 * https://5.250.176.181/ JPG [https://5.250.176.181/
 * Intezer for SentinelOne - Automate Your SOC Grunt Work
   [https://intezer.com/sentinelone-autonomous-soc-integration/
 * Set Up Live Endpoint Scanner Script in Your EDR – Intezer Docs
   [https://support.intezer.com/hc/en-us/articles/5403622552860-Set-Up-Live-Endpoint-Scanner-Script-in-Your-EDR-#h_01H438XRZEZ0CH1FMXA558ZTVP
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/#requirments
 * Vue d’ensemble de la sécurisation de l’accès privilégié | Microsoft
   Learn
   [https://learn.microsoft.com/fr-fr/security/privileged-access-workstations/overview
 * Réaliser un Bastion de Tier 0 abordable – 1/5 – MSSEC
   [https://blog.mssec.fr/realiser-un-bastion-de-tier-0-abordable-1-5/
 * Untitled :: Pwning OWASP Juice Shop
   [https://pwning.owasp-juice.shop/companion-guide/latest/
 * Qu'est-ce que la gestion des identités et des accès (IAM)? - Keeper
   [https://www.keepersecurity.com/blog/fr/2022/07/03/the-complete-guide-to-identity-and-access-management-iam/
 * #Useries - FortiWeb - Configuration en 5mn - YouTube
   [https://www.youtube.com/watch?v=jpJNIapcAC8&list=PLGp16Y0PcRNC29NBDOgFRry197Ys_sl9h
 * SASE: Qu’est-ce que le Secure Access Service Edge? | Cato Networks
   [https://www.catonetworks.com/fr/sase/
 * WebSploit Labs - by Omar Santos [https://websploit.org/
 * https://fortigate-vm.fortidemo.com/login?redir=%2Fng%2Flog%2Fview%2Fevent [https://fortigate-vm.fortidemo.com/login?redir=%2Fng%2Flog%2Fview%2Fevent
 * Guacamole : configurer l'authentification SAML avec Windows ADFS -
   24/7 - IT
   [https://247-it.io/guacamole-configurer-lauthentification-saml-avec-windows-adfs/
 * Sécurité des systèmes Linux : le patch management - Syloe
   [https://www.syloe.com/securite-systemes-linux-patch-management/
 * GitHub - alebov/AD-lab: An active directory laboratory for
   penetration testing. [https://github.com/alebov/AD-lab
 * Creating a Red & Blue Team Homelab | hausec
   [https://hausec.com/2021/03/04/creating-a-red-blue-team-home-lab/
 * 🖥 Building an Active Directory Lab 🔐 | by Robert Scocca | Medium
   [https://robertscocca.medium.com/building-an-active-directory-lab-82170dd73fb4#36d1
 * Creating Active Directory Labs for Blue and Red Teams - SEC Consult
   [https://sec-consult.com/blog/detail/creating-active-directory-labs-for-blue-and-red-teams/
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/
 * Accueil - Harden Academy [https://hardenad.net/
 * XDR Wars: Who Holds the Key? - by Shubham Goel
   [https://www.securityandmarkets.com/p/xdr-wars-who-holds-the-key
 * L'alphabet de la cybersécurité : AV, EPP, EDR, SIEM, et XDR à SOAR -
   Saycurit
   [https://www.saycurit.fr/lalphabet-de-la-cybersecurite-av-epp-edr-siem-et-xdr-a-soar/
 * The 9 Best XDR Software Solutions and Tools in 2023 [Features,
   Pricing & Reviews]
   [https://heimdalsecurity.com/blog/best-xdr-software-solutions-tools/
 * La méthode AGDLP : L’art de gérer ses permissions selon Microsoft –
   NEPTUNET.FR [https://neptunet.fr/agdlp/
 * Open Source Tools for Identity and Access Management
   [https://www.innominds.com/blog/open-source-tools-for-identity-and-access-management
 * Open Identity Platform · Access management, identity management,
   user-managed access, directory services, and an identity gateway,
   designed and built as a single, unified platform.
   [https://www.openidentityplatform.org/
 * Secrets engines | Vault | HashiCorp Developer
   [https://developer.hashicorp.com/vault/tutorials/getting-started/getting-started-secrets-engines
 * Vault | HashiCorp Developer [https://developer.hashicorp.com/vault
 * Best Practices - Active Directory Pro
   [https://activedirectorypro.com/category/best-practices/
 * Welcome | authentik [https://goauthentik.io/
 * Meilleures pratiques pour la sécurisation d'Active Directory |
   Microsoft Learn
   [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
 * Administration — Kasm 1.14.0 documentation
   [https://www.kasmweb.com/docs/latest/admin_guide.html
 * Index of /Video/ [http://s28.bitdl.ir/Video/
 * Index of
   /Video/PluralSight.Hashicorp.Boundary-first.Look.Bookware-KNiSO/kniso-hashicorp.boundary-first.look/02. Understanding How Boundary Works/ [http://s28.bitdl.ir/Video/PluralSight.Hashicorp.Boundary-first.Look.Bookware-KNiSO/kniso-hashicorp.boundary-first.look/02.%20Understanding%20How%20Boundary%20Works/
 * HashiCorp Vault - Secret management et protection des données
   [https://blog.wescale.fr/vault-cookbook
 * Cisco Skills For All - Etical Hacking Pentest
   [https://skillsforall.com/launch?id=80c156bc-84a4-47c9-a233-5eafe7bdde82&tab=curriculum&view=ca89ad0b-592a-514e-93a7-17f2f88abf68
 * Web Security Academy: Free Online Training from PortSwigger
   [https://portswigger.net/web-security
 * Apprenez les bases du langage Python - OpenClassrooms
   [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python
 * GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT for threat
   intelligence and mapping your attack surface.
   [https://github.com/smicallef/spiderfoot
 * Les 3 000+ meilleures vidéos sur le thème Meditation ·
   Téléchargement gratuit · Vidéos Pexels
   [https://www.pexels.com/fr-fr/chercher/videos/meditation/
 * Protection de la messagerie par SPF et DKIM – IØ Expertises
   [https://www.io-expertises.fr/protection-de-la-messagerie-par-spf-et-dkim/
 * Conduisez un test d'intrusion - OpenClassrooms
   [https://openclassrooms.com/fr/courses/1756296-conduisez-un-test-dintrusion
 * Centralisez et sécurisez votre annuaire Active Directory -
   OpenClassrooms
   [https://openclassrooms.com/fr/courses/2222496-centralisez-et-securisez-votre-annuaire-active-directory
 * Auditez la sécurité d'un système d'exploitation - OpenClassrooms
   [https://openclassrooms.com/fr/courses/2035746-auditez-la-securite-dun-systeme-dexploitation
 * 5 méthodes pour être plus productif - YouTube
   [https://www.youtube.com/watch?v=qYm9sz551aA&list=UUyhxxX9rvuoA_7EptWonUpA&index=3
 * Enregistrez des données complexes avec des dictionnaires - Apprenez
   les bases du langage Python - OpenClassrooms
   [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python/7290721-enregistrez-des-donnees-complexes-avec-des-dictionnaires
 * Setup
   [https://workshop.hackerops.dev/Setup-99e8bb20b6e3452f985547d79f52d34b
 * SIP et la sécurité - Protocole SIP
   [https://sip.goffinet.org/sip/securite-voip-sip/
 * fail2web | Echo'System'
   [https://echosystem.fr/articles/monitoring/fail2web
 * The Next Platform - The Next Platform [https://www.nextplatform.com/
 * Advanced Configuration - Keeper Connection Manager
   [https://docs.keeper.io/keeper-connection-manager/advanced-configuration
 * 🇬🇧 Guacamole - Advanced Administration and Tips 1 - Apps / Guacamole
   - EGroupware Help Forum
   [https://help.egroupware.org/t/uk-guacamole-advanced-administration-and-tips-1/74910
 * Set up access to Apache Guacamole in Digital Access component - -
   Nexus Documentation
   [https://doc.nexusgroup.com/display/PUB/Set+up+access+to+Apache+Guacamole+in+Digital+Access+component
 * Create an HTML 5 RDP/SSH Frontend Using Guacamole on Ubuntu 16.04
   LTS - Vultr.com
   [https://www.vultr.com/docs/create-an-html-5-rdp-ssh-frontend-using-guacamole-on-ubuntu-16-04-lts/
 * Apache Guacamole + Nginx Proxy Manager = SyntaxError - Server Fault
   [https://serverfault.com/questions/1061650/apache-guacamole-nginx-proxy-manager-syntaxerror
 * Guacamole - Amahi Wiki [https://wiki.amahi.org/index.php/Guacamole
 * Part I. User's Guide
   [https://guacamole.apache.org/doc/0.9.13-incubating/gug/users-guide.html
 * Comment HLAI aide à détecter les fichiers exécutables PRISM.
   [https://www.harfanglab.io/articles-blog/comment-hlai-aide-a-detecter-les-fichiers-executables-prism
 * HarfangLab EDR | + simple, + vite, + intelligent.
   [https://www.harfanglab.io/solutions/edr-au-service-du-soc
 * Hurukai - Login
   [https://8ff0699b3b360b7f.hurukai.io:8443/login?next=%252Fdashboard
 * Active Directory Checklist - Attack & Defense Cheatsheet
   [https://cybersecuritynews.com/active-directory-checklist/
 * Comment réaliser une attaque brute force RDP ? | IT-Connect
   [https://www.it-connect.fr/comment-realiser-une-attaque-brute-force-rdp/
 * Wireshark Tutorial: Decrypting RDP Traffic
   [https://unit42.paloaltonetworks.com/wireshark-tutorial-decrypting-rdp-traffic/
 * Apache Guacamole : Passerelle RDP, SSH, VNC, TELNET… – Tech2Tech |
   News, Astuces, Tutos, Vidéos autour de l'informatique
   [https://www.tech2tech.fr/apache-guacamole-passerelle-rdp-ssh-vnc-telnet/#Creer_une_connexion_RDP
 * Guacamole, contrôler vos équipements en SSH ou RDP via une interface
   Web
   [https://domopi.eu/guacamole-controler-vos-equipements-en-ssh-rdp-ou-vnc-via-une-interface-web/
 * Securing Remote Desktop (RDP) for System Administrators |
   Information Security Office
   [https://security.berkeley.edu/education-awareness/securing-remote-desktop-rdp-system-administrators
 * What Is RDP & How Do You Secure (or Replace) It? | BeyondTrust
   [https://www.beyondtrust.com/blog/entry/what-is-rdp-how-do-you-secure-or-replace-it
 * Microsoft Operating Systems BlueKeep Vulnerability | CISA
   [https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-168a
 * Are your Remote Access Tools FIPS 140-2 Validated?… | BeyondTrust
   [https://www.beyondtrust.com/blog/entry/are-your-remote-access-tools-fips-140-2-validated-heres-why-it-matters
 * Security Architecture - Keeper Connection Manager
   [https://docs.keeper.io/keeper-connection-manager/security
 * ZENETYS - Maîtrisez les accès distants à vos ressources avec
   Guacamole™
   [https://www.zenetys.com/maitrisez-les-acces-distants-a-vos-ressources-avec-guacamole/
 * FOP-159 Table header sometimes does not work. - ASF JIRA
   [https://issues.apache.org/jira/browse/FOP-159?filter=-5
 * Keeper Security Blog - Cybersecurity 101 and Product Updates
   [https://www.keepersecurity.com/blog/
 * Mentions légales - Cybi - Solutions innovantes de Cybersécurité
   basées sur de l'intelligence artificielle et de l'apprentissage
   automatique [https://www.cybi.fr/index.php/mentions-legales/
 * SCUBA Dashboard [https://dashboard.scuba-cyber.fr/
 * Network Documentation Software | DCIM, Network Documentation, OSP
   Software [https://graphicalnetworks.com/netterrain-logical-2/
 * Home - Cybi - Solutions innovantes de Cybersécurité basées sur de
   l'intelligence artificielle et de l'apprentissage automatique
   [https://www.cybi.fr/
 * Apache Guacamole™: 1.5.0 [https://guacamole.apache.org/releases/1.5.0/
 * Open sourcing the Kubernetes security audit | Cloud Native Computing
   Foundation
   [https://www.cncf.io/blog/2019/08/06/open-sourcing-the-kubernetes-security-audit/
 * Qu'est-ce que DevSecOps ? - France | IBM
   [https://www.ibm.com/fr-fr/cloud/learn/devsecops
 * Product Management - Shift Public
   [https://shift.inherent.fr/public/la-product-factory/organisation/product-management
 * MITRE ATT&CK Matrix for Kubernetes: Tactics & Techniques Part 3
   [https://www.weave.works/blog/mitre-att-ck-matrix-for-kubernetes-tactics-techniques-explained-part-3
 * BOUNDARY, OU L’ART DE GÉRER L’ACCÈS À VOS RESSOURCES PRIVÉES
   [https://blog.ippon.fr/2022/10/17/boundary/
 * Guides & Tutorials | Teleport [https://goteleport.com/resources/guides/
 * Catalogue de contenu SOAR Microsoft Azure Sentinel | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/azure/sentinel/sentinel-soar-content
 * Activer l’analyse des vulnérabilités avec le scanneur Qualys intégré
   - Microsoft Defender for Cloud | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/azure/defender-for-cloud/deploy-vulnerability-assessment-vm
 * Présentation de Microsoft Sentinel | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/azure/sentinel/overview
 * Comment tirer parti d'une opération Red Team ? - RiskInsight
   [https://www.riskinsight-wavestone.com/2020/08/comment-tirer-parti-dune-operation-red-team/
 * Red Team Tests dintrusion, audits de sécurité - Hub One
   [https://www.hubone.fr/oneblog/cybersecurite-quest-ce-quune-mission-red-team/
 * L’approche Red Team : Evaluation globale de votre sécurité
   [https://www.alter-solutions.fr/blog/lapproche-red-team/
 * Test d’intrusion, test red team - KPMG France
   [https://kpmg.com/fr/fr/blogs/home/posts/2021/1/test-intrusion-red-team-securite-risques.html
 * Anatomie d’un exercice « Red Team » - Silicon
   [https://www.silicon.fr/avis-expert/anatomie-dun-exercice-red-team
 * Red Teaming vs. Pen Testing – Quelle est la différence ? - Fusée
   [https://flare.io/fr/learn/resources/blog/red-teaming-vs-pen-testing/
 * Les tests d'intrusion Red Team - évaluer la sécurité - SysDream
   [https://sysdream.com/intrusion/redteam/
 * Red team, blue team & purple team : Quelles sont les différences ?
   [https://www.cyberuniversity.com/post/red-team-blue-team-purple-team-definition-et-roles-en-cybersecurite
 * authentik Alternatives: 25+ Identity Management Tools & Similar Apps
   | AlternativeTo [https://alternativeto.net/software/authentik/
 * LAN MAN WAN PAN BAN CAN ETC. | n0tes.fr
   [https://n0tes.fr/2022/03/10/LAN-MAN-WAN-et-le-reste/
 * The Pyramid of Pain in the SolarWinds Cyber Attack - Dynamite
   Analytics [https://dynamite.ai/pyramid-pain-solarwinds-cyber-attack/
 * Wiz | Secure Everything You Build and Run in the Cloud
   [https://www.wiz.io/
   _CTF_et_BugBounty
 * All of the Best Links and Resources on Cyber Security. - s0cm0nkey's
   Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * Code-Breaking, Cipher and Logic Puzzle solving tools | Boxentriq
   [https://www.boxentriq.com/code-breaking
 * Secure Salted Password Hashing - How to do it Properly
   [https://crackstation.net/hashing-security.htm
 * CTFtime.org / Events calendar [https://ctftime.org/calendar/
 * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking
   #Luvz [https://www.0x0ff.info/
 * Buffer Overflow & gdb – Part 1 – 0x0ff.info
   [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
 * Browserling – Online cross-browser testing
   [https://www.browserling.com/
 * Getting Started with Exploit Development
   [https://dayzerosec.com/blog/2021/02/02/getting-started.html
 * whois prevoyance-agricole.fr - bash.ws
   [https://bash.ws/whois/prevoyance-agricole.fr
 * CheatLists | Ivan Glinkin
   [https://www.ivanglinkin.com/category/cheatlists/
 * GitHub - dostoevskylabs/dostoevsky-pentest-notes: Notes for taking
   the OSCP in 2097. Read in book form on GitBook
   [https://github.com/dostoevskylabs/dostoevsky-pentest-notes
 * Devhints — TL;DR for developer documentation [https://devhints.io/
 * outils [https://lehollandaisvolant.net/tout/tools/
 * LetsDefend - Blue Team Training Platform [https://letsdefend.io/
 * Transform YAML into JSON - Online YAML Tools
   [https://onlineyamltools.com/convert-yaml-to-json
 * Euro symbol ASCII Code [https://www.eurosymbol.eu/ascii-code
 * DVWA Ultimate Guide - First Steps and Walkthrough - Bug Hacking
   [https://bughacking.com/dvwa-ultimate-guide-first-steps-and-walkthrough/#CSRF
 * SQLMAP-Detecting and Exploiting SQL Injection- A Detailed
   Explanation
   [https://gbhackers.com/sqlmap-detecting-exploiting-sql-injection/
 * Notes :: An0nud4y [https://an0nud4y.com/notes/
 * Checklist - Local Windows Privilege Escalation - HackTricks
   [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation
   Tuto-CTF
 * APPRENDRE PYTHON: FORMATION COMPLÈTE GRATUITE 2021 - YouTube
   [https://www.youtube.com/watch?v=LamjAFnybo0
 * Buffer Overflow & gdb – Part 1 – 0x0ff.info
   [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
 * professional education - How to learn penetration testing at home? -
   Information Security Stack Exchange
   [https://security.stackexchange.com/questions/11444/how-to-learn-penetration-testing-at-home
 * Learn X in Y Minutes: Scenic Programming Language Tours
   [https://learnxinyminutes.com/
 * CyberPunk: Open Source CyberSecurity [https://n0where.net/
 * Application Security [https://www.idontplaydarts.com/
 * YARA for pentesters | DiabloHorn
   [https://diablohorn.com/2017/12/25/yara-for-pentesters/
 * Hand Guide To Local File Inclusion(LFI)
   [http://securityidiots.com/Web-Pentest/LFI
 * LFI to shell – exploiting Apache access log | Rogue Coder
   [https://roguecod3r.wordpress.com/2014/03/17/lfi-to-shell-exploiting-apache-access-log/
 * Cyber Security Training Courses For Beginners and Advanced
   [https://www.concise-courses.com/training/
 * The unofficial HackerOne disclosure Timeline
   [http://h1.nobbd.de/index.php
 * Hacker101 - Introduction - YouTube
   [https://www.youtube.com/watch?v=zPYfT9azdK8&list=PLxhvVyxYRviZd1oEA9nmnilY3PhVrt4nj
 * Getting Started | Hacker101 [https://www.hacker101.com/
 * OWASP Testing Guide v4 Table of Contents - OWASP
   [https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
 * CTF Challenges - Yeah Hub
   [https://www.yeahhub.com/ctf-challenges-writeups/
 * 先知社区 [https://xz.aliyun.com/
 * MinU: 1 Walkthrough [https://hackso.me/minu-1-walkthrough/
 * tcpdump | GTFOBins [https://gtfobins.github.io/gtfobins/tcpdump/
 * hacksome | my security journey [https://hackso.me/
 * MyExperiments - Local Linux privilege escalation overview
   [https://myexperiments.io/linux-privilege-escalation.html#v-sudo
 * Linux elevation of privileges [https://guif.re/linuxeop
 * CTF Challenges - Hacking Articles
   [http://www.hackingarticles.in/ctf-challenges1/
 * handy techniques to bypass environment restrictions - 0xsp SRD
   [https://0xsp.com/offensive/handy-techniques-to-bypass-environment-restrictions/
 * xavki - YouTube [https://www.youtube.com/c/xavki-linux/playlists
 * My Learning | Cybrary [https://app.cybrary.it/my-learning
 * Website Username/Password brute-forcing with Hydra – EinStijn.com
   [https://www.einstijn.com/penetration-testing/website-username-password-brute-forcing-with-hydra/
 * Test WordPress Logins With Hydra on Kali Linux - Linux Tutorials -
   Learn Linux Configuration
   [https://linuxconfig.org/test-wordpress-logins-with-hydra-on-kali-linux
 * Home | Cyber | Dr. Chaos [https://www.drchaos.com/home/search/wordpress
 * AttackSurfaceMapper: Attack Surface Expander | CYBERPUNK
   [https://www.cyberpunk.rs/attacksurfacemapper-attack-surface-expander
 * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/
 * TCPDump Capture HTTP GET/POST requests | Devops Junction
   [https://www.middlewareinventory.com/blog/tcpdump-capture-http-get-post-requests-apache-weblogic-websphere/
   BugBounty
 * InfoSec Write-ups [https://infosecwriteups.com/
 * Video channel videos - PeerTube
   [https://peertube.sl-network.fr/video-channels/79b72c44-c395-4a52-a6f1-80fe5d8dd28e/videos
 * Bounty Report Generator [https://buer.haus/breport/
 * University Archives | Bugcrowd
   [https://www.bugcrowd.com/hackers/bugcrowd-university/
 * Corben Leo (Page 2) [https://corben.io/page/2/
 * Dashboard | Defend the Web [https://defendtheweb.net/dashboard
 * Dashboard | Defend the Web [https://defendtheweb.net/dashboard
 * BREAKDOWN Realistic Pentest of a Schneider Electric Industrial
   Control System M221 PLC - YouTube
   [https://www.youtube.com/watch?v=1Ppm7dQ66-U
 * OWASP Security Knowledge Framework | OWASP Foundation
   [https://owasp.org/www-project-security-knowledge-framework/
 * OpenVAS/GVM – scan de vulnérabilités – IØ Expertises
   [https://www.io-expertises.fr/openvas-audit-de-vulnerabilites/
 * Scanner de vulnérabilités avec un Raspberry Pi et Greenbone
   [https://www.it-connect.fr/creer-un-scanner-de-vulnerabilites-avec-un-raspberry-pi-mais-pas-que/
 * Web Application Security – InfoSec Write-ups – Medium
   [https://medium.com/bugbountywriteup/tagged/web-application-security
 * Bug Bounty – InfoSec Write-ups – Medium
   [https://medium.com/bugbountywriteup/tagged/bug-bounty
 * InfoSec Write-ups – Medium - TOP [https://medium.com/bugbountywriteup
 * BugBountyHunting.com - A community-curated Resource for Bug Bounty
   Hunting [https://www.bugbountyhunting.com/
 * https://www.openbugbounty.org/ [https://www.openbugbounty.org/
 * Become a bug bounty hunter - Learn about web application
   vulnerabilities and how to find them on bug bounty programs |
   BugBountyHunter.com [https://www.bugbountyhunter.com/
 * Hacker Success Guide | HackerOne Platform Documentation
   [https://docs.hackerone.com/hackers/hacker-success-guide.html
 * Bug Bounty Programs | yeswehack.com [https://yeswehack.com/programs
 * List of bug bounty writeups · Pentester Land
   [https://pentester.land/list-of-bug-bounty-writeups.html#bug-bounty-writeups-published-in-2019
 * File Transfer · OSCP - Useful Resources
   [https://backdoorshell.gitbooks.io/oscp-useful-links/content/file-transfer.html
 * Offensive Security’s PWK & OSCP Review - Jack Hacks
   [https://jhalon.github.io/OSCP-Review/
 * HackinGeeK - YouTube [https://www.youtube.com/c/HackinGeeK/videos
 * Weakpass [https://weakpass.com/
 * Hacktivity | HackerOne Platform Documentation
   [https://docs.hackerone.com/hackers/hacktivity.html
 * Hacker101 [https://www.hacker101.com/sessions/web_in_depth
 * So You Want To Be a Pentester? - Jack Hacks
   [https://jhalon.github.io/becoming-a-pentester/
 * Pentester Land · Offensive Infosec [https://pentester.land/
 * Penetration Testing Tools Cheat Sheet
   [https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
 * Guide 001 |Getting Started in Bug Bounty Hunting.. – Muhammad Khizer
   Javed
   [https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/
 * Pedro Henrique Cardoso – Medium [https://medium.com/@G4L1C
 * AS16347 ADISTA SAS - bgp.he.net [https://bgp.he.net/AS16347#_prefixes
 * Day 73: OSCP Notes from IPPSEC OSCP Style Videos - int0x33 - Medium
   [https://medium.com/@int0x33/day-73-oscp-notes-from-ippsec-oscp-style-videos-b6522a8d875a
 * Test d'intrusion - Pentest : Présentation et méthodologies -
   Information Security
   [https://www.information-security.fr/test-dintrusion-pentest-presentation-methodologies/
 * Learn to hack, collaborate with security researchers and learn about
   bugbounties | BugBountyNotes.com [https://www.bugbountynotes.com/
 * Live hacking on BugBountyNotes challenges with @zseano - YouTube
   [https://www.youtube.com/watch?v=8U6bWXDCUjU
 * bug bounty - free online courses/MOOC search results | Class Central
   [https://www.classcentral.com/search?q=bug+bounty&free=true&page=2
 * The Bug Bounty Radar - The Latest Public Bug Bounty Programs
   [https://bbradar.io/
 * Bug Bounty Forum - resources
   [https://bugbountyforum.com/resources/#cross-site-scripting-xss
 * Bug Hunter University Videos - Videos - Learn - Google Bug Hunters
   [https://bughunters.google.com/learn/videos/5956774821363712
   writeup
 * CTF Writeups – Medium [https://medium.com/ctf-writeups
 * Vault: Hack The Box Walkthrough
   [https://hackso.me/vault-htb-walkthrough/
 * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html#hackthebox
 * 0xdf hacks stuff | CTF solutions, malware analysis, home lab
   development [https://0xdf.gitlab.io/
 * ProHacktive – Medium [https://medium.com/prohacktive
   Challenges
 * Cylab Play - Vulnerable Apps | cylab.be
   [https://cylab.be/resources/cylab-play
 * Broken Crystals [http://brokencrystals.com/
 * MegaCorp One - Nanotechnology Is the Future
   [https://www.megacorpone.com/
 * Further Reading | 0xffsec Handbook
   [https://0xffsec.com/handbook/further-reading/
 * NetSPI SQL Injection Wiki [https://sqlwiki.netspi.com/
 * WeChall Sites de Challenges Participants
   [https://www.wechall.net/active_sites
 * WeChall Sites de Challenges Participants
   [https://www.wechall.net/active_sites/all/by/site_fun/DESC/page-1
 * The Cryptopals Crypto Challenges [https://cryptopals.com/sets/1
 * picoCTF - CMU Cybersecurity Competition [https://picoctf.org/
   CheatSheets
 * The Ultimate List of SANS Cheat Sheets | SANS Institute
   [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
 * 0xsp | offensive cheatsheet
   [https://0xsp.com/offensive/offensive-cheatsheet
 * nbtscan Cheat Sheet [https://highon.coffee/blog/nbtscan-cheat-sheet/
 * Reverse Shell Cheat Sheet
   [https://highon.coffee/blog/reverse-shell-cheat-sheet/
 * Penetration Testing Tools Cheat Sheet
   [https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
 * LFI Cheat Sheet [https://highon.coffee/blog/lfi-cheat-sheet/
 * Nmap Cheat Sheet and Pro Tips | HackerTarget.com
   [https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/
 * Volatility Usage · volatilityfoundation/volatility Wiki · GitHub
   [https://github.com/volatilityfoundation/volatility/wiki/Volatility-Usage
 * gitMemory :) [https://www.gitmemory.com/
 * Hacking/OSCP cheatsheet :: Ceso Adventures
   [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
 * Cheat Sheet : All Cheat Sheets in one page
   [http://www.cheat-sheets.org/
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * GTFOBins [https://gtfobins.github.io/#+file%20upload
 * MSFU [https://www.offensive-security.com/metasploit-unleashed/
 * Exploit-DB [https://www.exploit-db.com/
 * GHDB [https://www.exploit-db.com/google-hacking-database
 * Ultimate Library of ICS Cyber Security Resources - SCADAhacker
   [https://scadahacker.com/library/index.html
 * Welcome to Security Idiots!! [http://www.securityidiots.com/
 * Cheatsheet for HackTheBox · GitHub
   [https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24
 * https://pen-testing.sans.org/resources/downloads
   [https://pen-testing.sans.org/resources/downloads
 * https://github.com/coreb1t/awesome-pentest-cheat-sheets
   [https://github.com/coreb1t/awesome-pentest-cheat-sheets
 * https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List [https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
 * https://github.com/rmusser01/Infosec_Reference
   [https://github.com/rmusser01/Infosec_Reference
 * https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
   [https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
 * https://www.stationx.net/nmap-cheat-sheet/
   [https://www.stationx.net/nmap-cheat-sheet/
 * https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/
   [https://pentestlab.blog/2012/08/17/nmap-cheat-sheet/
 * https://highon.coffee/blog/cheat-sheet/
   [https://highon.coffee/blog/cheat-sheet/
 * https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet
   [https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet
 * GitHub - trimstray/awesome-ninja-admins: A collection of awesome
   lists, manuals, blogs, hacks, one-liners and tools for Awesome Ninja
   Admins. [https://github.com/trimstray/awesome-ninja-admins
 * Analyse your HTTP response headers [https://securityheaders.com/
 * Cheat Sheets - by SII [https://groupe-sii.github.io/cheat-sheets/
 * Bug Bounty Cheatsheet
   [https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html
 * Could not open a raw socket Error permission denied(13) | Ubuntu
   Tutorials
   [https://www.ubuntututorials.org/could-not-open-raw-socket-error-permission-denied-13/
 * Nmap Cheat Sheet 2023: All the Commands and More
   [https://www.geeksforgeeks.org/nmap-cheat-sheet/
 * GitHub - Lifka/hacking-resources: Hacking resources and cheat
   sheets. References, tools, scripts, tutorials, and other resources
   that help offensive and defensive security professionals.
   [https://github.com/Lifka/hacking-resources/tree/main
   IPinfo malware tools
 * Recommended sites for gathering IP reputation : AskNetsec
   [https://www.reddit.com/r/AskNetsec/comments/7xqsiq/recommended_sites_for_gathering_ip_reputation/
   HTTP_debugger
 * Free HTTP Request Viewer
   [https://www.httpdebugger.com/tools/ViewHttpHeaders.aspx
 * Make Simple HTTP POST And GET Requests Online
   [https://www.codepunker.com/tools/http-requests
 * Online curl command line builder [https://curlbuilder.com/
 * httpbin.org [https://httpbin.org/
 * ApiRequest.io | Free Tools available for Debugging resful APIs
   [http://www.apirequest.io/debugging-tools
 * Send HTTP Requests Online [https://reqbin.com/
   Messagerie_MAIL
 * Live et Webinar Email Marketing Archives - Badsender
   [https://www.badsender.com/category/live-webinar-email-marketing/
 * Authentification des emails : SPF, DKIM, DMARC... Tout ce qu'il faut
   savoir!
   [https://www.badsender.com/2014/01/13/authentification-des-emails/
 * Installer et configurer Postfix avec SPF + DKIM + DMARC -
   malekal.com
   [https://www.malekal.com/installer-configurer-postfix-spf-dkim-dmarc
 * Qu'est-ce que la DMARC ? Enregistrement, DKIM, SPF | Proofpoint FR
   [https://www.proofpoint.com/fr/threat-reference/dmarc
 * Outbox Protection [https://fraudmarc.com/outbox-protection
   HomeLabSecurity
 * Building a Cybersecurity Homelab for Detection & Monitoring -
   Cyberwox Academy
   [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/
 * Building A Test Lab For Pentesting Guide | White Oak Security
   [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/
 * Resources - Cyberwox Academy [https://cyberwoxacademy.com/resources/
 * Building A Test Lab For Pentesting Guide | White Oak Security
   [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/
 * Uncategorized | White Oak Security
   [https://www.whiteoaksecurity.com/blog/category/uncategorized/
 * Building a Cybersecurity Homelab for Detection & Monitoring -
   Cyberwox Academy
   [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/
 * Nouvel onglet [about:newtab
 * Introduction :: DetectionLab [https://detectionlab.network/
 * GitHub - hackertarget/DetectionLabUbuntuAddon: Add Ubuntu Server to
   DetectionLab Network with Vagrant
   [https://github.com/hackertarget/DetectionLabUbuntuAddon/
 * PowerShell Module Browser - PowerShell | Microsoft Docs
   [https://docs.microsoft.com/en-us/powershell/module/?view=powershell-5.1
 * Windows 11 Enterprise | Microsoft Evaluation Center
   [https://www.microsoft.com/en-us/evalcenter/download-windows-11-enterprise
 * Windows Server 2022 | Microsoft Evaluation Center
   [https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022
 * Windows 10 Enterprise | Microsoft Evaluation Center
   [https://www.microsoft.com/en-us/evalcenter/download-windows-10-enterprise
 * Introducing: Detection Lab. Detection Lab is a collection of Packer…
   | by Chris Long | Medium
   [https://medium.com/@clong/introducing-detection-lab-61db34bed6ae
 * Trying DetectionLab
   [https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html
 * Extend DetectionLab with Linux Endpoints | HackerTarget.com
   [https://hackertarget.com/extend-detectionlab-linux/
 * Build a Cyber Security Lab with DetectionLab | HackerTarget.com
   [https://hackertarget.com/cyber-security-detectionlab/
 * Proxmox VE 7: Converting a Laptop into a Bare Metal Server
   [https://benheater.com/bare-metal-proxmox-laptop/
 * Test and evaluate your WAF before hackers ☝️
   [https://lab.wallarm.com/test-your-waf-before-hackers/
   Hacking
 * Introduction — Scapy 2.4.5. documentation
   [https://scapy.readthedocs.io/en/latest/introduction.html#quick-demo
 * Reverse Engineering 101
   [https://malwareunicorn.org/workshops/re101.html#0
 * scapy · PyPI [https://pypi.org/project/scapy/
   CHIFFRER_SECU_TOOLS
 * Instance Directory - Welcome! [https://privatebin.info/directory/
 * CryptPad: Collaboration suite, encrypted and open-source
   [https://cryptpad.fr/what-is-cryptpad.html
 * SimpleLogin | Protéger votre vie privée avec les alias mail
   [https://simplelogin.io/fr/
 * RSA Encryption | MuirlandOracle | Blog
   [https://muirlandoracle.co.uk/2020/01/29/rsa-encryption/
 * Anonymous Proxy List - Free Proxy List
   [https://free-proxy-list.net/anonymous-proxy.html
 * Crypto CD-ROM – WARNING – written with 16-bit software, so requires
   Microsoft Virtual PC to run on Windows 7 or later Windows | Simon
   Singh [https://simonsingh.net/cryptography/crypto-cd-rom/
   RedTeam_BlueTeam
 * Explore Atomic Red Team [https://atomicredteam.io/
 * Red team checklist | Red Team Development and Operations
   [https://redteam.guide/docs/checklists/red-team-checklist/
 * Part 1 | Video Guide | What is Jasmin Ransomware | The RedTeam Tool
   - YouTube [https://www.youtube.com/watch?v=OMEARyiX8Dw
 * Rocket.Redteams [https://rocket.redteams.fr/home
 * Shell :: Just sharing... [https://redteams.fr/shell/
 * Getting Started Testing with Atomic Tests | Atomic Red Team
   [https://atomicredteam.io/testing
 * Red Team Tips – for red teamers, by red teamers
   [https://redteamer.tips/
 * Automating red team infrastructure with Ansible part 1 – Raw
   infrastructure – Red Team Tips
   [https://redteamer.tips/automating-red-team-infrastructure-with-ansible-part-1-raw-infrastructure/
 * :: Just sharing... [https://redteams.fr/
 * What is Red Teaming? | Red Team Development and Operations
   [https://redteam.guide/docs/Concepts/red-teaming
 * AlgoSecure | Outils offensifs (pentest / redteam) : exemple de mise
   en place d'une infrastructure
   [https://www.algosecure.fr/actualites/article/outils-offensifs-pentest-redteam-exemple-infrastructure
 * https://redteam.guide/docs/checklists/red-team-checklist/
   [https://redteam.guide/docs/checklists/red-team-checklist/
 * GitHub - yeyintminthuhtut/Awesome-Red-Teaming: List of Awesome Red
   Teaming Resources
   [https://github.com/yeyintminthuhtut/Awesome-Red-Teaming
 * GitHub - CyberSecurityUP/Awesome-Red-Team-Operations
   [https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations
 * Introduction - Red Team Notes
   [https://dmcxblue.gitbook.io/red-team-notes/
 * Red/Purple Teaming - s0cm0nkey's Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/red-purple-teaming
 * Free Red Teaming Tools & Simulation Toolkit - 2022
   [https://cybersecuritynews.com/free-red-teaming-tools/
 * Building a Red Team: How to Get Started
   [https://www.darkreading.com/attacks-breaches/building-a-red-team-how-to-get-started
 * ROE Template | Red Team Development and Operations
   [https://redteam.guide/docs/templates/roe_template/
 * Free Training Resources for Cybersecurity and IT Students and
   Professionals
   [https://benheater.com/free-training-resources-cybersec-and-it/
 * Red Team - Vincent Yiu [https://www.vincentyiu.com/
 * HanseSecure | You will be hacked. Choose the intruder.
   [https://hansesecure.de/
 * Automated Security Testing Tool | secureCodeBox
   [https://www.securecodebox.io/
 * Getting Started - VECTR Documentation
   [https://docs.vectr.io/Installation/
 * Features | VECTR [https://vectr.io/features/
 * VECTR Tutorial - v5.5 Installation - YouTube
   [https://www.youtube.com/watch?v=vp_lILONZ8k
 * Qu’est-ce que le Red Teaming ? Méthodologie et outils | Varonis
   [https://www.varonis.com/fr/blog/red-teaming
 * What is ired.team? - Red Teaming Experiments [https://www.ired.team/
 * GitHub - RistBS/Awesome-RedTeam-Cheatsheet: Red Team Cheatsheet in
   constant expansion.
   [https://github.com/RistBS/Awesome-RedTeam-Cheatsheet
 * Track 1 06 Quantify your hunt not your parents red teaming Devon
   Kerr - YouTube [https://www.youtube.com/watch?v=w_kByDwB6J0
 * Red Teaming/Adversary Simulation Toolkit
   [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
 * GitHub - tobor88/PowerShell-Red-Team: Collection of PowerShell
   functions a Red Teamer may use in an engagement
   [https://github.com/tobor88/PowerShell-Red-Team
 * GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A
   cheat sheet that contains common enumeration and attack methods for
   Windows Active Directory.
   [https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
 * Atomic Red Team [https://0x1.gitlab.io/pentesting/Atomic-Red-Team/
 * atomic-red-team/atomics at master · redcanaryco/atomic-red-team ·
   GitHub
   [https://github.com/redcanaryco/atomic-red-team/tree/master/atomics
 * Red Team Testing Services | RedTeam Security
   [https://www.redteamsecure.com/advanced-penetration-testing/red-teaming
 * GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team /
   Penetration Testing [https://github.com/A-poc/RedTeam-Tools
 * Anatomie d'un exercice Red Team - Chapitre 1 - POST
   [https://www.post.lu/business/blog/articles/cybersecurite/technical-corner/exercice-red-team-chapitre-1
 * GitHub - botherder/ntap: Transparent network tap
   [https://github.com/botherder/ntap
 * Cobalt Strike Training Resources | Cobalt Strike
   [https://www.cobaltstrike.com/training/
 * SANS Offensive Operations - YouTube
   [https://www.youtube.com/@SANSOffensiveOperations/search?query=Red
 * CALDERA [https://caldera.mitre.org/
 * A Beginner’s Guide to MITRE CALDERA™ User Training | by CALDERA |
   Medium
   [https://medium.com/@mitrecaldera/a-beginners-guide-to-mitre-caldera-user-training-6e4676c1c5c9
 * Red Team Reconnaissance Techniques | Linode Docs
   [https://www.linode.com/docs/guides/red-team-reconnaissance-techniques/
 * HackerSploit | Linode Docs
   [https://www.linode.com/docs/authors/hackersploit/
 * Vulnerability Detection | Linode Docs
   [https://www.linode.com/docs/guides/security/vulnerabilities/
 * Linode Guides & Tutorials | Linode Docs
   [https://www.linode.com/docs/guides/
 * You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS
   ICS 2018] - YouTube [https://www.youtube.com/watch?v=mj2iSdBw4-0
 * Émulation de l'adversaire de l'équipe rouge avec Caldera - YouTube
   [https://www.youtube.com/watch?v=EIHLXWnK1Dw
 * CALDERA – Medium [https://medium.com/@mitrecaldera
 * Simulation d'attaques et de groupes APT avec CALDERA de MITRE
   »InfoSec Dutchie
   [https://www-infosecdutchie-com.translate.goog/simulating-attacks-with-mitre-caldera/?_x_tr_sl=auto&_x_tr_tl=fr&_x_tr_hl=fr
 * Gigabit Ethernet Tap - Hacker Warehouse
   [https://hackerwarehouse.com/product/gigabit-ethernet-tap/
 * Knowm Passive LAN Tap – Knowm.org
   [https://knowm.org/knowm-passive-lan-tap/
 * caldera mitre tuto - YouTube
   [https://www.youtube.com/results?search_query=caldera+mitre+tuto
 * D3FEND Matrix | MITRE D3FEND™ [https://d3fend.mitre.org/
 * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains
   cutting-edge open-source security tools (OST) for a red teamer and
   threat hunter.
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit#lateral-movement
 * BHIS | Atomic Red Team: Hands-on Getting Started Guide | Carrie &
   Darin Roberts | 1-Hour - YouTube
   [https://www.youtube.com/watch?v=eHZEyEf_icE&t=1840s
 * Attack Emulation Tools: Atomic Red Team, CALDERA and More –
   Antisyphon Training
   [https://www.antisyphontraining.com/event/attack-emulation-tools-atomic-red-team-caldera-and-more/2023-05-09/
 * Torturez votre EDR avec Atomic Red Team ! - Almond
   [https://almond.eu/cybersecurity-insights/torturez-votre-edr-avec-atomic-red-team/
 * Qu’est‑ce que MITRE ATT&CK et quelle est son utilité? |
   WeLiveSecurity
   [https://www.welivesecurity.com/fr/2019/09/18/introduction-mitre-attack-utilite/
 * Zero-Point Security [https://training.zeropointsecurity.co.uk/
 * Atomic Red Team Training - Basics and Beyond - YouTube
   [https://www.youtube.com/watch?v=d_E-hfKQ5Hw
 * Atomic Red Team Tutorial Series - YouTube
   [https://www.youtube.com/playlist?list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6
 * Open Source Security Index [https://opensourcesecurityindex.io/
 * How to Test Your Security Controls Using Atomic Red Team intro -
   YouTube
   [https://www.youtube.com/watch?v=M4SHpDX8GTo&list=PL92eUXSF717W9TCfZzLca6DmlFXFIu8p6&index=9
 * Utilisation avancée de sqlmap | Connect - Editions Diamond
   [https://connect.ed-diamond.com/MISC/misc-062/utilisation-avancee-de-sqlmap
 * Red Team Village - Cybersecurity Training and Briefings
   [https://redteamvillage.io/
 * GitHub - an4kein/awesome-red-teaming: List of red team resources
   [https://github.com/an4kein/awesome-red-teaming#-social-engineering
 * Équipe rouge — Wikipédia
   [https://fr.wikipedia.org/wiki/%C3%89quipe_rouge
   Docker_K8S
 * Panorama des outils de sécurité autour des conteneurs - OCTO Talks !
   [https://blog.octo.com/panorama-des-outils-de-securite-autour-des-conteneurs/
 * docker_fiche_technique.pdf
   [https://www.ssi.gouv.fr/uploads/2020/12/docker_fiche_technique.pdf
 * Utiliser img pour sécuriser son build Docker dans Kubernetes
   [https://www.padok.fr/blog/docker-kubernetes-img
 * Open Source Container Security with Syft & Grype • Anchore
   [https://anchore.com/opensource/
 * ​​Kubernetes: Why Use It, How It Works, Options & Alternatives
   [https://www.aquasec.com/cloud-native-academy/kubernetes-101/kubernetes-complete-guide/
 * XCP-ng documentation | XCP-ng documentation [https://xcp-ng.org/docs/
   linux
 * Variables spéciales | Mon pense-bête
   [https://www.quennec.fr/trucs-astuces/syst%C3%A8mes/gnulinux/programmation-shell-sous-gnulinux/le-langage-de-programmation-awk/principe/variables-sp%C3%A9ciales
 * System and Service Manager [https://systemd.io/
 * Potential bypass of Runas user restrictions | Sudo
   [https://www.sudo.ws/security/advisories/minus_1_uid/
 * Akadias Publications
   [https://www.akadia.com/html/publications.html#Unix-Linux-Apache%20Publications
 * explainshell.com - match command-line arguments to their help text
   [https://explainshell.com/
 * UE Introduction au Système d'exploitation - JP Gelas
   [https://perso.univ-lyon1.fr/jean-patrick.gelas/UE_Systeme/
 * Q4OS - desktop operating system [https://q4os.org/
 * blendOS — Beautiful. Efficient. Elegant. [https://blendos.co/
 * 2DayGeek - Linux and Unix | Open Source | Linux Howtos
   [https://www.2daygeek.com/
   Windows
 * PPT_Share - Google Drive
   [https://drive.google.com/drive/folders/1vrWH5GCW1EG2QOBmrssN4-H98ReE0WZe
 * A Guide To Cloud - Free Cloud Certification Courses
   [https://www.aguidetocloud.com/
 * Administrator Portals | Microsoft Portals [https://msportals.io/
 * Cybersecurity Memo [https://blog.51sec.org/
 * LazyWinAdmin [https://lazywinadmin.com/
 * AZ-500 Real Exam Questions & Answers - PDF.pdf - Google Drive
   [https://drive.google.com/file/d/1wmxbdjLYgFYyLCcvUn6Kd1DdjclF5cOl/view
 * Microsoft AZ-500 Certification- Azure Security Technologies -
   Google Drive
   [https://drive.google.com/drive/folders/1hQpIp1zd05QoumcNgyL8caSc_GPfTHqM
 * live.sysinternals.com - / [https://live.sysinternals.com/
 * Spiceworks Community - IT Best Practices, How-tos, Product Reviews,
   written by and for IT Pros [https://community.spiceworks.com/
 * How to Use Slmgr to Change, Remove, or Extend Your Windows License
   [https://www.howtogeek.com/245445/how-to-use-slmgr-to-change-remove-or-extend-your-windows-license/
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/
 * Collecte d’informations sur les ordinateurs - PowerShell | Microsoft
   Learn
   [https://learn.microsoft.com/fr-fr/powershell/scripting/samples/collecting-information-about-computers?view=powershell-7.2
 * Administrator Portals | Microsoft Portals
   [https://msportals.io/?search=
 * Using WSL to Build a Python Development Environment on Windows -
   Practical Business Python [https://pbpython.com/wsl-python.html
 * Documentation Microsoft 365 Defender | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/microsoft-365/security/defender/?view=o365-worldwide
 * Documentations - Harden Academy [https://hardenad.net/les-standards/
 * 24/7 - IT | Tutoriels informatique [https://247-it.io/
 * - Centre d’administration Microsoft Entra
   [https://entra.microsoft.com/#view/Microsoft_AAD_IAM/TenantOverview.ReactView
 * Find your Microsoft Azure and Office 365 tenant ID - What is my
   tenant ID? [https://www.whatismytenantid.com/
 * La liste des commandes PowerShell - malekal.com
   [https://www.malekal.com/liste-commandes-powershell/#Les_commandes_PowerShell_de_base_sur_les_comptes_utilisateurs
 * Gestion des identités et des accès : bonnes pratiques de sécurité
   Azure | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/azure/security/fundamentals/identity-management-best-practices
 * Windows Subsystem for Linux September 2023 update - Windows Command
   Line
   [https://devblogs.microsoft.com/commandline/windows-subsystem-for-linux-september-2023-update/
 * Run an attack simulation in a Microsoft Defender XDR pilot
   environment | Microsoft Learn
   [https://learn.microsoft.com/en-us/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack?view=o365-worldwide
 * Exécuter une simulation d’attaque dans un environnement pilote
   Microsoft Defender XDR | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/microsoft-365/security/defender/eval-defender-investigate-respond-simulate-attack?view=o365-worldwide
 * Commencer à utiliser la formation à la simulation d’attaque |
   Microsoft Learn
   [https://learn.microsoft.com/fr-fr/microsoft-365/security/office-365-security/attack-simulation-training-get-started?view=o365-worldwide
   Bible
 * The Cybersecurity career and job hunting guide.
   [https://www.cyberhuntingguide.net/
 * malwareunicorn.org [https://malwareunicorn.org/#/workshops
 * Red Teaming/Adversary Simulation Toolkit
   [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges
 * Wanna Be a Hacker ? - Hex Buddy Notes
   [https://h3xbuddy.gitbook.io/readme/
 * PWK (OSCP) (PEN-200) - Hide01.ir
   [https://pwk.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0
 * PWK (OSCP) (PEN-200) - Hide01.ir
   [https://pwk.hide01.ir/#video-path=media/video/GCKL_04_01.mp4&time-offset=65
 * hide01.ir - Advanced Web Attacks and Exploitation (WEB-300)
   [https://awae.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0
 * PEN-300 - OSEP - Hide01.ir
   [https://pen300.hide01.ir/#video-path=media/video/COPY_00_00.mp4&time-offset=0
 * PWK (OSCP) (PEN-200) - Hide01.ir
   [https://pwk.hide01.ir/#video-path=media/video/CLF_01_01.mp4&time-offset=110
 * PEN-300 - OSEP - Hide01.ir
   [https://pen300.hide01.ir/index.html#video-path=media/video/CSCEO_02_01.mp4&time-offset=470
 * MEGA - Ethical Hacking Penetration Testing & Bug Bounty Hunting-V2
   [https://mega.nz/folder/A2QUjJYR#Vv0xbGm30InMD5kG_tQSWw
 * MEGA - Vikas Chaudhary
   bug-bounty-hunting-offensive-approach-to-hunt-bugs
   [https://mega.nz/folder/Ro9zna5I#BwWk-iQnI8JjGTIahNQUpQ
 * Index of /Compresed/Packt/ [http://s28.bitdl.ir/Compresed/Packt/
 * 05. Pentesting - start.me [https://start.me/p/7kj9g2/05-pentesting
 * Que devez-vous protéger? [https://securityinabox.org/fr/
 * Expert led courses for front-end web developers. | egghead.io
   [https://egghead.io/
   Learn_Site_pour_apprendre
 * Udemy - Bug Bounty Web Hacking - Learning for Life
   [http://learningdl.com/udemy-bug-bounty-web-hacking/
 * command line – UrFix's Blog [https://blog.urfix.com/tag/command-line/
 * logiciel pfsense | www.osnet.eu
   [https://www.osnet.eu/fr/articles-by-category/logiciel-pfsense
 * Category:Attack - OWASP
   [https://www.owasp.org/index.php/Category:Attack
 * Introduction · pentestbook [https://chryzsh.gitbooks.io/pentestbook/
 * Bug Bounty - Hacker Powered Security Testing | HackerOne
   [https://www.hackerone.com/
 * SQLBolt - Learn SQL - Introduction to SQL [https://sqlbolt.com/
 * Please help on "hackthebox" challenge - Support / Beginner Guides -
   0x00sec - The Home of the Hacker
   [https://0x00sec.org/t/please-help-on-hackthebox-challenge/3370
 * GitLab-Adsita [https://sources.ntic.fr/
 * Expert led courses for front-end web developers. | egghead.io
   [https://egghead.io/
   NOCODE
 * Formation No Code : Guide pour se former au No Code en 2022
   [https://nocodestation.com/formation-no-code/
 * The best way to build web apps without code | Bubble
   [https://bubble.io/
 * Le nocode Libre et Open Source pour apps mobile et web - Rédacteurs
   - Framacolibri
   [https://framacolibri.org/t/le-nocode-libre-et-open-source-pour-apps-mobile-et-web/13260
 * Qu'est-ce que le No Code ? Le Guide Petit Hack
   [https://www.petithack.com/blog/no-code
 * Initiez-vous au no-code par la pratique | Initiation aux No-code Ops
   par Contournement
   [https://www.contournement.io/formations/initiation-no-code
 * Formation no code gratuite : Initiation à Bubble et Adalo | Ottho
   [https://www.ottho.co/sinitier-au-no-code?formation-categorie=e-learning-i#programme
 * Créer sa 1ère application sur Bubble - Partie 1 - YouTube
   [https://www.youtube.com/watch?v=m8B01KC1EJU
   FAKE_MAIL
 * The 7 Best Sites to Prank Your Friends With Fake Email Messages
   [https://www.makeuseof.com/tag/deadfake-send-fake-anonimous-email-messages/
 * Emkei's Fake Mailer [https://emkei.cz/
 * FakeUpdate.net - Windows Update Prank by fediaFedia
   [https://fakeupdate.net/
   TOP_TOP_Liens
 * Candidater |fr] Locali [https://www.locali.fr/candidature/
 * vm [https://www.onworks.net/programs/vm-online
 * Voice Dictation - Online Speech Recognition [https://dictation.io/
 * Remover [https://remover.zmo.ai/
 * Resource Cards - Selected free resources for designers
   [https://resourcecards.com/
 * unDraw - Open source illustrations for any idea [https://undraw.co/
 * One Complete Solution to Manage Risk | Drata
   [https://drata.com/product/risk-management
 * Midjourney [https://midjourney.com/
 * Tips for designing and delivery great PowerPoint presentations. —
   Garr Reynolds [https://www.garrreynolds.com/tips
 * L'outil de productivité le plus puissant : Notion - YouTube
   [https://www.youtube.com/watch?v=_HGQKRv-wQI&list=PLUULu5_LYAtue5_6y32aEbfzwm5SbAOo4
 * / ViewPure [https://www.viewpure.com/cNc8fqIjyVA?start=0&end=0
 * / ViewPure [https://www.viewpure.com/5MgBikgcWnY?start=0&end=0
 * Scan Report Nmap 7.80
   [https://htmlpreview.github.io/?https://github.com/honze-net/nmap-bootstrap-xsl/blob/master/scanme.html#
 * An0nud4y [https://an0nud4y.com/
 * twitch.tv passwords - BugMeNot. [https://bugmenot.com/view/twitch.tv
   UTUBE
 * IppSec - YouTube
   [https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
 * TechWorld with Nana - YouTube
   [https://www.youtube.com/channel/UCdngmbVKX1Tgre699-XLlUA
 * The Shadow Brokers - YouTube
   [https://www.youtube.com/channel/UCkpwPf2B4FphjqVcozDym0A
 * HackerSploit - YouTube
   [https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q
 * LiveOverflow - YouTube
   [https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w
 * John Hammond - YouTube [https://www.youtube.com/user/RootOfTheNull
 * Penetration Testing in Linux - YouTube
   [https://www.youtube.com/channel/UC286ntgASMskhPIJQebJVvA
 * Null Byte - YouTube
   [https://www.youtube.com/channel/UCgTNupxATBfWmfehv21ym-g
 * webpwnized - YouTube [https://www.youtube.com/user/webpwnized
 * Grafikart.fr - YouTube [https://www.youtube.com/user/grafikarttv/videos
 * securityidiots.com - YouTube
   [https://www.youtube.com/channel/UCPPAYs04kwfXcHnerm_ueFw
 * ErrOr SquaD - YouTube
   [https://www.youtube.com/channel/UCou-7r8Mk4oQcBmazxp5uwg/videos
 * https://www.youtube.com/@reconless1983/videos
   [https://www.youtube.com/@reconless1983/videos
 * Harshil Darji - YouTube
   [https://www.youtube.com/user/darjiharshil2994/videos
 * Michael LaSalvia - YouTube [https://www.youtube.com/user/genxweb/videos
 * LiveOverflow - YouTube
   [https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/playlists
 * Greenred Productions - Relaxing Music - YouTube
   [https://www.youtube.com/channel/UC1bjWVLp2aaJmPcNbi9OOsw
 * Chaz Rough - YouTube
   [https://www.youtube.com/channel/UCXDrbX-ATVxWLhzVPuk2RGQ
 * mozart husayn - YouTube
   [https://www.youtube.com/channel/UCIPAqm9e_uem9TA9SgPxkGg/videos?shelf_id=0&sort=dd&view=0
 * Derek Rook - YouTube
   [https://www.youtube.com/channel/UCMACXuWd2w6_IEGog744UaA
 * Bug Bounty: Complete Web Hacking Course | Earn by hacking legally -
   YouTube [https://www.youtube.com/watch?v=7USUiBJDm3M
 * HackerOne - YouTube
   [https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw/featured
 * How To Shot Web - Jason Haddix's talk from DEFCON23 - YouTube
   [https://www.youtube.com/watch?v=VtFuAH19Qz0&feature=youtu.be
 * Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's
   LevelUp 2017 - YouTube
   [https://www.youtube.com/watch?v=C4ZHAdI8o1w&feature=youtu.be
 * DEF CON 25 - Jason Haddix - Introducing HUNT Data Driven Web Hacking
   & Manual Testing - YouTube
   [https://www.youtube.com/watch?v=0CU75vPfIS4&feature=youtu.be
 * Tales of a Bug Bounty Hunter - Arne Swinnen - YouTube
   [https://www.youtube.com/watch?v=Ehq6ofUbslI&feature=youtu.be
 * Programming / Coding / Hacking music - YouTube
   [https://www.youtube.com/playlist?list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y&disable_polymer=true
 * Programming / Coding / Hacking music vol.18 (ANONYMOUS HEADQUARTERS)
   - YouTube
   [https://www.youtube.com/watch?v=qoma-IpMdV8&list=RDqoma-IpMdV8&start_radio=1
 * Learn English Conversation - English Today Beginner Level 1 - DVD 1
   - YouTube
   [https://www.youtube.com/watch?v=7oOX48NOyTQ&list=PLjPWtACbY0xlKUBEFrZKfALxTS8hHwWEt
 * Bugcrowd University - Introduction to Burp Suite - YouTube
   [https://www.youtube.com/watch?v=h2duGBZLEek
 * Web App Penetration Testing - YouTube
   [https://www.youtube.com/playlist?list=PLBf0hzazHTGO3EpGAs718LvLsiMIv9dSC
 * GynvaelEN - YouTube [https://www.youtube.com/user/GynvaelEN
 * Blues & Rock Ballads Relaxing Music Vol.4 - YouTube
   [https://www.youtube.com/watch?v=tSSxFFy5Bak&list=RDtSSxFFy5Bak&start_radio=1&t=8
 * Relaxing Blues Music | Vol 7 Mix Songs | Rock Music 2018 HiFi -
   YouTube
   [https://www.youtube.com/watch?v=5nd9GtfFTMk&list=RD5nd9GtfFTMk&start_radio=1&t=5
 * Relaxing Blues Music 2017 | D Man Ain't Enough Whiskey |
   www.RelaxingBlues.Com - YouTube
   [https://www.youtube.com/watch?v=oCF15jPMfIA&list=PLa_JSgSQfk1nvwyACbe1uxbxLptU4UIob
 * Synology - YouTube [https://www.youtube.com/user/synologyinc
 * YouTube [https://www.youtube.com/watch?v=caRgbJZRHzw&feature=youtu.be
 * Learn English conversation - English Today Beginner Level - YouTube
   [https://www.youtube.com/playlist?list=PLjPWtACbY0xlKUBEFrZKfALxTS8hHwWEt
 * The Cyber Mentor - YouTube
   [https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw/videos
 * Zero to Hero Pentesting: Episode 1 - Course Introduction,
   Notekeeping, Introductory Linux, and AMA - YouTube
   [https://www.youtube.com/watch?v=qlK174d_uu8&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj
 * ちとくちとく - YouTube
   [https://www.youtube.com/channel/UCofgQ7mDpWfHu2_i2pJoQRA
 * sam bowne web - YouTube
   [https://www.youtube.com/results?search_query=sam+bowne+web
 * Ludovic Guérin - Cours de SI - YouTube
   [https://www.youtube.com/channel/UCKePSV3VZrLFDexdTNh5PTw/videos
 * Full Ethical Hacking Course - Network Penetration Testing for
   Beginners (2019) - YouTube [https://www.youtube.com/watch?v=3Kq1MIfTWCE
 * SAVEVIDEO.ME: Télécharger Dailymotion vidéos, Vimeo, Facebook,
   Twitter et l'autres! [http://savevideo.me/fr/
 * Recon, Scanning, And Being Stealthy | Yuki Chan - Automate Pentest -
   Sur Up-Tube.com [https://up-tube.com/upvideo/cm6-2tuuM8R
 * STÖK - YouTube [https://www.youtube.com/c/STOKfredrik/playlists
 * Guided Hacking - YouTube
   [https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw
 * InsiderPhD - YouTube [https://www.youtube.com/c/InsiderPhD/playlists
 * Mark Grimes - YouTube
   [https://www.youtube.com/channel/UCEZz_xKyZ-mhY5L5rluykvw/videos
 * Everlaab - YouTube
   [https://www.youtube.com/channel/UCyhxxX9rvuoA_7EptWonUpA
 * The Complete Open Source Intelligence (OSINT) Training Course -
   YouTube [https://www.youtube.com/watch?v=opLD4zFB5z0
 * inCyber - YouTube
   [https://www.youtube.com/channel/UCqAUmpTXbid8sLp6c--xeHg
 * Vérifier l’information en ligne (techniques OSINT): atelier en ligne
   (gratuit) - YouTube [https://www.youtube.com/watch?v=eksCOUZhhT4
 * TryHackMe Intro to Windows Official Walkthrough - YouTube
   [https://www.youtube.com/watch?v=87TSrJTxD54&list=PLsqUCyw0Jf9tAXTNPmDixY6ASkrOm_7tm&index=4
 * Buffer Overflows Made Easy - YouTube
   [https://www.youtube.com/playlist?list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G
 * Centralisez et sécurisez votre annuaire Active Directory -
   OpenClassrooms
   [https://openclassrooms.com/fr/courses/2222496-centralisez-et-securisez-votre-annuaire-active-directory
 * Practical Mobile app attacks by Example Workshop - OWASP Czech Day -
   YouTube [https://www.youtube.com/watch?v=EmlJpYrrzj0
 * zseano - YouTube [https://www.youtube.com/c/zseano
 * The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test
   HackFest Summit 2018 - YouTube
   [https://www.youtube.com/watch?v=WTN7n7744B4
 * SANS Offensive Operations - YouTube
   [https://www.youtube.com/c/SANSOffensiveOperations/videos
 * HACKERLOI.pdf - YouTube [https://www.youtube.com/watch?v=Zj_7Wunnu2w
 * Learn Cybersecurity: OpenVAS Scan, Ingreslock And Secure Shell
   Exploit - YouTube
   [https://www.youtube.com/watch?v=1YQG_xeXdWg&list=PL0-xwzAwzllx4w5OYdRoVTqlNvQ7xALNM
 * Loi Liang Yang - YouTube [https://www.youtube.com/c/LoiLiangYang
 * How Hackers Launch PDF Virus File And How We Can Protect Ourselves!
   (Cybersecurity) - YouTube [https://www.youtube.com/watch?v=3RSn9JwnWlQ
 * HTML + CSS + JavaScript introduction - web 0x00 - YouTube
   [https://www.youtube.com/watch?v=jmgsgjPn1vs&list=PLhixgUqwRTjx2BmNF5-GddyqZcizwLLGP
 * MIT App Inventor - YouTube [https://www.youtube.com/c/MITAppInventor123
 * naitech - YouTube [https://www.youtube.com/@naitech-nsa/playlists
 * PenTest Workshop - YouTube [https://www.youtube.com/@PenTestWorkshop
 * 106 PowerShell Secrets and Tactics Ben0xA - YouTube
   [https://www.youtube.com/watch?v=mPPv6_adTyg
 * Vilebrequin - YouTube [https://www.youtube.com/@Vilebrequin
 * horizon-gull - YouTube [https://www.youtube.com/@horizongull
 * DEFCONConference - YouTube [https://www.youtube.com/@DEFCONConference
 * Sam Bowne - YouTube [https://www.youtube.com/@sambowne
 * Azarath - YouTube
   [https://www.youtube.com/channel/UCFGsKf-N3pk7xg-PUUgCDSA
 * Sandoz - YouTube
   [https://www.youtube.com/channel/UCnC8KCcp2-DYfPY4_bKIc0A
 * Monsieur Bidouille - YouTube
   [https://www.youtube.com/channel/UCSULDz1yaHLVQWHpm4g_GHA
 * GDG France - YouTube
   [https://www.youtube.com/channel/UCx83f-KzDd3o1QK2AdJIftg
 * Devoxx FR - YouTube
   [https://www.youtube.com/channel/UCsVPQfo5RZErDL41LoWvk0A/featured
 * Hak5 - YouTube [https://www.youtube.com/user/Hak5Darren
 * inCyber - YouTube [https://www.youtube.com/@inCyberMedia/videos
 * Samsa.fr - YouTube [https://www.youtube.com/@samsa_fr/videos
 * CodeAvecJonathan - YouTube [https://www.youtube.com/@CodeAvecJonathan
 * Susanth Sutheesh - YouTube [https://www.youtube.com/@SusanthSutheesh
 * zseano - YouTube [https://www.youtube.com/@zseano
 * Tutorials Point - YouTube [https://www.youtube.com/@TutorialsPoint_
 * Motasem Hamdan - YouTube [https://www.youtube.com/@MotasemHamdan
 * freeCodeCamp.org - YouTube [https://www.youtube.com/@freecodecamp
 * Mantis - YouTube [https://www.youtube.com/@MantisSTS
 * Adrian Crenshaw - YouTube [https://www.youtube.com/@irongeek
 * STÖK - YouTube [https://www.youtube.com/@STOKfredrik
 * Bug Bounty 2022 Guide: Where to focus // How to make money // How to
   get started today - YouTube
   [https://www.youtube.com/watch?v=-2eVJRBNzY0
 * Farah Hawa - YouTube [https://www.youtube.com/@FarahHawa/videos
 * John Hammond - YouTube [https://www.youtube.com/@_JohnHammond
 * Hack & Dev avec Rémi - YouTube [https://www.youtube.com/@remi-cybersec
 * securityguideme - YouTube
   [https://www.youtube.com/@securityguideme/videos
 * Black Hat - YouTube [https://www.youtube.com/@BlackHatOfficialYT
 * Hacker Vlog - YouTube [https://www.youtube.com/@HackerVlog
 * YesWeHack - YouTube [https://www.youtube.com/@yeswehack8608
 * Black & White Security - YouTube
   [https://www.youtube.com/@cybersecurity-/videos
 * intigriti - YouTube [https://www.youtube.com/@intigriti
 * Bug Bounty Tutorials - YouTube
   [https://www.youtube.com/@BugBountyTutorials/videos
 * Cybr - YouTube [https://www.youtube.com/@Cybrcom
 * HackHappy - YouTube [https://www.youtube.com/@HackhappyOrg
 * Grafikart.fr - YouTube [https://www.youtube.com/@grafikart
 * CyberSecurityTV - YouTube [https://www.youtube.com/@CyberSecurityTV
 * Ethical Hacking Indonesia - YouTube
   [https://www.youtube.com/@benediktussava
 * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101
 * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101
 * zSecurity - YouTube [https://www.youtube.com/@zSecurity
 * thenewboston - YouTube [https://www.youtube.com/@thenewboston
 * S4WR42 - YouTube [https://www.youtube.com/@s4wr426
 * Netsec Explained - YouTube [https://www.youtube.com/@NetsecExplained
 * Cyber Academy - YouTube [https://www.youtube.com/@CyberAcademyHindi
 * xavki - YouTube [https://www.youtube.com/@xavki
 * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101/playlists
 * CVE.report - Home [https://cve.report/
 * TechWorld with Nana - YouTube
   [https://www.youtube.com/@TechWorldwithNana
 * BUG HUNTER UNIVERSITY - YouTube
   [https://www.youtube.com/playlist?list=PLY-vqlMAnJ9bGoI82H1BB8BE4A8H2OCA-&cbrd=1&themeRefresh=1
 * Hackintux - YouTube [https://www.youtube.com/@hackintux5813
 * processus thief - YouTube
   [https://www.youtube.com/results?search_query=processus+thief
 * PowerShell for Pentesters - YouTube
   [https://www.youtube.com/playlist?list=PLJQHPJLj_SQatUsJy3O4k-VQlllquDmDr
 * Screen sharing in Apache Gaucamole - YouTube
   [https://www.youtube.com/watch?v=MXywMfXD_8I
 * Guacamole Remote Desktop - Open Source, Self Hosted remote access to
   your machines in the browser! - YouTube
   [https://www.youtube.com/watch?v=DGw6P5Lkj-U
 * Black Hat USA 2013 - HOW CVSS is DOSsing YOUR PATCHING POLICY (and
   wasting your money) - YouTube
   [https://www.youtube.com/watch?v=_laE5mp1Nl8
 * Victor de Martrin - YouTube
   [https://www.youtube.com/channel/UC995AyG92eh2LDaedXje8mQ
 * HackinGeeK - YouTube [https://www.youtube.com/c/HackinGeeK/videos
 * https://www.youtube.com/channel/UC8butISFwT-Wl7EV0hUK0BQ
   [https://www.youtube.com/channel/UC8butISFwT-Wl7EV0hUK0BQ
 * xavki - YouTube
   [https://www.youtube.com/channel/UCs_AZuYXi6NA9tkdbhjItHQ/playlists?view=50&sort=dd&shelf_id=12&view_as=subscriber
 * SentinelOne Management Console Tour - YouTube
   [https://www.youtube.com/embed/SHAcB9WzwTg
 * How To Make A Cluster Computer (Part 1) - YouTube
   [https://www.youtube.com/watch?v=1R0UgIgcb5g
 * SANS Offensive Operations - YouTube
   [https://www.youtube.com/@SANSOffensiveOperations
 * 🔴 Webinaire - Cobalt Strike : Découverte, Simulation, Détection
   et protection. - YouTube [https://www.youtube.com/watch?v=AhKtJWcsc94
 * Red Team Ops with Cobalt Strike - Operations (1 of 9) - YouTube
   [https://www.youtube.com/watch?v=i6tsLWrCiGE&list=PLcjpg2ik7YT6H5l9Jx-1ooRYpfvznAInJ
 * Black Hills Information Security - YouTube
   [https://www.youtube.com/@BlackHillsInformationSecurity/videos
 * Pentester Academy TV - YouTube
   [https://www.youtube.com/channel/UChjC1q6Ami7W0E71TzPZELA
 * THEGREENBOW - YouTube [https://www.youtube.com/@thegreenbow1357
 * Naveenkumar S - YouTube [https://www.youtube.com/@naveenkumars8244
 * OffSec Live | Web Application Assessment Essentials: Web Attacker
   Methodology - YouTube
   [https://www.youtube.com/watch?v=_mUqA-lBLTc&list=PLJrSyRNlZ2Ecrihsz_H5mXYoCmWZDqXyI&index=16
 * OffSec - YouTube [https://www.youtube.com/@OffSecTraining/videos
 * Dark Web Documentary 01 Getting Setup with Tails Linux - YouTube
   [https://www.youtube.com/watch?v=QTIzSz73yYU&list=PL1H1sBF1VAKU8aP5FC-makTTBknb1EWYC
 * Pour 1nf0 - la Cyber expliquée - YouTube
   [https://www.youtube.com/@Pour1nfo/videos
 * https://www.youtube.com/@Micmaths?cbrd=1&themeRefresh=1
   [https://www.youtube.com/@Micmaths?cbrd=1&themeRefresh=1
 * James Lyne: Everyday cybercrime -- and what you can do about it |
   TED Talk
   [https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_about_it
 * Cyber Spider - YouTube [https://www.youtube.com/@technicalspider9812
 * KBTrainings En Français - YouTube
   [https://www.youtube.com/@KBTrainings_fr/playlists
 * Configuration Du Pare-feu FortiGate 80D: VLAN, WAN, DHCP, Regles
   IPv4 | Vidéo#4: Réseau Domestique 🏠 - YouTube
   [https://www.youtube.com/watch?v=RB0DfizwroI
   Veille
 * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/
 * Home - IT Security Guru [https://www.itsecurityguru.org/
 * Uniqkey Features: Built for IT, Designed for Employees
   [https://www.uniqkey.eu/features
 * Hacking - IT Security Guru
   [https://www.itsecurityguru.org/category/hacking-news/
 * The Cybersecurity Podcast Network - Security Weekly | SC Media | SC
   Media [https://www.scmagazine.com/security-weekly
 * BFT [https://mrfreetools.com/tools/?s=09
 * How to Test Endpoint Security with Red Teaming | CrowdStrike
   [https://www.crowdstrike.com/blog/how-to-test-endpoint-security-with-red-teaming/
 * BtoBradio.TV | Recherche pour RSSI [https://btobradio.tv/search
 * ComCyberGend et les entreprises
   [https://www.thegreenbow.com/fr/ressource/webtv/cybercriminalite-comment-le-comcybergend-combat-aux-cotes-des-entreprises/
 * Cybersécurité Solutions [https://www.cybersecurite-solutions.com/
 * Business Software and Services Reviews | G2 [https://www.g2.com/
 * Actualités sur la sécurité informatique | IT-Connect
   [https://www.it-connect.fr/actualites/actu-securite/
 * Sites web les plus visités - Top sites web classés pour février 2022
   | Similarweb [https://www.similarweb.com/fr/top-websites/
 * Dashboard - Pulsedive [https://pulsedive.com/dashboard/
 * Data Security Breach – L'actualité cybersécurité pour PME/PMI/TPE
   [https://www.datasecuritybreach.fr/
 * AttackIQ Academy [https://attackiq.com/
 * RISKS-LIST: RISKS-FORUM Digest [https://catless.ncl.ac.uk/Risks/
 * ZATAZ [https://www.zataz.com/
 * Directory of ATT&CK Open Source Tools
   [https://www.attack-community.org/directory/
 * Laique.eu – Informations sur les cyberattaques [https://laique.eu/
 * Free Premium Exam Dumps - Real Exam Q&A | CertLibrary.com
   [https://www.certlibrary.com/
 * https://tria.ge/reports/public [https://tria.ge/reports/public
 * Zero-Day Exploit Targeting Popular Java Library Log4j
   [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/
 * Directory of ATT&CK Open Source Tools
   [https://www.attack-community.org/directory/
 * Hack Today — The Home of Hackers! [https://www.hacktoday.io/
 * ISO27k infosec management standards [https://www.iso27001security.com/
 * InQuest Labs - InQuest.net [https://labs.inquest.net/
 * infond: légalité du scan de port
   [http://www.infond.fr/2010/09/legalite-du-scan-de-port.html
 * La protection juridique du "pentester", prestataire de test
   d’intrusion informatique. Par Pablo Nicoli, Avocat.
   [https://www.village-justice.com/articles/protection-juridique-pentester-prestataire-test-intrusion-informatique,35615.html
 * Google Colab [https://colab.research.google.com/github/
 * technique et droit du numérique = le blog tout en BD !
   [https://technique-et-droit-du-numerique.fr/
 * Video Archives – Horizon3.ai [https://www.horizon3.ai/category/videos/
 * Researchers have developed CVE-2022-40684 PoC exploit code
   [https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
 * RasPwn OS – Un OS vulnérable à mettre sur Raspberry Pi
   [https://korben.info/raspwn-os-raspberry-pi.html
 * How does AutoPWN Suite work? | PWN SPOT!
   [https://pwnspot.com/posts/AutoPWN/
 * Experts show how to bypass Windows Hello feature to login on Windows
   10 PCsSecurity Affairs
   [https://securityaffairs.co/wordpress/120278/hacking/windows-hello-bypass.html
 * https://www.cynet.com/blog/ [https://www.cynet.com/blog/
 * https://www.globalsecuritymag.fr/ [https://www.globalsecuritymag.fr/
 * https://www.anomali.com/blog [https://www.anomali.com/blog
 * https://inquest.net/blog [https://inquest.net/blog
 * https://exchange.xforce.ibmcloud.com/search/%23ransomware
   [https://exchange.xforce.ibmcloud.com/search/%23ransomware
 * https://observatoire-fic.com/ [https://observatoire-fic.com/
 * https://www.globalsign.com/fr/blog [https://www.globalsign.com/fr/blog
 * https://cyberguerre.numerama.com/ [https://cyberguerre.numerama.com/
 * https://cybergordon.com/ [https://cybergordon.com/
 * https://www.informatiquenews.fr/news/securite
   [https://www.informatiquenews.fr/news/securite
 * https://www.arsouyes.org/ [https://www.arsouyes.org/
 * https://us-cert.cisa.gov/ncas [https://us-cert.cisa.gov/ncas
 * https://infosecwriteups.com/ [https://infosecwriteups.com/
 * https://www.auscert.org.au/resources/security-bulletins/
   [https://www.auscert.org.au/resources/security-bulletins/
 * https://www.scoop.it/topic/securite-informatique-by-dcit-conseil
   [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil
 * https://www.esecurityplanet.com/ [https://www.esecurityplanet.com/
 * http://cve.circl.lu/ [http://cve.circl.lu/
 * https://www.opencti.net.br/ [https://www.opencti.net.br/
 * https://pulsedive.com/ [https://pulsedive.com/
 * https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/1
   [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/1
 * https://www.kali-linux.fr/ [https://www.kali-linux.fr/
 * https://news.torii-security.fr/ [https://news.torii-security.fr/
 * https://lobste.rs/t/security [https://lobste.rs/t/security
 * https://www.geeek.org/chaines-youtube-geek/
   [https://www.geeek.org/chaines-youtube-geek/
 * https://www.undernews.fr/ [https://www.undernews.fr/
 * https://www.usine-digitale.fr/cybersecurite/
   [https://www.usine-digitale.fr/cybersecurite/
 * https://siecledigital.fr/cybersecurite/
   [https://siecledigital.fr/cybersecurite/
 * https://malwaredevil.com/ [https://malwaredevil.com/
 * http://morningstarsecurity.com/security-twitterverse
   [http://morningstarsecurity.com/security-twitterverse
 * https://attackerkb.com/ [https://attackerkb.com/
 * https://linc.cnil.fr/ [https://linc.cnil.fr/
 * https://malpedia.caad.fkie.fraunhofer.de/actor/fin8
   [https://malpedia.caad.fkie.fraunhofer.de/actor/fin8
 * https://s.tencent.com/research/bsafe/
   [https://s.tencent.com/research/bsafe/
 * https://www.opencve.io/cve [https://www.opencve.io/cve
 * https://www.auscert.org.au/resources/security-bulletins/
   [https://www.auscert.org.au/resources/security-bulletins/
 * https://cyber.gc.ca/en/alerts-advisories
   [https://cyber.gc.ca/en/alerts-advisories
 * https://www.hkcert.org/security-bulletin
   [https://www.hkcert.org/security-bulletin
 * https://portswigger.net/daily-swig [https://portswigger.net/daily-swig
 * https://cxsecurity.com/ [https://cxsecurity.com/
 * https://www.pensezcybersecurite.gc.ca/fr/ressources
   [https://www.pensezcybersecurite.gc.ca/fr/ressources
 * https://news.torii-security.fr/t/Certfr
   [https://news.torii-security.fr/t/Certfr
 * https://veille-cyber.com/ [https://veille-cyber.com/
 * https://www.anomali.com/ [https://www.anomali.com/
 * https://www.cert-ist.com/public/fr/home
   [https://www.cert-ist.com/public/fr/home
 * Malware Trends Tracker | ANY.RUN [https://any.run/malware-trends/
 * Weakpass [https://weakpass.com/download
 * Cyber Range Training | SANS Institute
   [https://www.sans.org/cyber-ranges/
 * Tools - Intelligence X [https://intelx.io/tools?tab=general
 * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/
 * Information Security Stack Exchange
   [https://security.stackexchange.com/
 * Phonebook.cz - Intelligence X [https://phonebook.cz/
 * BleepingComputer.com - Technology news and support
   [https://www.bleepingcomputer.com/
 * InfoSec Write-ups [https://infosecwriteups.com/?gi=a227bdd976ec
 * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation
   [https://iplists.firehol.org/#aboutCollapseOne
 * Les Appels à Candidature
   [https://alternatif-art.com/index.php/les-appels-a-candidature
 * Dashboard - Pulsedive [https://pulsedive.com/dashboard/
 * Hacking – Just For Fun [http://hacking.thewebcreation.fr/
 * HTTPCS - Dernières actualités [https://www.httpcs.com/news
 * Offres d'emploi informatique et développeurs
   [http://emploi.developpez.com/
 * ITIL® [http://wiki.octopus-itsm.com/fr/article-categories/itilr
 * sur InformatiqueNews.fr : toute l'actu et les tendances
   [https://www.informatiquenews.fr/news/securite/page/2
 * TWikiSecurity [[ Codev [[ TWiki
   [https://twiki.org/cgi-bin/view/Codev/TWikiSecurity
 * IT Security News and Cybersecurity News - IT Security Guru
   [https://www.itsecurityguru.org/
 * Infosecurity Magazine - Information Security & IT Security News and
   Resources [https://www.infosecurity-magazine.com/
 * RiskInsight - Le blog des experts cybersécurité Wavestone
   [https://www.riskinsight-wavestone.com/
 * Linux – My Server – Anthesia.NET
   [https://www.anthesia.net/linux-my-server/
 * https://blog.httpcs.com/ [https://blog.httpcs.com/
 * https://securite.developpez.com/ [https://securite.developpez.com/
 * https://thehackernews.com/ [https://thehackernews.com/
 * https://www.ethicalhacker.net/ [https://www.ethicalhacker.net/
 * https://rmll.ubicast.tv/channels/#securite-entre-transparence-et-opacite_77315 [https://rmll.ubicast.tv/channels/#securite-entre-transparence-et-opacite_77315
 * https://www.xmco.fr/actusecu/ [https://www.xmco.fr/actusecu/
 * https://nakedsecurity.sophos.com/ [https://nakedsecurity.sophos.com/
 * hackers - toute l'actualité [https://siecledigital.fr/tag/hackers/
 * https://otx.alienvault.com/dashboard/new
   [https://otx.alienvault.com/dashboard/new
 * jetlib.sec [https://sec.jetlib.com/search.php
 * Security Strategy – phoenixNAP Blog
   [https://phoenixnap.com/blog/category/security-strategy
 * /root Archives - The Ethical Hacker Network
   [https://www.ethicalhacker.net/category/features/root/
 * SHAttered - CloudBleed - NoLimitSecu
   [https://www.nolimitsecu.fr/shattered-cloudbleed/
 * Ransomware attack leads to shutdown of major U.S. pipeline system -
   Malware Devil
   [https://malwaredevil.com/2021/05/08/ransomware-attack-leads-to-shutdown-of-major-u-s-pipeline-system/?utm_campaign=twitter&utm_medium=twitter&utm_source=twitter
 * Alertes | Accompagnement Cybersécurité des Structures de Santé
   [https://cyberveille-sante.gouv.fr/alertes
 * LINC [http://linc.cnil.fr/
 * Hackers Repository | Latest Hacking Tools - Haxf4rall
   [https://haxf4rall.com/
 * CyberScoop [https://www.cyberscoop.com/
 * Open-source-tools-for-CTI/README.md at master ·
   BushidoUK/Open-source-tools-for-CTI · GitHub
   [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md
 * GreenLock Advisory [https://greenlock.ghost.io/
 * Actualités sécurité, piratage, hacking et cybercriminalité
   [https://www.01net.com/actualites/securite/
 * HOTforSecurity – The blog on the sizzling world of computer
   security: steamy stories from the dynamic world of internet fraud,
   scams, malware – and gossip. Powered by Bitdefender.
   [https://hotforsecurity.bitdefender.com/
 * Coronavirus | Futura Santé
   [https://www.futura-sciences.com/sante/medecine/coronavirus/
 * Actualités et information IT [https://www.lemagit.fr/actualites
 * How to Protect Kubernetes Clusters from Cyberthreats | Hacker Noon
   [https://hackernoon.com/search?query=ansible
 * Tags | Geeek [https://www.geeek.org/tags/
 * Exploit Development [https://www.reddit.com/r/ExploitDev/
 * La cyber-sécurité - Faits et chiffres | Statista
   [https://fr.statista.com/themes/3680/la-cyber-securite/
 * Home - Security Boulevard [https://securityboulevard.com/
 * InQuest Labs - InQuest.net
   [https://labs.inquest.net/iocdb/search/FIN8#iocdb-search+ZXlKbUlqcDdJbUZ5ZEdsbVlXTjBYM1I1Y0dVaU9sc2llV0Z5WVhOcFoyNWhkSFZ5WlNJc0luVnliQ0pkZlN3aWJ5STZleUp6YjNKMFJtbGxiR1FpT201MWJHeDlMQ0p3SWpwN2ZYMD0=
 * Find Open Source By Searching, Browsing and Combining 7,000 Topics
   [https://awesomeopensource.com/
 * La cybersécurité des entreprises - Prévenir et guérir : quels
   remèdes contre les cyber virus ?
   [https://www.senat.fr/rap/r20-678/r20-678_mono.html
 * ThreatMiner.org | Data Mining for Threat Intelligence
   [https://www.threatminer.org/
 * About [https://blog.openthreatresearch.com/about/
 * Comment créer un mot de passe sécurisé et simple à retenir ? |
   economie.gouv.fr
   [https://www.economie.gouv.fr/particuliers/creer-mot-passe-securise
 * Irongeek.com [https://www.irongeek.com/
 * site:*.github.io intext:cheatsheet+offensive+pentesting wpscan -
   Recherche Google
   [https://www.google.com/search?q=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&sca_esv=570671288&ei=2XkdZauqHL2lkdUPg4iOkAY&ved=0ahUKEwjr-pmk0NyBAxW9UqQEHQOEA2IQ4dUDCA8&uact=5&oq=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&gs_lp=Egxnd3Mtd2l6LXNlcnAiPnNpdGU6Ki5naXRodWIuaW8gaW50ZXh0OmNoZWF0c2hlZXQrb2ZmZW5zaXZlK3BlbnRlc3Rpbmcgd3BzY2FuSMoUUO8BWIcScAF4AJABAJgBPaABhgOqAQE3uAEDyAEA-AEB4gMEGAEgQYgGAQ&sclient=gws-wiz-serp
 * 🌌 IP BlackHole [https://ip.blackhole.monster/
 * Leo : le chatbot IA qui priorise la confidentialité
   [https://www.servicesmobiles.fr/leo-le-chatbot-ia-qui-priorise-la-confidentialite-92213
   Info_BonnePratique
 * Computer Emergency Response Team — Wikipédia
   [https://fr.wikipedia.org/wiki/Computer_Emergency_Response_Team
 * Bienvenue sur le site du CLUSIR Rhône-Alpes | Clusir Rhône Alpes
   [http://www.clusir-rha.fr/
   ECOLE_FORMATION
 * Hands-on cyber security training brought to life through real-world
   simulations | CyberStart [https://cyberstart.com/
 * CyWARIA - Cympire [https://www.cympire.com/cywaria/
   FRAMEWORK
 * CAF - Principles and guidance - NCSC.GOV.UK
   [https://www.ncsc.gov.uk/collection/caf/caf-principles-and-guidance
 * Cybersecurity Framework | NIST [https://www.nist.gov/cyberframework
 * OWASP Foundation | Open Source Foundation for Application Security
   [https://owasp.org/
 * OSSTMM 3 - OSSTMM.3.pdf [https://www.isecom.org/OSSTMM.3.pdf
   Veille secu 2020
 * Sécurité Archives - Cyberguerre
   [https://cyberguerre.numerama.com/tag/securite/
 * CXSECURITY.COM Free Security List [https://cxsecurity.com/
 * Catégories - Comparez les prix et les meilleurs outils - Capterra
   France - 2020 [https://www.capterra.fr/directory
 * Security [https://news.softpedia.com/cat/Security/
 * Bulletins de sécurité | DGSSI
   [https://www.dgssi.gov.ma/fr/macert/bulletins-de-securite.html
 * Home - Security Boulevard [https://securityboulevard.com/
 * Les Français, mauvais élèves européens de la protection de leurs
   données – Data Security Breach
   [https://www.datasecuritybreach.fr/france-donnees-personnelles/
   OSSEC-OSSIM
 * communities.alienvault.com - Recherche Google
   [https://www.google.fr/search?q=communities.alienvault.com
 * Que fait ce code PHP injecté?
   [https://security.stackovernet.com/fr/q/18693
 * system compromise - How do I deal with a compromised server? -
   Information Security Stack Exchange
   [https://security.stackexchange.com/questions/39231/how-do-i-deal-with-a-compromised-server)
 * hacking - How do I deal with a compromised server? - Server Fault
   [https://serverfault.com/questions/218005/how-do-i-deal-with-a-compromised-server
 * User Rob Moir - Server Fault
   [https://serverfault.com/users/7783/rob-moir
 * @cc_on - JavaScript | MDN
   [https://developer.mozilla.org/en-US/docs/Web/JavaScript/Microsoft_Extensions/at-cc-on
 * Open Threat Exchange (OTX) | AlienVault
   [https://www.alienvault.com/open-threat-exchange
 * AlienVault - Open Threat Exchange [https://otx.alienvault.com/
 * Configuring OSSEC Clients with OSSIM | Muhammad Attique's Blog
   [http://muhammadattique.com/2015/01/03/configuring-ossec-clients-with-ossim/
   CVE
 * CVE.report - Home [https://cve.report/
 * CVE - Search CVE List [https://cve.mitre.org/cve/search_cve_list.html
 * Vulnerabilities (CVE) - OpenCVE [https://www.opencve.io/cve
 * Most recent entries - CVE-Search [http://cve.circl.lu/
 * CVE-2021-34527 : PrintNightmare Vulnerability, Exploit and
   Remediation | ThreatIT - Cyber Security News, Articles & Tutorials
   [https://threatit.com/articles/cve-2021-34527-printnightmare-vulnerability-exploit-and-remediation/
 * GitHub - stanfrbd/searchcve [https://github.com/stanfrbd/searchcve
 * http://cve.circl.lu/ [http://cve.circl.lu/
 * https://www.opencve.io/cve [https://www.opencve.io/cve
 * CVE - CVE-2021-44228
   [https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228
 * Exploiting log4j (CVE-2021-44228) RCE - YouTube
   [https://www.youtube.com/watch?v=OJRqyCHheRE
 * GitHub - christophetd/log4shell-vulnerable-app: Spring Boot web
   application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
   [https://github.com/christophetd/log4shell-vulnerable-app
 * vulnonym.org - An offensive and otherwise scary human readable name
   generator for CVEs. · Vulnonym.org [https://vulnonym.org/
 * Our CVEs - SentinelOne [https://www.sentinelone.com/labs/our-cves/
 * CVE STALKER -The most viral CVE(vulnerability) ranking chart-
   [https://cvestalker.com/weekly.php
 * Researchers have developed CVE-2022-40684 PoC exploit code
   [https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
 * DailyCVE [https://www.reddit.com/r/DailyCVE/
 * CVE security vulnerability database. Security vulnerabilities,
   exploits, references and more [https://www.cvedetails.com/
 * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/
 * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/
   Veille_travail
 * Welcome! [https://suip.biz/
 * Teleport - YouTube [https://www.youtube.com/c/Gravitational/playlists
 * Apache Guacamole™ [https://guacamole.apache.org/
 * Systancia : Editeur global et indépendant Logiciels de cybersécurité
   [https://www.systancia.com/
 * Boundary by HashiCorp [https://www.boundaryproject.io/
 * Implémentation et architecture — Manuel Apache Guacamole v1.4.0
   [https://guacamole-apache-org.translate.goog/doc/gug/guacamole-architecture.html?_x_tr_sl=auto&_x_tr_tl=fr&_x_tr_hl=fr
 * Guacamole, contrôler vos équipements en SSH ou RDP via une interface
   Web
   [https://domopi.eu/guacamole-controler-vos-equipements-en-ssh-rdp-ou-vnc-via-une-interface-web/
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/
 * 13 outils gratuits en ligne pour analyser les vulnérabilités et les
   logiciels malveillants de la sécurité des sites Web
   [https://geekflare.com/fr/online-scan-website-security-vulnerabilities/
 * Spectre: Passwords, Privacy-first [https://spectre.app/
 * https://blog.lesspass.com/2016-07-08/comment-ca-marche
   [https://blog.lesspass.com/2016-07-08/comment-ca-marche
 * Security Tools Benchmarking [https://sectooladdict.blogspot.com/
 * Free Edition - SOCRadar® Cyber Intelligence Inc.
   [https://socradar.io/free-edition/
 * Portail:Sécurité informatique — Wikipédia
   [https://fr.wikipedia.org/wiki/Portail:S%C3%A9curit%C3%A9_informatique
 * Top 10 des logiciels de prise en main à distance - Selectronic.fr
   [https://www.selectronic.fr/informatique/logiciels-de-prise-en-main-a-distance/
 * 10 meilleurs logiciels de contrôle à distance pour PC - malekal.com
   [https://www.malekal.com/meilleurs-logiciels-controle-distance-pc/
 * Logiciels de prise en main à distance : meilleurs outils - Capterra
   France 2022
   [https://www.capterra.fr/directory/30928/remote-support/software
 * Logiciels de prise en main à distance - Meilleurs outils 2022 |
   GetApp France
   [https://www.getapp.fr/directory/563/remote-support/software
 * Attack Surface Intelligence | Recorded Future
   [https://www.recordedfuture.com/platform/attack-surface-intelligence
 * Intelligence-Driven Cybersecurity for the Enterprise - Anomali
   [https://www.anomali.com/
 * Freeware – Essai – Démos – Licences – OpenOTP Security Suite –
   RCDevs Security
   [https://www.rcdevs.com/fr/try-and-buy/#tbfreewaresep#tbfreewaresep
 * YumiSign – Digital Signature Platform [https://www.yumisign.com/
 * Torturez votre EDR avec Atomic Red Team ! - Rampar
   [https://www.rampar.com/news/torturez-votre-edr-avec-atomic-red-team/
 * Virtual x86 [https://copy.sh/v86/
 * OSV [https://osv.dev//#use-the-cli
 * Kaspersky IT Encyclopedia [https://encyclopedia.kaspersky.com/
 * Attaques ciblées : le jeu
   [http://targetedattacks.trendmicro.com/cyoa/fra/#
 * Somfy – Ne faites pas entrer le hacker
   [https://jackstones.somfy.com/#episodes
 * Guacamole Bastion Host
   [http://netcubed-ami.s3-website-us-east-1.amazonaws.com/guaws/v2.3.1/
   Hunting-Mal
 * Malware Corpus Tracker - Download Sites - haas [https://tracker.h3x.eu/
 * home [https://suip.biz/
 * Welcome! [https://w-e-b.site/
 * MalwareSamples (Mr. Malware) · GitHub
   [https://github.com/MalwareSamples
 * GitHub - MalwareSamples/Linux-Malware-Samples: Linux Malware Sample
   Archive including various types of malicious ELF binaries and
   viruses. Be careful!
   [https://github.com/MalwareSamples/Linux-Malware-Samples
 * Malware and Virus Samples | VirusSamples.com
   [https://www.virussamples.com/
 * James Brine - Australian Cyber Threat Intelligence -
   jamesbrine.com.au [https://jamesbrine.com.au/
 * CAPE Sandbox [https://www.capesandbox.com/analysis/
 * Curated Intelligence [https://www.curatedintel.org/
 * ThreatMiner.org | Data Mining for Threat Intelligence
   [https://www.threatminer.org/
 * searchcode | source code search engine [https://searchcode.com/
 * MetaDefender Cloud | Advanced threat prevention and detection
   [https://metadefender.opswat.com/
 * All domains that include facebook - SecurityTrails
   [https://securitytrails.com/list/keyword/facebook
 * InQuest Labs - InQuest.net [https://labs.inquest.net/
 * Dashboard - Pulsedive [https://pulsedive.com/dashboard/
 * Weakpass [https://weakpass.com/download
 * GitHub - InQuest/malware-samples: A collection of malware samples
   and relevant dissection information, most probably referenced from
   http://blog.inquest.net [https://github.com/InQuest/malware-samples
 * AV-ATLAS [https://portal.av-atlas.org/
 * UnpacMe Results
   ebdebe69d2d1252847af7fd1a76f19cfe1d828463374a583829a5ac9d6ba1e8f
   [https://www.unpac.me/results/00e6c90e-2fac-494e-8371-4148ca36727a#/
 * malwares.com [https://www.malwares.com/
 * VMRAY
   [https://www.vmray.com/analyses/ebdebe69d2d1/report/behavior_grouped.html#
 * Threat Feed | Online Malware Sandbox | VMRay
   [https://threatfeed.vmray.com/
 * 5-Minute Analysis of a Remote Access Trojan | by David French |
   Threat Punter | Medium
   [https://medium.com/threatpunter/5-minute-analysis-of-a-remote-access-trojan-c0d085e53d53
 * IRIS-H Digital Forensics [https://iris-h.services/pages/dashboard
 * CyberGordon - Cyber Reputation Checks [https://cybergordon.com/
 * Domains containing "fin8" | ThreatMiner.org
   [https://www.threatminer.org/domains.php?q=FIN8#gsc.tab=0&gsc.q=FIN8&gsc.page=1
 * VX Vault [http://vxvault.net/ViriList.php
 * Hatching Triage | Sandbox for High-Volume Automated Malware Analysis
   [https://tria.ge/
 * Free Automated Malware Analysis Service - powered by Falcon Sandbox
   - Search results
   [https://www.hybrid-analysis.com/search?query=c8427258f566f22f7117d3b86b16f806a6eeb9ae
 * HoneyDB [https://riskdiscovery.com/honeydb/
 * Reverss [https://sandbox.anlyz.io/search/files/
 * PacketTotal - Malware Archive
   [https://packettotal.com/malware-archive.html#
 * InQuest Labs - InQuest.net
   [https://labs.inquest.net/iocdb/search/FIN8#iocdb-search+ZXlKbUlqcDdJbUZ5ZEdsbVlXTjBYM1I1Y0dVaU9sc2llV0Z5WVhOcFoyNWhkSFZ5WlNJc0luVnliQ0pkZlN3aWJ5STZleUp6YjNKMFJtbGxiR1FpT201MWJHeDlMQ0p3SWpwN2ZYMD0=
 * ThreatMiner.org | Data Mining for Threat Intelligence
   [https://www.threatminer.org/
 * Talos File Reputation || Cisco Talos Intelligence Group -
   Comprehensive Threat Intelligence
   [https://talosintelligence.com/sha_searches
 * URLhaus | Malware URL exchange [https://urlhaus.abuse.ch/
 * MalwareBazaar | Browse malware samples
   [https://bazaar.abuse.ch/browse.php?search=Softonic
 * You searched for Softonic | VMRay [https://www.vmray.com/?s=Softonic
 * Malware Reports - Online Malware Analysis Sandbox
   [https://app.any.run/submissions
 * ANY.RUN - Our Benefits For Your Work & Study [https://any.run/why-us/
 * Free Automated Malware Analysis Service - powered by Falcon Sandbox
   [https://www.hybrid-analysis.com/
 * VirusTotal [https://www.virustotal.com/gui/
 * Automated Malware Analysis Report for https://www.ecomgroup.co/ -
   Generated by Joe Sandbox
   [https://www.joesandbox.com/analysis/377531/0/html
 * MalwareBazaar | Malware sample exchange [https://bazaar.abuse.ch/
 * 63b8a0fc...a28c | VMRay Analyzer Report
   [https://www.vmray.com/analyses/63b8a0fc17f2/report/overview.html
 * Intezer Analyze
   [https://analyze.intezer.com/families/dd680674-8e2f-4495-a5cb-53fc7ac28fdc
 * Automated Malware Analysis Report for sourceinit.dat - Generated by
   Joe Sandbox [https://www.joesandbox.com/analysis/340839/0/html#overview
 * "dasmalwerk.eu" [https://dasmalwerk.eu/
 * GitHub - NextronSystems/APTSimulator: A toolset to make a system
   look as if it was the victim of an APT attack
   [https://github.com/NextronSystems/APTSimulator
 * MalwareWorld - Checker [https://www.malwareworld.com/
 * Free and Open Source Threat Intelligence Feeds - Threat Intelligence
   [https://www.threat-intel.xyz/
 * PhishTank | Join the fight against phishing
   [https://data.phishtank.com/index.php
 * Malware Trends Tracker | ANY.RUN [https://any.run/malware-trends/
 * Interactive Online Malware Analysis Sandbox - ANY.RUN
   [https://app.any.run/
 * FileZilla_3.51.0_win64_sponsored-setup.exe - Le scanner anti-virus
   de Jotti
   [https://virusscan.jotti.org/fr-FR/search/hash/c8427258f566f22f7117d3b86b16f806a6eeb9ae
 * Cuckoo Sandbox [https://sandbox.pikker.ee/analysis/search/
 * The No More Ransom Project
   [https://www.nomoreransom.org/en/decryption-tools.html
 * Automated Malware Analysis - Joe Sandbox Cloud Basic
   [https://www.joesandbox.com/#windows
 * VirusShare.com [https://virusshare.com/
 * SOCIETE NINJA [https://societe.ninja/
 * ThreatMiner.org | Data Mining for Threat Intelligence
   [https://www.threatminer.org/
 * Intezer Analyze
   [https://analyze.intezer.com/analyses/da159b7a-ad91-4023-aa3e-0fc0720caefa
 * The Ultimate List of SANS Cheat Sheets | SANS Institute
   [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/
 * Malware Reports - Online Malware Analysis Sandbox
   [https://app.any.run/submissions/
 * Advanced File Analysis System | Valkyrie [https://valkyrie.comodo.com/
 * CAPEv2 Sandbox [https://www.capesandbox.com/analysis/search/
 * Automated Malware Analysis - Joe Sandbox Cloud Basic
   [https://www.joesandbox.com/analysispaged/0
 * FortiGuard [https://www.fortiguard.com/
 * Argus Managed Defence | mnemonic [https://passivedns.mnemonic.no/
 * 205.209.152.78 - urlscan.io
   [https://urlscan.io/result/dae8179f-2136-48b0-95ff-793c6b120cae/#transactions
 * Passive DNS Simplified Integration Guide - Argus API Documentation -
   docs.mnemonic.no
   [https://docs.mnemonic.no/display/public/API/Passive+DNS+Simplified+Integration+Guide
 * RiskIQ Community Edition [https://community.riskiq.com/home
 * VirusBay [https://beta.virusbay.io/
 * OST Map [https://www.intezer.com/ost-map/#
 * Malpedia (Fraunhofer FKIE) [https://malpedia.caad.fkie.fraunhofer.de/
 * GitHub - rshipp/awesome-malware-analysis: Defund the Police.
   [https://github.com/rshipp/awesome-malware-analysis
 * Reverss [https://sandbox.anlyz.io/dashboard
 * VirusShare.com [https://virusshare.com/
 * https://vx-underground.org/samples.html
   [https://vx-underground.org/samples.html
 * InQuest Labs - InQuest.net [https://labs.inquest.net/
 * MalShare [https://malshare.com/
 * malwares.com [https://www.malwares.com/
 * malwares.com [https://www.malwares.com/search/tag?tag=exploit
 * Malware Corpus Tracker - Download Sites - haas [http://tracker.h3x.eu/
 * scumware.org - Just another free alternative for security and
   malware researchers. [https://www.scumware.org/index.php
 * CyberGordon - Cyber Reputation Checks [https://cybergordon.com/
 * 6 Ways to Test if Your Antivirus and Antimalware is Working •
   Raymond.CC
   [https://www.raymond.cc/blog/test-the-effectiveness-of-your-antivirus-firewall-and-hips-software/
 * Sophos Search
   [https://search.sophos.com/#q=DocDl...|fr]
 * Intezer Analyze [https://analyze.intezer.com/
 * Synapsint [https://www.synapsint.com/report.php
 * ShinoSec [https://shinosec.com/
 * IP Address Abuse and Blacklist Reporting Site | Live IP Map
   [https://www.liveipmap.com/
 * CAPE Sandbox [https://www.capesandbox.com/analysis/
 * FileScan.IO - Next-Gen Malware Analysis Platform
   [https://www.filescan.io/scan
 * UnpacMe Live Feed [https://www.unpac.me/feed#/
 * Learning with ReversingLabs | How To Videos
   [https://www.reversinglabs.com/learning-with-reversinglabs/video/how-to
 * Learning with ReversingLabs | Definition Videos
   [https://www.reversinglabs.com/learning-with-reversinglabs/video/definition
 * OST Map [https://www.intezer.com/ost-map/
 * URLhaus | Browse [https://urlhaus.abuse.ch/browse/
 * GitHub - qnighy/ransomware-demo: A proof-of-concept for ransomware
   encryption [https://github.com/qnighy/ransomware-demo
 * MalwareTech - Everything Cyber Security [https://www.malwaretech.com/
 * Winitor [https://www.winitor.com/
 * Shota Shinogi (Sh1n0g1) | Sh1n0g1.github.io [https://sh1n0g1.github.io/
 * Hasherezade's projects [https://hasherezade.github.io/
 * Comment développer une sandbox d'analyse des malware à l'aide
   d'Elastic Security | Elastic Blog
   [https://www.elastic.co/fr/blog/how-to-build-a-malware-analysis-sandbox-with-elastic-security
 * Ransomware Simulators - Reality or a Bluff? - Palo Alto Networks
   Blog
   [https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/
 * ThreatFox | Share Indicators Of Compromise (IOCs)
   [https://threatfox.abuse.ch/
 * SOC Prime Blog [https://socprime.com/blog/
 * group profiles
   [https://ransomwatch.telemetry.ltd/#/profiles?id=lockbit2
 * Submit a file for malware analysis - Microsoft Security Intelligence
   [https://www.microsoft.com/en-us/wdsi/filesubmission
 * Decoding Malicious PowerShell Activity - A Case Study - Blog -
   Sophos Labs - Sophos Community
   [https://community.sophos.com/sophos-labs/b/blog/posts/decoding-malicious-powershell
 * 5 Minute Forensics: Decoding PowerShell Payloads Tevora
   [https://www.tevora.com/threat-blog/5-minute-forensics-decoding-powershell-payloads/
 * Ransomware.live [https://www.ransomware.live/#/
   MAP_ATTACK
 * https://cybermap.kaspersky.com/ [https://cybermap.kaspersky.com/
 * AV-ATLAS [https://portal.av-atlas.org/
 * https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=18763&view=map [https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=18763&view=map
 * https://threatmap.bitdefender.com/ [https://threatmap.bitdefender.com/
 * https://www.imperva.com/cyber-threat-index/
   [https://www.imperva.com/cyber-threat-index/
 * https://securitycenter.sonicwall.com/m/page/worldwide-attacks
   [https://securitycenter.sonicwall.com/m/page/worldwide-attacks
 * https://horizon.netscout.com/ [https://horizon.netscout.com/
 * https://map.lookingglasscyber.com/ [https://map.lookingglasscyber.com/
 * https://www.spamhaustech.com/threat-map/
   [https://www.spamhaustech.com/threat-map/
 * https://talosintelligence.com/fullpage_maps/pulse?cf_chl_jschl_tk=pmd_yP.SGTs7XqETcMYLi_zpl_S.gBDexADJM4ImX6l56aI-1630307729-0-gqNtZGzNAiWjcnBszQjl [https://talosintelligence.com/fullpage_maps/pulse?__cf_chl_jschl_tk__=pmd_yP.SGTs7XqETcMYLi_zpl_S.gBDexADJM4ImX6l56aI-1630307729-0-gqNtZGzNAiWjcnBszQjl
 * https://threatmap.checkpoint.com/ [https://threatmap.checkpoint.com/
 * https://www.fireeye.com/cyber-map/threat-map.html
   [https://www.fireeye.com/cyber-map/threat-map.html
 * https://threatmap.fortiguard.com/ [https://threatmap.fortiguard.com/
 * https://threatbutt.com/map/ [https://threatbutt.com/map/
 * https://www.sophos.com/en-us/threat-center/threat-monitoring/threatdashboard.aspx#malware-threats [https://www.sophos.com/en-us/threat-center/threat-monitoring/threatdashboard.aspx#malware-threats
 * Enterprise Threat Monitor | Akamai
   [https://www.akamai.com/fr/visualizations/enterprise-threat-monitor
 * CloudTweaks | Top 10 Real Time Hacking Ransomware Tracking Maps
   [https://cloudtweaks.com/live-hacking-ransomware-tracking-maps-online/
 * Live botnet threats worldwide | Spamhaus Technology
   [https://www.spamhaus.com/threat-map/
 * Akamai Globe [https://globe.akamai.com/
 * Live Threat Map | Radware [https://livethreatmap.radware.com/
 * Cyber-malveillance en temps réel
   [https://secureidees.com/cyber-malveillance-en-temps-reel/
 * Cyber-attack Map [https://map.httpcs.com/
 * Sicherheitstacho - Start [https://www.sicherheitstacho.eu/start/main
 * Police Violence in the United States
   [https://blmprotests.forensic-architecture.org/
 * Agency ← Forensic Architecture
   [https://forensic-architecture.org/about/agency
 * Civilian Harm in Ukraine [https://ukraine.bellingcat.com/
 * Ukraine Interactive map - Ukraine Latest news on live map -
   liveuamap.com [https://liveuamap.com/
 * France latest news in English on live map - France today - Paris now
   - france.liveuamap.com
   [https://france.liveuamap.com/en/2022/30-march-the-prefect-of-pasdecalais-has-been-found-guilty
 * Leaflet - a JavaScript library for interactive maps
   [https://leafletjs.com/
 * Maps for your apps - Thunderforest [https://www.thunderforest.com/
 * France latest news in English on live map - France today - Paris now
   - france.liveuamap.com
   [https://france.liveuamap.com/en/2022/22-march-corsica-yvan-colonna-died-the-anger-of-the-separatists
 * Interactive Online Malware Analysis Sandbox - ANY.RUN
   [https://app.any.run/
 * Randonnée pédestre avec trace gps à télécharger gratuitement -
   hébergements - carte Ign© - topoguide [https://www.randogps.net/
 * HE 3D Network Map [https://he.net/3d-map/
 * Capture Labs
   [https://capturelabs.sonicwall.com/m/feature/security-center
   Forensics
 * Products - Nextron Systems [https://www.nextron-systems.com/products/
 * Avant d'accéder à YouTube
   [https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dl0ZCyfA75ZE&gl=FR&m=0&pc=yt&uxe=23983172&hl=fr&src=1
 * Connexion - Dropbox
   [https://www.dropbox.com/login?cont=https%3A%2F%2Fwww.dropbox.com%2Fhome%2FAAA_CDI
 * HackTheBox - Silo writeup [https://v3ded.github.io/ctf/htb-silo
 * Useful Volatility Commands & Plugins – Cyber Security Blog
   [https://atalaysblog.wordpress.com/2019/07/13/useful-volatility-commands-plugins/
 * Memory Forensics-TryHackMe. Perform memory forensics to find the… |
   by 0xsanz | Apr, 2021 | Medium
   [https://0xsanz.medium.com/memory-forensics-tryhackme-2178944d9468
 * Investigating Windows TryHackMe | by m4rk0ns3cur1ty | Medium
   [https://markonsecurity.medium.com/investigating-windows-tryhackme-10e187badedb
 * volatility .vmdk to .raw at DuckDuckGo
   [https://duckduckgo.com/?t=ffab&q=volatility+.vmdk+to+.raw&ia=web
 * How to analyze a VMware memory image with Volatility | Andrea
   Fortuna
   [https://www.andreafortuna.org/2019/04/03/how-to-analyze-a-vmware-memory-image-with-volatility/
 * virtual machine - Convert VMDK file to compressed RAW file - Stack
   Overflow
   [https://stackoverflow.com/questions/52419727/convert-vmdk-file-to-compressed-raw-file
 * mount .vmdk on linux at DuckDuckGo
   [https://duckduckgo.com/?t=ffab&q=mount+.vmdk+on+linux&ia=web
 * Mount a VMware virtual disk (.vmdk) file on a Linux box Using mount
   [https://www.commandlinefu.com/commands/view/13718/mount-a-vmware-virtual-disk-.vmdk-file-on-a-linux-box
 * forensics windows with kali cli at DuckDuckGo
   [https://duckduckgo.com/?q=forensics+windows+with+kali+cli&t=ffab&ia=web
 * Windows Forensics and Security - Forensic Focus
   [https://www.forensicfocus.com/articles/windows-forensics-and-security/
 * Command Line for Windows Malware and Forensics - Infosec Resources
   [https://resources.infosecinstitute.com/topic/commandline-malware-and-forensics/
 * binwalk pagefile.sys at DuckDuckGo
   [https://duckduckgo.com/?q=binwalk+pagefile.sys&t=ffab&ia=web
 * cli find for a spécial date at DuckDuckGo
   [https://duckduckgo.com/?t=ffab&q=cli+find+for+a+sp%C3%A9cial+date&ia=web
 * kali linux mount VMdk - Recherche Google
   [https://www.google.com/search?q=kali+linux+mount+VMdk&ei=6SGAYJXdAsPigwffr4SYAg&oq=kali+linux+mount+VMdk&gs_lcp=Cgdnd3Mtd2l6EAMyBggAEBYQHjoHCAAQRxCwAzoECAAQQzoFCAAQsQM6AggAOgQIABATUKKSBVi_uAVgj8EFaAFwAngAgAFuiAG9BpIBBDExLjGYAQCgAQGqAQdnd3Mtd2l6yAEIwAEB&sclient=gws-wiz&ved=0ahUKEwjV9birso_wAhVD8eAKHd8XASMQ4dUDCA0&uact=5
 * mount - Mounting VMDK disk image - Stack Overflow
   [https://stackoverflow.com/questions/22327728/mounting-vmdk-disk-image
 * How to Extract Content from VMDK Files: A Step-By-Step Guide
   [https://www.nakivo.com/blog/extract-content-vmdk-files-step-step-guide/
 * Kali Linux Top Forensic Tools (2020) – Linux Hint
   [https://linuxhint.com/kali_linux_top_forensic_tools/
 * GitHub - volatilityfoundation/volatility: An advanced memory
   forensics framework [https://github.com/volatilityfoundation/volatility
 * How to prepare a VMWare memory image for Volatility analysis
   [https://dfirx.blogspot.com/2018/09/how-to-prepare-vmware-memory-image-for.html
 * Analysing a VMWare Memory image with volatility - Angry-Bender’s
   blog house
   [https://angry-bender.github.io/blog/vmware_snapshots_volatility/
 * Open a VMWare Disk Image (VMDK) with Autopsy for forensics analisys
   | Andrea Fortuna
   [https://www.andreafortuna.org/2016/09/08/open-a-vmware-disk-image-vmdk-with-autopsy-for-forensics-analisys/
 * How to perform a digital forensic analysis using only free tools |
   Andrea Fortuna
   [https://www.andreafortuna.org/2021/02/13/how-to-perform-a-digital-forensic-analysis-using-only-free-tools/
 * How to detect Cobalt Strike Beacons using Volatility | Andrea
   Fortuna
   [https://www.andreafortuna.org/2021/01/06/how-to-detect-cobalt-strike-beacons-using-volatility/
 * SIFT Workstation Download
   [https://digital-forensics.sans.org/community/downloads
 * Volatility Memory Analysis Cheat Sheet - Memory Analysis Cheat
   Sheet.current.pdf
   [https://computer.forensikblog.de/files/cheatsheet/Memory%20Analysis%20Cheat%20Sheet.current.pdf
 * Volatility Cheatsheet - Memory Forensics CTF
   [https://www.codersnoon.com/2021/01/volatility-cheatsheet-memory-forensics.html
 * An Easy Cheat Sheet for Understanding Market Volatility - Trade of
   the Day
   [https://mtatradeoftheday.com/an-easy-cheat-sheet-for-understanding-market-volatility/
 * Volatility Strategies Cheat Sheet | fintrinity
   [https://www.fintrinity.com/research/volatility-strategies-cheat-sheet/
 * Volatility, my own cheatsheet (Part 1): Image Identification |
   Andrea Fortuna
   [https://www.andreafortuna.org/2017/06/25/volatility-my-own-cheatsheet-part-1-image-identification/
 * SHA2 - CyberChef
   [https://gchq.github.io/CyberChef/#recipe=SHA2('256',1,160)&input=NWU4ODQ4OThkYTI4MDQ3MTUxZDBlNTZmOGRjNjI5Mjc3MzYwM2QwZDZhYWJiZGQ2MmExMWVmNzIxZDE1NDJkOA
 * Linux forensic for compromission at DuckDuckGo
   [https://duckduckgo.com/?q=Linux+forensic+for+compromission&t=ffab&ia=web
 * Breach detection with Linux filesystem forensics | Opensource.com
   [https://opensource.com/article/18/4/linux-filesystem-forensics
 * SHA256 hash for "password" [https://sha256calc.com/hash/sha256/password
 * Decoding with CyberChef - TryHackMe! Advent of Cyber Day 22 -
   YouTube [https://www.youtube.com/watch?v=l0ZCyfA75ZE
 * Microsoft PowerPoint - Sec504HANDOUT_WinInDisCheat_3.0.pptx -
   download
   [https://www.sans.org/security-resources/posters/intrusion-discovery-cheat-sheet-windows/225/download
 * download
   [https://www.sans.org/security-resources/posters/intrusion-discovery-cheat-sheet-linux/230/download
 * SEC434_Cheat_Sheet.indd - 6
   [https://www.sans.org/brochure/course/log-management-in-depth/6?msc=Cheat+Sheet+Blog
 * Cheatsheet_SEC301-401_R7.indd - Cheatsheet_SEC301-401_R7.pdf
   [https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea7de5267932e94b/5eb08aafcf88d36e47cf0644/Cheatsheet_SEC301-401_R7.pdf
 * forensic windows tools at DuckDuckGo
   [https://duckduckgo.com/?t=ffab&q=forensic+windows+tools&ia=web
 * encase forensics at DuckDuckGo
   [https://duckduckgo.com/?q=encase+forensics&t=ffab&ia=web
 * Products and Services- Endpoint Security and Incident Response and
   eDiscovery [https://security.opentext.com/products-services?cmpid=nav_r
 * How to mount a vmdk file in Linux
   [https://jasonmurray.org/posts/2021/mountvmdk/
 * Top 7 Open Source Forensic Tools That You Should Know About
   [https://appsierra.com/top-7-open-source-forensic-tools/
 * OSForensics - Product Information, Download and Purchase
   [https://www.osforensics.com/products/index.php
 * Resources [https://www.forensicmethods.com/resources
 * SANS Digital Forensics and Incident Response Blog | Computer
   Forensics How-To: Microsoft Log Parser | SANS Institute
   [https://www.sans.org/blog/computer-forensics-how-to-microsoft-log-parser/
 * Splunk Phantom Security Orchestration & Automation | Splunk
   [https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html
 * Windows Security Log Encyclopedia
   [https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx
 * Endpoint Protection - Symantec Enterprise
   [https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=3fe87d70-07ad-4cee-811f-ce4f8b8429ae&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
 * GitHub - cipher387/osint_stuff_tool_collection: A collection of
   several hundred online tools for OSINT
   [https://github.com/cipher387/osint_stuff_tool_collection#xbox
 * PALADIN : la suite médico-légale Linux la plus populaire au monde
   [https://sumuri.com/software/paladin/
 * How to Use Windows Forensic Environment 10 [https://www.winfe.net/use
 * PPEE - Professional PE Explorer [https://www.mzrst.com/
 * Investigations ← Forensic Architecture
   [https://forensic-architecture.org/
 * I Learned Blog [https://blog.ilearned.eu/
 * Kroll Artifact Parser And Extractor (KAPE) | Cyber Risk | Kroll
   [https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape
 * Eric Zimmerman's tools [https://ericzimmerman.github.io/#!index.md
   Mitre Attack
 * Using ATT&CK for CTI Training | MITRE ATT&CK®
   [https://attack.mitre.org/resources/training/cti/
 * MITRE ATT&CK® [https://attack.mitre.org/#
 * MITRE ATT&CK™ [https://attack.mitre.org/
 * ATT&CK® Navigator [https://mitre-attack.github.io/attack-navigator/
 * ATT&CK® Navigator [https://mitre-attack.github.io/attack-navigator/
 * GitHub - mitre/caldera: Automated Adversary Emulation Platform
   [https://github.com/mitre/caldera
 * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre
 * How to Use the MITRE ATT&CK Framework | ChaosSearch
   [https://www.chaossearch.io/blog/how-to-use-mitre-attck-framework
 * MITRE ATT&CK® – Medium [https://medium.com/mitre-attack
 * Resilient Against Supply Chain Threats -
   supply_chain_attacks_and_resiliency_mitigations_-_mitre.pdf
   [https://www.nist.gov/system/files/documents/2018/12/06/supply_chain_attacks_and_resiliency_mitigations_-_mitre.pdf
 * Introduction to ATT&CK - CTI Workshop Full Slides.pdf
   [https://attack.mitre.org/docs/training-cti/CTI%20Workshop%20Full%20Slides.pdf
 * MITRE ATT&CK | MITRE
   [https://www.mitre.org/focus-areas/cybersecurity/mitre-attack
   Blacklist
 * https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 [https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192
 * https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd [https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd
 * http://www.cryptage.org/enigma.html
   [http://www.cryptage.org/enigma.html
 * IP Address Abuse and Blacklist Reporting Site
   [https://liveipmap.com/77.111.247.71
 * https://udger.com/resources/ip-list/known_attack_source
   [https://udger.com/resources/ip-list/known_attack_source
 * http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ [http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/
 * https://pentestlab.blog/2017/09/25/suid-executables/
   [https://pentestlab.blog/2017/09/25/suid-executables/
 * https://feodotracker.abuse.ch/blocklist/
   [https://feodotracker.abuse.ch/blocklist/
 * https://ipinfo.io/23.66.166.151 [https://ipinfo.io/23.66.166.151
 * https://zeltser.com/malicious-ip-blocklists/
   [https://zeltser.com/malicious-ip-blocklists/
 * http://geoiplookup.net/ip/185.102.219.50
   [http://geoiplookup.net/ip/185.102.219.50
 * 37.58.150.203 - ADISTA SAS - FR | Proxy Detection Lookup | IP
   Address Lookup
   [https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/37.58.150.203
 * https://www.liveipmap.com/?ip=194.98.100.133
   [https://www.liveipmap.com/?ip=194.98.100.133
 * IP Neighbour : Find sites on the same IP address
   [https://www.ipneighbour.com/#/lookup/91.103.233.142
 * http://www.binarydefense.com/banlist.txt
   [http://www.binarydefense.com/banlist.txt
 * http://danger.rulez.sk/projects/bruteforceblocker/blist.php
   [http://danger.rulez.sk/projects/bruteforceblocker/blist.php
 * http://www.cryptage.org/enigma.html
   [http://www.cryptage.org/enigma.html
 * https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192 [https://store.delmarvagroup.com/knowledgebase.php?action=displayarticle&id=4192
 * http://www.binarydefense.com/banlist.txt
   [http://www.binarydefense.com/banlist.txt
 * http://danger.rulez.sk/projects/bruteforceblocker/blist.php
   [http://danger.rulez.sk/projects/bruteforceblocker/blist.php
 * https://pentestlab.blog/2017/09/25/suid-executables/
   [https://pentestlab.blog/2017/09/25/suid-executables/
 * https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd [https://otx.alienvault.com/indicator/ip/104.31.75.222?utm_medium=InProduct&utm_source=ThreatCrowd
 * https://www.threatcrowd.org/ip.php?ip=104.31.75.222
   [https://www.threatcrowd.org/ip.php?ip=104.31.75.222
 * https://zeltser.com/malicious-ip-blocklists/
   [https://zeltser.com/malicious-ip-blocklists/
 * https://feodotracker.abuse.ch/blocklist/
   [https://feodotracker.abuse.ch/blocklist/
 * https://udger.com/resources/ip-list/known_attack_source
   [https://udger.com/resources/ip-list/known_attack_source
 * http://iplists.firehol.org/?ipset=firehol_level1
   [http://iplists.firehol.org/?ipset=firehol_level1
 * http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/ [http://www.webpagetest.org/result/171020_7B_49add930c54c68a0ffdefdc74336d18e/
 * https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine [https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine
 * https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com [https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com
 * https://www.liveipmap.com/?ip=194.98.100.133
   [https://www.liveipmap.com/?ip=194.98.100.133
 * IP Address Abuse and Blacklist Reporting Site
   [https://liveipmap.com/77.111.247.71
 * https://myip.ms/#a [https://myip.ms/#a
 * IP Neighbour : Find sites on the same IP address
   [https://www.ipneighbour.com/#/lookup/91.103.233.142
 * http://www.blocklist.de/en/index.html
   [http://www.blocklist.de/en/index.html
 * http://geoiplookup.net/ip/185.102.219.50
   [http://geoiplookup.net/ip/185.102.219.50
 * https://ipinfo.io/23.66.166.151 [https://ipinfo.io/23.66.166.151
 * https://www.whatismyip.net/ [https://www.whatismyip.net/
 * TOR status [https://check.torproject.org/torbulkexitlist
 * Blacklist Checker and Scanner | Unlock The Inbox
   [https://www.unlocktheinbox.com/blacklistchecker/bl/
 * https://dnsdumpster.com/ [https://dnsdumpster.com/
 * http://multirbl.valli.org/lookup/ [http://multirbl.valli.org/lookup/
 * IP Address Blacklist Check, IP DNSBL Check | IPVoid
   [http://www.ipvoid.com/ip-blacklist-check/
 * mda-spj.fr safe ? Check it with URLVoid
   [http://www.urlvoid.com/scan/mda-spj.fr/
 * MultiRBL.valli.org - Results of the query 149.255.137.90
   [http://multirbl.valli.org/lookup/149.255.137.90.html
 * Network Tools: DNS,IP,Email [https://mxtoolbox.com/SuperTool.aspx
 * tor list json
   [https://onionoo.torproject.org/details?fields=exit_addresses&flag=exit
 * AbuseIPDB - IP Address Blacklist [https://www.abuseipdb.com/
 * Blacklist IP Addresses Live Database 2018. Blacklist Check
   [https://myip.ms/browse/blacklist
 * Per-IP rate limiting with iptables - Making Pusher
   [https://making.pusher.com/per-ip-rate-limiting-with-iptables/
 * Building Public and Private IPtables Blacklists | CCNA HUB
   [https://www.ccnahub.com/linux/building-public-and-private-iptables-blacklists/
 * BotReports.com - Updates on the bots and user-agents for the latest
   spiders, crawlers, scrapers and more [http://www.botreports.com/
 * BLACKLISTALERT.ORG - Email Problem ? - Test if your IP or DOMAIN is
   blacklisted in a spamdatabase [http://www.blacklistalert.org/
 * 5 Steps to Investigate and Report Abusive IP Address • Raymond.CC
   [https://www.raymond.cc/blog/reporting-hacked-rooted-servers-booters-datacenters/
 * OPSWAT MetaDefender Cloud | IP Scan Results for 88.241.93.251
   [https://metadefender.opswat.com/results#!/ip/ODguMjQxLjkzLjI1MQ==/overview
 * Domain Blacklist & Email Spam Check | UltraTools
   [https://www.ultratools.com/tools/spamDBLookupResult
 * GitHub - trick77/ipset-blacklist: A script to ban large numbers of
   IP addresses published in blacklists.
   [https://github.com/trick77/ipset-blacklist
 * Global DNS Propagation Checker - What's My DNS?
   [https://www.whatsmydns.net/#MX/ecai.fr
 * 37.58.150.203 - ADISTA SAS - FR | Proxy Detection Lookup | IP
   Address Lookup
   [https://www.ipqualityscore.com/free-ip-lookup-proxy-vpn-test/lookup/37.58.150.203
 * Tracker | Ransomware Tracker
   [https://ransomwaretracker.abuse.ch/tracker/
 * abuse.ch | Fighting malware and botnets [https://abuse.ch/
 * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT
   [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/
 * https://github.com/jas3/getBlacklist/blob/master/README.md
   [https://github.com/jas3/getBlacklist/blob/master/README.md
 * http://cdn.miscreantpunchers.net/iprep.txt
   [http://cdn.miscreantpunchers.net/iprep.txt
 * https://www.htbridge.com/websec/?id=oqGcuqne
   [https://www.htbridge.com/websec/?id=oqGcuqne
 * https://access.watch/database [https://access.watch/database
 * https://access.watch/database/addresses/bad
   [https://access.watch/database/addresses/bad
 * https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2
   [https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2
 * Cisco Talos [https://talosintelligence.com/reputation_center
 * ReputationAuthority | WatchGuard Technologies
   [http://www.reputationauthority.org/
 * 168.235.97.87 | IP Address and Robot Database | Access Watch: The
   Web Traffic Intelligence Engine
   [https://access.watch/database/addresses/168.235.97.87
 * List of User-Agents (Spiders, Robots, Browser)
   [http://www.user-agents.org/
 * https://www.threatcrowd.org/ip.php?ip=104.31.75.222
   [https://www.threatcrowd.org/ip.php?ip=104.31.75.222
 * https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine [https://github.com/mlsecproject/combine/wiki/Threat-Intelligence-Feeds-Gathered-by-Combine
 * http://iplists.firehol.org/?ipset=firehol_level1
   [http://iplists.firehol.org/?ipset=firehol_level1
 * https://myip.ms/#a [https://myip.ms/#a
 * https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com [https://tools.keycdn.com/performance?url=https://www.mutuelle2sante.com
 * Blacklist Checker and Scanner | Unlock The Inbox
   [https://www.unlocktheinbox.com/blacklistchecker/bl/
 * http://www.blocklist.de/en/index.html
   [http://www.blocklist.de/en/index.html
 * https://www.whatismyip.net/ [https://www.whatismyip.net/
 * https://dnsdumpster.com/ [https://dnsdumpster.com/
 * http://multirbl.valli.org/lookup/ [http://multirbl.valli.org/lookup/
 * MultiRBL.valli.org - Results of the query 149.255.137.90
   [http://multirbl.valli.org/lookup/149.255.137.90.html
 * IP Address Blacklist Check, IP DNSBL Check | IPVoid
   [http://www.ipvoid.com/ip-blacklist-check/
 * mda-spj.fr safe ? Check it with URLVoid
   [http://www.urlvoid.com/scan/mda-spj.fr/
 * Network Tools: DNS,IP,Email [https://mxtoolbox.com/SuperTool.aspx
 * AbuseIPDB - IP Address Blacklist [https://www.abuseipdb.com/
 * Blacklist IP Addresses Live Database 2018. Blacklist Check
   [https://myip.ms/browse/blacklist
 * Per-IP rate limiting with iptables - Making Pusher
   [https://making.pusher.com/per-ip-rate-limiting-with-iptables/
 * Building Public and Private IPtables Blacklists | CCNA HUB
   [https://www.ccnahub.com/linux/building-public-and-private-iptables-blacklists/
 * BotReports.com - Updates on the bots and user-agents for the latest
   spiders, crawlers, scrapers and more [http://www.botreports.com/
 * BLACKLISTALERT.ORG - Email Problem ? - Test if your IP or DOMAIN is
   blacklisted in a spamdatabase [http://www.blacklistalert.org/
 * 5 Steps to Investigate and Report Abusive IP Address • Raymond.CC
   [https://www.raymond.cc/blog/reporting-hacked-rooted-servers-booters-datacenters/
 * OPSWAT MetaDefender Cloud | IP Scan Results for 88.241.93.251
   [https://metadefender.opswat.com/results#!/ip/ODguMjQxLjkzLjI1MQ==/overview
 * Domain Blacklist & Email Spam Check | UltraTools
   [https://www.ultratools.com/tools/spamDBLookupResult
 * GitHub - trick77/ipset-blacklist: A script to ban large numbers of
   IP addresses published in blacklists.
   [https://github.com/trick77/ipset-blacklist
 * Global DNS Propagation Checker - What's My DNS?
   [https://www.whatsmydns.net/#MX/ecai.fr
 * Tracker | Ransomware Tracker
   [https://ransomwaretracker.abuse.ch/tracker/
 * abuse.ch | Fighting malware and botnets [https://abuse.ch/
 * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT
   [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/
 * http://cdn.miscreantpunchers.net/iprep.txt
   [http://cdn.miscreantpunchers.net/iprep.txt
 * https://access.watch/database [https://access.watch/database
 * https://access.watch/database/addresses/bad
   [https://access.watch/database/addresses/bad
 * https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2
   [https://www.audemail.com/scan.php?serverSMTP=149.255.137.90&x=6&y=2
 * Cisco Talos [https://talosintelligence.com/reputation_center
 * ReputationAuthority | WatchGuard Technologies
   [http://www.reputationauthority.org/
 * TorStatus - Tor Network Status [https://torstatus.blutmagie.de/
 * 168.235.97.87 | IP Address and Robot Database | Access Watch: The
   Web Traffic Intelligence Engine
   [https://access.watch/database/addresses/168.235.97.87
 * www.blocklist.de -- Export all Attacker-IPs from the last 48 Hours.
   [https://www.blocklist.de/en/export.html
 * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation
   [https://iplists.firehol.org/
 * https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset
 * GitHub - Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist: The
   Ultimate Unified Hosts file for protecting your network, computer,
   smartphones and Wi-Fi devices against millions of bad web sites.
   Protect your children and family from gaining access to bad web
   sites and protect your devices and pc from being infected with
   Malware or Ransomware.
   [https://github.com/Ultimate-Hosts-Blacklist/Ultimate.Hosts.Blacklist
 * Red Flag Domains [https://red.flag.domains/
   Risk
 * Comment prioriser les vulnérabilités de son système d'information ?
   [https://cyberwatch.fr/veille/comment-prioriser-les-vulnerabilites-de-son-systeme-dinformation/
 * Comment utiliser le MITRE ATT&CK pour analyser une menace
   informatique ?
   [https://cyberwatch.fr/veille/comment-utiliser-le-mitre-attack-pour-analyser-une-menace-informatique/
   Google
 * Google Alertes : recevez des alertes lorsque du contenu susceptible
   de vous intéresser est publié sur le Web
   [https://www.google.com/alerts#1:32
   ANSSI
 * Recommandations de sécurité relatives au déploiement de conteneurs
   Docker | Agence nationale de la sécurité des systèmes d'information
   [https://www.ssi.gouv.fr/guide/recommandations-de-securite-relatives-au-deploiement-de-conteneurs-docker/
 * Points de contrôle Active Directory
   [https://www.cert.ssi.gouv.fr/uploads/ad_checklist.html
 * GitHub - ANSSI-FR/ORADAD: Outil de récupération automatique des
   données de l'Active Directory / Automated tool for dumping Active
   Directory data [https://github.com/ANSSI-FR/ORADAD
 * DemainSpécialisteCyber [https://www.demainspecialistecyber.fr/
   MATIN
 * 🌍 Ransomware's attacks by country
   [https://www.ransomware.live/#/country/fr
 * Info²Sec [https://news.torii-security.fr/
 * Veille #Cybersécurité #Manifone | Scoop.it
   [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil
 * Veille #Infrastructure #DCIT-Conseil #Vannes | Scoop.it
   [https://www.scoop.it/topic/systemes-d-information-dcit
 * Time to Learn | Scoop.it [https://www.scoop.it/topic/formation-2-0
 * Renseignements Stratégiques, Investigations & Intelligence
   Economique [http://veilles.arnaudpelletier.com/
 * Evénements | Portail du CERT Santé
   [https://cyberveille-sante.gouv.fr/liste/evenements
 * Sécurité de l'information de santé et plus... | Scoop.it
   [https://www.scoop.it/topic/ssi-sante
 * CERT-FR [https://cyberowl.mousqueton.io/#/CERT-FR
 * The Hacker News | #1 Trusted Cybersecurity News Site
   [https://thehackernews.com/
 * Capture Labs [https://capturelabs.sonicwall.com/m/feature/security-news
 * #software-development stories | HackerNoon
   [https://hackernoon.com/tagged/software-development
 * Blog Stéphane Bortzmeyer: Accueil [https://www.bortzmeyer.org/
 * Electronvalley Magazine Innovations Tech IA AI
   [https://electronvalley.fr/
 * Cyber Security News Today | Articles on Cyber Security, Malware
   Attack updates | Cyware
   [https://cyware.com/cyber-security-news-articles
 * BleepingComputer | Cybersecurity, Technology News and Support
   [https://www.bleepingcomputer.com/
 * Cybersecurite sur Servicesmobiles.fr
   [https://www.servicesmobiles.fr/cybersecurite
 * Bons plans Cours & formations : promotions en ligne et en magasin »
   Dealabs [https://www.dealabs.com/groupe/cours-et-formations
 * Phoenix Security - FIX Vulnerability with context from appsec to
   cloud security [https://phoenix.security/
 * Latest Vulnerabilities | Vumetric Cyber Portal
   [https://cyber.vumetric.com/vulns/
 * Latest Publications - Check Point Research
   [https://research.checkpoint.com/latest-publications/
 * 🌌 IP BlackHole [https://ip.blackhole.monster/
 * Top 10 Cloud Access Security Broker (CASB) Solutions for 2023
   [https://www.esecurityplanet.com/products/casb-security-vendors/
 * Chroniques du positif | Obs du Positif
   [https://www.obsdupositif.org/blog
 * https://www.obsdupositif.org/blog [https://www.obsdupositif.org/blog
 * Tips & Tricks | CYBERPUNK
   [https://www.cyberpunk.rs/category/tips-tricks
 * Actualités sur la sécurité informatique | IT-Connect
   [https://www.it-connect.fr/actualites/actu-securite/
 * infoDSI : Le quotidien des utilisateurs de l'informatique en
   entreprise [https://infodsi.com/
 * Cyberattaques - Actualité, infos et vidéos en direct
   [https://www.francetvinfo.fr/internet/securite-sur-internet/
 * Cyber Security News Today - Latest Updates & Research - Cybernews
   [https://cybernews.com/
 * Infoguerre | Ecole de Guerre Economique [https://www.ege.fr/infoguerre
 * Cloudflare Radar [https://radar.cloudflare.com/?dateRange=1d
 * Federated timeline - DEF CON Social [https://defcon.social/public
 * Category: Web Security | Threatpost
   [https://threatpost.com/category/web-security/
 * Latest Vulnerabilities | Vumetric Cyber Portal
   [https://cyber.vumetric.com/vulns/
 * Explorer - Infosec Exchange [https://infosec.exchange/explore
 * Cyber Security News UK [https://cybersecuritynews.uk/
 * NewsBrief
   [https://emm.newsbrief.eu/NewsBrief/clusteredition/fr/latest.html
 * Cyber criminalité Archives - InCyber
   [https://incyber.org/theme/cyber-criminalite/
 * Risk Discovery [https://riskdiscovery.com/
 * Technical Information Security Content & Discussion
   [https://www.reddit.com/r/netsec/
 * All | Search powered by Algolia
   [https://hn.algolia.com/?dateRange=all&page=0&prefix=false&query=cybersecurity&sort=byDate&type=story
 * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/
 * Actualité : les news, dossiers et analyses informatiques | Silicon
   [https://www.silicon.fr/actualites/cybersecurite
 * HackRead | Latest Cyber Crime - InfoSec- Tech - Hacking News
   [https://www.hackread.com/
 * Actualités Archives - Bellingcat
   [https://fr.bellingcat.com/category/actualites/
 * Actualités et Dernières Infos en France| Arab News fr
   [https://www.arabnews.fr/france
 * POSITIVR : initiatives positives, causes, innovations et
   inspirations [https://positivr.fr/
 * Nouvelles Positives - Des nouvelles positives tous les jours
   [https://nouvellespositives.com/
 * TRT Français [https://www.trtfrancais.com/
 * BizToc [https://biztoc.com/
 * Riskintel Média | Actualités [https://www.riskintel.fr/actualit%C3%A9s
 * Upstract [https://upstract.com/
 * APAR.TV - PRÉDICTIF [https://www.apar.tv/
 * Open Source Security Index [https://opensourcesecurityindex.io/
 * Similar Sites Like upstract.com - Competitors & Alternatives
   [https://www.similarsites.com/site/upstract.com
 * Upstract [https://upstract.com/
 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp -
   Information Gathering | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a
 * HackTricks - HackTricks [https://book.hacktricks.xyz/welcome/readme
 * Cybersécurité Solutions [https://www.cybersecurite-solutions.com/
 * Le Guide Du SecOps - Page 8 sur 21 - Blog 🇫🇷 publiant des articles
   de Cybersecurité (Off./Def.), SysAdmin et DevSecOps
   [https://le-guide-du-secops.fr/page/8/
 * UNDERNEWS.FR - Actualité sécurité informatique & cybercrime
   [https://www.undernews.fr/
 * cybersecurity [https://www.reddit.com/r/cybersecurity/
 * PARIS 11/02/2023 • MANIFESTATION CONTRE LA RÉFORME DES RETRAITES –
   Taranis News
   [https://taranis.news/2023/02/paris-11-02-2023-manifestation-contre-la-reforme-des-retraites/
 * Black bloc — Wikipédia [https://fr.wikipedia.org/wiki/Black_bloc
 * français - Global Security Mag Online
   [https://www.globalsecuritymag.com/-francais-.html
 * Threatpost | The first stop for security news [https://threatpost.com/
 * À propos de l’ENISA - L’Agence de l'Union européenne pour la
   cybersécurité — ENISA [https://www.enisa.europa.eu/about-enisa/about/fr
 * Security | ZDNET [https://www.zdnet.com/topic/security/
 * Hot Questions - Stack Exchange [https://stackexchange.com/
 * Ecole de Guerre Economique - Formations Intelligence économique
   Cyber Sûreté [https://migration.ege.fr/
 * Disclosures - JSOF [https://www.jsof-tech.com/disclosures/
 * 7 free cybersecurity resources you need to bookmark - Help Net
   Security
   [https://www.helpnetsecurity.com/2022/11/28/7-free-cybersecurity-resources-you-need-to-bookmark/
 * Cyber Security Review – News • Insights • Analysis
   [https://www.cybersecurity-review.com/
 * La météo à Saint-Étienne, Auvergne-Rhône-Alpes, France | Tomorrow.io
   [https://www.tomorrow.io/weather/fr/
 * Cybersecurity - TechGenix [https://techgenix.com/security/
 * SANS Newsletters | SANS Institute [https://www.sans.org/newsletters/
 * Toute l'information internationale en direct | Euronews
   [https://fr.euronews.com/
 * All | Search powered by Algolia
   [https://hn.algolia.com/?dateRange=all&page=1&prefix=false&query=pentest&sort=byDate&type=story
 * Your Cybersecurity News Connection - Cyber News | CyberWire
   [https://thecyberwire.com/
 * Direct TV | Toute l'actualité en live streaming gratuit | Euronews
   [https://fr.euronews.com/live
 * Info²Sec [https://news.torii-security.fr/
 * Video channel videos - PeerTube
   [https://peertube.sl-network.fr/video-channels/79b72c44-c395-4a52-a6f1-80fe5d8dd28e/videos?a-state=42
 * I Learned Blog [https://blog.ilearned.eu/most_read.html
 * Our CVEs - SentinelOne [https://www.sentinelone.com/labs/our-cves/
 * 🚀 Pomodoro Timer — Do more in less time, stress-free
   [https://pomodorotimer.online/
 * Actualité technologique et scientifique
   [https://www.techno-science.net/
 * CERT-EU News Monitor
   [https://cert.europa.eu/cert/filteredition/en/CERT-LatestNews.html
 * KitPloit - PenTest & Hacking Tools [https://www.kitploit.com/
 * Hacker Videos – Telegram [https://t.me/s/HackerVideos/
 * Full Disclosure Mailing List [https://seclists.org/fulldisclosure/
 * HackGit – Telegram [https://t.me/s/hackgit
 * CXSECURITY.COM Free Security List [https://cxsecurity.com/
 * Pentester – Telegram [https://t.me/s/news4hack
 * Bug Bounty Channel – Telegram [https://t.me/s/bug_bounty_channel
 * OSINT – Telegram [https://t.me/s/osint_channel?before=131
 * threatABLE Feed [https://www.threatable.io/
 * Cybersécurité [https://www.conix.fr/blog/cybersecurite/
 * The Next Platform - The Next Platform [https://www.nextplatform.com/
 * News ≈ Packet Storm [https://packetstormsecurity.com/news/
 * Similar Sites Like thehackernews.com - Competitors & Alternatives
   [https://www.similarsites.com/site/thehackernews.com
 * Similar Sites Like securityaffairs.co - Competitors & Alternatives
   [https://www.similarsites.com/site/securityaffairs.co
 * Hacker News
   [https://hn.algolia.com/?dateRange=pastMonth&page=0&prefix=false&query=cybersecurity&sort=byDate&type=story
 * Worldle [https://worldle.harari.ovh/
 * Accueil - InCyber [https://incyber.fr/
 * security - Netsec, appsec, and infosec | Lobsters
   [https://lobste.rs/t/security
 * InfoSec - Veille Sécurité collaborative
   [https://news.torii-security.fr/
 * Journal du hacker [https://www.journalduhacker.net/
 * Sécurité - LinuxFr.org [https://linuxfr.org/
 * ZATAZ [https://www.zataz.com/
 * Experts show how to bypass Windows Hello feature to login on Windows
   10 PCsSecurity Affairs [https://securityaffairs.co/wordpress/
 * oss-sec: by thread [https://seclists.org/oss-sec/2021/q4/index.html
 * Veille #Cybersécurité #Manifone | Scoop.it
   [https://www.scoop.it/topic/securite-informatique-by-dcit-conseil
 * Real-time cybersecurity readiness. - AttackIQ [https://attackiq.com/
 * Hack OPS-SAT (CYSAT) : ouverture de l'appel à idées
   [https://incyber.fr/hack-ops-sat-cysat-ouverture-de-lappel-a-idees/
 * Data Security Breach – L'actualité cybersécurité pour PME/PMI/TPE
   [https://www.datasecuritybreach.fr/
 * Les 15 journaux britanniques et américains à lire pour progresser en
   anglais [https://generationvoyage.fr/journaux-anglais/
 * https://www.govcert.ch/blog/
   [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/#
 * Ressources - Avant de Cliquer, l'humain au coeur de la cybersécurité
   [https://avantdecliquer.com/ressources/
 * Cybersécurité : Actualités, analyses et dossiers - L'Usine Digitale
   [https://www.usine-digitale.fr/cybersecurite/
 * Cybermenaces : bilan 2021 et prévisions 2022
   [https://www.solutions-numeriques.com/webinar/cybermenaces-bilan-2021-et-previsions-2022/
 * The Daily Swig | Cybersecurity news and views
   [https://portswigger.net/daily-swig
 * Pétrolette [https://petrolette.space/
 * SpeedGuide :: Broadband Tweaks, Wireless Networks, Security
   [https://www.speedguide.net/
 * Homepage - The Record by Recorded Future [https://therecord.media/
 * Hack Forums [https://hackforums.net/index.php
 * Equities / SHIFT Search [https://shiftsearch.com/
 * 🥰마음이 따뜻해지는 포근한 느낌의 재즈피아노🎹 l 카페음악, 매장음악
   l Relaxing Jazz Piano Music - YouTube
   [https://www.youtube.com/watch?v=roSRbK1vSA0
 * Ressources - synacktiv - boite Lynon pentest
   [https://www.synacktiv.com/ressources%253Ffield_resources_tags_target_id%253D22.html
 * Cybermalveillance : anatomie d’un écosystème qui s’organise en
   chaîne de valeur - IT SOCIAL
   [https://itsocial.fr/partenaires/mega-international-partenaire/articles-mega/cybersecurite-anatomie-dun-ecosysteme-qui-sorganise-en-chaine-de-valeur/
 * Vulnerability Archives • Penetration Testing
   [https://securityonline.info/category/news/vulnerability/
 * Emplois Numériques [https://www.emplois-numeriques.com/
 * Twitch [https://www.twitch.tv/offsecofficial
 * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/
 * L'une - Globb Security FR [http://globbsecurity.fr/
 * CyberScoop | Breaking Cybersecurity News, Public Sector Threats
   [https://cyberscoop.com/
 * Cybersécurité : Actualités, analyses et dossiers - L'Usine Digitale
   [https://www.usine-digitale.fr/cybersecurite/
   HTB
 * Penetration Testing Process
   [https://academy.hackthebox.com/module/90/section/1569
 * https://www.hackthebox.com/hacker/pro-labs
   [https://www.hackthebox.com/hacker/pro-labs
 * Master Red Teaming With Pro Labs | Hack The Box
   [https://www.hackthebox.com/hacker/pro-labs
 * Hack The Box - Academy [https://academy.hackthebox.com/paths
 * Hack The Box: Buy Your Gift Card Today | The Ideal Cybersecurity
   Gift [https://www.hackthebox.com/giftcards
 * Hack The Box :: Log in [https://ctf.hackthebox.com/login
 * https://www.hackthebox.com/hacker/pro-labs
   [https://www.hackthebox.com/hacker/pro-labs
 * https://academy.hackthebox.com/login
   [https://academy.hackthebox.com/login
 * Web Requests [https://academy.hackthebox.com/module/details/35
 * Hack The Box :: Forums [https://forum.hackthebox.com/
 * Introduction to HTB Academy | Hack The Box Help Center
   [https://help.hackthebox.com/en/articles/5272936-introduction-to-htb-academy#h_6ac6f773e1
 * Ultimate CPTS Guide
   [https://findingurpasswd.notion.site/findingurpasswd/Ultimate-CPTS-Guide-22b7d3d74d7843c3addf92b4f17a83c7
 * Introduction to HTB Academy | Hack The Box Help Center
   [https://help.hackthebox.com/en/articles/5272936-introduction-to-htb-academy#h_6ac6f773e1
 * Malware and Virus Samples | VirusSamples.com
   [https://www.virussamples.com/
   Write-up
 * HTB_Academy Attacking Web Applications with Ffuf | Hacking Blog
   [https://r4fik1.github.io/htb-academy/HTBAcademy_Attacking-Web-Applications-with-Ffuf/
 * HTB_Academy/HTB_attacking_web_applications_with_ffuf/README.md at
   main · r4fik1/HTB_Academy · GitHub
   [https://github.com/r4fik1/HTB_Academy/blob/main/HTB_attacking_web_applications_with_ffuf/README.md
 * FootPrinting DNS Enumeration HACKTHEBOX | Pentest Path - YouTube
   [https://www.youtube.com/watch?v=eudA-HRlc2Y
 * External - Web - HTB Academy (CPTS)
   [https://nukercharlie.gitbook.io/htb-academy-cpts/
 * Footprinting - HTB Academy (CPTS)
   [https://nukercharlie.gitbook.io/htb-academy-cpts/internal-network-and-ad/footprinting
 * FOOTPRINTING POP3/IMAP HTB - YouTube
   [https://www.youtube.com/watch?v=OX8472WTZgw
 * HTB: Pilgrimage | 0xdf hacks stuff
   [https://0xdf.gitlab.io/2023/11/25/htb-pilgrimage.html?s=09
 * HTB Academy Labs - Footprinting (Medium)
   [https://www.natussec.com/blog/htb-academy-labs-footprinting-medium
 * cpts-quick-references/assessments/Footprinting Lab - Medium.md at
   main · bbhunter/cpts-quick-references · GitHub
   [https://github.com/bbhunter/cpts-quick-references/blob/main/assessments/Footprinting%20Lab%20-%20Medium.md
 * HTB: Pilgrimage | 0xdf hacks stuff
   [https://0xdf.gitlab.io/2023/11/25/htb-pilgrimage.html?s=09
   WriteUp-Quality
 * https://youtu.be/OepTsVrfIHs SQL injection
   [https://youtu.be/OepTsVrfIHs
 * https://bravotwoable.com/category/courses/tryhackme/
   [https://bravotwoable.com/category/courses/tryhackme/
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
   [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
 * https://electronicsreference.com/thm/
   [https://electronicsreference.com/thm/
 * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
   [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
 * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
   [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
 * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
   [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
 * https://www.youtube.com/watch?v=jzuxNG13Xj4
   [https://www.youtube.com/watch?v=jzuxNG13Xj4
 * https://www.youtube.com/watch?v=eLIRjcI5eYU
   [https://www.youtube.com/watch?v=eLIRjcI5eYU
 * https://www.youtube.com/watch?v=V7Gdc32XRhA
   [https://www.youtube.com/watch?v=V7Gdc32XRhA
 * https://www.youtube.com/watch?v=u-OZQkv2ebw
   [https://www.youtube.com/watch?v=u-OZQkv2ebw
 * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
   [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
 * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
   [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
 * https://raphaelrichard-sec.fr/learning-notes
   [https://raphaelrichard-sec.fr/learning-notes
 * https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/The%20Tangled%20Web.pdf [https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/The%20Tangled%20Web.pdf
 * https://www.infosecarticles.com/tryhackme-the-marketplace-walkthrough/ [https://www.infosecarticles.com/tryhackme-the-marketplace-walkthrough/
 * https://www.csnp.org/post/tryhackme-pyramid-of-pain-room
   [https://www.csnp.org/post/tryhackme-pyramid-of-pain-room
 * https://nananan.github.io/ [https://nananan.github.io/
 * https://youtu.be/OepTsVrfIHs [https://youtu.be/OepTsVrfIHs
 * https://duckduckgo.com/?q=tryhackme+Red+Team+Capstone+Challenge&t=brave&iax=videos&ia=videos&iai=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dxrh3g5VjY6Y [https://duckduckgo.com/?q=tryhackme+Red+Team+Capstone+Challenge&t=brave&iax=videos&ia=videos&iai=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dxrh3g5VjY6Y
 * https://khalid-emad.gitbook.io/tryhackme-sql-injection-lab/
   [https://khalid-emad.gitbook.io/tryhackme-sql-injection-lab/
 * https://infosecwriteups.com/sql-injection-lab-tryhackme-writeup-fcf30f846e82 [https://infosecwriteups.com/sql-injection-lab-tryhackme-writeup-fcf30f846e82
 * https://www.youtube.com/watch?v=M9JDQtR16Ls
   [https://www.youtube.com/watch?v=M9JDQtR16Ls
 * https://theinfosecblog.com/red-team-fundamentals-tryhackme-walkthrough/ [https://theinfosecblog.com/red-team-fundamentals-tryhackme-walkthrough/
 * https://www.youtube.com/watch?v=FFjZYrZE_lo
   [https://www.youtube.com/watch?v=FFjZYrZE_lo
 * https://www.youtube.com/watch?v=ksMi3p-vvEk
   [https://www.youtube.com/watch?v=ksMi3p-vvEk
 * https://benheater.com/tag/tryhackme/
   [https://benheater.com/tag/tryhackme/
 * https://benheater.com/tryhackme-persisting-active-directory/
   [https://benheater.com/tryhackme-persisting-active-directory/
 * https://salarbakhtiari.medium.com/extracting-credentials-from-memory-with-lsa-protection-proctected-process-light-enabled-2064af4258bd [https://salarbakhtiari.medium.com/extracting-credentials-from-memory-with-lsa-protection-proctected-process-light-enabled-2064af4258bd
 * https://raphaelrichard-sec.fr/learning-notes/living-off-the-land
   [https://raphaelrichard-sec.fr/learning-notes/living-off-the-land
 * https://raphaelrichard-sec.fr/portswigger
   [https://raphaelrichard-sec.fr/portswigger
 * https://benheater.com/tryhackme-exploiting-active-directory/
   [https://benheater.com/tryhackme-exploiting-active-directory/
 * https://benheater.com/tryhackme-persisting-active-directory/
   [https://benheater.com/tryhackme-persisting-active-directory/
 * https://www.cyb3rm3.com/bypa551nguac
   [https://www.cyb3rm3.com/bypa551nguac
 * https://benheater.com/tryhackme-enumerating-active-directory/
   [https://benheater.com/tryhackme-enumerating-active-directory/
 * https://www.youtube.com/watch?v=9U0OdYQ7MCg
   [https://www.youtube.com/watch?v=9U0OdYQ7MCg
 * https://www.youtube.com/watch?v=k_99-dXtdpc
   [https://www.youtube.com/watch?v=k_99-dXtdpc
 * https://www.youtube.com/watch?v=0pcWviZcFVU&list=PLqM63j87R5p6BXQK3VCL-9ZLVyyXs_Au1 [https://www.youtube.com/watch?v=0pcWviZcFVU&list=PLqM63j87R5p6BXQK3VCL-9ZLVyyXs_Au1
 * https://www.youtube.com/watch?v=dXgVrnPetKs&list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae&index=3 [https://www.youtube.com/watch?v=dXgVrnPetKs&list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae&index=3
 * https://www.youtube.com/playlist?list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae [https://www.youtube.com/playlist?list=PLrY_AbzZGqt_-sHuHORntt-ybcrTBUMae
 * https://motasem-notes.net/updated-the-complete-windows-privilege-escalation-tryhackme-windows-privesc/ [https://motasem-notes.net/updated-the-complete-windows-privilege-escalation-tryhackme-windows-privesc/
 * https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ [https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/
 * https://blog.mzfr.me/posts/2020-02-1-linux-priv-esc/
   [https://blog.mzfr.me/posts/2020-02-1-linux-priv-esc/
 * https://mathiasbynens.github.io/rel-noopener/
   [https://mathiasbynens.github.io/rel-noopener/
 * https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/ [https://blog.dareboost.com/fr/2017/03/target-blank-rel-noopener-securite-performance/
 * https://www.jitbit.com/alexblog/256-targetblank-the-most-underestimated-vulnerability-ever/ [[https://www.jitbit.com/alexblog/256-targetblank-the-most-underestimated-vulnerability-ever/|fr]
 * https://www.youtube.com/watch?v=WxbfkN-u8d8
   [https://www.youtube.com/watch?v=WxbfkN-u8d8
 * https://readysetexploit.wordpress.com/2021/12/21/try-hack-me-napping/ [https://readysetexploit.wordpress.com/2021/12/21/try-hack-me-napping/
 * https://infosecwriteups.com/wireshark-101-walkthrough-tryhackme-4d9f7d4264b0 [https://infosecwriteups.com/wireshark-101-walkthrough-tryhackme-4d9f7d4264b0
 * https://infosecwriteups.com/ [https://infosecwriteups.com/
 * https://bravotwoable.com/category/courses/tryhackme/
   [https://bravotwoable.com/category/courses/tryhackme/
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://electronicsreference.com/thm/
   [https://electronicsreference.com/thm/
 * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
   [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
 * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
   [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
 * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
   [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
 * https://www.youtube.com/watch?v=jzuxNG13Xj4
   [https://www.youtube.com/watch?v=jzuxNG13Xj4
 * https://www.youtube.com/watch?v=V7Gdc32XRhA
   [https://www.youtube.com/watch?v=V7Gdc32XRhA
 * https://www.youtube.com/watch?v=u-OZQkv2ebw
   [https://www.youtube.com/watch?v=u-OZQkv2ebw
 * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
   [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
 * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
   [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
 * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
   [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://0x00sec.org/ [https://0x00sec.org/
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://www.youtube.com/watch?v=eLIRjcI5eYU
   [https://www.youtube.com/watch?v=eLIRjcI5eYU
 * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe
 * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
   [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
 * https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html [https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html
 * https://steflan-security.com/tryhackme-buffer-overflow-prep/
   [https://steflan-security.com/tryhackme-buffer-overflow-prep/
 * https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 [https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14
 * https://noxious.tech/posts/Brainstorm/
   [https://noxious.tech/posts/Brainstorm/
 * https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ [https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/
 * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up
 * https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/
   [https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/
 * https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G [[https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G|fr]
 * https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md [https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://ludovic-cyber-sec.netlify.app/attacking-kerberos-tryhackme
   [https://ludovic-cyber-sec.netlify.app/attacking-kerberos-tryhackme
 * https://bdure.medium.com/attacktive-directory-fr-b10e18002fae
   [https://bdure.medium.com/attacktive-directory-fr-b10e18002fae
 * https://snowscan.io/# [https://snowscan.io/#
 * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up
 * https://stacklima.com/comment-installer-kali-docker-image-sur-linux/
   [https://stacklima.com/comment-installer-kali-docker-image-sur-linux/
 * https://sky9262.tistory.com/entry/RG8geW91IGtub3csIHdobyBhbSBJPw
   [https://sky9262.tistory.com/entry/RG8geW91IGtub3csIHdobyBhbSBJPw
 * https://intelx.io/integrations [https://intelx.io/integrations
 * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
   [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
 * https://bravotwoable.com/category/courses/tryhackme/
   [https://bravotwoable.com/category/courses/tryhackme/
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://electronicsreference.com/thm/
   [https://electronicsreference.com/thm/
 * https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
   [https://www.hackingarticles.in/a-beginners-guide-to-buffer-overflow/
 * https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
   [https://www.kali-linux.fr/hacking/overflows-passons-a-la-pratique
 * https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
   [https://www.youtube.com/channel/UC9WYWHLdu9TK-0Hu3wcHJ9g
 * https://www.youtube.com/watch?v=jzuxNG13Xj4
   [https://www.youtube.com/watch?v=jzuxNG13Xj4
 * https://www.youtube.com/watch?v=V7Gdc32XRhA
   [https://www.youtube.com/watch?v=V7Gdc32XRhA
 * https://www.youtube.com/watch?v=u-OZQkv2ebw
   [https://www.youtube.com/watch?v=u-OZQkv2ebw
 * https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
   [https://www.thedutchhacker.com/owasp-top-10-on-tryhackme/
 * https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
   [https://jinshiranai.hashnode.dev/tryhackme-owasp-top-10-write-up
 * https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
   [https://medium.com/@4n0m4l1/tryhackme-owasp-top-10-f84353a1963
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://0x00sec.org/ [https://0x00sec.org/
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://www.youtube.com/watch?v=eLIRjcI5eYU
   [https://www.youtube.com/watch?v=eLIRjcI5eYU
 * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe
 * https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
   [https://www.0x0ff.info/2015/buffer-overflow-gdb-part1/
 * https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html [https://shinris3n.github.io/writeups/resources/2021/06/13/TryHackMe-BOF-Prep.html
 * https://steflan-security.com/tryhackme-buffer-overflow-prep/
   [https://steflan-security.com/tryhackme-buffer-overflow-prep/
 * https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14 [https://faizanwrites.medium.com/buffer-overflow-prep-walkthrough-2375f7ef6a14
 * https://noxious.tech/posts/Brainstorm/
   [https://noxious.tech/posts/Brainstorm/
 * https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/ [https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/
 * https://www.cyb3rm3.com/wr1t35up [https://www.cyb3rm3.com/wr1t35up
 * https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/
   [https://marcorei7.wordpress.com/2021/05/04/129-gatekeeper/
 * https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G [[https://www.youtube.com/playlist?list=PLLKTMCUeix3O0DPbmuaRuR_4Hxo4m3G|fr]
 * https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md [https://github.com/hamza07-w/gatekeeper-tryHackme-writeup/blob/main/README.md
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://0x00sec.org/ [https://0x00sec.org/
 * https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe [https://shamsher-khan-404.medium.com/buffer-overflows-tryhackme-writeup-348aec9c1dfe
 * Sourcing.Games [https://sourcing.games/
 * Hack Today — The Home of Hackers! [https://www.hacktoday.io/
 * hacksome | my security journey [https://hackso.me/
 * InfoSec Write-ups [https://infosecwriteups.com/
 * Steflan's Security Blog [https://steflan-security.com/
 * Tag: thm | Rawsec [https://blog.raw.pm/tags/thm/
 * CTF Challenges - Hacking Articles
   [https://www.hackingarticles.in/ctf-challenges-walkthrough/
 * CTF Challenges - Hacking Articles
   [https://www.hackingarticles.in/ctf-challenges-walkthrough/
 * https://the-finn.net/ [https://the-finn.net/
 * /dev/random: Sleepy Walkthrough CTF
   [https://highon.coffee/blog/sleepy-ctf-walkthrough/
 * Blog [https://epi052.gitlab.io/notes-to-self/blog/
 * g0blin Research TOP TOP [https://g0blin.co.uk/
 * GTFOBins [https://gtfobins.github.io/#+file%20upload
 * jhalon.github.io/_posts at master · jhalon/jhalon.github.io
   [https://github.com/jhalon/jhalon.github.io/tree/master/_posts
 * Tenten HackTheBox | CTF Machine Walkthrough | Toogles
   [http://toogl.es/#/view/KXmyFGJZE4g
 * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html#hackthebox
 * Hacking Articles - Raj Chandel's Blog [https://www.hackingarticles.in/
 * Categories - Jack Hacks [https://jhalon.github.io/categories.html
 * ninja hatori – Medium [https://medium.com/@hninja049
 * Tenten HackTheBox | CTF Machine Walkthrough | Toogles
   [http://toogl.es/#/view/KXmyFGJZE4g
 * /dev/random: Sleepy Walkthrough CTF
   [https://highon.coffee/blog/sleepy-ctf-walkthrough/
 * Pivoting and Port Forwarding
   [https://g10s.io/pivoting-and-port-forwarding/
 * TryHackMe : Basic Pentesting - Notamax
   [https://notamax.be/tryhackme-basic-pentesting/
 * Intro - Rowbot's PenTest Notes [https://guide.offsecnewbie.com/
 * Rowbot's Reverse Shell Generator
   [https://offsecnewbie.com/reverse_shell.php
 * Write-Ups | Cyber TryHard
   [https://juliette1012.github.io/categories/write-ups/
 * Tryhackme - Page 2 of 5 - The Dutch Hacker
   [https://www.thedutchhacker.com/category/write-ups/tryhackme/page/2/
 * Categories | qhum7 [https://qhum7.github.io/tabs/categories/
 * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists
 * * [https://www.tashastaples.com/
 * Ethical hacking and penetration testing - InfoSec, IT, Kali Linux,
   BlackArch [https://miloserdov.org/
 * TryHackMe Raw Notes - Try Hack Me Writeups
   [https://harshitruwali.github.io/TryHackMe/index.md/
 * HackTricks - HackTricks [https://book.hacktricks.xyz/welcome/readme
 * hackplayers [https://www.hackplayers.com/
   ToolZ
 * https://github.com/OlivierLaflamme/Cheatsheet-God
   [https://github.com/OlivierLaflamme/Cheatsheet-God
 * https://wiki.wireshark.org/CaptureFilters
   [https://wiki.wireshark.org/CaptureFilters
 * https://www.wireshark.org/docs/ [https://www.wireshark.org/docs/
 * https://github.com/WindowsExploits/Exploits/tree/master/CVE-2017-0213 [https://github.com/WindowsExploits/Exploits/tree/master/CVE-2017-0213
 * https://www.mankier.com/1/xfreerdp [https://www.mankier.com/1/xfreerdp
 * https://github.com/vavkamil/awesome-bugbounty-tools
   [https://github.com/vavkamil/awesome-bugbounty-tools
 * https://miloserdov.org/?p=4726 [https://miloserdov.org/?p=4726
 * https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com
   [https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com
 * https://netsec.ws/?p=337 [https://netsec.ws/?p=337
 * https://redteam.guide/docs/checklists/red-team-checklist/
   [https://redteam.guide/docs/checklists/red-team-checklist/
 * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm
 * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm
 * https://contest-2010.korelogic.com/rules.txt
   [https://contest-2010.korelogic.com/rules.txt
 * https://miloserdov.org/?p=3338 [https://miloserdov.org/?p=3338
 * https://miloserdov.org/?p=3338 [https://miloserdov.org/?p=3338
 * https://w-e-b.site/ [https://w-e-b.site/
 * https://hackersinterview.com/ [https://hackersinterview.com/
 * https://onlineyamltools.com/convert-yaml-to-json
   [https://onlineyamltools.com/convert-yaml-to-json
 * https://github.com/simsong/bulk_extractor
   [https://github.com/simsong/bulk_extractor
 * https://redteam.guide/docs/checklists/red-team-checklist
   [https://redteam.guide/docs/checklists/red-team-checklist
 * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
   [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/
 * https://malwareunicorn.org/workshops/re101.html#0
   [https://malwareunicorn.org/workshops/re101.html#0
 * https://shinolocker.com/ [https://shinolocker.com/
 * https://shinosec.com/ [https://shinosec.com/
 * https://sh1n0g1.github.io/ [https://sh1n0g1.github.io/
 * https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com
   [https://email1.io/?aid=e3ajsfOrhy&from=temp-mail.com
 * https://netsec.ws/?p=337 [https://netsec.ws/?p=337
 * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm
 * https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm
 * Shadowsocks | A fast tunnel proxy that helps you bypass firewalls.
   [https://shadowsocks.org/
 * Welcome! [https://suip.biz/
 * Comment trouver les vulnérabilités d'attaque par injection SQL?
   [https://geekflare.com/fr/find-sql-injection/
 * Toolbox [https://geekflare.com/tools/toolbox
 * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/
   Maison
 * https://www.loupausa.fr/ [https://www.loupausa.fr/
 * Films | Rob Hope [https://robhopefilms.com/films/
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DaicEwUe0JCk
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXsVtSPgaRzI
 * Shockers, poings électriques et tasers de poche
   [https://www.armurerie-lavaux.com/Materiel-de-defense/Shockers-Poings-electriques-Taser-de-poche/
 * Spurious Correlations [https://tylervigen.com/spurious-correlations
 * GL.iNet Admin Panel [http://192.168.8.1/#/login
 * Usbek & Rica - Recherche
   [https://usbeketrica.com/fr/search/content?q=cyber&sortBy=score
 * GreenGo | L’alternative à Airbnb. Française et Responsable.
   [https://www.greengo.voyage/
 * CryptPad [https://cryptpad.fr/
 * - MassifduPilat.com
   [https://massifdupilat.com/pilat/randonnee/randonnee-vtt-velo-pilat/
 * Commande - Les Jardins de Victorien
   [https://www.lesjardinsdevictorien.fr/commande/
 * Jean-Martin Fortier - Agriculteur et Auteur
   [https://www.jeanmartinfortier.com/#projects
 * Guide pour réaliser son jardin alimentaire sur le toit | Agriculture
   urbaine - Agri-Réseau | Documents
   [https://www.agrireseau.net/agriculture-urbaine/documents/95947/guide-pour-realiser-son-jardin-alimentaire-sur-le-toit?a=1&r=petit+jardin
 * 8 sites d'actualités positives et solidaires à suivre !
   [https://www.davidcouturier.fr/8-sites-actualites-positives/
 * POSITIVR : initiatives positives, causes, innovations et
   inspirations [https://positivr.fr/
 * SynoMyFamily - Synology DiskStation [https://10.0.0.80:5001/#/signin
 * CS253 - Web Security [https://web.stanford.edu/class/cs253/
 * Syno [http://myfamilyariokio.quickconnect.to/https_first/
 * SSH Local, Remote and Dynamic Port Forwarding - Explain it like I am
   five! | - erev0s.com
   [https://erev0s.com/blog/ssh-local-remote-and-dynamic-port-forwarding-explain-it-i-am-five/
 * Syno [http://myfamilyariokio.quickconnect.to/https_first/
 * Rockbalancing | Earth Art – Google My Maps
   [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&msa=0&ie=UTF8&t=m&ll=45.42031066038717%2C4.442260977871677&spn=109.636453%2C316.40625&z=14&source=embed
 * La gestion des conflits
   [https://modules-iae.univ-lille.fr/M30/cours/co/002_module_30_Beaucourt_Conflits_web.html
 * Cloudron - App Store [https://www.cloudron.io/store/index.html#
 * Le Mot - Wordle en français [https://wordle.louan.me/
 * Productivité [https://everlaab.com/ressources/
 * Freebox OS [http://mafreebox.freebox.fr/
 * Interprétation des 64 hexagrammes Yi King | Yi King interprétation
   hexagrammes
   [http://yi-king-gratuit.com/yi-king-interpretation-64-hexagrammes.html
 * Paraphraz.it | Reformulateur pour réécrire, reformuler, et
   paraphraser un texte [https://paraphraz.it/fr/
 * Welcome to ntopng [http://192.168.1.5:3000/lua/hosts_stats.lua
 * Maltrail (2021-05-24) [http://192.168.1.5:8338/
 * How to install Blackarch Repositories on Arch Linux | FOSS Linux
   [https://www.fosslinux.com/17105/how-to-install-blackarch-repositories-on-arch-linux.htm
 * Meditation Timer [https://www.meditation-timer.com/
 * InsightTimer FR [https://insighttimer.com/fr/
 * Generative.fm - Play [https://play.generative.fm/browse
 * Generative.fm – Endless ambient music generators
   [https://generative.fm/
 * Free Zen Meditation Timer - Timers for Silent Meditation
   [https://www.the-guided-meditation-site.com/zen-meditation-timer.html
 * Zazen Meditation Timer
   [https://noeldemartin.github.io/zazen-meditation-timer/
 * GitHub - legrk/awesome-meditation: meditation and mindfulness online
   resources [https://github.com/legrk/awesome-meditation
 * A Soft Murmur [https://asoftmurmur.com/
 * Ringtones [https://www.chimes.com/pages/ringtones
 * Metasploit Unleashed - Free Online Ethical Hacking Course
   [https://www.offensive-security.com/metasploit-unleashed/
 * Hack The Box Universities CTF 2021 | A Hacking Competition For
   Universities
   [https://www.hackthebox.eu/event/university-ctf-2021?utm_source=platform&utm_medium=banner&utm_campaign=uni-ctf-2021
 * CTFtime.org / Events calendar [https://ctftime.org/calendar/
 * Tirez un maximum de ce cours - Apprenez les bases du langage Python
   - OpenClassrooms
   [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python/7289381-tirez-un-maximum-de-ce-cours
 * Resoomer | Résumeur pour faire un résumé de texte automatique en
   ligne [https://resoomer.com/
 * SafeCycle - Itinéraire pour vélo, centré sur la sécurité, gratuit et
   open source
   [https://safecycle.atelier-des-communs.fr/?profile=route&vae=true&sort=safe&start=45.439459%2C4.447880&end=45.458860%2C4.395939#
 * AttackIQ Academy [https://academy.attackiq.com/
 * SuperCook - Zero Waste Recipe Generator [https://www.supercook.com/#/
 * Pentest – Tests d’intrusion et audits de sécurité | Vaadata
   [https://www.vaadata.com/fr/
 * UFONet - Denial of Service Toolkit [https://ufonet.03c8.net/
 * Avanset VCE Exam Simulator 3.0 Crack Torrent + License Key 2022
   Latest [https://licensedcrack.com/avanset-vce-exam-simulator-crack-key/
 * Autoprotection Digitale Contre la Surveillance | Astuces, Outils et
   Guides Pratiques pour des Communications En Ligne Plus Sécurisées
   [https://ssd.eff.org/fr
 * Sketchfab - The best 3D viewer on the web [https://sketchfab.com/
 * Granite stone pink 03 - Download Free 3D model by 3dhdscan
   (@3dhdscan) 1f1710c
   [https://sketchfab.com/3d-models/granite-stone-pink-03-1f1710c6f8be4419a2ef02012b2308fd
 * accueil La Doc [https://ladoc.cemea.org/accueil
 * Master 2 OPSIE : Organisation et Protection des Systèmes
   d’Information dans les Entreprises | Agence nationale de la sécurité
   des systèmes d'information
   [https://www.ssi.gouv.fr/particulier/formations/secnumedu/formations-labellisees-secnumedu/master-2-opsie-organisation-et-protection-des-systemes-dinformation-dans-les-entreprises/
 * Rockbalancing | Earth Art – Google My Maps
   [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&fbclid=IwAR2VKhLS4ODSGVNY4gGxAr8VGcRjNvE9L5HI134Bdea3lMQyiEmZ2yYp-lU&ll=4.25701657132063%2C-90.65504695000004&z=2
 * The 16 Best Sites to Watch TV on Your Computer Over the Internet
   [https://www.makeuseof.com/tag/best-streaming-tv-services/
 * 12 Video Sites That Are Better Than YouTube
   [https://www.makeuseof.com/tag/top-12-sites-watch-videos-youtube/
 * Online Pranks 😈😂 | Just Pranx, Bro! [https://pranx.com/
 * ActivityWatch - Open-source time tracker [https://activitywatch.net/
 * Dépôt du dossier et traitement demande MDPH | Mon Parcours Handicap
   [https://www.monparcourshandicap.gouv.fr/aides/le-depot-du-dossier-et-le-traitement-de-la-demande-par-la-maison-departementale-des-personnes
 * La Maison Loire Autonomie - Handicap (MDPH) - Département de la
   Loire
   [https://www.loire.fr/jcms/lw_1326999/fr/la-maison-loire-autonomie-handicap-mdph
 * Emploi et handicap : la reconnaissance de la qualité de travailleur
   handicapé (RQTH) - Ministère du Travail, du Plein emploi et de
   l'Insertion
   [https://travail-emploi.gouv.fr/emploi-et-insertion/emploi-et-handicap/rqth
 * pipotron - altavista Yahoo Search Results
   [https://us.yhs4.search.yahoo.com/yhs/search;_ylt=A0oG7pwWSMtOMVgAqg2stLcF?ei=UTF-8&p=pipotron&fr=altavista
 * Pipotron [http://www.pipotron.free.fr/
 * Accueil - Les Économistes Atterrés [https://www.atterres.org/
 * Une analyse du projet de réforme des retraites tel que le présente
   le gouvernement. - Les Économistes Atterrés
   [https://www.atterres.org/une-analyse-du-projet-de-reforme-des-retraites-tel-que-le-presente-le-gouvernement/
 * Webcams autour de Saint-Étienne - meteoblue
   [https://www.meteoblue.com/fr/meteo/webcams/saint-%C3%89tienne_france_2980291
 * Webcams DIR Centre Est
   [http://www.webcams-dir.centre-est.developpement-durable.gouv.fr/
 * EarthCam - Webcam Network [https://www.earthcam.com/mapsearch/
 * Live cameras: France [http://insecam.org/en/bycountry/FR/?page=4
 * EarthCam - Hall of Fame [https://www.earthcam.com/halloffame/
 * Accueil [https://www.mesdroitssociaux.gouv.fr/accueil/
 * Vente aux enchères de biens d'occasion et biens immobiliers des
   collectivités et entreprises - Agorastore [https://www.agorastore.fr/
 * Vente du 01/04/2023 au 07/04/2023 | encheres-domaine
   [https://encheres-domaine.gouv.fr/hermes/ventes/vente-en-ligne/vente-du-01042023/505086
 * L'Enatronic, générateur de discours façon ENA
   [http://chrisferon.free.fr/technologies-langage/pipotron-discours-ena.php
 * L'argent Dette (2010) Paul Grignon - YouTube
   [https://www.youtube.com/watch?v=kgA2-bWXSN4
 * Achat pièces d'or et d'argent en ligne sur AuCOFFRE.com
   [https://www.aucoffre.com/
 * Cartes météo | Radar météo & satellite en temps réel - meteoblue
   [https://www.meteoblue.com/fr/meteo/cartes/saint-%c3%89tienne_france_2980291#coords=4/45.43/4.39&map=temperature~daily-max~auto~2%20m%20above%20gnd~none
 * Play Unblocked Games - UBG365 [https://ubg365.github.io/
 * Bored Panda - The Only Magazine For Pandas [https://www.boredpanda.com/
 * How to Meditate - Mindful [https://www.mindful.org/how-to-meditate/
 * Cryptoast - Démocratisons la crypto-monnaie ! [https://cryptoast.fr/
 * Forfait Mobile : Voici les meilleures offres en juillet 2023
   [https://www.frandroid.com/comparateur-forfaits
 * Le chemin sauvage - accueil [https://www.lecheminsauvage.com/
 * Boutique - Chemin Sauvage [https://www.lecheminsauvage.com/la-boutique/
 * Itinéraires vélo en France : trouver et calculer votre parcours
   [https://www.francevelotourisme.com/itineraire
 * Service Addresses & Features | Quad9
   [https://quad9.net/service/service-addresses-and-features/#ip
 * Plan Maison 3D - Logiciel gratuit pour dessiner ses plans 3D
   [https://www.kozikaza.com/kazaplan/new
 * La communauté et les outils pour la maison | Kozikaza
   [https://www.kozikaza.com/?s=09
 * Sweet Home 3D : Guide d'utilisation
   [https://www.sweethome3d.com/fr/userGuide.jsp
 * Free Accounts Archives » Tricky Wire
   [https://www.trickywire.com/category/free-accounts/
 * Téléchargement et utilisation de l’image de récupération du système
   d’exploitation Dell | Dell France
   [https://www.dell.com/support/kbdoc/fr-fr/000123667/telechargement-et-utilisation-de-l-image-de-recuperation-du-systeme-d-exploitation-dell-dans-microsoft-windows
 * How to Enable Developer Mode on Your Chromebook
   [https://www.howtogeek.com/210817/how-to-enable-developer-mode-on-your-chromebook/
 * GitHub - dnschneid/crouton: Chromium OS Universal Chroot Environment
   [https://github.com/dnschneid/crouton
 * How to Restore Your Chromebook's Original BIOS and Software If
   You've Erased It
   [https://www.howtogeek.com/279308/how-to-restore-your-chromebooks-original-bios-and-software/
 * Android App Testing on Chromebooks - Professionally Evil Insights
   [https://www.secureideas.com/blog/2019/02/android-app-testing-on-chromebooks.html
 * 21 Crosh Terminal Commands All Chromebook Users Should Know
   [https://www.makeuseof.com/tag/terminal-commands-chromebook/
 * Comment restaurer un Chromebook après un crash système .
   [https://mychromebook.fr/comment-restaurer-un-chromebook-apres-un-crash-systeme/
 * Skilleos | Cours pour Professionnels en ligne | Skilleos
   [https://www.skilleos.com/pro?orderBy=ranking
 * Humoresques - Bienvenue sur le site Humoresques
   [http://www.humoresques.fr/
 * Offres d'emploi ⋅ Saint-Étienne ⋅ CDI - jobs_that_makesense
   [https://jobs.makesense.org/fr/s/jobs/Saint-%C3%89tienne--France/all/cdi
 * Capture Labs
   [https://capturelabs.sonicwall.com/m/feature/security-center
 * Pricing - Read more [https://skiff.com/pricing
 * Uniqkey Features: Built for IT, Designed for Employees
   [https://www.uniqkey.eu/features
   Meditate
 * Le massif du Pilat : l’air le plus pur du monde !* – Esprit Jeûne ·
   Respir n'Ice [https://www.jeune-rando-yoga.fr/massif-du-pilat/
 * 30 Day Meditation Challenge - YouTube
   [https://www.youtube.com/playlist?list=PL2CsBiOXfpeLEAgwfGrfcz7TygFim9vX0
 * 30 Day Meditation Challenge for Beginners - One Mind Dharma
   [https://oneminddharma.com/30-day-meditation-challenge/
 * ChatGPT - L'univers est-il infini? [https://chat.openai.com/chat
 * Playground - OpenAI API ChatGPT [https://beta.openai.com/playground
 * Meditate [https://meditation-timer.netlify.app/
 * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/
 * Plus de 1 000 vidéos gratuites de Drone et de Nature en résolution
   HD et 4K - Pixabay [https://pixabay.com/fr/videos/search/drone/
 * carte rockbalance - Rockbalancing | Earth Art – Google My Maps
   [https://www.google.com/maps/d/viewer?mid=1vVvIxeHCE-oBSwHljKKxudiEEvI&fbclid=IwAR2VKhLS4ODSGVNY4gGxAr8VGcRjNvE9L5HI134Bdea3lMQyiEmZ2yYp-lU&ll=4.25701657132063%2C-90.65504695000004&z=2
 * THE DEEPEST OM 108 Times Peaceful OM Mantra Meditation | THE DEEPEST
   OM 108 Times Peaceful OM Mantra Meditation | By Sounds of Meditation
   | Facebook
   [https://www.facebook.com/soundsofmeditation/videos/858209811032477
 * The Tools by Phil Stutz and Barry Michels - TuningJohn
   [https://tuningjohn.com/book/tools/
 * Articles et conseils - Le RIME - Réseau International du Mieux-Être
   [https://le-rime.com/articles-et-conseils/
 * A Soft Murmur [https://asoftmurmur.com/
 * Noisli - Improve Focus and Boost Productivity with Background Sounds
   [https://www.noisli.com/
 * Pluto TV Extrême sur Pluto TV
   [https://pluto.tv/fr/live-tv/pluto-tv-extreme-fr
 * Pluto TV Voyage sur Pluto TV
   [https://pluto.tv/fr/live-tv/pluto-tv-voyage-fr
 * Pluto TV Yoga sur Pluto TV
   [https://pluto.tv/fr/live-tv/pluto-tv-yoga-fr
 * Voir Films et Series Streaming Gratuitement HD - Lebonstream
   [https://www.lebonstream.xyz/
 * Coflix [https://coflix.tv/browse
 * Bflix Alone Australia (2023) Online Free on bflix
   [https://bflixmovies.me/series/alone-australia-2023-full-tv-show-free-bflix-watch-online-free-7931.html
 * Bflix [https://bflix.io/
 * Watch Movies Online Free [https://bflix.to/movies
 * widrav widrav.com [https://widrav.com/
 * Flokta - John Wick : Chapitre 4 (2023)
   [https://flokta.com/1qsl2p45h3/b/flokta/3253012350
 * Imago TV - Tous les documentaires [https://www.imagotv.fr/documentaires
 * Le Dhammapada: les dits du Bouddha
   [http://www.dhammadelaforet.org/sommaire/dhp/dhp_sommaire.html
 * Plateforme de streaming films nature & documentaires animaliers -
   SVOD - Salamandre [https://www.salamandre.tv/
 * HumanDilemma | Kick [https://kick.com/humandilemma
 * Contenus d'une chaîne de vidéos - PeerTube
   [https://peertube.su/c/hacker_sploit/videos
 * HuniTV - stream sport [https://fdabe9.myshopify.com/
 * Stream2watch- Best Sports Stream Sites [https://thestream2watch.net/
   Share_File
 * Gofile - Free file sharing and storage platform
   [https://gofile.io/welcome
   Jardin
 * Box de graines - Box de graines - Légumes faciles | Association
   Kokopelli
   [https://kokopelli-semences.fr/fr/p/KK0002-Box-de-graines-Legumes-faciles
 * Semences bio, graines potagères variétés anciennes
   [https://www.lepotagerdesante.com/
 * Entretien du potager : Conseils, astuces et infos pour jardiniers
   [https://jardinerfacile.fr/potager/
 * Spurious Correlations [https://tylervigen.com/spurious-correlations
 * Le potager d'Olivier - YouTube
   [https://www.youtube.com/channel/UC3-gwlrYQi5Q3t00Tyr2tmQ/videos
 * permaculture agroécologie etc... - YouTube
   [https://www.youtube.com/@permacultureetc
   Correction_aide_FR
 * SCRIBENS [https://www.scribens.fr/
 * CORDIAL [https://www.cordial.fr/enligne.php/
 * Correction de texte en ligne [https://www.correctiononline.fr/
 * Reverso [http://www.reverso.net/orthographe/correcteur-francais/
 * BonPatron [https://bonpatron.com/
 * Larousse.fr [https://www.larousse.fr/
 * LanguageTool [https://languagetool.org/fr/
 * SpellBoy [https://www.spellboy.com/verification_orthographique/
 * Connecteurs logiques
   [https://sites.uclouvain.be/infosphere_boreal/fichiers_communs/module7/connecteurs.html
 * Reverso | Traduction gratuite, Dictionnaire, Grammaire
   [http://www.reverso.net/text_translation.aspx?lang=FR
 * Trucs et astuces orthographique, synthaxique et grammaire
   [http://www.ladictee.fr/grammaire/truc_astuce_orthographe_grammaire_conjugaison_vocabulaire_syntaxe.htm
 * CCDMD - Exercices interactifs - Exercices interactifs
   [https://www.ccdmd.qc.ca/fr/exercices_interactifs/
 * Le détecteur de fautes [https://detecteur.ccdmd.qc.ca/#/exercices
 * CCDMD - Stratégies d'écriture - Stratégies d'écriture dans la
   formation spécifique [https://www.ccdmd.qc.ca/fr/strategies_ecriture/
 * Threat Reference : répertoire des cybermenaces et attaques internet
   | Proofpoint FR [https://www.proofpoint.com/fr/threat-reference
 * Paraphraz.it | Reformulateur pour réécrire, reformuler, et
   paraphraser un texte [https://paraphraz.it/fr/
 * Réécrire, reformuler ou reformuler du texte | changeur de mots
   gratuit
   [https://smodin.io/fr/reformuler-automatiquement-le-texte-en-francais-gratuitement
 * MerciApp • Correcteur d'orthographe et de grammaire
   [https://www.merci-app.com/
 * Orthographe
   [https://www.francaisfacile.com/cgi2/myexam/liaison.php?liaison=_orthographe_
 * Figures de style : le guide complet | La langue française
   [https://www.lalanguefrancaise.com/linguistique/figures-de-style-guide-complet
   PNL-eneagramme-MBIST
 * Test Ennéagramme (gratuit) | Commencer le Test (2022)
   [https://enneagram.bz/fr
 * Type de personnalité ISTP | The Myers-Briggs Company
   [https://eu.themyersbriggs.com/fr-FR/tools/MBTI/MBTI-personality-Types/ISTP
   Japon
 * le site du Japon - le site du Japon [https://lesitedujapon.com/
 * Les pierres et le Japon - le site du Japon
   [https://lesitedujapon.com/les-pierres-et-le-japon/
 * Auberge de jeunesse au Japon, réservez votre hostel idéal sur
   Hostelworld.
   [https://www.french.hostelworld.com/st/auberges-de-jeunesse/asie/japon/?source=affiliate-PHG-1101l3Ic4&affiliate=PHG&ref_id=1011lwvnEyLe
 * Japon intime - Au fil du Japon
   [https://www.voyagejapon.com/circuit/japon-intime
 * Cours de japonais n1 débutant - le site du Japon
   [https://lesitedujapon.com/cours-de-japonais-n1/
   Bushcraft
 * Make A Crossbow From Scratch Video | Survival Life
   [https://survivallife.com/diy-survival-make-a-crossbow-from-scratch/
   SPORTS
 * DAREBEE [https://darebee.com/
 * 8 habitudes alimentaires pour garder la ligne et être en bonne santé
   [http://www.litobox.com/guide-nutrition
 * 30 Days Combat HIIT - YouTube
   [https://www.youtube.com/playlist?list=PLQSMS0J6JbrKcGgbOwIknlYcFv0vrHcI3
 * 4 Elliptical Workouts for MAXIMUM Weight Loss
   [http://www.nowloss.com/elip/
 * Entrainement sportif - Programmes de sport tous niveaux
   [https://entrainement-sportif.fr/#gsc.tab=0
 * Gainage - 15 exercices pour renforcer la sangle abdominale
   [https://entrainement-sportif.fr/perdre-ventre-gainage-ceinture-abdominale.htm#programme-gainage
 * MuscleWiki - Exercises - Abdominals
   [https://musclewiki.com/exercises/male/abdominals
   Android
 * Info about Samsung Galaxy S5 Neo - s5neolte
   [https://doc.e.foundation/devices/s5neolte
 * Open Source Mobile OS Alternatives To Android
   [https://itsfoss.com/open-source-alternatives-android/
 * Install LineageOS on klte | LineageOS Wiki
   [https://wiki.lineageos.org/devices/klte/install
 * Info about klte | LineageOS Wiki
   [https://wiki.lineageos.org/devices/klte/
   GPS_Cartographie
 * Randonnée pédestre avec trace gps à télécharger gratuitement -
   hébergements - carte Ign© - topoguide [https://www.randogps.net/
 * OpenTopoMap - Topographische Karten aus OpenStreetMap
   [https://opentopomap.org/#map=15/45.37796/4.53761
 * CyclOSM: OpenStreetMap-based bicycle map
   [https://www.cyclosm.org/#map=13/45.3708/4.4416/cyclosm
 * BBBike extracts OpenStreetMap [https://garmin3.bbbike.org/
   Best_Off
 * Mr. Free Tools - The Best Free Tools & Resources
   [https://mrfreetools.com/
   Ziq
 * Freesound - sound search
   [https://freesound.org/search/?q=nature&f=tag%3A%22forest%22&w=&s=Duration+%28long+first%29&advanced=0&g=1
 * La BOITE à MUSIQUES | RADIO DIO
   [https://radiodio.org/pres_emission/chat-sonne/
 * Ane Brun playlist top
   [https://www.youtube.com/watch?v=nOubjLM9Cbc&index=30&list=RDGNSBctmMI3k
 * RADIO DIO [http://radiodio.axperia.net/
 * Listen to Ambient Sounds and Music With Timer - Deepfocus.io
   [https://deepfocus.io/
 * TuneIn [https://tunein.com/radio/Music-c424724/?attributes=filter%3Dl98
 * Qobuz Web Player [https://play.qobuz.com/artist/21621
 * FIP autour de l'electro | Free Internet Radio | TuneIn
   [https://tunein.com/radio/FIP-autour-de-lelectro-s293089/
 * Laura Marling - What He Wrote - YouTube
   [https://www.youtube.com/watch?v=g3BXL3QvQD8&list=RDg3BXL3QvQD8&start_radio=1
 * Wanderlust 🌲 - An Indie/Folk/Pop Playlist - YouTube
   [https://www.youtube.com/watch?v=KCCqqPqDqSY
 * Wanderlust 🌲 - An Indie/Folk/Pop Playlist - YouTube
   [https://www.youtube.com/watch?v=KCCqqPqDqSY&list=RDKCCqqPqDqSY&start_radio=1
 * TSUGI RADIO - TSUGI [https://www.tsugi.fr/tsugi-radio/
 * DownTown | Jazzy HipHop - YouTube
   [https://www.youtube.com/watch?v=GGBm9gTY2NU&list=RDGGBm9gTY2NU&start_radio=1&t=28
 * Liquid Drum and Bass Mix #60 - YouTube
   [https://www.youtube.com/watch?v=aJoo79OwZEI&list=RDaJoo79OwZEI&start_radio=1&t=0
 * The Cinematic Orchestra - To Build a Home - YouTube
   [https://www.youtube.com/watch?v=QB0ordd2nOI&list=RDEMne13xUS4wJ54s16t5fVBDg&start_radio=1
 * The Ultimate Indie-Folk Playlist | Vol. 2 - YouTube
   [https://www.youtube.com/watch?v=HYsN3drpUms&start_radio=1&list=RDHYsN3drpUms&t=2
 * Discographie officielle de Tricky à écouter et regarder gratuitement
   [http://www.allformusic.fr/tricky/discographie
 * Programming / Coding / Hacking music vol.20 (UNDER THE DEEP) -
   YouTube
   [https://www.youtube.com/watch?v=rr0gvSS1OzE&index=7&list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y
 * TSUGI - toute la musique d’aujourd’hui… et de demain.
   [https://www.tsugi.fr/
 * Background Noises • Ambient Sounds • Relaxing Music | myNoise ®
   [https://mynoise.net/noiseMachines.php
 * Japanese Garden • Relaxing Ambience Player
   [https://mynoise.net/NoiseMachines/japaneseGardenSoundscapeGenerator.php
 * Chillout-Radio.com - Chillout Lounge Music Radio
   [https://chillout-radio.com/
 * Hipstersound - coffee shop sounds for creative stimulation.
   [https://hipstersound.com/ambient.html
 * Rainyscope weather simulator: the beauty of the changing seasons.
   [https://rainyscope.com/#slide-3
 * Listen to Smooth Jazz and Rain Sounds - JazzAndRain.com
   [http://www.jazzandrain.com/
 * 8tracks [https://8tracks.com/explore/blues_rock/popular/5
 * peaky blinders - download free mp3 - Mp3-PM
   [http://mp3pn.info/search/s/f/neil+young/
 * peaky blinders - download free mp3 - Mp3-PM
   [http://mp3-pm.org/s/f/peaky+blinders/
 * WebOas.is - Radio [https://weboas.is/radio/
 * Download Free Music for YouTube videos | Bensound
   [https://www.bensound.com/free-music-for-youtube-videos
 * MyPianoPop - Cours de Piano Pop n°1 en France et en Europe
   [https://www.mypianopop.com/
 * Cours de guitare Blues Débutant Gratuit - Les Bases
   [https://www.myguitare.com/cours/cours-guitare-blues-debutant-gratuit
 * csmultimedios.servehttp.com - /Discografias A-Q/
   [http://csmultimedios.servehttp.com/Discografias%20A-Q/
 * csmultimedios.servehttp.com - /Discografias R-Z/
   [http://csmultimedios.servehttp.com/Discografias%20R-Z/
 * Index of /ongaku [http://meoac.com/ongaku/
 * Télécharger de la musique libre et gratuite
   [https://www.auboutdufil.com/
 * Don's Tunes on Spotify
   [https://open.spotify.com/user/dondraperstunes?si=UxKfg7zBQg6_cc5rQrQywg&nd=1&dlsi=8c04ecd047f245df
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D1IATcDK8AOE
   DEMO_secu
 * hakanonymos / June 2021
   [https://github.com/hakanonymos?tab=overview&from=2021-06-01&to=2021-06-30
 * Shoppy - Profile of hakanonymos [https://shoppy.gg/@hakanonymos
 * Learn to Hack [https://www.hacksplaining.com/
   Prez
 * derouler_atelier_mrrobot.sh · master · BigData / Demo-Security ·
   GitLab
   [https://gitlab.adista.intra/BigData/Demo-Security/blob/master/derouler_atelier_mrrobot.sh
 * Cast & Info | Mr. Robot | USA Network
   [http://www.usanetwork.com/mrrobot/cast
 * My Photoblog - last picture [http://www.fstsh.com/
 * http://www.whoismrrobot.com/ [http://www.whoismrrobot.com/
 * who is Mr Robot USA Network casting - Recherche Google
   [https://www.google.fr/search?q=who+is+Mr+Robot+USA+Network+casting&ie=utf-8&oe=utf-8&client=firefox-b-ab&gfe_rd=cr&dcr=0&ei=fZqBWtfPNOfBXsmJu4gM
 * ASafety » Reverse-shell one-liner Cheat Sheet
   [https://www.asafety.fr/reverse-shell-one-liner-cheat-sheet/

   Utils
 * breachdirectory
   [https://breachdirectory.org/?__cf_chl_rt_tk=VPJZtMdhi.bdw_XO_sqTpJLIDeJ0uxqpDZL_bh7xRy0-1705049575-0-gaNycGzNDSU
 * Online SHA1 Encryption and Decryption [https://md5decrypt.net/en/Sha1/
 * Speedtest unyc [http://speedtest.unyc.io/
 * Skiff - mail - drive-calendar
   [https://app.skiff.com/signin?s=referer-header&c=https%3A%2F%2Fwww.clubic.com%2F&pt=2.0%3A+Privacy-first%2C+end-to-end+encrypted+email+%28with+color%29.&agid=undefined&aid=undefined
 * All DNS record types [https://www.nslookup.io/
 * https://api.ipify.org/ [https://api.ipify.org/
 * Find email addresses in seconds • Hunter (Email Hunter)
   [https://hunter.io/
 * Subdomain Finder scan of adista.fr - C99.nl
   [https://subdomainfinder.c99.nl/scans/2023-12-04/adista.fr
 * Tools - Intelligence X [https://intelx.io/tools
 * explorateur de données data.gouv.fr [https://explore.data.gouv.fr/
 * Subdomain Finder scan of unyc.io - C99.nl
   [https://subdomainfinder.c99.nl/scans/2023-12-28/unyc.io
 * file.io - Super simple file sharing [https://www.file.io/
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/
 * We Transfer Gratuit. Envoi sécurisé de gros fichiers.
   [https://www.swisstransfer.com/fr-fr
 * Code Beautify and Code Formatter For Developers - to Beautify,
   Validate, Minify, JSON, XML, JavaScript, CSS, HTML, Excel and more
   [https://codebeautify.org/
 * Mail1.io [https://email1.io/?aid=dB0sZKEUx1&from=temp-mail.com
 * Check if a Website is Malicious/Scam or Safe/Legit | URLVoid
   [https://www.urlvoid.com/
 * Domain Reputation Check Tool | IPVoid
   [https://www.ipvoid.com/domain-reputation-check/
 * Find your mail server IP - Blacklistmaster
   [https://www.blacklistmaster.com/find-your-mailserver-ip
 * IPCisco | Cisco Networking Academy | Network Certification | Learn
   [https://ipcisco.com/
 * CRDF Threat Center: List of malware samples detected by CRDF Labs
   [https://threatcenter.crdf.fr/samples.html
 * Translate
   [https://libretranslate.com/?source=auto&target=fr&q=Translate%2520Shell%2520is%2520a%2520command-line%2520translator%2520powered%2520by%2520Google%2520Translate%2520%28default%29%2C%2520Bing%2520Translator%2C%2520Yandex%2520Translate%2C%2520and%2520Apertium.%2520It
 * NsTools.fr : 5.153.183.164 - Analyse, trouver et whois mon adresse
   IP 5.153.183.164 [https://nstools.fr/5.153.183.164
 * DeepL Traduction – DeepL Translate : le meilleur traducteur au monde
   [https://www.deepl.com/fr/translator
 * Liste des adresses IP: 45.67.229.* (45.67.229.0 - 45.67.229.254) |
   Adresse IP (Français) 🔍 [https://fr.ipshu.com/ip_d_list/45.67.229
 * 45.67.230.45 | Dictionary Attacker | IP Address Inspector | Project
   Honey Pot [https://www.projecthoneypot.org/ip_45.67.230.45
 * FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation
   [https://iplists.firehol.org/
 * 216.244.66.202 | Wowrack.com | AbuseIPDB
   [https://www.abuseipdb.com/check/216.244.66.202
 * 216.244.66.202 IP Reputation Lookup | IP Address Reputation Check
   [https://www.ipqualityscore.com/ip-reputation-check
 * URLhaus | Browse
   [https://urlhaus.abuse.ch/browse.php?search=https%3A%2F%2Fcoppellhomedecor.com%2Ftip.js
 * Search - urlscan.io [https://urlscan.io/search/#*
 * tutanota : Créez un compte de courriel gratuit aujourd'hui
   [https://tutanota.com/fr/pricing
 * Blacklist Check - IP Checker [https://iptoolbox.org/blacklist-check.php
 * BGP.Tools [https://bgp.tools/
 * Whois Lookup, Domain Availability & IP Search - DomainTools
   [https://whois.domaintools.com/
 * MAC 84:A9:3E | MAC Address Lookup
   [https://maclookup.app/search/result?mac=84:a9:3e:4b:1d:8a
 * Whois planet-work.com [https://www.whois.com/whois/planet-work.com
 * request catcher [https://okio.requestcatcher.com/
 * Similar Site for Request Catcher — record HTTP requests, webhooks,
   API calls [https://similarsite.org/show-page/requestcatcher.com
 * Server Uptime - Free 1 min monitoring, 100 monitors, 12 locations.
   [https://server-uptime.com/
 * POST Requests Online [https://reqbin.com/post-online
 * Beeceptor - Rest/SOAP API Mocking, HTTP Debugger & Proxy - API Mock
   Server [https://beeceptor.com/
 * IoT Detection Service | FortiGuard
   [https://www.fortiguard.com/services/dds
 * IP Reputation/Blacklist Check, Online IP Reputation Lookup | APIVoid
   [https://www.apivoid.com/tools/ip-reputation-check/
 * Palo Alto Networks URL filtering - Test A Site
   [https://urlfiltering.paloaltonetworks.com/query/
 * MetaDefender Cloud | Results
   [https://metadefender.opswat.com/results/file/6CA3D50D18E1517D557B56DA9E4BB897142E026949DC5E74A504887B2F44064D/hash/overview
 * LOLBAS [https://lolbas-project.github.io/#
 * GTFOBins [https://gtfobins.github.io/
 * https://www.zone-h.org/archive?hz=1
   [https://www.zone-h.org/archive?hz=1
 * Hash text - IT Tools [https://it-tools.tech/hash-text
 * Ophcrack [https://ophcrack.sourceforge.io/
 * Logiciel d'emailing & marketing par e-mail - YMLP
   [https://www.ymlp.com/fr/
 * Clavier Virtuel [http://claviervirtuel.fr/
 * ACCOUNTKILLER.COM - [https://www.accountkiller.com/en/
   GENERAL
 * ENI training [https://www.eni-training.com/portal/client/home
 * Python Tutorial | Learn Python Programming
   [https://www.geeksforgeeks.org/python-programming-language/?ref=shm
 * Automated application deployment with GitHub Actions and Pages |
   GitHub Resources - GitHub Resources
   [https://resources.github.com/learn/pathways/automation/essentials/automated-application-deployment-with-github-actions-and-pages/
 * Web Penetration Testing - Hacking Articles
   [https://www.hackingarticles.in/web-penetration-testing/
 * Blog ⋆ IpCisco [https://ipcisco.com/ipcisco-blog/
 * Search About python - Mind Luster
   [https://www.mindluster.com/?search_for=Python+
 * Network – Ringtail Security [https://ringtail.ch/collections/network
 * Programmer en Python en 1h30 avec Anaconda (GRATUIT - 2023) | Udemy
   [https://www.udemy.com/course/programmer-python/learn/lecture/24560522#content
 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp -
   Information Gathering | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a
 * GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of
   bugbounty writeups (Bug type wise) , inspired from
   https://github.com/ngalongc/bug-bounty-reference
   [https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
 * Cisco Skills For All Ethical Hacking [https://skillsforall.com/
 * Resource Hub: Get Packet Tracer, Virtual Machines, and More
   [https://skillsforall.com/resources/lab-downloads?courseLang=en-US
 * Cisco Skills For All English 1
   [https://skillsforall.com/fr/launch?id=1c91fa6b-3459-45ab-ab8d-e2ed5213e35a&tab=curriculum&view=20b578a1-0aae-57f4-8949-bfc4786ccf6f
 * UTM | Virtual machines for Mac [https://mac.getutm.app/
 * Home – Siren Security [https://sirensecurity.io/blog/home/
 * futurecoder [https://fr.futurecoder.io/course/#IntroducingTheShell
 * Meterpreter. – Siren Security [https://sirensecurity.io/blog/home/
 * Connectez-vous et commencez à apprendre | Udemy
   [https://www.udemy.com/join/login-popup/?next=/course/programmer-python/learn/lecture/24560522%3Fstart%3D225#overview
 * Veille Archives - Cyberwatch [https://cyberwatch.fr/veille/
 * Comment prioriser les vulnérabilités de son système d'information ?
   [https://cyberwatch.fr/veille/comment-prioriser-les-vulnerabilites-de-son-systeme-dinformation/
 * Comment utiliser le MITRE ATT&CK pour analyser une menace
   informatique ?
   [https://cyberwatch.fr/veille/comment-utiliser-le-mitre-attack-pour-analyser-une-menace-informatique/
 * Linode Guides & Tutorials | Linode Docs
   [https://www.linode.com/docs/guides/
 * Vulnerability Detection | Linode Docs
   [https://www.linode.com/docs/guides/security/vulnerabilities/
 * VirtualBox: How To Fix Failure In Starting VM (On Manjaro Linux) -
   DEV Community
   [https://dev.to/nabbisen/virtualbox-how-to-solve-a-problem-about-failure-in-starting-vm-on-manjaro-linux-49fg
 * ATA Learning - High quality, in-depth, no-fluff how-to articles on
   IT, sysadmin, cloud and DevOps. [https://adamtheautomator.com/
 * Information Security [https://adamtheautomator.com/category/infosec/
 * I Learned [https://ilearned.eu/
 * Supports [https://www.cyberedu.fr/pages/supports/
 * Liens intéressants – Stanislas.io
   [https://stanislas.io/quelques-lectures-interessantes/
 * How to Install and Use the Linux Bash Shell on Windows 10
   [http://www.howtogeek.com/249966/how-to-install-and-use-the-linux-bash-shell-on-windows-10/
 * Mitesh Shah [https://miteshshah.github.io/
 * Automated application deployment with GitHub Actions and Pages |
   GitHub Resources - GitHub Resources
   [https://resources.github.com/learn/pathways/automation/essentials/automated-application-deployment-with-github-actions-and-pages/
 * Formation DevOps | Stéphane ROBERT
   [https://blog.stephane-robert.info/docs/
 * Digital Forensics & Incident Response Blog Geared Toward Beginners
   [https://dfirdiva.com/
 * Learn REST APIs [https://rapidapi.com/learn/rest#what-is-an-api
   vuln_exploit_vuln_veille
 * GitHub - rapid7/hackazon: A modern vulnerable web app
   [https://github.com/rapid7/hackazon
 * Vulnerability Database 🛡 [https://vuldb.com/fr/
 * Vulnérabilités – IØ Expertises
   [https://www.io-expertises.fr/category/vulnerabilites/
 * Malvuln - Malware security vulnerabilty research and exploits
   targeting malware, worms and viruses. Malvuln is a unique source for
   malware exploit threat intel." [https://malvuln.com/
 * Technical Advisory: Zero-day critical vulnerability in Log4j2
   exploited in the wild
   [https://businessinsights.bitdefender.com/technical-advisory-zero-day-critical-vulnerability-in-log4j2-exploited-in-the-wild
 * Pick a Vulnerability to Learn About
   [https://www.hacksplaining.com/lessons
 * https://nvd.nist.gov/vuln [https://nvd.nist.gov/vuln
 * http://www.morningstarsecurity.com/news#vulnerabilities
   [http://www.morningstarsecurity.com/news#vulnerabilities
 * https://vulners.com/search?query=!bulletinFamily:ioc%20order:published [https://vulners.com/search?query=!bulletinFamily:ioc%20order:published
 * https://blog.vulners.com/ [https://blog.vulners.com/
 * Vulnerability Database 🛡 [https://vuldb.com/
 * Vulnerability DB | Snyk
   [https://snyk.io/vuln/search?q=elasticsearch&type=any
 * https://vulners.com/search?query=!bulletinFamily:ioc%20order:published [https://vulners.com/search?query=!bulletinFamily:ioc%20order:published
 * contao cms vulnerabilities - Recherche Google
   [https://www.google.com/search?source=hp&ei=fqEaX-WpFaSJlwSU64jYBw&q=contao+cms+vulnerabilities&oq=contao+vuln&gs_lcp=CgZwc3ktYWIQAxgBMgYIABAWEB4yBggAEBYQHjIGCAAQFhAeOggIABCxAxCDAToFCAAQsQM6AggAOgIILjoECAAQCjoECAAQHlCnC1i1N2CWSmgBcAB4AYABrgKIAbQJkgEIMTAuMS4wLjGYAQCgAQGqAQdnd3Mtd2l6&sclient=psy-ab
 * Security Bulletin | HKCERT [https://www.hkcert.org/security-bulletin
 * Vulners - Vulnerability Data Base
   [https://vulners.com/search?query=bulletinFamily
 * Vulnerability DB | Snyk [https://snyk.io/vuln
 * Vulnerability Trends - Vulmon [https://vulmon.com/trends
 * https://community.qualys.com/vulnerability-detection-pipeline/
   [https://community.qualys.com/vulnerability-detection-pipeline/
 * Risk-Based Vulnerability Management Automation | Hackuity
   [https://www.hackuity.io/
 * http://www.vulnweb.com/ [http://www.vulnweb.com/
 * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf
 * http://www.vulnweb.com/ [http://www.vulnweb.com/
 * Too many vulnerabilities on one Tuesday from 2 vendors, not to
   mention zero-days – Vulners Blog
   [https://blog.vulners.com/2021/05/17/vulners-weekly-digest-48/
 * GitHub - skavngr/rapidscan: The Multi-Tool Web Vulnerability
   Scanner. [https://github.com/skavngr/rapidscan
 * GitHub - Moham3dRiahi/XAttacker: X Attacker Tool ☣ Website
   Vulnerability Scanner & Auto Exploiter
   [https://github.com/Moham3dRiahi/XAttacker
 * adon90/pentest_compilation: Compilation of commands, tips and
   scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real
   scenarios [https://github.com/adon90/pentest_compilation
 * GitHub - vulnersCom/getsploit: Command line utility for searching
   and downloading exploits [https://github.com/vulnersCom/getsploit
 * GitHub - jbarone/xxelab: A simple web app with a XXE vulnerability.
   [https://github.com/jbarone/xxelab
 * GitHub - DiogoMRSilva/websitesVulnerableToSSTI: Simple websites
   vulnerable to Server Side Template Injections(SSTI)
   [https://github.com/DiogoMRSilva/websitesVulnerableToSSTI
 * GitHub - AonCyberLabs/Windows-Exploit-Suggester: This tool compares
   a targets patch levels against the Microsoft vulnerability database
   in order to detect potential missing patches on the target. It also
   notifies the user if there are public exploits and Metasploit
   modules available for the missing bulletins.
   [https://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylist
 * GitHub - DefectDojo/django-DefectDojo: DefectDojo is an open-source
   application vulnerability correlation and security orchestration
   tool. [https://github.com/DefectDojo/django-DefectDojo
 * GitHub - Yavuzlar/VulnLab [https://github.com/Yavuzlar/VulnLab
 * GitHub - kaiiyer/awesome-vulnerable: A curated list of VULNERABLE
   APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE
   LAB. [https://github.com/kaiiyer/awesome-vulnerable
 * GitHub - OWASP/Vulnerable-Web-Application: OWASP Vulnerable Web
   Application Project https://github.com/hummingbirdscyber
   [https://github.com/OWASP/Vulnerable-Web-Application
 * GitHub - sec4you/VulnLabs: docker-compose bringing up multiple
   vulnerable applications inside containers.
   [https://github.com/sec4you/VulnLabs
 * GitHub - webpwnized/mutillidae: OWASP Mutillidae II is a free,
   open-source, deliberately vulnerable web application providing a
   target for web-security training. Mutillidae can be installed on
   Linux and Windows using LAMP, WAMP, and XAMMP. It is pre-installed
   on SamuraiWTF and OWASP BWA. The existing version can be updated on
   these platforms. With dozens of vulnerabilities and hints to help
   the user; this is an easy-to-use web hacking environment designed
   for labs, security enthusiast, classrooms, CTF, and vulnerability
   assessment tool targets. Mutillidae has been used in graduate
   security courses, corporate web sec training courses, and as an
   "assess the assessor" target for vulnerability assessment software.
   A containerized version of the application is available as a
   companion project. [https://github.com/webpwnized/mutillidae
 * Common Vulnerability Scoring System Version 3.1 Calculator
   [https://www.first.org/cvss/calculator/3.1
 * Seattle v0.3 Walkthrough on Vulnhub by Graceful Security – Cyber
   Boot Camp [http://cbcamp.com/seattle-v0-3-walkthrough-on-vulnhub-by/
 * Categories | Root Network Security
   [https://www.rootnetsec.com/categories/#vulnhub
 * What do you need to know about the log4j (Log4Shell) vulnerability?
   - YouTube [https://www.youtube.com/watch?v=oC2PZB5D3Ys
 * GitHub - christophetd/log4shell-vulnerable-app: Spring Boot web
   application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
   [https://github.com/christophetd/log4shell-vulnerable-app
 * I Learned - Log4j, une vulnérabilité d'une ampleur inédite
   [https://ilearned.eu/log4j.html
 * Online Vulnerability Scanners and Network Intelligence |
   HackerTarget.com [https://hackertarget.com/
 * ZTH - Obscure Web Vulns - The Dutch Hacker
   [https://www.thedutchhacker.com/zth-obscure-web-vulns/
 * CVE security vulnerability database. Security vulnerabilities,
   exploits, references and more [https://www.cvedetails.com/
 * SecurityFocus [https://www.securityfocus.com/vulnerabilities
 * NVD - Results
   [https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=openssl+0.9.8c-1&search_type=all
 * Vulners - Vulnerability Data Base
   [https://vulners.com/search?query=openssl%200.9.8c-1
 * Vulners - Vulnerability Data Base [https://vulners.com/
 * Vulnerabilities (CVE) - OpenCVE [https://www.opencve.io/cve
 * Vulnerability DB | Snyk [https://snyk.io/vuln
 * vulnonym.org - An offensive and otherwise scary human readable name
   generator for CVEs. · Vulnonym.org [https://vulnonym.org/
 * Vulnerability Intelligence by CyberSecurity Help s.r.o.
   [https://www.cybersecurity-help.cz/
 * Auditing Webapps · CTF Field Guide
   [https://trailofbits.github.io/ctf/web/vulnerabilities.html
 * Vulnerable Pages [https://games.samsclass.info/
 * Hackable - Secret Hacker | Vulnerable Web Application Server ~
   Secret Hacker Official ®
   [https://secrethackersite.blogspot.com/2019/10/hackable-secret-hacker-vulnerable-web.html
 * GitHub - future-architect/vuls: Vulnerability scanner for
   Linux/FreeBSD, agentless, written in Go
   [https://github.com/future-architect/vuls
 * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs
   [https://metadefender.opswat.com/#!/
 * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs
   [https://metadefender.opswat.com/#!/
 * Advanced Threats - Security Intelligence
   [http://securityintelligence.com/topics/vulnerabilities-threats/threats/
 * Not So Spooky: Linux "Ghost" Vulnerability
   [http://blog.trendmicro.com/trendlabs-security-intelligence/not-so-spooky-linux-ghost-vulnerability/
 * The Prices vs. Features of Web Application Vulnerability Scanners
   [http://www.sectoolmarket.com/price-and-feature-comparison-of-web-application-scanners-unified-list.html
 * Vigil@nce vulnérabilités - veille, base, alerte et gestion
   [http://vigilance.fr/
 * TrendLabs Security Intelligence BlogVulnerabilities Archives -
   TrendLabs Security Intelligence Blog
   [http://blog.trendmicro.com/trendlabs-security-intelligence/category/vulnerabilities/
 * OPSWAT MetaDefender Cloud | Vulnerability, CDR and Antivirus APIs
   [https://metadefender.opswat.com/#!/
 * Hacktivity: Latest Security Vulnerabilities Found, Rewarded, or
   Disclosed
   [https://hackerone.com/hacktivity?sort_type=popular&filter=type%3Aall&querystring=&page=1
 * CVSS v2 Calculator
   [https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?calculator&version=2
 * NVD - Search and Statistics [https://nvd.nist.gov/vuln/search
 * Vulners - Vulnerability Data Base [https://vulners.com/products
 * vulners search exploit
   [https://vulners.com/packetstorm/PACKETSTORM:153372
 * NVD - CVSS v3 Calculator
   [https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C)
 * MassVulScan.sh, identifiez rapidement les ports ouverts sur votre
   réseau et les hosts vulnérables – H2K
   [https://hack2know.how/2019/02/massvulscan-sh-identifiez-rapidement-les-ports-ouverts-sur-votre-reseau-et-les-hosts-vulnerables/
 * CTF Series : Vulnerable Machines — tech.bitvijays.com
   [https://bitvijays.github.io/LFC-VulnerableMachines.html
 * abatchy's blog | OSCP-like Vulnhub VMs
   [https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms
 * PwnLab: init - VulnHub Walkthrough - YouTube
   [https://www.youtube.com/watch?v=NrbuqqeuurA
 * CORS - Lab #1 CORS vulnerability with basic origin reflection |
   Short Video - YouTube
   [https://www.youtube.com/watch?v=XTFDst3TjMM&list=PLuyTk2_mYISJpyzYl947x48JABj0AVVUF&index=4
 * How to Use NMAP 7 to Discover Vulnerabilities, Launch DoS Attacks
   and More - Hackzzon: Pentesting and Security
   [http://hackzzon.blogspot.fr/2016/02/how-to-use-nmap-7-to-discover.html
 * (no title)
   [http://null-byte.wonderhowto.com/how-to/art-0-day-vulnerabilities-part3-command-injection-and-csrf-vulnerabilities-0166321/
 * Damn Vulnerable Linux: DVL: WebGoat SQL Injection
   [http://www.computersecuritystudent.com/SECURITY_TOOLS/SQL_INJECTION/lesson2/
 * Resources ~ VulnHub [https://www.vulnhub.com/resources/
 * vulnhub boot2root challenges - Cyberry
   [http://www.cyberry.co.uk/vulnhub/
 * Acunetix Web Vulnerability Scanner 9.5 Cracked by 0x22
   [https://leakforums.net/thread-323233
 * Vulnerability Trends - Vulmon [https://vulmon.com/trends
 * GitHub - rapid7/metasploit-vulnerability-emulator: Created by Jin
   Qian via the GitHub Connector
   [https://github.com/rapid7/metasploit-vulnerability-emulator
 * Vulners Database - viewCount:50 TO * order:viewCount last 7 days
   [https://vulners.com/search?query=v...%20order:viewCount%20last%207%20days|fr]
 * CVE STALKER -The most viral CVE(vulnerability) ranking chart-
   [https://cvestalker.com/weekly.php
 * Vulnerabilities - Acunetix
   [https://www.acunetix.com/vulnerabilities/web/
 * Vulnerability feed [https://inthewild.io/feed
 * Vulnerability Database - OSV [https://osv.dev/list
 * GitHub - 0xtavian/awesome-attack-surface-monitoring: Curated list of
   open-source & paid Attack Surface Monitoring (ASM) tools.
   [https://github.com/0xtavian/awesome-attack-surface-monitoring
 * shell-storm | Shellcodes Database [http://shell-storm.org/shellcode/
 * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/
 * 💀 Sploitus | Exploit & Hacktool Search Engine
   [https://sploitus.com/?query=NoCMS#exploits
 * Vumetric Cybersecurity Portal [https://cyber.vumetric.com/
 * Exploit Database - Exploits for Penetration Testers, Researchers,
   and Ethical Hackers [https://www.exploit-db.com/
 * Search files: openssl 0.9.8c-1 ≈ Packet Storm
   [https://packetstormsecurity.com/search/?q=openssl+0.9.8c-1
 * GreyNoise Visualizer [https://viz.greynoise.io/
 * CXBugtraq Site 1 - cxsecurity.com [https://cxsecurity.com/wlb/
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * GitHub - anhtu97/PayloadAllEverything
   [https://github.com/anhtu97/PayloadAllEverything
 * CXSECURITY.COM Free Security List [https://cxsecurity.com/
 * Security Bulletins | Cybersecurity Services Australia | AusCERT
   [https://www.auscert.org.au/resources/security-bulletins/
 * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/
 * Security Bulletins | Cybersecurity Services Australia | AusCERT
   [https://www.auscert.org.au/resources/security-bulletins/
 * CXSECURITY.COM Free Security List [https://cxsecurity.com/
 * Most recent entries - CVE-Search [http://cve.circl.lu/
 * malwares.com [https://www.malwares.com/search/tag?tag=exploit
 * Black Hills Information Security, a Penetration Testing Company -
   Projects [https://www.blackhillsinfosec.com/projects/
 * Search files: bind ≈ Packet Storm
   [https://packetstormsecurity.com/search/?q=bind
 * Vulcan Remedy Cloud [https://vulcan.io/remedy-cloud
 * Get your own instance of Vulcan Free - Vulcan Cyber
   [https://vulcan.io/lp/vulcan-free/
 * DailyCVE [https://www.reddit.com/r/DailyCVE/
 * Vulcan [https://mitremapper.voyager18.io/
 * Current Activity | CISA
   [https://www.cisa.gov/uscert/ncas/current-activity
 * / ViewPure [http://www.viewpure.com/ZWMo3VJpQrQ?start=0&end=0
 * GitHub - microsoft/AttackSurfaceAnalyzer: Attack Surface Analyzer
   can help you analyze your operating system's security configuration
   for changes during software installation.
   [https://github.com/microsoft/AttackSurfaceAnalyzer
 * Open Source Tooling for Threat Analysis and Attack Surface
   Management - YouTube [https://www.youtube.com/watch?v=ZWMo3VJpQrQ
 * NCP - National Checklist Program Checklist Repository
   [https://ncp.nist.gov/repository?product=Google+Android+7.x&sortBy=modifiedDate%7Cdesc
 * 0day.today Exploit Database : vulnerability : 0day : new exploits :
   shellcode by 0day.today Team [https://fr.0day.today/
 * EPSS : qu'est-ce que l'Exploit Prediction Scoring System ?
   [https://cyberwatch.fr/veille/epss-quest-ce-que-lexploit-prediction-scoring-system/
 * Vulnerability & Exploit Database
   [https://pentest-tools.com/vulnerabilities-exploits
 * Vulcan [https://mitremapper.voyager18.io/#
 * Recent vulnerabilities and exploits
   [https://vulmon.com/searchpage?q=*&sortby=bydate
 * Latest Solarwinds Serv U File Server 7.1.0.2 Security
   Vulnerabilities | Vumetric Cyber Portal
   [https://cyber.vumetric.com/vulns/solarwinds/serv-u-file-server/7-1-0-2/
 * Comprendre les CVE et leur score CVSS | Knock-Knock
   [https://www.knock-knock.fr/blog/comprendre-les-cve-et-leur-score-cvss/
 * Vulnerabilities · Attack statistics · The Shadowserver Foundation
   [https://dashboard.shadowserver.org/statistics/honeypot/monitoring/vulnerability/?category=monitoring&statistic=unique_ips&limit=100
 * TurnKey GNU/Linux | 100+ free ready-to-use system images for virtual
   machines, the cloud and bare metal [https://www.turnkeylinux.org/
 * Base de données des vulnérabilités (CVE, CAPEC, CWE, Exploit-db)
   [https://kb.prohacktive.io/fr/index.php
 * CVE Trends - crowdsourced CVE intel [https://cvetrends.com/
 * Cloud Vulnerabilities and Security Issues Database
   [https://www.cloudvulndb.org/
 * Search - urlquery [https://urlquery.net/search?q=malware+.fr
 * Fortinet : Products and vulnerabilities
   [https://www.cvedetails.com/vendor/3080/Fortinet.html
 * Attaques cybersécurité auprès d'organismes publics - uMap
   [https://umap.openstreetmap.fr/fr/map/attaques-cybersecurite-aupres-dorganismes-publics_821557?ref=julien.io#7/46.773/4.537
 * Evénements | Portail du CERT Santé
   [https://cyberveille-sante.gouv.fr/liste/evenements
   TOOLS_et_TUTO
 * CryptPad [https://cryptpad.fr/
 * Transform YAML into JSON - Online YAML Tools
   [https://onlineyamltools.com/convert-yaml-to-json
 * Video Library
   [https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/list-of-videos.htm
 * Marco Pontello's Home - Software - TrIDNet
   [https://www.mark0.net/soft-tridnet-e.html
 * Canarytokens [https://canarytokens.org/generate
 * JSON Web Tokens - jwt.io [https://jwt.io/#debugger-io
 * CyberChef [https://gchq.github.io/CyberChef/
 * Home - Active Countermeasures [https://www.activecountermeasures.com/
 * Online Tools - RingZer0 CTF [https://ringzer0team.com/tool
 * intoDNS: adista.fr - check DNS server and mail server health
   [https://intodns.com/adista.fr
 * SSL Certificates - ZeroSSL [https://zerossl.com/features/certificates/
 * home [https://suip.biz/
 * Welcome! [https://w-e-b.site/
 * The 13 Most Helpful Pentesting Resources
   [https://www.checkmarx.com/2016/07/26/13-helpful-pentesting-resources/
 * OSINT Framework [https://osintframework.com/
 * Carte des directs Facebook
   [https://www.facebook.com/livemap#@42.602615482,-8.071217689000008,3.204700083z
 * Markdown, Please! [http://markdownplease.com/
 * Newsletters Archive - Toddington
   [https://www.toddington.com/newsletter/
 * Fuck Yeah Markdown
   [http://fuckyeahmarkdown.com/?u=http%3A%2F%2Fbrettterpstra.com%2F2014%2F05%2F04%2Ffolderize-sync-nvalt-notes-to-nested-folders%2F&read=1
 * DNS Leak Tests [http://dnsleak.com/
 * Information Sur Mon Adresse Ip
   [http://www.mon-ip.com/info-adresse-ip.php
 * Linuxize [https://linuxize.com/
 * Test de vitesse Internet | Fast.com [https://fast.com/fr/
 * EPP et EDR: le futur de la cybersécurité endpoint
   [https://secureidees.com/epp-et-edr-le-futur-de-la-cybersecurite-endpoint/
 * Zonemaster [https://zonemaster.fr/domain_check
 * adista.fr | DNSViz [https://dnsviz.net/d/adista.fr/analyze/
 * DNSdumpster.com - dns recon and research, find and lookup dns
   records [https://dnsdumpster.com/
 * All domains that include facebook - SecurityTrails
   [https://securitytrails.com/list/keyword/facebook
 * Tools - Intelligence X [https://intelx.io/tools?tab=general
 * Free Online Tools for Looking up Potentially Malicious Websites
   [https://zeltser.com/lookup-malicious-websites/
 * Skip Tracing Framework [https://makensi.es/stf/
 * Run Curl Commands Online [https://reqbin.com/curl
 * Bienvenue dans Colaboratory - Colaboratory
   [https://colab.research.google.com/notebooks/intro.ipynb#scrollTo=-Rh3-Vt9Nev9
 * Aide sociale [https://www.aide-sociale.fr/ameli-contact/
 * Generate a list of random words
   [http://listofrandomwords.com/moretools/
 * DanvOps | DanvOps [https://danvops.fr/
 * TweetDeck [https://tweetdeck.twitter.com/
 * JDH [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9/page/3
 * Ulysse | Votre billet d'avion à la vitesse d'un héros
   [https://ulysse.travel/
 * Imago [https://www.imagotv.fr/podcasts
 * Sécurité [https://security.stackovernet.com/
 * Developpez.com, le club des développeurs et IT Pro
   [https://www.developpez.com/
 * Tmux Cheat Sheet & Quick Reference [https://tmuxcheatsheet.com/
 * MyMemory - Machine translation meets human translation
   [https://mymemory.translated.net/
 * TryHackMe | Learn Cybersecurity [https://tryhackme.com/
 * SynoMyFamily - Synology DiskStation
   [https://myfamilyariokio.fr4.quickconnect.to/
 * OpenTopoMap - Topographische Karten aus OpenStreetMap
   [https://opentopomap.org/#map=15/45.37796/4.53761
 * morss.it – Get more out of RSS feeds, for free [https://morss.it/
 * MultiRBL.valli.org - Results of the query enedis.fr
   [http://multirbl.valli.org/lookup/enedis.fr.html
 * Email temporaire – Email à usage unique - Email anonyme
   [https://temp-mail.org/fr/#:~:text=Email%20jetable%20-%20est%20un%20service%20qui%20permet,comme%3A%20tempmail%2C%2010minutemail%2C%20e-mail%20jetable%2C%20faux-mail%20ou%20trash-mail.
 * Release the Kraken: Starting Your Password Cracking Journey
   [https://threat.tevora.com/release-the-kraken/
 * Comment installer WSL 2 sous Windows 10 ? – Korben
   [https://korben.info/installer-wsl2-windows-linux.html
 * Introduction - OWASP Cheat Sheet Series
   [https://cheatsheetseries.owasp.org/
 * Cours de Pen Testing | Coursera
   [https://fr.coursera.org/search?query=pen%20testing&index=prod_all_products_term_optimization&allLanguages=French
 * Overview DevSec Baselines – DevSec Hardening Framework
   [https://dev-sec.io/baselines/
 * Online investigation tool - Reverse IP, NS, MX, WHOIS and Search
   Tools
   [https://dnslytics.com/?utm_source=addon&utm_medium=logo&utm_campaign=ipdomaininfo
 * Adista - bgp.he.net
   [https://bgp.he.net/search?search%5Bsearch%5D=Adista&commit=Search
 * How to Create Fake Online Identity | The Droid Guy
   [https://thedroidguy.com/create-fake-online-identity-1119783
 * Bishop Fox Labs [https://labs.bishopfox.com/home
 * DNSdumpster.com - dns recon and research, find and lookup dns
   records [https://dnsdumpster.com/
 * Network Tools by YouGetSignal.com [http://www.yougetsignal.com/
 * Virtual Machine (VM), Windows Virtual PC & BrowserStack : Microsoft
   Edge Dev
   [https://dev.windows.com/en-us/microsoft-edge/tools/vms/windows/
 * t411.me passwords - BugMeNot [http://bugmenot.com/view/t411.me
 * I-BlockList | Lists [https://www.iblocklist.com/lists.php
 * Pocket [https://getpocket.com/login?ep=3
 * error · Issue #19 · v3n0m-Scanner/V3n0M-Scanner · GitHub
   [https://github.com/v3n0m-Scanner/V3n0M-Scanner/issues/19
 * Check My Torrent IP | Proxy & VPN Verification | TorGuard
   [https://torguard.net/checkmytorrentipaddress.php?hash=c63eb2f6dafe6ab1352092e87a18a77e826fa428
 * DNS leak test [https://www.dnsleaktest.com/
 * Toogles: Awesome Goggles for YouTube
   [http://toogl.es/#/search/HackThebox%20walkthrough
 * Hack.me · The house of rising sandbox [https://hack.me/
 * Resources - Toddington [https://www.toddington.com/resources/
 * Cheat Sheets - Toddington
   [https://www.toddington.com/resources/cheat-sheets/
 * IntelTechniques.com | OSINT & Privacy Services by Michael Bazzell |
   Open Source Intelligence [https://inteltechniques.com/
 * Halcyon IDE [https://halcyon-ide.org/
 * Ettercap Home Page [http://www.ettercap-project.org/ettercap/
 * My IP Address - BrowserLeaks.com [https://browserleaks.com/ip
 * Email temporaire – Email à usage unique - Email anonyme
   [https://temp-mail.org/fr/?__cf_chl_jschl_tk__=2501852d9e619493581e854dc826d80ab30a0205-1600153595-0-AfboQCYBbE6R6V1_ysb5OLTGp_qJ17nc-XvzzGQCIChNjdkKD5gkag3GkuKR2G7wYcG7osz8b9OSIsYpZAVS6WLIrLxqKtC7d1mzUkwtEugiUTSDySXrTbuloR0K1VtdODkLzL1ojcK160hGjwtUypOXI27fM3uCyzFTml4upQLjHt6bMbpizivu6RgN21uzQTw2DYP4sISuJIhJjXFxZi3hhAlefoUUyDVjd7LkqEibpqWzwuSviBcTYDBQ8g-LxdzMA42G5G6gO1AqdblE1iU
 * Résultat du Test de Spam
   [https://www.mail-tester.com/test-oxs1kv41d&reloaded=2
 * Scan results for https://www.cabinet-logic.fr/
   [https://securityheaders.com/?q=https%3A%2F%2Fwww.cabinet-logic.fr%2F&followRedirects=on
 * Tous les cours - Pierre Giraud [https://www.pierre-giraud.com/cours/
 * Zenk - Security - Repository [https://repo.zenk-security.com/?dir=.
 * Background Noises • Ambient Sounds • Relaxing Music | myNoise ®
   [https://mynoise.net/noiseMachines.php
 * 88 Keys • Relaxing Piano Soundscape
   [https://mynoise.net/NoiseMachines/acousticPianoSoundscapeGenerator.php
 * Focus at Work • Relax at Home • Sleep at Night | myNoise ®
   [https://mynoise.net/howToUseSoundMachines.php
 * Manuel PHP - max_input_time - La référence en Cours et Manuels PHP /
   MYSQL / HTML en francais
   [http://www.manuelphp.com/php/ini.max-input-time.php
 * Lexique de Termes et Acronymes Reseaux & Telecom -
   201304_lexique_de_termes_reseaux.pdf
   [https://lafibre.info/images/doc/201304_lexique_de_termes_reseaux.pdf
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * Online PHP Javascript Script Decoder | Quttera
   [https://malwaredecoder.com/
 * UnPHP - The Online PHP Decoder [https://www.unphp.net/
 * Qualys SSL Labs [https://www.ssllabs.com/
 * Global DNS Propagation Checker - What's My DNS?
   [https://www.whatsmydns.net/
 * Hurricane Electric BGP Toolkit [https://bgp.he.net/
 * RIPE Network Coordination Centre [https://www.ripe.net/
 * 0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d |
   ANY.RUN - Free Malware Sandbox Online
   [https://any.run/report/0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d/7b7a6442-1479-4a4b-9b05-424588efad3a
 * Malware Search | Decalage [http://decalage.info/fr/mwsearch#gsc.tab=0
 * www.dan.me.uk [https://www.dan.me.uk/
 * Bash online commands: whois, nslookup, dig, ping - bash.ws
   [https://bash.ws/
 * ID Ransomware [https://id-ransomware.malwarehunterteam.com/
 * ANY.RUN - Interactive Online Malware Sandbox [https://any.run/
 * RequestBin — Collect, inspect and debug HTTP requests and webhooks
   [http://requestbin.net/
 * azerty!& - decrypted download - decryptpassword.com
   [https://decryptpassword.com/encrypt/
 * DNS leak test
   [https://www.dnsleaktest.com/what-is-transparent-dns-proxy.html
 * BASH Programming – Linux Hint
   [https://linuxhint.com/category/bash-programming/
 * Toolbox | DNSstuff [https://tools.dnsstuff.com/
 * 💀 Sploitus | Exploit & Hacktool Search Engine
   [https://sploitus.com/?query=webmin%201.910#exploits
 * Le Proxy gratuit le plus rapide | hide.me [https://hide.me/fr/proxy
 * Fonctionnalités Piwigo - Logiciel photothèque & Digital Asset
   Management [https://fr.piwigo.com/produit
 * Pulsedive [https://pulsedive.com/
 * bash - How can I execute local script on remote machine and include
   arguments? - Unix & Linux Stack Exchange
   [https://unix.stackexchange.com/questions/87405/how-can-i-execute-local-script-on-remote-machine-and-include-arguments
 * PHP-FPM: Multiple Resource Pools | Servers for Hackers
   [https://serversforhackers.com/c/php-fpm-multiple-resource-pools
 * Pastebin dump collection [https://psbdmp.ws//
 * Mesnoeuds - Noeud de cabestan
   [http://mesnoeuds.free.fr/knot.php?knotId=71&search=cabestan
 * IP Addresses 37.58.245.0 - 37.58.245.255 | Geo IP Lookup
   [http://geoiplookup.net/ip-addresses/37.58.245.0-37.58.245.255
 * Recommended sites for gathering IP reputation : AskNetsec
   [https://www.reddit.com/r/AskNetsec/comments/7xqsiq/recommended_sites_for_gathering_ip_reputation/
 * Générer un nom aléatoire - Homme, Français, France - Fake Name
   Generator [https://fr.fakenamegenerator.com/gen-male-fr-fr.php
 * Freenom - Un nom pour chacun
   [https://www.freenom.com/fr/index.html?lang=fr
 * All Events - Digital Forensics Training and Conferences
   [https://www.dfir.training/allevents
 * MailDev [http://10.23.255.216:1080/#/
 * DNS leak test [https://www.dnsleaktest.com/results.html
 * 10 Minute Mail - Temporary E-Mail
   [https://10minutemail.com/10MinuteMail/index.html?dswid=267
 * ctf-tools & HackingTools: Exhaustive list of hacking tools
   [https://securityonline.info/2017/04/21/ctf-tools-hackingtools-exhaustive-list-of-hacking-tools/
 * Guides - Torrent VPN Guide
   [http://www.best-bittorrent-vpn.com/guides.html
 * Trenta : agence de communication globale, digitale et indépendante
   [https://nl.hideproxy.me/go.php?u=Q1K3T1CmMjxOolPILJnT0rlQ&b=5
 * https://pastebin.com/raw/0SNSvyjJ [https://pastebin.com/raw/0SNSvyjJ
 * Free Automated Malware Analysis Service - powered by Falcon Sandbox
   [http://w.hybrid-analysis.com/
 * Catégorie:gestion de projet - Le Jargon Français 4.1 - dictionnaire
   d'informatique
   [http://jargonf.org/wiki/Cat%C3%A9gorie:gestion_de_projet
 * Abusix Intelligence | Abusix [https://www.abusix.ai/
 * Webhook.site - Test, process and transform emails and HTTP requests
   [https://webhook.site/#!/7ba8e96e-6f30-4271-b281-65de1c753550
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * Search Exploits - HackTricks [https://book.hacktricks.xyz/
 * Downloadable Results [https://ytb.rip/
 * Nothink! [http://www.nothink.org/
 * Security tools - Linux Security Expert
   [https://linuxsecurity.expert/security-tools/#top10
 * Analyse your HTTP response headers [https://securityheaders.com/
 * Exploit Tools Web Based [https://exploits.my.id/index.html
 * Data Removal: Darik's Boot and Nuke - DBAN [https://dban.org/
 * Introducing BusKill: A Kill Cord for your Laptop - Michael
   Altfield's Tech Blog
   [https://tech.michaelaltfield.net/2020/01/02/buskill-laptop-kill-cord-dead-man-switch/
 * Compiler Explorer [https://godbolt.org/
 * FileFormat.Info · The Digital Rosetta Stone
   [https://www.fileformat.info/
 * What is my IP address? — ifconfig.co [https://ifconfig.co/
 * https://epi052.github.io/feroxbuster-docs/
   [https://epi052.github.io/feroxbuster-docs/
 * OWASP ZAP [https://www.zaproxy.org/docs/desktop/ui/
 * Installing Burp Suite Professional / Community Edition - PortSwigger
   [https://portswigger.net/burp/documentation/desktop/getting-started
 * Modes opératoires Réseau & Systèmes [https://www.smnet.fr/accueil.html
 * Hack Today — The Home of Hackers! [https://www.hacktoday.io/
 * 10 Great Free Online Courses in Cybersecurity
   [https://www.onlinecoursereport.com/free/cybersecurity/
 * OWASP ZAP User Group - Google Groupes
   [https://groups.google.com/g/zaproxy-users
 * Awesome Search [https://awesomelists.top/
 * Archives des astuces – Kali-linux.fr
   [https://www.kali-linux.fr/category/astuces
 * Á propos - HackinGeeK [https://hackingeek.com/a-propos/
 * HackinGeeK - Contrôlez le futur monde juste avec un clavier.
   [https://hackingeek.com/
 * All learning materials | Web Security Academy
   [https://portswigger.net/web-security/all-materials
 * All learning materials - detailed | Web Security Academy
   [https://portswigger.net/web-security/all-materials/detailed
 * Cracker un mot de passe | Zythom
   [https://zythom.fr/2020/11/cracker-un-mot-de-passe/
 * JSON pour les débutants [https://la-cascade.io/json-pour-les-debutants/
 * penetration testing - Learn Anything
   [https://learn-anything.xyz/security/penetration-testing
 * ansible - Learn Anything [https://learn-anything.xyz/
 * Known Supported Devices · brandonlw/Psychson Wiki · GitHub
   [https://github.com/brandonlw/Psychson/wiki/Known-Supported-Devices
 * DuckToolKit [https://www.ducktoolkit.com/
 * GitHub - kevthehermit/DuckToolkit: Encoding Tools for Rubber Ducky
   [https://github.com/kevthehermit/DuckToolkit
 * Catégories - Comparez les prix et les meilleurs outils - Capterra
   France - 2020 [https://www.capterra.fr/directory
 * Splunk® Enterprise - Splunk Documentation
   [https://docs.splunk.com/Documentation/Splunk
 * Education-Training-Certification | Splunk
   [https://www.splunk.com/en_us/training.html
 * Cartes mémo et listes à propos de OSCP | Quizlet
   [https://quizlet.com/subject/OSCP/?price=free&type=sets&creator=all
 * PY4E - Python for Everybody [https://www.py4e.com/lessons
 * Learn X in Y Minutes: Scenic Programming Language Tours
   [https://learnxinyminutes.com/docs/ansible/
 * Introduction à vagrant
   [https://blog.stephane-robert.info/post/introduction-vagrant/
 * Top 10 web hacking techniques of 2020 - nominations open |
   PortSwigger Research
   [https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open
 * Attacking MS Exchange Web Interfaces – PT SWARM
   [https://swarm.ptsecurity.com/attacking-ms-exchange-web-interfaces/
 * freeCodeCamp.org [https://www.freecodecamp.org/news/
 * How to install Blackarch Repositories on Arch Linux | FOSS Linux
   [https://www.fosslinux.com/17105/how-to-install-blackarch-repositories-on-arch-linux.htm
 * Top 7 Open Source Forensic Tools That You Should Know About
   [https://appsierra.com/top-7-open-source-forensic-tools/
 * OSForensics - Product Information, Download and Purchase
   [https://www.osforensics.com/products/index.php
 * Open Computer Forensics Architecture [http://ocfa.sourceforge.net/
 * Resources [https://www.forensicmethods.com/resources
 * Technical — ENISA
   [https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational
 * DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc).
   [http://ddecode.com/phpdecoder/
 * DDecode - PHP Decoder (eval, base64_encode, gzinglate, etc).
   [http://ddecode.com/phpdecoder/?home
 * Projectdiscovery.io [https://projectdiscovery.io/#/
 * ngrok - secure introspectable tunnels to localhost
   [https://ngrok.com/pricing
 * 🤞 Doigts Croisés Emoji [https://emojiterra.com/fr/doigts-croises/
 * whois prevoyance-agricole.fr - bash.ws
   [https://bash.ws/whois/prevoyance-agricole.fr
 * GTFOBins [https://gtfobins.github.io/
 * Assessment Results - KubeAcademy
   [https://kube.academy/assessments/fcf7be3b-dce7-4fd0-9cd2-ec79836df199
 * Liens utiles [https://domopi.eu/liens-utiles/
 * KubeAcademy - Unlock your full potential with Kubernetes courses
   designed by experts - KubeAcademy [https://kube.academy/
 * Cyber Security Blog | White Oak Security
   [https://www.whiteoaksecurity.com/blog/
 * BUG HUNTING METHODOLOGY FOR BEGINNERS | by Mahendra Purbia
   (Mah3Sec_) | InfoSec Write-ups
   [https://infosecwriteups.com/bug-hunting-methodology-for-beginners-20b56f5e7d19
 * A penetration tester’s guide to subdomain enumeration | by Bharath |
   Appsecco
   [https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6
 * How do I send an HTTP POST request?
   [https://reqbin.com/req/zvtstmpb/post-request-example
 * Red - Offensive Operations - s0cm0nkey's Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive
 * Ssh2john how to | VK9 Security [https://vk9-sec.com/ssh2john-how-to/
 * Debuggex: Online visual regex tester. JavaScript, Python, and PCRE.
   [https://www.debuggex.com/
 * Scrum Certification, Agile Certification | Scrum, Agile Training
   [https://www.scrumstudy.com/
 * Le Manifeste Agile est-il toujours d'actualité ?
   [https://www.atlassian.com/fr/agile/manifesto
 * Pricing · Tailscale [https://tailscale.com/pricing/
 * Scale out your Raspberry Pi Nomad cluster to the cloud
   [https://johansiebens.dev/posts/2020/09/scale-out-your-raspberry-pi-nomad-cluster-to-the-cloud/
 * Building a Nomad cluster on Raspberry Pi running Ubuntu server
   [https://johansiebens.dev/posts/2020/08/building-a-nomad-cluster-on-raspberry-pi-running-ubuntu-server/
 * Un cluster de Raspberry Pi avec Kubernetes - Framboise 314, le
   Raspberry Pi à la sauce française....
   [https://www.framboise314.fr/un-cluster-de-raspberry-pi-avec-kubernetes/
 * https://auth0.openai.com/u/signup/identifier?state=hKFo2SBCRk9TdWNkdG5rZFNMakUxbzE5VnVIVjROY0xOSU5QU6Fur3VuaXZlcnNhbC1sb2dpbqN0aWTZIFB0T25ObEk3cy1lNlU0WVNTTG8xMXB4T2tXNmlWZ3BYo2NpZNkgVGRKSWNiZTE2V29USHROOTVueXl3aDVFNHlPbzZJdEc [https://auth0.openai.com/u/signup/identifier?state=hKFo2SBCRk9TdWNkdG5rZFNMakUxbzE5VnVIVjROY0xOSU5QU6Fur3VuaXZlcnNhbC1sb2dpbqN0aWTZIFB0T25ObEk3cy1lNlU0WVNTTG8xMXB4T2tXNmlWZ3BYo2NpZNkgVGRKSWNiZTE2V29USHROOTVueXl3aDVFNHlPbzZJdEc
 * Assetnote Wordlists [https://wordlists.assetnote.io/
 * Medicat USB [https://medicatusb.com/docs/
 * mkjwk - JSON Web Key Generator [https://mkjwk.org/
 * Grayhatwarfare [https://grayhatwarfare.com/
 * Index of
   /Video/Linkedin.Learning.Penetration.Testing.Active.Directory-XQZT/
   [http://s28.bitdl.ir/Video/Linkedin.Learning.Penetration.Testing.Active.Directory-XQZT/
 * CryptoHack – Introduction to CryptoHack -
   [https://cryptohack.org/courses/intro/course_details/
 * dnscheck.tools - test your dns resolvers
   [https://dnscheck.tools/#results
 * Subdomain Finder - C99.nl [https://subdomainfinder.c99.nl/
 * regex101: build, test, and debug regex [https://regex101.com/
 * Class Central • Find the best courses, wherever they exist.
   [https://www.classcentral.com/
 * Bug Bounty For Beginners In Tamil |fr] Bug Bounty Course in Tamil |
   Step To Learn Hacking | Introduction | Learn Bug Bounty | bug hunter
   | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625
 * Bug Bounty For Beginners In Tamil |fr] TLS Without Sequre Flag Set In
   Website | SSL and TLS | Browser Overview | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625/61eaadec08933
 * Bug Bounty For Beginners In Tamil |fr] learn how to find bugs in
   websites in tamil | bug bounty | ethical hacking | live proof hack |
   Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-bug-bounty-for-beginners-in-tamil-61625/61eaadec08949
 * bug bounty - free online courses/MOOC search results | Class Central
   [https://www.classcentral.com/search?q=bug+bounty&free=true
 * Best MD5 SHA1 Decrypt | Encrypt | Crack | Decode | Hash Toolkit
   [https://hashtoolkit.com/
 * Encrypto: Secure your files before sending them out
   [https://macpaw.com/encrypto
 * Free Cybersecurity Services and Tools | CISA
   [https://www.cisa.gov/resources-tools/resources/free-cybersecurity-services-and-tools
 * Cybersecurity History Podcast | Malicious Life [https://malicious.life/
 * Free Tools - Active Countermeasures
   [https://www.activecountermeasures.com/free-tools/
 * IronSocket - Pricing - VPN Service, Smart DNS Proxy, SOCKS5 Proxy
   [https://ironsocket.com/pricing
 * Open Source Shodan Alternatives | AlternativeTo
   [https://alternativeto.net/software/shodan/?license=opensource
 * Automated Penetration Testing Platform - Pentera
   [https://pentera.io/platform/
 * Use Cases - Pentera Cybersecurity
   [https://pentera.io/use-cases/#red-teaming
 * Pentera Labs Research - Pentera [https://pentera.io/pentera-labs/
 * Merlin Command and Control framework — Merlin BETA documentation
   [https://merlin-c2.readthedocs.io/en/latest/index.html
 * Formation Certification OSCP™ (PEN-200) – Ambient IT
   [https://www.ambient-it.net/formation/oscp/
 * JumioRequestBin — Collect, inspect and debug HTTP requests and
   webhooks [https://requestbin.jumio.com/
 * Ultimate Library of ICS Cyber Security Resources - SCADAhacker
   [https://scadahacker.com/library/index.html#ebooks
 * IT infrastructure | TurnKey GNU/Linux
   [https://www.turnkeylinux.org/it-infrastructure
 * VMware Images [https://www.osboxes.org/vmware-images/
 * dnstwist | phishing domain scanner [https://dnstwist.it/
 * OffSec | Library [https://portal.offsec.com/library/all
 * Search About pentsting - Mind Luster
   [https://www.mindluster.com/?search_for=pentsting
 * Learn Cyber Security Full Course Learn Cyber Security In 8 Hours |
   Cyber Security Training |Simplilearn - Mind Luster
   [https://www.mindluster.com/lesson/110081
 * Free Python Course by Cisco: No Prior Experience Necessary!
   [https://skillsforall.com/fr/course/python-essentials-1?courseLang=en-US
 * English for IT 1 - Skills for All
   [https://skillsforall.com/fr/course/english-for-it1?courseLang=en-US
 * Learning Catalog: Free online courses in Cybersecurity, etc.
   [https://skillsforall.com/fr/catalog?category=course
 * Network – Ringtail Security [https://ringtail.ch/collections/network
 * midBit Technologies, LLC [https://midbittech.com/index.html
 * Browserleaks - Check your browser for privacy leaks
   [https://browserleaks.com/
 * ZimaBoard Official Shop | ZimaBoard Official Store
   [https://shop.zimaboard.com/
 * ADCS + PetitPotam NTLM Relay: Obtaining krbtgt Hash with Domain
   Controller Machine Certificate - Red Team Notes
   [https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/adcs-+-petitpotam-ntlm-relay-obtaining-krbtgt-hash-with-domain-controller-machine-certificate
 * Welcome [https://opensecuritytraining.info/Welcome.html
 * ZimaBoard Docs [https://docs.zimaboard.com/
 * batocera.linux [https://batocera.org/
 * batocera.linux [https://batocera.org/compatibility.php
 * Security & Attacks | Cloudflare Radar
   [https://radar.cloudflare.com/security-and-attacks/fr
 * Free Automated Malware Analysis Sandboxes and Services
   [https://zeltser.com/automated-malware-analysis/
 * Cheap ([[$40) Network Tap with OpenWRT - Spotlight Cybersecurity
   [https://spotlightcybersecurity.com/cheap-network-tap-with-openwrt.html
 * Tap 'n' Sniff - Cureblog
   [https://curesec.com/blog/article/blog/Tap-039n039-Sniff-185.html
 * Infosec Skills // Courses
   [https://app.infosecinstitute.com/portal/search?template=courses&sort=relevance&q=&filters%5Btype%5D%5B0%5D=Course
 * GitHub - ricardojoserf/Portswigger-Labs: All Apprentice and
   Practitioner-level Portswigger labs
   [https://github.com/ricardojoserf/Portswigger-Labs
 * XSS game [https://xss-game.appspot.com/
 * site:https://www.kitploit.com hack how to bypass MFA 2023 at
   DuckDuckGo
   [https://duckduckgo.com/?q=site%3Ahttps%3A%2F%2Fwww.kitploit.com+hack+how+to+bypass+MFA+2023&t=ffab&atb=v340-1&ia=web
 * Community Edition | Kasm Workspaces
   [https://www.kasmweb.com/community-edition
 * Community Edition | Kasm Workspaces
   [https://www.kasmweb.com/community-edition#demo
 * Information Tech. and Cyber Security [https://def24.com/
 * SOCRadar LABS - IOC Radar Results
   [https://socradar.io/labs/ioc-radar/45.119.81.249
 * Privnote - Send notes that will self-destruct after being read
   [https://privnote.com/#
 * Le socle interministériel de logiciels libres est un ensemble de
   logiciels libres préconisés par l'État français depuis 2013.
   [https://code.gouv.fr/sill/list?category=Security%20%26%20Privacy
 * KitPloit - PenTest Tools!
   [http://idiopathic24.rssing.com/chan-13017459/all_p50.html
 * GTmetrix | Website Performance Testing and Monitoring
   [https://gtmetrix.com/
 * Téléchargement WATT et WATT_GO
   [http://explorateurdelalune.free.fr/Telechargement/Telecharger_WATT.html
 * Le potager d'Olivier - YouTube
   [https://www.youtube.com/channel/UC3-gwlrYQi5Q3t00Tyr2tmQ/videos?themeRefresh=1
 * Sending RTP stream with packETH | packETH
   [https://packeth.wordpress.com/2014/09/04/sending-rtp-stream-with-packeth/
 * GitHub - BlackHoleMonster/IP-BlackHole: IP.blackhole.monster is an
   IP blacklist that uses multiple sensors to identify network attacks
   (e.g. SSH brute force) and spam incidents. All reports are evaluated
   and in case of too many incidents the responsible IP holder is
   informed to solve the problem.
   [https://github.com/BlackHoleMonster/IP-BlackHole/tree/main
 * How to Maintain Blacklist for IPTables Atomatically - Ed Chen Logic
   [https://logic.edchen.org/how-to-maintain-blacklist-for-iptables-atomatically/
 * How to Block Blacklist in IPTables - Ed Chen Logic
   [https://logic.edchen.org/how-to-block-blacklist-in-iptables/
 * How to block an IP address with ufw on Ubuntu Linux server -
   nixCraft
   [https://www.cyberciti.biz/faq/how-to-block-an-ip-address-with-ufw-on-ubuntu-linux-server/
 * Map Enterprise ASN Infrastructure
   [https://sator-sdk.github.io/posts/asn-mapping/
 * Privilege Escalation - AJ Dumanhug - infosec stuff
   [https://atom.hackstreetboys.ph/tag/privilege-escalation/
 * Red Team Capstone Challenge! - TryHackMe -- Part 1 - YouTube
   [https://www.youtube.com/watch?v=xrh3g5VjY6Y&list=PLMoaZm9nyKaOrmj6SQH2b8lP6VN7Z4OD-
 * Tevora Threat Blog | Latest Blog Posts
   [https://www.tevora.com/threat-blog/page/2/
 * curl - Tutorial [https://curl.se/docs/tutorial.html
 * How to produce test hashes for various formats [Openwall Community
   Wiki] [https://openwall.info/wiki/john/Generating-test-hashes
 * OS fingerprinting
   [https://www.cgsecurity.org/Articles/fingerprinting.html
 * JWT.one - Online JSON Web Token Encoder / Decoder [https://jwt.one/
 * JSON Web Tokens - jwt.io [https://jwt.io/
 * Pwnagotchi - Deep Reinforcement Learning instrumenting bettercap for
   WiFi pwning. :: Installation [https://pwnagotchi.ai/installation/
 * Releases · aluminum-ice/pwnagotchi
   [https://github.com/aluminum-ice/pwnagotchi/releases/
 * Kasm Workspaces | The Container Streaming Platform
   [https://www.kasmweb.com/
   KaliToolz
 * nipper-ng | Kali Linux Tools [https://www.kali.org/tools/nipper-ng/
   HTTP_server
 * Serveo: expose local servers to the internet using SSH
   [https://serveo.net/
 * ngrok - Online in One Line [https://ngrok.com/
 * Localtunnel ~ Expose yourself to the world
   [https://theboroer.github.io/localtunnel-www/
 * Openport - Easy and secure reverse SSH [https://openport.io/
 * Pagekite - The fast, reliable localhost tunneling solution
   [https://pagekite.net/
 * LocalXpose | Bye bye localhost, hello world [https://localxpose.io/
   ToolZ
 * home [https://suip.biz/
 * Welcome! [https://w-e-b.site/
 * FREE and ONLINE SQL injection Scanner with sqlmap
   [https://suip.biz/?act=sqlmap
 * Best SQL Injection (SQLi) Detection Tools 2022 | ServerWatch
   [https://www.serverwatch.com/reviews/sql-injection-detection-tools/
 * GitHub - sqlmapproject/sqlmap: Automatic SQL injection and database
   takeover tool [https://github.com/sqlmapproject/sqlmap
 * GitHub - ron190/jsql-injection: jSQL Injection is a Java application
   for automatic SQL database injection.
   [https://github.com/ron190/jsql-injection
 * Havij Download – Advanced Automated SQL Injection Tool
   [https://kalilinuxtutorials.com/havij-download-sql-injection/
 * GitHub - CiscoCXSecurity/bbqsql: SQL Injection Exploitation Tool
   [https://github.com/CiscoCXSecurity/bbqsql
 * GitHub - JohnTroony/Blisqy: Version 0.2 - Exploit Time-based
   blind-SQL injection in HTTP-Headers (MySQL/MariaDB).
   [https://github.com/JohnTroony/Blisqy
 * Standard Transforms for Maltego - Maltego
   [https://www.maltego.com/transform-hub/standard-transforms/
 * Transform [https://transform.tools/
 * Punycode converter (IDN converter), Punycode to Unicode 🔧
   [https://www.punycoder.com/
 * Anonymizer [https://2ip.io/anonim/
 * GitHub - docker/docker-bench-security: The Docker Bench for Security
   is a script that checks for dozens of common best-practices around
   deploying Docker containers in production.
   [https://github.com/docker/docker-bench-security
 * GitHub - JonGood/vulhub-lab: Automate building a home lab with
   vulnerable docker containers. [https://github.com/JonGood/vulhub-lab
 * GitHub - We5ter/Scanners-Box: A powerful and open-source toolkit for
   hackers and security automation - 安全行业从业者自研开源扫描器合辑
   [https://github.com/We5ter/Scanners-Box
 * Les meilleurs systèmes d'exploitation anonymisants
   [https://desgeeksetdeslettres.com/meilleurs-systemes-exploitation-anonymisants/
 * OWASP SamuraiWTF [https://www.samurai-wtf.org/
 * Wohin soll die Reise gehen? - Gnoppix 22.12 - #SonntagsOS - 71 -
   YouTube [https://www.youtube.com/watch?v=mYbhe4QqjTI
 * Medicat USB [https://medicatusb.com/
 * Nipper - Firewall & Network Configuration Audit Tool | Titania -
   Titania [https://www.titania.com/products/nipper/
 * Cockpit Project — Cockpit Project [https://cockpit-project.org/
 * Cisco Packet Tracer - Networking Simulation Tool
   [https://www.netacad.com/fr/courses/packet-tracer
 * 0481640086 – numéro inconnu, téléphone
   [https://www.numeroinconnu.fr/numero/0481640086
 * Google hacking Dork|谷歌黑客之寻找包含密码的文件 - 🔰雨苁ℒ🔰
   [https://www.ddosi.org/google-hacking-1/
 * open.dns0.eu [https://www.dns0.eu/fr/open
 * How to Use The Netcat (nc) Command: An In-Depth Tutorial - NoobLinux
   [https://nooblinux.com/how-to-use-netcat/
 * Générer un nom aléatoire - Aléatoire, Français, France - Fake Name
   Generator [https://fr.fakenamegenerator.com/gen-random-fr-fr.php
 * Malcat - hexadecimal editor and disassembler for malware analysis
   [https://malcat.fr/?s=09
 * How to Find SQL Injection Attack Vulnerabilities?
   [https://geekflare.com/find-sql-injection/
 * How to Find Vulnerable Webcams Across the Globe Using Shodan « Null
   Byte :: WonderHowTo
   [https://null-byte.wonderhowto.com/how-to/find-vulnerable-webcams-across-globe-using-shodan-0154830/
 * The Zeek Network Security Monitor [https://zeek.org/
 * Ethical Hacking - start.me
   [https://start.me/p/1kgAyY/ethical-hacking?locale=fr
 * OSINT-GLOBAL (Non-US) - start.me
   [https://start.me/p/jj2XEr/osint-global-non-us
 * WiGLE: Wireless Network Mapping
   [https://wigle.net/map?maplat=45.43809832390882&maplon=4.448097508334977&mapzoom=17&coloring=density
 * What do you need to protect? [https://securityinabox.org/en/
 * Privacy Tools Guide: Website for Encrypted Software & Apps
   [https://www.privacytools.io/
 * Page d'acceuil d'Autodéfense contre la surveillance
   [https://ssd.eff.org/fr/
 * TheHackerStuff - Learn Vulnerability Assessment & Penetration
   Testing [https://thehackerstuff.com/
 * Origines et évolutions de NMAP | Blog Pr0ph3cy
   [https://www.pr0ph3cy.com/blog/nmap-origines-et-evolutions
 * Get Started: DCIM, Network Documentation, OSP | DCIM, Network
   Documentation, OSP Software [https://graphicalnetworks.com/demo-form/
 * Home - Cybi - Solutions innovantes de Cybersécurité basées sur de
   l'intelligence artificielle et de l'apprentissage automatique
   [https://www.cybi.fr/
 * How to Detect CVEs Using Nmap Vulnerability Scan Scripts
   [https://securitytrails.com/blog/nmap-vulnerability-scan
 * The Ultimate Manual For Nmap Vulnerability Scanning
   [https://nira.com/nmap-vulnerability-scanning/
 * vulns NSE Library — Nmap Scripting Engine documentation
   [https://nmap.org/nsedoc/lib/vulns.html
 * Détecter facilement les CVE avec des scripts Nmap – Oksecu.fr
   [https://oksecu.home.blog/2019/07/11/detecter-facilement-les-cve-avec-les-scripts-nmap/
 * GitHub - vulnersCom/nmap-vulners: NSE script based on Vulners.com
   API [https://github.com/vulnersCom/nmap-vulners
 * Apache Guacamole™: 1.5.0 [https://guacamole.apache.org/releases/1.5.0/
 * 12 outils pour tester la délivrabilité de vos emails
   [https://blog.busybiz.com/11-outils-pour-tester-la-d%C3%A9livrabilit%C3%A9-de-vos-emails
 * OpenTunnel - Free WireGuard VPN Servers
   [https://opentunnel.net/wireguard/
 * Fake Information Generator - Fakeinfo.net [https://fakeinfo.net/
 * Tabby - a terminal for a more modern age [https://tabby.sh/
 * Beginners Guide to TShark (Part 1) - Hacking Articles
   [https://www.hackingarticles.in/beginners-guide-to-tshark-part-1/
 * Title Case - Text To Password Convertor
   [https://www.titlecase.com/password-generator
 * Password Strength Checker [http://www.passwordmeter.com/
 * Logiciel SaaS pour site internet et réseau
   [https://www.crawl-tools.com/fr/
 * Nmap for Pentester: Output Format Scan - Hacking Articles
   [https://www.hackingarticles.in/nmap-for-pentester-output-format-scan/
 * Latest Hacking News | Cyber Security News, Hacking Tools and
   Penetration Testing Courses - LHN offers the latest hacking news,
   penetration testing tools and cyber security courses for ethical
   hackers, penetration testers, IT security experts and essentially
   anyone interested in the cyber security world
   [https://latesthackingnews.com/
 * SRI Hash Generator [https://www.srihash.org/
 * USBKill | USB Kill devices for pentesting & law-enforcement
   [https://usbkill.com/
 * Comment échanger une clé SSH pour une authentification sans mot de
   passe entre des serveurs Linux?
   [https://geekflare.com/fr/linux-ssh-key-exchange/
 * Proxmox Archives - Virtualization Howto
   [https://www.virtualizationhowto.com/category/proxmox/
 * Killercoda Interactive Environments [https://killercoda.com/
 * Cloudron - Complete solution for self-hosting web apps
   [https://www.cloudron.io/
 * Cloudron - App Store [https://www.cloudron.io/store/index.html
 * Public pentest reports | Pentest reports
   [https://pentestreports.com/reports/
 * Réaliser un TAP réseau Ethernet passif
   [https://tutoduino.fr/tutoriels/tap-reseau-ethernet-passif/
 * Raspberry Pi Network TAP Appliance – Dualcomm
   [https://www.dualcomm.com/products/raspberry-pi-network-appliance
 * Building a Raspberry Pi Network Tap/Bridge | hyprblog
   [https://blog.coffinsec.com/howto/2017/03/30/Building-RaspberryPi-Network-Tap.html
 * Flask Session Cookie Decoder
   [https://www.kirsle.net/wizards/flask-session.cgi
 * sqlmap-Cheat-Sheet.webp (Image WEBP, 1581 × 1261 pixels)
   [https://cdn.comparitech.com/wp-content/uploads/2021/07/sqlmap-Cheat-Sheet.webp
 * Sqlmap Cheat Sheet: Commands, Options, and Advanced Features
   [https://www.stationx.net/sqlmap-cheat-sheet/
   Hardenning
 * Guide to the Secure Configuration of Red Hat Enterprise Linux 7 |
   OpenSCAP Security Guide
   [https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html
 * Complete 8500 Control List [https://www.stigviewer.com/controls/800-53
 * GitHub - trimstray/the-practical-linux-hardening-guide: This guide
   details creating a secure Linux production system. OpenSCAP
   (C2S/CIS, STIG).
   [https://github.com/trimstray/the-practical-linux-hardening-guide
 * About Project | The Practical Linux Hardening Guide
   [https://trimstray.github.io/the-practical-linux-hardening-guide/
 * Complete STIG List [https://www.stigviewer.com/stigs
 * Linux hardening steps for starters - Linux Audit
   [https://linux-audit.com/linux-server-hardening-most-important-steps-to-secure-systems/
 * Automatic Security Updates with DNF - Linux Audit
   [https://linux-audit.com/automatic-security-updates-with-dnf/
 * Static OpenSCAP [https://static.open-scap.org/
 * GitHub - ComplianceAsCode/content: Security automation content in
   SCAP, Bash, Ansible, and other formats
   [https://github.com/ComplianceAsCode/content
 * SCAP Workbench | OpenSCAP portal
   [https://www.open-scap.org/tools/scap-workbench/
 * OpenSCAP User Manual
   [https://static.open-scap.org/openscap-1.3/oscap_user_manual.html
 * Center for Internet Security (CIS) compliance in Red Hat Enterprise
   Linux using OpenSCAP
   [https://www.redhat.com/en/blog/center-internet-security-cis-compliance-red-hat-enterprise-linux-using-openscap
 * NCP - National Checklist Program Checklist Repository
   [https://ncp.nist.gov/repository?typeId=1&sortBy=modifiedDate%7Cdesc
 * CIS-CAT Lite [https://learn.cisecurity.org/cis-cat-lite
   En_Cours
 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp -
   Information Gathering | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b5a
 * Cisco Skills For All Ethical Hacking
   [https://skillsforall.com/fr/launch?id=80c156bc-84a4-47c9-a233-5eafe7bdde82&tab=curriculum&view=4b9a9e78-8312-5c08-b4fb-831ec7d5f43a
 * Cisco Skills For All English 1
   [https://skillsforall.com/fr/launch?id=1c91fa6b-3459-45ab-ab8d-e2ed5213e35a&tab=curriculum&view=20b578a1-0aae-57f4-8949-bfc4786ccf6f
   Utilitaire-Documentation
 * Wiki Evolix - Howto HAProxy [https://wiki.evolix.org/HowtoHaproxy
 * start LinuxPedia [http://www.linuxpedia.fr/doku.php/start
 * HAProxy version 1.5.19 - Configuration Manual
   [http://cbonte.github.io/haproxy-dconv/1.5/configuration.html
 * ShellHacks - Linux Hacks and Guides [https://www.shellhacks.com/
 * umask Calculator - WintelGuy.com [https://wintelguy.com/umask-calc.pl
 * ByteByteGo Newsletter | Alex Xu | Substack
   [https://blog.bytebytego.com/
 * Vidéo catégorie - Ressources - TheGreenBow
   [https://www.thegreenbow.com/fr/ressources/webtv/
 * Index of /9/items/armchaircommando/
   [https://ia800802.us.archive.org/9/items/armchaircommando/
 * Netflix Codes : trouvez les catégories cachées sur Netflix (liste
   complète) [https://www.netflix-codes.com/fr
 * Learn anything [https://www.tutorai.me/
   Log4j_Log4Shell
 * Zero-Day Exploit Targeting Popular Java Library Log4j
   [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/
 * CVE - CVE-2021-44228
   [https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228
 * Exploiting log4j (CVE-2021-44228) RCE - YouTube
   [https://www.youtube.com/watch?v=OJRqyCHheRE
 * GitHub - curated-intel/Log4Shell-IOCs
   [https://github.com/curated-intel/Log4Shell-IOCs
 * GitHub - SentineLabs/log4j_response
   [https://github.com/SentineLabs/log4j_response
 * Zero-Day Exploit Targeting Popular Java Library Log4j
   [https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/
   Code
 * Le tutoriel Python — Documentation Python 3.12.0
   [https://docs.python.org/fr/3/tutorial/
 * Tutoriel gratuit de Python : Programmer en Python en 1h30 avec
   Anaconda (GRATUIT - 2023) | Udemy
   [https://www.udemy.com/course/programmer-python/
 * Learn Python Online - A Guide | Codementor
   [https://www.codementor.io/learn-python-online
 * http://inventwithpython.com/ [http://inventwithpython.com/
 * Learn X in Y Minutes: Scenic Programming Language Tours
   [https://learnxinyminutes.com/
 * Django - Full Stack Python [https://www.fullstackpython.com/django.html
 * Lecture Slides and Code | Introduction to Computer Science and
   Programming in Python | Electrical Engineering and Computer Science
   | MIT OpenCourseWare
   [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-slides-code/
 * Introduction to Computer Science and Programming in Python |
   Electrical Engineering and Computer Science | MIT OpenCourseWare
   [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/
 * Find Courses by Topic | MIT OpenCourseWare | Free Online Course
   Materials
   [https://ocw.mit.edu/courses/find-by-topic/#cat=engineering&subcat=computerscience&spec=programminglanguages
 * Lecture Videos | Introduction to Computer Science and Programming in
   Python | Electrical Engineering and Computer Science | MIT
   OpenCourseWare
   [https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-0001-introduction-to-computer-science-and-programming-in-python-fall-2016/lecture-videos/index.htm
 * Le Guide Ultime pour Apprendre Python | Comment Coder
   [https://www.commentcoder.com/apprendre-python/
 * Apprenez à coder pour atteindre vos objectifs | Comment Coder
   [https://www.commentcoder.com/
 * Akadias Publications
   [https://www.akadia.com/html/publications.html#Unix-Linux-Apache%20Publications
 * Learn to Code — For Free — Coding Courses for Busy People
   [https://www.freecodecamp.org/
 * Think Python [https://greenteapress.com/thinkpython/html/index.html
 * Online Python Interpreter - online editor
   [https://www.onlinegdb.com/online_python_interpreter
 * Python Online Compiler & Interpreter - Replit
   [https://replit.com/languages/python3
 * Welcome to Python.org [https://www.python.org/shell/
 * Fonctions natives — Documentation Python 3.10.6
   [https://docs.python.org/fr/3/library/functions.html
 * List of Keywords in Python Programming
   [https://www.programiz.com/python-programming/keyword-list
 * Introduction à Python - Pierre Giraud
   [https://www.pierre-giraud.com/python-apprendre-programmer-cours/introduction/
 * Python Essentials 1 [https://pythoninstitute.org/python-essentials-1
 * OpenEDG – Improving your learning experience [https://openedg.org/
 * Learn Python Programming [https://www.programiz.com/python-programming
 * zeitkraut – Exploring HTTP Headers with [codenetcat[/code
   [https://www.zeitkraut.com/posts/2013-11-05-exploring-http-headers.html
 * Code. Simply. Clearly. Calmly. [https://calmcode.io/
 * Code With Mu [https://codewith.mu/en/
 * La meilleure façon d'apprendre Python 2023 (tutoriels Python
   gratuits et payants)
   [https://kinsta.com/fr/blog/facon-d-apprendre-python/
 * Best Place to Learn Python: Recommended Websites to learn
   Programming
   [https://www.bitdegree.org/tutorials/best-place-to-learn-python/
 * 7 Best Coding Apps to Learn Python on the Go
   [https://geekflare.com/coding-apps-to-learn-python/
 * Générer de vraies applications avec Python - Training | Microsoft
   Learn
   [https://learn.microsoft.com/fr-fr/training/paths/python-language/
 * Node-RED [https://nodered.org/
 * Programmer en Python en 1h30 avec Anaconda (GRATUIT - 2023) | Udemy
   [https://www.udemy.com/course/programmer-python/learn/lecture/24560522?start=225#overview
 * Free Online Course: An Introduction to Interactive Programming in
   Python (Part 1) from Coursera | Class Central
   [https://www.classcentral.com/course/interactivepython1-408
 * Cours intensif sur Python | Coursera
   [https://www.coursera.org/learn/python-crash-course?irclickid=UTj36z2DVxyPT1IyXUS9p1tJUkFz7IRhnQ9SWw0&irgwc=1#reviews
 * Comment installer la distribution Anaconda pour Python sur Ubuntu
   20.04 | DigitalOcean
   [https://www.digitalocean.com/community/tutorials/how-to-install-the-anaconda-python-distribution-on-ubuntu-20-04-fr
 * Ethical Hacking Tutorials - Python Code
   [https://www.thepythoncode.com/topic/ethical-hacking
 * 12 ressources pour apprendre Python pour les débutants
   [https://geekflare.com/fr/python-learning-resources/
 * py.CheckiO - Python coding challenges and exercises with solutions
   for beginners and advanced [https://py.checkio.org/
 * Screeps - MMO strategy sandbox game for programmers
   [https://screeps.com/
 * Coding Games and Programming Challenges to Code Better
   [https://www.codingame.com/start/fr/
 * GitFluence - Find the Git Command You Need Now!
   [https://gitfluence.com/?s=09
 * Future Engineer | Register
   [https://app.futureengineer.fr/register?mtm_campaign=AFE%20website
 * Toxicode - Laboratoire du web communautaire
   [https://www.toxicode.fr/learn
 * HedgeDoc - Ideas grow better together [https://demo.hedgedoc.org/
 * https://www.loupausa.fr/ [https://www.loupausa.fr/
 * 17 jeux de programmation pour apprendre à coder
   [https://www.blogduwebdesign.com/blog/developpement/apprendre-la-programmation-en-jouant.html
 * CheckiO - coding games and programming challenges for beginner and
   advanced [https://checkio.org/
 * Codewars - Achieve mastery through coding practice and developer
   mentorship [https://www.codewars.com/
 * The SQL Murder Mystery [https://mystery.knightlab.com/
 * Apprenez aujourd'hui, construisez un avenir meilleur. | Code.org
   [https://code.org/
 * Introduction à Python - Training | Microsoft Learn
   [https://learn.microsoft.com/fr-fr/training/modules/intro-to-python/
 * Learn Python - Free Interactive Python Tutorial
   [https://www.learnpython.org/fr/
 * Python pour jeunes débutants de 7 à 97 ans
   [http://pythonpourenfants.free.fr/
 * Golden Quest [https://app.codingpark.io/goldenquest
 * Python | Files | Codecademy
   [https://www.codecademy.com/resources/docs/python/files
 * Apprendre Python efficacement : apprendre Python en 8 étapes
   [https://fr.bitdegree.org/tutos/apprendre-python/
 * La référence du langage Python — Documentation Python 3.8.17
   [https://docs.python.org/fr/3.8/reference/index.html
 * 3.12.1 Documentation [https://docs.python.org/fr/3/index.html
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DnLRL_NcnK-4
 * Learn Intro to Programming | Kaggle
   [https://www.kaggle.com/learn/intro-to-programming
 * Python Learning Paths – Real Python
   [https://realpython.com/learning-paths/
 * Learn Python – Free Python Courses for Beginners
   [https://www.freecodecamp.org/news/learn-python-free-python-courses-for-beginners/
 * Python Basics with Sam - YouTube
   [https://www.youtube.com/playlist?list=PLWKjhJtqVAbkmRvnFmOd4KhDdlK1oIq23
 * Python-Object-Oriented Programming | Free Online Course | Alison
   [https://alison.com/fr/sujet/apprendre/100102/programmation-orientee-objet#course-plan
 * Learn anything [https://www.tutorai.me/?ref=taaft
 * https://coding-guru-liart.vercel.app/?ref=taaft
   [https://coding-guru-liart.vercel.app/?ref=taaft
 * 1. Introduction - Cours de Python
   [https://python.sdv.univ-paris-diderot.fr/01_introduction/
 * Laravel [https://php-the-readability-way.fr/?s=09
 * Git [https://git-scm.com/
 * Rapid API Learn [https://rapidapi.com/learn
 * Node-RED [https://nodered.org/
   CERTIFICATION
 * https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2PjDI
   [https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2PjDI
 * https://docs.microsoft.com/fr-fr/learn/
   [https://docs.microsoft.com/fr-fr/learn/
 * https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500?wt.mc_id=learningredirect_certs-web-wwl [https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500?wt.mc_id=learningredirect_certs-web-wwl
 * https://www.examtopics.com/exams/microsoft/ms-500/view/
   [https://www.examtopics.com/exams/microsoft/ms-500/view/
 * https://www.examtopics.com/exams/microsoft/az-500/
   [https://www.examtopics.com/exams/microsoft/az-500/
 * https://www.youtube.com/watch?v=YKlGL66EpRg
   [https://www.youtube.com/watch?v=YKlGL66EpRg
 * https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500
   [https://docs.microsoft.com/fr-fr/learn/certifications/exams/ms-500
 * https://www.youtube.com/watch?v=XidoIFSXPa8&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD [https://www.youtube.com/watch?v=XidoIFSXPa8&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD
 * https://www.youtube.com/watch?v=cG00gMyvwfo
   [https://www.youtube.com/watch?v=cG00gMyvwfo
 * https://www.youtube.com/watch?v=aFORgNDZRu0&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD&index=2 [https://www.youtube.com/watch?v=aFORgNDZRu0&list=PLhLKc18P9YOAEO9F15YFe7WCIrW1VzJjD&index=2
 * Examen AZ-500 : technologies de sécurité Microsoft Azure - Learn |
   Microsoft Docs
   [https://docs.microsoft.com/fr-fr/learn/certifications/exams/az-500
   OSCP-like
 * Passing OSCP - scund00r
   [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
 * Hacking Web Applications: — GracefulSecurity
   [https://www.gracefulsecurity.com/hacking-web-applications/
 * Offensive Security’s PWK & OSCP Review - Jack Hacks
   [https://jhalon.github.io/OSCP-Review/
 * Pinky's Blog [https://pinkysplanet.net/
 * Prep Guide for Offsec's PWK/OSCP - Cybrary
   [https://www.cybrary.it/0p3n/prep-guide-offsecs-pwkoscp/
 * Resource for people preparing for Offensive security Certified
   Penetration Tester [https://www.reddit.com/r/oscp/
 * Path2OSCP [https://localhost.exposed/path-to-oscp/
 * x89k [https://x89k.cf/infosec/2018/11/03/oscpsurvivalguide.html
 * GitHub - RustyShackleford221/OSCP-Prep: A comprehensive
   guide/material for anyone looking to get into infosec or take the
   OSCP exam [https://github.com/RustyShackleford221/OSCP-Prep
 * OlivierLaflamme/Cheatsheet-God: Penetration Testing / OSCP Biggest
   Reference Bank / Cheatsheet
   [https://github.com/OlivierLaflamme/Cheatsheet-God
 * Hacking/OSCP cheatsheet :: Ceso Adventures
   [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
 * OSCP- One Page Repository - OSCP
   [https://oscp.infosecsanyam.in/one-page-methodology
   streaming
 * pentesting | Toogles [http://toogl.es/#/search/pentesting
 * Grab online videos for free from YouTube, Dailymotion, Vimeo etc.
   [https://www.videograbber.net/
 * Enstream — Film Streaming HD Gratuit [https://www.enstream.co/
 * http://streamcomplet.com/page/2/ [http://streamcomplet.com/page/2/
 * http://filmstreaming.cc/ [http://filmstreaming.cc/
 * http://www.filmstreamings.biz/ [http://www.filmstreamings.biz/
 * http://www.voirfilms.org/the-revenant-2015.htm
   [http://www.voirfilms.org/the-revenant-2015.htm
 * http://film-en-stream.net/ [http://film-en-stream.net/
 * SERIE STREAMING [http://streamingserie.tv/
   HACK
 * PentesterLab Our exercises [https://pentesterlab.com/exercises/
 * The Ultimate Installation Guide for Kali Linux | . .
   TheSecurityBlogger . . .
   [http://www.thesecurityblogger.com/the-ultimate-installation-guide-for-kali-linux/
 * YGN Ethical Hacker Group (YEHG) :: The Web Security Division
   [http://www.yehg.net/lab/#training.attacking
 * Free Penetration Testing and Ethical Hacking Training Course -
   Cybrary [https://www.cybrary.it/course/ethical-hacking/
 * OWASP WebGoat Web Hacking Simulation Series © YGN Ethical Hacker
   Group (YEHG), Yangon, Myanmar - http://yehg.net
   [http://webappsecmovies.sourceforge.net/webgoat/
 * security - Hacking training simulator - Stack Overflow
   [http://stackoverflow.com/questions/5588067/hacking-training-simulator
 * g0tmi1k - Have you... g0tmi1k [https://blog.g0tmi1k.com/
 * Backdooring program with Shellter & Bypass A.V - YouTube
   [https://www.youtube.com/watch?v=fMNsf1Fwdp4
 * Basic ShellCode Injection | Shellter VI 6.0
   [https://www.shellterproject.com/basic-shellcode-injection/
 * How To Crack Cobalt Strike And Increase The Trial - YouTube
   [https://www.youtube.com/watch?v=LCCjZYsZyPM
 * Category:Web exploitation - NetSec [https://nets.ec/Web_Exploitation
 * Flow [http://opensecuritytraining.info/Flow.html
 * Dr. Chaos [http://www.drchaos.com/
 * GitHub - enaqx/awesome-pentest: A collection of awesome penetration
   testing resources, tools and other shiny things
   [https://github.com/enaqx/awesome-pentest
 * shell-storm | Shellcodes Database [http://shell-storm.org/shellcode/
 * Exploit Pack #6 - Reverse shell - YouTube
   [https://www.youtube.com/watch?v=QcfFMWLE8vA
 * SPARTA | Network Infrastructure Penetration Testing Tool
   [http://sparta.secforce.com/#Download
 * How To Configure Syringe Script - YouTube
   [https://www.youtube.com/watch?v=8UHLTrFzx7k&list=PL8AF2hTqPD0saJm8VXoCrcQBPufqRA4Mz
 * Encripto AS - YouTube
   [https://www.youtube.com/channel/UCQ4p-2PukXtJXYSxQ29o8RA
 * LabxNow | Research & Development Environment!
   [https://www.labxnow.org/labxweb/
 * Hack Like a Pro: How to Find Exploits Using the Exploit Database in
   Kali « Null Byte
   [http://null-byte.wonderhowto.com/how-to/hack-like-pro-find-exploits-using-exploit-database-kali-0156399/
 * How to Easily Find an Exploit in Exploit DB and Get It Compiled All
   from Your Terminal. « Null Byte
   [http://null-byte.wonderhowto.com/how-to/easily-find-exploit-exploit-db-and-get-compiled-all-from-your-terminal-0163760/
 * jetlib.sec [http://sec.jetlib.com/Exploit-DB/2016/05/
 * Irongeek.com [http://www.irongeek.com/
 * Présentation et installation de Maltrail - System-Linux
   [http://www.system-linux.eu/index.php?post/2016/03/08/Maltrail
 * http://www.rssing.com/index.php [http://www.rssing.com/index.php
 * Демонстрация незащищенности корпоративной сети - YouTube
   [https://www.youtube.com/watch?v=QAqJ0ubUO0Y
 * Pentestit - YouTube
   [https://www.youtube.com/channel/UC9ToC-EU5TzX-B_LjS06oSQ
 * Posts Related to Web-Pentest [https://securityidiots.com/Web-Pentest
 * OpenNIC Public Servers [https://servers.opennicproject.org/
 * Tor Buddy Script Demo Tor + Proxychains + Anonymous DNS - YouTube
   [https://www.youtube.com/watch?v=AedFlLSmJf8
 * How to Auto Install All Kali Linux Tools Using "Katoolin" on
   Debian/Ubuntu
   [http://www.tecmint.com/install-kali-linux-tools-using-katoolin-on-ubuntu-debian/
 * KitPloit - PenTest Tools!
   [http://idiopathic24.rssing.com/chan-13017459/all_p50.html
 * Pentester Academy - Web Application Pentesting - Learning for Life
   [http://learningdl.com/pentester-academy-web-application-pentesting/
 * ZANYAR MATRIX - YouTube
   [https://www.youtube.com/channel/UCayM6dPtLLG1_OmgvKOQBUw
 * Sameh Attia: How to run commands on Linux Container (LXD) instance
   at provision launch time
   [http://sattia.blogspot.md/2017/03/how-to-run-commands-on-linux-container.html
 * How To Perform External Black-box Penetration Testing in
   Organization
   [https://gbhackers.com/external-black-box-penetration-testing/
 * GitHub - SifoHamlaoui/Pentest-Bookmarkz: Some useful links for
   Pentesters [https://github.com/SifoHamlaoui/Pentest-Bookmarkz
 * http://www.amanhardikar.com/mindmaps/Practice.html
   [http://www.amanhardikar.com/mindmaps/Practice.html
 * 40 Best Penetration Testing (Pen Testing) Tools in 2018
   [https://www.guru99.com/top-5-penetration-testing-tools.html
 * How to hack a Wordpress Website - Ceos3c
   [https://www.ceos3c.com/hacking/how-to-hack-a-wordpress-website/
 * Cheat Sheets [https://highon.coffee/blog/cheat-sheet/
 * SQLi To Shell - SQLMAP | RWB Network Security
   [http://www.rwbnetsec.com/sqli-to-shell-sqlmap/
 * HackTheBox | Toogles [http://toogl.es/#/search/HackTheBox
 * YGN Ethical Hacker Group (YEHG) :: The Web Security Division
   [http://yehg.net/lab/#home
 * Hack Like the Bad Guys – Using Tor for Firewall Evasion and
   Anonymous Remote Access
   [https://foxglovesecurity.com/2015/11/02/hack-like-the-bad-guys-using-tor-for-firewall-evasion-and-anonymous-remote-access/
 * Web Application Penetration Testing Cheat Sheet | JDow.io
   [https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/
 * TorStatus - Tor Network Status [http://torstatus.blutmagie.de/
   CHESS
 * Teacher Chess Club Resources for High School |
   [https://www.viewpure.com/pages/teacher-resources-high-school-chess-club/
   Proxy
 * 1 minute ago checked proxy servers - Free proxy list service since
   2004 year! Almost 10 years of proxy service
   [http://proxy-list.org/english/index.php
 * Free Proxy Lists - HTTP Proxy Servers (IP Address, Port)
   [http://freeproxylists.net/
 * 4everproxy: Free Secure Web Proxy | Anonymous Proxy
   [https://www.4everproxy.com/
 * Free Proxy List - Page 1 of 7
   [http://www.proxy4free.com/list/webproxy1.html
   MITTRE
 * ATT&CK® Evaluations
   [https://attackevals.mitre-engenuity.org/methodology-overview/
 * ATT&CK® Evaluations
   [https://attackevals.mitre-engenuity.org/trials-deceptions/participants/sentinelone-deceptions?view=overview
 * ATT&CK® Evaluations
   [https://attackevals.mitre-engenuity.org/using-attack-evaluations/
 * ATT&CK Training and Certification - MITRE ATT&CK Defender (MAD)
   [https://mitre-engenuity.org/cybersecurity/mad/
 * Training & Certification Curriculum - MITRE ATT&CK Defender (MAD)
   [https://mitre-engenuity.org/cybersecurity/mad/mad-curriculum/
 * Dissecting a Detection: An Analysis of ATT&CK Evaluations Data
   (Sources) Part 1 of 2 | by Jamie Williams | MITRE ATT&CK® | Medium
   [https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c
 * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/enterprise
 * ATT&CK® Evaluations [https://attackevals.mitre-engenuity.org/about/
 * Adversary Emulation Library - MITRE Engenuity
   [https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/
   WIFI
 * WiGLE: Wireless Network Mapping
   [https://wigle.net/map?maplat=37.76559999999937&maplon=-122.42459999999792&mapzoom=13&coloring=density
 * Torrent Search Engine | 1337x.to [https://www.1337x.to/
 * c - MegaSearch.co [http://megasearch.co/?q=fr&h=0&c=0&s=1&a=&m1=&m2=
 * Hulbee [https://hulbee.com/?query=&uiLanguage=browser&region=en-US
 * Search Results | IT-eBooks.directory
   [http://it-ebooks.directory/search.html?query=forensics&in=title&page=1
   SANS
 * GIAC - Home [https://exams.giac.org/Home
 * SANS Login
   [https://idp.sans.org/simplesaml/module.php/core/loginuserpass.php?AuthState=_4f7edb2566c68790d8ace051c87ffc836770afb86d%3Ahttps%3A%2F%2Fidp.sans.org%2Fsimplesaml%2Fsaml2%2Fidp%2FSSOService.php%3Fspentityid%3Dhttps%253A%252F%252Fwww.sans.org%252Fsimplesaml%252Fmodule.php%252Fsaml%252Fsp%252Fmetadata.php%252Fsans-live-sp%26RelayState%3Dhttps%253A%252F%252Fwww.sans.org%252Faccount%252Floginsso%26cookieTime%3D1669030581
 * Workbook - AUD507 Lab Wiki [https://lab-g.aud507.com/
 * AUD507 Lab Wiki [https://lab-g.aud507.com/
 * aud507.pdf
   [https://raw.githubusercontent.com/dhondta/tex-course-index-template/master/examples/sans/aud507.pdf
 * AUD507: SANS OnDemand [https://ondemand-player.sans.org/12075#init
 * AUD507 Public Wiki [https://www.aud507.com/
 * Cheat Sheets - AUD507 Public Wiki [https://www.aud507.com/cs/
 * Web References - AUD507 Public Wiki [https://www.aud507.com/ref/
 * Cyber Range Training | SANS Institute
   [https://www.sans.org/cyber-ranges/
 * Cyber Security Skills Roadmap | SANS Institute: Cyber Security
   Skills Roadmap
   [https://www.sans.org/cyber-security-skills-roadmap/?msc=main-nav%3Futm_medium%3DDisplay&utm_source=Global%20Security%20Magazine&utm_content=EMEA%20roadmap%20FR%202021&utm_campaign=Skills%20Roadmap
 * Auditing & Monitoring Networks and Systems | SANS AUD507
   [https://www.sans.org/cyber-security-courses/auditing-networks-perimeters-systems/
 * FFIEC IT Examination Handbook InfoBase - IT Booklets
   [https://ithandbook.ffiec.gov/it-booklets.aspx
 * AUD507 Auditing & Monitoring Networks, Perimeters & Systems Cartes |
   Quizlet
   [https://quizlet.com/417638132/aud507-auditing-monitoring-networks-perimeters-systems-flash-cards/
 * How To Pass SANS GIAC Certification Exams - ericooi.com
   [https://www.ericooi.com/how-to-pass-sans-giac-certification-exams/
 * Better GIAC Testing with Pancakes – tisiphone.net
   [https://tisiphone.net/2015/08/18/giac-testing/
 * Auditing & Monitoring Networks and Systems | SANS AUD507
   [https://www.sans.org/cyber-security-courses/auditing-networks-perimeters-systems/
 * SANS Institute
   [https://www.sans.org/account/course-materials/access/s/1267130
 * Back to Basics: Understanding PowerShell Objects
   [https://adamtheautomator.com/powershell-objects/
 * Apprendre Powershell en 2 heures ! (L'essentiel en 2022) - YouTube
   [https://www.youtube.com/watch?v=cNc8fqIjyVA
 * / ViewPure apprendre PowerShell en deux heures
   [https://www.viewpure.com/cNc8fqIjyVA?start=0&end=0
 * PowerShell Tools I Use for Audit and Compliance Measurement | Clay
   Risenhoover | SANS Institute
   [https://www.sans.org/blog/powershell-tools-i-use-audit-and-compliance-measurement/
 * / ViewPure [https://www.viewpure.com/fiULc5XjuDc?start=0&end=0
 * PowerShell for Audit, Compliance, and Security Automation &
   Visualization: Part 1 - YouTube
   [https://www.youtube.com/watch?v=fiULc5XjuDc
 * PowerShell: Part 2: Audit and Compliance Data Acquisition with
   PowerShell - YouTube [https://www.youtube.com/watch?v=RoSl1_6fAc8
 * VisualizationDemo
   [https://video.sec557.com/Bonus-Visualizations/Bonus-Visualizations.html
 * PowerShell: Part 3: Beyond CSVs - Visualization using PowerShell,
   Excel, and Grafana - YouTube
   [https://www.youtube.com/watch?v=wR7J2XS7f80
 * PowerShell 2022: State of the Art / Hack / Infection - YouTube
   [https://www.youtube.com/watch?v=hDbqXWGifls
 * Cloud Security Alliance - Chapitre Français •◄▷•
   [https://cloudsecurityalliance.fr/
 * Docker CIS Benchmark: Best Practices in Brief | Aqua
   [https://www.aquasec.com/cloud-native-academy/docker-container/docker-cis-benchmark/
 * What is a Docker Container? - Aqua Security
   [https://www.aquasec.com/cloud-native-academy/docker-container/
 * CIS Downloads [https://downloads.cisecurity.org/#/
 * The Illustrated Children's Guide to Kubernetes - YouTube
   [https://www.youtube.com/watch?v=4ht22ReBjno
 * Illustrated-Childrens-Guide-to-Kubernetes.pdf
   [https://shortcdn.com/chrisshort/pdf/Illustrated-Childrens-Guide-to-Kubernetes.pdf
 * GitHub - docker/docker-bench-security: The Docker Bench for Security
   is a script that checks for dozens of common best-practices around
   deploying Docker containers in production.
   [https://github.com/docker/docker-bench-security
 * Qu'est-ce que le tag DMARC pct (pourcentage) dans un enregistrement
   DMARC ? [https://powerdmarc.com/fr/what-is-the-dmarc-pct-tag/
 * Documentation/Réseaux/Application : Faiblesse des serveurs DNS par
   transfert de zone. [Root Me : plateforme d'apprentissage dédiée au
   Hacking et à la Sécurité de l'Information]
   [https://www.root-me.org/fr/Documentation/Reseaux/Application/Faiblesse-des-serveurs-DNS-par-transfert-de-zone
 * Cours complet sur les zones DNS - COURSNET
   [http://www.coursnet.com/2014/12/cours-complet-sur-les-zones-dns.html
 * SMTP Enumeration Technique. Hi Medium! Here we are again with a new…
   | by M'hirsi Hamza | Medium
   [https://hamzamhirsi.medium.com/smtp-enumeration-technique-20c7aab1887a
 * SMTP User Enumeration – Penetration Testing Lab
   [https://pentestlab.blog/2012/11/20/smtp-user-enumeration/
   Juridique_NTIC_SI
 * L'affaire « Bluetouff » : condamné pour vol de données librement
   accessibles - Le petit juriste
   [https://www.lepetitjuriste.fr/laffaire-bluetouff-condamne-pour-vol-de-donnees-librement-accessibles/
 * Droit des NTIC Archives - Page 2 sur 2 - Le petit juriste
   [https://www.lepetitjuriste.fr/category/droit-des-ntic/page/2/
 * Offres d'emploi (CDI, CDD), apprentissages et stages | Welcome to
   the Jungle
   [https://www.welcometothejungle.com/fr/jobs?refinementList%5Boffices.country_code%5D%5B%5D=FR&refinementList%5Boffices.state%5D%5B%5D=Auvergne-Rhone-Alpes&aroundQuery=Auvergne-Rh%C3%B4ne-Alpes%2C%20France&page=1&query=architecte%20cybersecurite
 * Remote Cybersecurity Jobs in France with great benefits and pay
   [https://remoteok.com/remote-cybersecurity-jobs?location=FR
   SSL
 * Les certificats TLS - Blog de Aymeric Lagier
   [https://aymericlagier.com/2021/04/07/les-certificats-tls/
 * Tout comprendre des certificats SSL - Fotozik
   [https://www.fotozik.fr/tout-comprendre-des-certificats-ssl
   DIY
 * Robots & Drones on Tindie [https://www.tindie.com/browse/robots-drones/
 * Tutorials | Hackaday.io [https://hackaday.io/list/159729-tutorials
   FREE_COURSES
 * Home page | EC-Council Learning
   [https://codered.eccouncil.org/?logged=false
 * Global Leader of Cybersecurity Solutions and Services | Fortinet
   [https://www.fortinet.com/
 * Free Cyber Security Training & Resources | SANS Institute
   [https://www.sans.org/cyberaces/
 * Coursera | Degrees, Certificates, & Free Online Courses
   [https://www.coursera.org/
 * Build new skills. Advance your career. | edX [https://www.edx.org/
 * GitHub - sujayadkesar/cybersecurity-resources: Cybersecurity
   Resources [https://github.com/sujayadkesar/cybersecurity-resources?s=09
 * Command Challenge! [https://cmdchallenge.com/
 * CryptoHack – A fun, free platform for learning cryptography
   [https://cryptohack.org/
 * Hacker101 CTF [https://ctf.hacker101.com/
 * Hacking-Lab [https://hacking-lab.com/services/
 * OverTheWire: Wargames [https://overthewire.org/wargames/
 * Hackaflag - Academy [https://hackaflag.com.br/academy.html
   CYBERSECU_glossaire
 * Archives des Définition – FRENCHWEB.FR
   [https://www.frenchweb.fr/rubrique/guides/definition-guides
   OSINT
 * osint.link - the best [https://osint.link/
 * ThreatMiner.org | Data Mining for Threat Intelligence
   [https://www.threatminer.org/
 * Free Tools | OSINT Combine [https://www.osintcombine.com/tools
 * Creepy by ilektrojohn [https://www.geocreepy.com/
 * https://directory.email-verifier.io/
   [https://directory.email-verifier.io/
 * Buscador OSINT VM [https://inteltechniques.com/buscador/index.html
 * WiGLE: Wireless Network Mapping [https://wigle.net/
 * OSINT-FR | Les outils pour débuter en OSINT
   [https://osintfr.com/fr/outils/
 * Trace Labs | Search Party
   [https://www.tracelabs.org/initiatives/search-party#
 * GreyNoise Visualizer [https://viz.greynoise.io/
 * OSINT Framework [https://osintframework.com/
 * List of Operating Systems for OSINT (Open-Source Intelligence) |
   PenTestIT
   [https://pentestit.com/operating-systems-open-source-intelligence-osint-list/
 * GitHub - smicallef/spiderfoot: SpiderFoot automates OSINT collection
   so that you can focus on analysis.
   [https://github.com/smicallef/spiderfoot
 * GitHub - famavott/osint-scraper: Social Recon
   [https://github.com/famavott/osint-scraper
 * osint – WebBreacher.com [https://webbreacher.com/category/osint/
 * Links for Doxing, Personal OSInt, Profiling, Footprinting,
   Cyberstalking
   [http://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking
 * OSINT Tools - Recommendations List | Subliminal HackingSubliminal
   Hacking
   [http://www.subliminalhacking.net/2012/12/27/osint-tools-recommendations-list/
 * @BushidoToken cybersecurity
   [https://blog.bushidotoken.net/2021/05/osint-blog-watch-skies.html
 * Threat Intelligence - Pulsedive [https://pulsedive.com/
 * URL and website scanner - urlscan.io [https://urlscan.io/
 * Introduction to Linux from a Forensic Perspective - Tsurugi
   [https://academy.cyber5w.com/courses/intro-to-linux-using-tsurugi
 * Week in OSINT – Medium [https://medium.com/week-in-osint
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/
 * Welcome! [https://w-e-b.site/
 * Méthodologie d’OSINT orientée réseaux sociaux | SYNETIS
   [https://www.synetis.com/methodologie-dosint-orientee-reseaux-sociaux/
 * Threat Intelligence 101 — Splendeurs et misères de la Kill Chain |
   by SEKOIA | Cyber Threat Intelligence par SEKOIA | Medium
   [https://medium.com/cyberthreatintel/threat-intelligence-101-splendeurs-et-mis%C3%A8res-de-la-kill-chain-67869d5995e6
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/open-source-intelligence-osint/tools-and-methodology/methodology/
 * OSINT Tools - Practical OSINT Tools - free of charge - Aware Online
   [https://www.aware-online.com/en/osint-tools/
 * LetsDefend - Blue Team Training Platform [https://letsdefend.io/
 * We are OSINTCurio.us – Helping the OSINT community stay curious
   [https://osintcurio.us/
 * Social Exploits - Passion, Persistence, Perception
   [https://socialexploits.com/
 * Welcome | OSINT Combine Academy [https://academy.osintcombine.com/
 * OSINT Bookmarks | OSINT Combine
   [https://www.osintcombine.com/osint-bookmarks
 * Spokeo Social Search | Find Emails & Usernames
   [https://www.spokeo.com/social/profile?q=Julien+BOULHAUT&loaded=1
 * Open Threat Research Blog [https://blog.openthreatresearch.com/
 * OSINT: How to find information on anyone - The First Digit - Medium
   [about:reader?url=https%3A%2F%2Fmedium.com%2Fthe-first-digit%2Fosint-how-to-find-information-on-anyone-5029a3c7fd56
 * Lullar Com - Search People Profile by Email or Username
   [https://lullar-com-3.appspot.com/en
 * This Person Does Not Exist [https://thispersondoesnotexist.com/
 * ZATAZ » OSINT : se fabriquer une fausse identité en deux clics de
   souris
   [https://www.zataz.com/osint-se-fabriquer-une-fausse-identite-en-deux-clics-de-souris/
 * CSI Linux [https://csilinux.com/
 * osint.link [https://osint.link/
 * PeekYou [https://www.peekyou.com/
 * eTools.ch - Metasearch [https://www.etools.ch/search.do
 * Namechk plugin - search results - Namechk
   [https://namechk.com/namechk-plugin-search-results/?n=Julien%20BOULHAUT&g-recaptcha-response=03AFcWeA6li_IgbM1ONZz8sXqnf3u5mkQlbO_g8BSuIH_0lb4oUB7l-9Qnq3_baWgGp2zvOR06q30F-T5hunvhWeqa9rqAfGBTjz2lq9Q1JApww4uZu8xZPK1JxSdMM1BYlY02NLLuPOBl1Q8cRsaqU1pXc8-LVG5pxobYXivphqZCy_JmmhRZ5NOT2QP1mAfOKmMGvtEBUCe8P35LBY4j6uIc4Ifr5iv6kQz9oVtt-3s9cTLgbWRcQC87_Aqez7APw-2hsDjFZBjJtq1IeXA3xSbaH2a_mDGksUVXHRKA9MT67yDnh5uDicOkDXQv65IA7p91ffTmP87YgFhSwBtKQy9xAmtLLaHmTgzEO4oHyiVVk5GvATXq_Ju5ZUudO8u8ofczLNmMYio-pKs22j2jzNsdK7zEQBhcb411egh6EP48bcL7epizBJfzcndM9SALalGk3BPZ7a_1DKi4AEc_cypj11xMjyeYTTS81GfmlolBBEK1eGkhHHhC5yP8XwX5gK2g1qOuxeh5mbwPY2oFOnAuSioSA_3WLA8aW7dZXq7gsXtAnYdy_4w_wptnZl183nJpCWKE4_KMowA5eytnA0_HEhQBkDYAvxX4Jb6wsuRPRh1kDh0BuLE
 * namecheckr | Social and Domain Name Availability Search For Brand
   Professionals [https://www.namecheckr.com/
 * Shodan Cheat Sheet: Keep IoT In Your Pocket | The Dark Source
   [https://thedarksource.com/shodan-cheat-sheet/
 * GTD Search Results
   [https://www.start.umd.edu/gtd/search/Results.aspx?search=
 * Webmii [https://webmii.com/
 * Le monde entier est un qactus | OpenFacto
   [https://openfacto.fr/2022/06/27/le-monde-entier-est-un-qactus/
 * 🔓 TopOSINT.com - start.me [https://start.me/p/vjqXe1/toposint-com
 * Epieos, the ultimate OSINT tool [https://epieos.com/
 * bit_of_hex [https://bitofhex.com/
 * bit_of_hex [https://bitofhex.com/page/3/
 * PimEyes: Face Recognition Search Engine and Reverse Image Search
   [https://pimeyes.com/en
 * 9 Open Source Intelligence (OSINT) Tools for Penetration Testing
   [https://geekflare.com/osint-tools/
 * @BushidoToken Threat Intel [https://blog.bushidotoken.net/
 * BushidoUK (BushidoUK) / Repositories · GitHub
   [https://github.com/BushidoUK?tab=repositories
 * Cyber Detective🇺🇦 sur Twitter : "CCTV cameras in #OSINT - how to
   search for cameras (including vulnerable cameras) - how to save
   streams from cameras - how to analyze video 🧵🧵🧵(1/15)
   https://t.co/LSugBbrFYZ" / Twitter
   [https://twitter.com/cyb_detective/status/1547702631849635841
 * Google Custom Search Engine for search 10 worldwide webcams catalogs
   [https://cipher387.github.io/webcamcse/
 * Webcams on World Map - World Cams [https://worldcams.tv/map/
 * Webcamtaxi Search Engine of Live World Webcams
   [https://www.webcamtaxi.com/en/search.html?searchword=Paris&searchphrase=all
 * Windy: Webcams
   [https://www.windy.com/fr/-Webcams/webcams?48.858,2.339,5
 * Windy: Webcams
   [https://www.windy.com/fr/-Webcams/webcams?45.337,3.933,9
 * GitHub - cipher387/Dorks-collections-list: List of Github
   repositories and articles with list of dorks for different search
   engines [https://github.com/cipher387/Dorks-collections-list#cctv-dorks
 * Offensive OSINT [https://www.offensiveosint.io/
 * AML Toolbox - start.me [https://start.me/p/rxeRqr/aml-toolbox
 * Username search tool - Use these useful OSINT tools in your
   investigation on usernames
   [https://www.aware-online.com/en/osint-tools/username-search-tool/
 * Bellingcat's Online Investigation Toolkit bit.ly/bcattools -
   Google Sheets
   [https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=1130825724
 * https://osint.link/ [https://osint.link/
 * OSINT.SH - All in one Information Gathering Tools [https://osint.sh/
 * PassMark OSForensics - Digital investigation
   [https://www.osforensics.com/
 * Les tutos de Processus [https://processus.site/index.html
 * OZINT - FAQ [https://ozint.eu/faq/
 * link information [https://iplogger.org/logger/m0y34H9Re0fU/
 * context:global @adista.fr - Sourcegraph
   [https://sourcegraph.com/search?q=context%3Aglobal+%40adista.fr&patternType=standard&sm=1&groupBy=repo
 * 13.67.50.129 - IP Scoring: Inbound Moderate, Outbound Moderate,
   Singapore, | Criminal IP
   [https://www.criminalip.io/en/asset/report/13.67.50.129
 * Biznar: Deep Web Business Results
   [https://biznar.com/biznar/desktop/en/results.html
 * GitHub - mattnotmax/cyberchef-recipes: A list of cyber-chef recipes
   and curated links [https://github.com/mattnotmax/cyberchef-recipes
 * Submarine Cable Map [https://www.submarinecablemap.com/
 * Search Colocation, Fiber Network & Hybrid Cloud | Inflect
   [https://inflect.com/search
 * Cloud Infrastructure Map
   [https://www.cloudinfrastructuremap.com/#/service/cloud-regions
 * OSINT Framework [https://osintframework.com/
 * OSINT-FR | Les outils pour débuter en OSINT
   [https://osintfr.com/fr/outils/
 * CFReDS - Data Leakage Case
   [https://www.cfreds.nist.gov/data_leakage_case/data-leakage-case.html
 * Phonebook.cz - Intelligence X [https://phonebook.cz/
 * Intelligence X [https://intelx.io/
 * Browserling - Live interactive cross-browser testing
   [https://www.browserling.com/browse/win/7/chrome/92/http%3A%2F%2Fwww.exploit-db.com
 * Set it on 🔥child -OSINT for Finding People - Google Sheets
   [https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc/edit#gid=603724104
 * UK-OSINT [https://www.uk-osint.net/
 * Platform Downloads | OmniSci
   [https://www.omnisci.com/platform/downloads
 * OpenCorporates :: The Open Database Of The Corporate World
   [https://opencorporates.com/
 * IP Address Lookup | Geolocation [https://www.iplocation.net/ip-lookup
 * Geolocate the Location of an IP Address | Geolocation
   [https://www.geolocation.com/?ip=88.126.142.18#ipresult
 * IP Location Finder - IP Lookup With Detailed Geolocation Data |
   KeyCDN Tools [https://tools.keycdn.com/geo?host=88.126.142.18
 * Free Tools | OSINT Combine [https://www.osintcombine.com/tools
 * France - Webcams [https://worldcam.eu/webcams/europe/france
 * Host: 86.207.79.161 [https://app.netlas.io/host/adista.fr/
 * GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly
   awesome OSINT [https://github.com/jivoi/awesome-osint#-general-search
 * FaceCheck - Reverse Image Search - Face Recognition Search Engine
   [https://facecheck.id/
 * FilePursuit- Discover Everything!, Search the web for files, videos,
   audios, eBooks and much more. [https://filepursuit.com/
 * Artemis – A Radio Signals Recognition Manual – AresValley
   [https://www.aresvalley.com/artemis/
 * Artemis 3 Released: Offline Signal Identification Database
   [https://www.rtl-sdr.com/artemis-3-released-offline-signal-identification-database/
 * bellingcat - the home of online investigations
   [https://www.bellingcat.com/
 * GitHub - epsylon/ufonet: UFONet - Denial of Service Toolkit
   [https://github.com/epsylon/ufonet
 * Avoid The Hack: 8 Best DNS Providers for Privacy (and adblocking) |
   Avoid the Hack (avoidthehack!)
   [https://avoidthehack.com/best-dns-privacy
 * Quad9 | A public and free DNS service for a better security and
   privacy [https://quad9.net/
 * Adresses du service & fonctionnalités | Quad9
   [https://quad9.net/fr/service/service-addresses-and-features
 * Sentinel Online - ESA - Sentinel Online
   [https://sentinels.copernicus.eu/web/sentinel/home
 * OZINT - La plateforme communautaire dédiée à l'OSINT [https://ozint.eu/
 * OSINT Dojo [https://www.osintdojo.com/
 * Predicta Lab [https://predictalab.fr/
 * Predicta Lab [https://predictalab.fr/#0
 * OSINT Dojo [https://www.osintdojo.com/resources/
 * CyberSoc | Cyber Detective CTF [https://ctf.cybersoc.wales/
 * Ransomwhere [https://ransomwhe.re/#browse
 * Course Catalog [https://www.nw3c.org/UI/CourseCatalog.html
 * OSINT Dojo - YouTube [https://www.youtube.com/@OSINTDojo/videos
 * Live cameras: France [http://insecam.org/en/bycountry/FR/?page=1
 * FaceCheck - Reverse Image Search - Face Recognition Search Engine
   [https://facecheck.id/
 * Instant Username Search [https://instantusername.com/#/
 * Check files for metadata info [https://www.metadata2go.com/
 * MetaOSINT | Jumpstart Your OSINT Investigation | Home
   [https://metaosint.github.io/?s=09
 * OSINT Tutorials - Tutorials for safe and effective OSINT
   investigations [https://www.aware-online.com/en/osint-tutorials/
 * LeakIX - Graph [https://leakix.net/graph
 * Webcams | OSINT Essentials [https://www.osintessentials.com/webcams
 * Epieos, the ultimate OSINT tool
   [https://epieos.com/?q=fabperso%40hotmail.com&t=email
 * OSINT Industries [https://osint.industries/
 * BreachDirectory - Check If Your Email or Username was Compromised
   [https://www.breachdirectory.org/
 * Decrypt MD5, SHA1, MySQL, NTLM, SHA256, MD5 Email, SHA256 Email,
   SHA512, Wordpress, Bcrypt hashes for free online
   [https://hashes.com/en/decrypt/hash
 * sha1 hash decoder and calculator [https://md5hashing.net/hash/sha1
 * Base64 Decode and Encode - Online Tool [https://www.base64decode.net/
 * CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux,
   Rainbow Tables, etc. [https://crackstation.net/
 * BreachDirectory - Check If Your Email or Username was Compromised
   [https://www.breachdirectory.org/index.html
 * Leak - Lookup | Data Breach Search Engine [https://leak-lookup.com/
 * Leak - Lookup | Login [https://leak-lookup.com/account/login
 * BreachDirectory - Check If Your Email or Username was Compromised
   [https://breachdirectory.org/index.html
 * Generate a Random Name - Fake Name Generator
   [https://www.fakenamegenerator.com/
 * DeHashed — #FreeThePassword [https://www.dehashed.com/
 * The Official Social Engineering Hub - Security Through Education
   [https://www.social-engineer.org/
 * Photo Location & Online EXIF Data Viewer - Pic 2 Map
   [https://www.pic2map.com/
 * what3words /// The simplest way to talk about location
   [https://what3words.com/gardon.hangar.enserrer
 * L'investigation Open Source avec Maltego - Club OSINT & Veille -
   AEGE - YouTube [https://www.youtube.com/watch?v=7Sgg5UqV4D0&t=5121s
 * pictriev, moteur de recherche du visage
   [http://www.pictriev.com/?lang=fr#
 * Reconnaissance Faciale : applications et avantages
   [https://www.electronicid.eu/fr/blog/post/reconnaissance-faciale/fr
 * Clearview AI | Facial Recognition [https://www.clearview.ai/
 * FaceCheck - Reverse Image Search - Face Recognition Search Engine
   [https://facecheck.id/
 * 215 TinEye search results
   [https://tineye.com/search/9da93423d519511da4dfc6b1a110f75bf4d7da44?sort=score&order=desc&page=1
 * What Happened on October 1, 1965 - On This Day
   [https://www.onthisday.com/date/1965/october/1
 * 9 meilleurs moteurs de recherche à reconnaissance faciale pour
   rechercher par visage et non par nom
   [https://geekflare.com/fr/face-recognition-search-engines/
 * TinEye Reverse Image Search [https://tineye.com/
 * ENQUÊTE - Avec les Sherlock Holmes du net - Journal de 20 heures |
   TF1
   [https://www.tf1.fr/tf1/jt-20h/videos/enquete-avec-les-sherlock-holmes-du-net-08240458.html
 * AI-Generated Faces: Diverse & Customizable | Generated.Photos
   [https://generated.photos/faces
 * Authentic Natural AI-Generated Faces | Generated.Photos
   [https://generated.photos/faces/natural#
 * AI Face Generator, AI Portrait Generator - NightCafe Creator
   [https://creator.nightcafe.studio/ai-face-generator
 * This Person Does Not Exist - Random Face Generator
   [https://this-person-does-not-exist.com/en
 * ꓘamerka by Offensive OSINT [https://kamerka.io/
 * OSINT Blog | The Latest News and Insights on Open Source
   Intelligence - ESPY [https://espysys.com/osint-blog/
 * quipqiup - cryptoquip and cryptogram solver [https://www.quipqiup.com/
 * Exposed adista.fr Search Result | Criminal IP
   [https://www.criminalip.io/asset/search?query=adista.fr
 * Comment trouver les sous-domaines d'un domaine en quelques minutes ?
   [https://geekflare.com/fr/find-subdomains/
 * L'annuaire Numéros SVA
   [https://www.infosva.org/?tel=0188899962&date=30-10-2023
 * tinfoleak | Free dossier of a twitter user [https://tinfoleak.com/
 * Micah Hoffman's Personal Blog [https://webbreacher.com/
 * Suivre n'importe qui avec juste un numéro de téléphone | Enquête
   OSINT
   [https://ichi.pro/fr/suivre-n-importe-qui-avec-juste-un-numero-de-telephone-enquete-osint-184670966736397
 * Truecaller - Principale application mondiale d'identification de
   l'appelant et de blocage des appels [https://www.truecaller.com/fr-fr
 * de🔸digger find public files in Google Drive
   [https://www.dedigger.com/#gsc.tab=0
 * ACHAT CARTE SIM TELEPHONIQUE ANONYME ! - Simslife [https://simslife.fr/
 * Origin Error [http://deadfake.com/
 * CamHacker.com | Search Webcam Search Engine [https://www.camhacker.com/
 * Agente Espião: Câmeras de Vigilâncias
   [http://cinemauniversaldownloads.blogspot.com/p/blog-page_16.html
 * Social Searcher - Free Social Media Search Engine
   [https://www.social-searcher.com/
 * NameCheckup - Find Available Username [https://namecheckup.com/
 * FotoForensics [https://fotoforensics.com/
 * Alain Riccobene email address & phone number | Adista Expert IT
   contact information - RocketReach
   [https://rocketreach.co/alain-riccobene-email_52402058
   BlueTeam
 * SANS Blue Team Operations [https://wiki.sans.blue/#!index.md
 * SANS Blue Team Operations [https://wiki.sans.blue/#!index.md
   Info_Outil
 * TweetDeck [https://tweetdeck.twitter.com/
 * URL/IP Lookup | Webroot BrightCloud
   [http://www.brightcloud.com/tools/url-ip-lookup.php
 * Airbus D&S CyberSecurity blog [http://blog.airbuscybersecurity.com/
 * Digital Attack Map
   [http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=2&time=16873&view=map
 * KitPloit - PenTest Tools for your Security Arsenal!
   [http://www.kitploit.com/
 * FireEye Cyber Threat Map
   [https://www.fireeye.com/cyber-map/threat-map.html
 * ikks.com safe ? Check it with URLVoid
   [http://www.urlvoid.com/scan/ikks.com/
 * Email Hunter - Find email addresses in seconds [https://emailhunter.co/
 * Les outils de la veille – Page 2 – L'actualité et les nouveaux
   outils de la veille et du community management par Fidel Navamuel
   [http://outilsveille.com/page/2/
 * DNS leak test [https://dnsleaktest.com/
 * IP/DNS Detect - What is your IP, what is your DNS, what informations
   you send to websites. [https://ipleak.net/
 * Intelligence X [https://intelx.io/
 * PunkSPIDER [https://www.punkspider.org/
 * 8map.de - Live Attack-Map [http://8map.de/maps/
 * Arbor Networks | ATLAS Dashboard: Global [https://atlas.arbor.net/
 * ATLAS Summary Report: Global Attacks
   [https://atlas.arbor.net/summary/attacks#summary
 * Domain/SiteScan | 8ack.de [https://8ack.de/scan/
 * DONT PANIC First Aid Kit | 8ack.de [https://8ack.de/firstaidkit/
 * Interactive Cyber Attack Map | CTF365 Blog
   [https://blog.ctf365.com/interactive-cyber-attack-map/
   Info_graphie
 * (3) Infographics | Cybercriminality & IT Security sur Pinterest |
   Ordinateurs, Infographie et Infographie
   [https://fr.pinterest.com/returnpath/infographics-cybercriminality-it-security/
 * INFOGRAPHIE: Genèse des menaces
   [http://www.trendmicro.fr/infographies/genese-des-menaces/index.html
 * APT Index • APT Index / Default View • Kumu
   [https://embed.kumu.io/0b023bf1a971ba32510e86e8f1a38c38#apt-index
   Info_Secu
 * Journal du hacker [https://www.journalduhacker.net/t/s%C3%A9curit%C3%A9
 * Le Reddit des Sysadmins Francophones
   [https://www.reddit.com/r/Sysadmin_Fr/
 * Best Practices SI [https://www.bestpractices-si.fr/
 * Les 10 sites à suivre pour une veille #InfoSec | Le blog de la
   cybersécurité
   [http://www.cyber-securite.fr/2010/12/28/les-10-sites-a-suivre-pour-une-veille-infosec/
 * Le Rôle du RSSI | securite information
   [http://www.ysosecure.com/securite-information/role-rssi.html
 * Information Security and IT Security News - Infosecurity Magazine
   [http://www.infosecurity-magazine.com/news/
 * ZATAZ Sécurité informatique, protection et anonymat numériques -
   ZATAZ [http://www.zataz.com/#axzz470PHsrqK
 * 1-15 May 2015 Cyber Attacks Timeline | HACKMAGEDDON
   [http://www.hackmageddon.com/2015/05/19/1-15-may-2015-cyber-attacks-timeline/
 * 5 étapes pour Débuter en Programmation – Le Blog du Hacker
   [http://www.leblogduhacker.fr/5-etapes-pour-debuter-en-programmation/
 * Zone-H.org - Unrestricted information [http://zone-h.org/?zh=1
 * Actualités sécurité, piratage, hacking et cybercriminalité
   [http://www.01net.com/rub/actualites/10005/actualites/securite/
 * Blocklists of Suspected Malicious IPs and URLs
   [https://zeltser.com/malicious-ip-blocklists/
 * Channelnews.fr - l'actualité du business de l'informatique et des
   télécoms [http://www.channelnews.fr/
 * computer security
   [https://news.google.com/news/section?hl=en&pz=1&ned=us&q=computer+security
 * Criminalités numériques | Cybercriminalité, analyse criminalistique
   des systèmes numériques [http://blog.crimenumerique.fr/
 * Data Security Breach | Cyber Défense pour entreprises & particuliers
   [http://www.datasecuritybreach.fr/
 * FireBounty | The Ultimate Bug Bounty Aggregator!
   [https://firebounty.com/
 * FireEye Cyber Threat Map
   [https://www.fireeye.com/cyber-map/threat-map.html
 * Mag-Securs |fr] Accueil [http://www.mag-securs.com/
 * FortiGuard.com | Home [https://fortiguard.com/
 * Hack Like a Pro « Null Byte How-Tos
   [http://null-byte.wonderhowto.com/how-to/hack-like-a-pro/
 * hacking
   [https://news.google.com/news/section?hl=en&pz=1&ned=us&q=hacking
 * HACKMAGEDDON | I know with what weapons World War III will be
   fought… [http://www.hackmageddon.com/
 * Information #Security #InfoSec #CyberSecurity #CyberSécurité
   #CyberDefence | Scoop.it
   [http://www.scoop.it/t/it-systems-networks-security
 * Information Security Stack Exchange [http://security.stackexchange.com/
 * June 2015 Cyber Attacks Statistics | HACKMAGEDDON
   [http://www.hackmageddon.com/2015/07/13/june-2015-cyber-attacks-statistics/?utm_content=bufferdfdef&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
 * Kaspersky Cyberthreat real-time map [https://cybermap.kaspersky.com/
 * Latest Hacking News - Google+
   [https://plus.google.com/+Latesthackingnewscom/posts
 * Latest Threat Information
   [http://tools.cisco.com/security/center/navigation.x?i=118
 * Mad Irish :: Home [http://www.madirish.net/
 * Microsoft Safety Scanner - Outil en ligne gratuit pour la sécurité
   et l'intégrité des ordinateurs
   [https://www.microsoft.com/security/scanner/fr-fr/default.aspx
 * New [https://news.ycombinator.com/newest
 * News ≈ Packet Storm [http://packetstormsecurity.com/news/
 * Norse Attack Map [http://map.norsecorp.com/#/
 * Online Penetration Testing Tools | Ethical Hacking Tools
   [https://pentest-tools.com/
 * Outils de sécurité Détection Évaluation Logiciels malveillants
   Protection Mise à jour Gestion
   [https://technet.microsoft.com/fr-fr/security/cc297183#E2D
 * Packet Storm [http://packetstormsecurity.com/
 * Securelist - Information about Viruses, Hackers and Spam
   [https://securelist.com/
 * Sécurité informatique [http://cs76.free.fr/securite.php
 * Sécurité informatique : Toute l'actualité sur Le Monde.fr.
   [http://www.lemonde.fr/securite-informatique/
 * sécurité informatique et réseaux sociaux infographie - Recherche
   Google
   [https://www.google.fr/search?q=s%C3%A9curit%C3%A9+informatique+et+r%C3%A9seaux+sociaux+infographie&espv=2&biw=1280&bih=939&site=webhp&tbm=isch&tbo=u&source=univ&sa=X&ved=0CCcQsARqFQoTCJGLhfzV6ccCFcfrGgodyFIOWg
 * Sécurité informatique, protégez vos réseaux sociaux - CNET France
   [http://www.cnetfrance.fr/internet-securite/
 * Security News [http://www.morningstarsecurity.com/news
 * Sicherheitstacho.eu [http://www.sicherheitstacho.eu/
 * Silicon [http://www.silicon.fr/categorie/security
 * Toute l'Actualité Sécurité Informatique du Monde Informatique
   [http://www.lemondeinformatique.fr/securite-informatique-3.html
 * TheBlacksheep at www.bright-shadows.net: Internet Security
   Challenges, Network security, Computer security - Community
   [http://bright-shadows.net/
 * Une vision d'un centre opérationnel de sécurité (COS / SOC) - Le
   blog sécurité de Philippe Vialle / Phil Vialle's blog
   [http://www.ph-v.net/article-une-vision-d-un-centre-operationnel-de-securite-cos-cos-112457277.html
 * Useful Computer Security Resources - Select Real Security
   [http://www.selectrealsecurity.com/useful-security-resources
 * WIRED [http://www.wired.com/
 * www.zataz.com/news/ [http://www.zataz.com/news/
 * XMCO - ActuSécu [http://www.xmco.fr/actusecu.html
 * XMCO - Experts en sécurité informatique [http://www.xmco.fr/index.html
 * ZATAZ Sécurité informatique, protection et anonymat numériques -
   ZATAZ [http://www.zataz.com/
 * GitHub - kahun/awesome-sysadmin: A curated list of amazingly awesome
   open source sysadmin resources inspired by Awesome PHP.
   [https://github.com/kahun/awesome-sysadmin
 * SecuriTeam Blogs [https://blogs.securiteam.com/
 * Les outils de la veille [http://outilsveille.com/
 * Security-Feeds.com - Actualités
   [http://www.security-feeds.com/index.php/fr/Actualites/
 * 72 hours of Security News [http://netsecu.org/
 * Accueil [http://www.security-feeds.com/
 * FeedBucket - Web RSS Reader
   [http://www.feedbucket.com/?src=https%3A%2F%2Fctftime.org%2Fwriteups%2Frss%2F
 * Interactive Cyber Attack Map | CTF365 Blog
   [https://blog.ctf365.com/interactive-cyber-attack-map/
 * Lexsi Security Hub [https://www.lexsi.com/securityhub/
 * Pentest [http://esec-pentest.sogeti.com/
 * Result for 'ip:87.255.133.212' - ZoomEye
   [chrome-extension://klbibkeccnjlkjkiokjodocebajanakg/suspended.html#uri=https://www.zoomeye.org/search?q=ip%3A87.255.133.212
 * Sécurité informatique de A à Z | geekz0ne.fr
   [http://geekz0ne.fr/blog/2010/03/13/securite-informatique-de-a-a-z/
 * Security News
   [chrome-extension://klbibkeccnjlkjkiokjodocebajanakg/suspended.html#uri=http://www.morningstarsecurity.com/news
 * Malware-Traffic-Analysis.net
   [http://www.malware-traffic-analysis.net/index.html
 * Jordan Wright [http://jordan-wright.com/
 * Médecine connectée : un diagnostic | Securelist
   [https://securelist.fr/connected-medicine-and-its-diagnosis/66614/
 * Weakpass [https://weakpass.com/download
   Graph
 * Gephi - The Open Graph Viz Platform [https://gephi.org/
   Start.me
 * OSINT & Cybersecurity - Page Gallery - start.me
   [https://start.me/pages/int/osint
 * 05. Pentesting - start.me
   [https://start.me/p/7kj9g2/05-pentesting?locale=fr
 * Technical Sources - start.me
   [https://start.me/p/ELY5By/technical-sources
 * Technical Sources - start.me
   [https://start.me/p/ELY5By/technical-sources
 * Page d'accueil - start.me [https://start.me/start/fr/page-d-accueil
 * The Ultimate OSINT Collection - start.me
   [https://start.me/p/DPYPMz/the-ultimate-osint-collection
 * Technical Sources - start.me
   [https://start.me/p/ELY5By/technical-sources
 * Verification Toolset - start.me
   [https://start.me/p/ZGAzN7/verification-toolset
 * start.me [https://start.me/p/ZGAzN7/verification-toolset
 * Page d'accueil - start.me [https://start.me/start/fr/page-d-accueil
 * Technical Sources - start.me
   [https://start.me/p/ELY5By/technical-sources
 * Verification Toolset - start.me
   [https://start.me/p/ZGAzN7/verification-toolset
 * The Ultimate OSINT Collection - start.me
   [https://start.me/p/DPYPMz/the-ultimate-osint-collection
 * Hacking/CTF - start.me [https://start.me/p/jjBklr/hacking-ctf
 * OSINT - start.me [https://start.me/p/ZME8nR/osint
 * Top Hacking & Security websites - start.me
   [https://start.me/sites/int/tech/hacking-security
 * FAROS OSINT Resources - start.me
   [https://start.me/p/1kvvxN/faros-osint-resources
 * Ethical Hacking - start.me [https://start.me/p/1kgAyY/ethical-hacking
 * Forensics - start.me [https://start.me/p/q6mw4Q/forensics
 * Cybersecurity - start.me [https://start.me/p/vjBeQ6/cybersecurity
 * OSINT-Russie (IEC-IES) - start.me
   [https://start.me/p/0PeKwy/osint-russie-iec-ies
 * - start.me [https://start.me/p/rx6Qj8/nixintel-s-osint-resource-list
 * Meilleurs Hacking & Sécurité de sites web - start.me
   [https://start.me/sites/int/tech/hacking-security
 * Verification Toolset - start.me
   [https://start.me/p/ZGAzN7/verification-toolset
 * Pen Testing / Red Team - start.me
   [https://start.me/p/8yQwY0/pen-testing-red-team
 * SANS Pen Test HackFest 2021 - start.me
   [https://start.me/p/9EPkKR/sans-pen-test-hackfest-2021
 * Startpage Résultats de la Recherche
   [https://www.startpage.com/sp/search
 * 05. Pentesting - start.me [https://start.me/p/7kj9g2/05-pentesting
 * Hacking/CTF - start.me [https://start.me/p/jjBklr/hacking-ctf
 * OSINT & Cybersecurity - Page Gallery - start.me
   [https://start.me/pages/int/osint
 * Technical Sources - start.me
   [https://start.me/p/ELY5By/technical-sources
 * Top Hacking & Security websites - start.me
   [https://start.me/sites/int/tech/hacking-security
 * Top Hacking & Security websites - start.me
   [https://start.me/sites/int/tech/hacking-security
   Blog-a-lire
 * Cybersécurité | Arsouyes.org
   [https://www.arsouyes.org/categories/cybersecurite
 * James Kettle Research Overview [https://skeletonscribe.net/
 * https://the-finn.net/ [https://the-finn.net/
 * Marco Ramilli's Blog [https://marcoramilli.blogspot.com/
 * SSL [http://www.iletaitunefoisinternet.fr/categories/ssl/
 * HighOn.Coffee • Security Research • Penetration Testing Blog
   [https://highon.coffee/
 * Top Sites in France - Alexa
   [https://www.alexa.com/topsites/countries/FR
 * Security Research & Penetration Testing Blog - Aptive
   [https://www.aptive.co.uk/blog/
 * Kali tools – Page 4 – All things in moderation
   [https://hydrasky.com/category/network-security/kali-tools/page/4/
 * DFIR Cheat sheets and Infographics
   [https://www.dfir.training/resources/downloads/cheatsheets-infographics
 * Rapport État des lieux d'Internet | Akamai
   [https://www.akamai.com/fr/fr/about/our-thinking/state-of-the-internet-report/
 * Developing a PoC Step by Step - The Akamai Blog
   [https://blogs.akamai.com/2015/12/developing-a-poc-step-by-step.html
 * http://www.amanhardikar.com/mindmaps/PracticeUrls.html
   [http://www.amanhardikar.com/mindmaps/PracticeUrls.html
 * 先知社区 [https://xz.aliyun.com/
 * Re4son’s Blog | Re4son [https://whitedome.com.au/re4son/topics/re4son/
 * illmob – make shit, break shit, do shit. [http://www.illmob.org/
 * Web | WebFu Staging [https://web-central.appspot.com/web/
 * Pentester Land · Offensive Infosec [https://pentester.land/
 * Articles de blog GlobalSign [https://www.globalsign.com/fr/blog
 * OWASP Top 10 Tools and Tactics
   [https://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/
 * ~$ Linux - K_LFA.INFO Sysadmin Quotes [https://k-lfa.info/tag/linux/
 * Guide 001 |Getting Started in Bug Bounty Hunting.. – Muhammad Khizer
   Javed
   [https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/
 * Spawning a TTY Shell [https://netsec.ws/?p=337
 * PortSwigger - Burp - All learning materials - detailed
   [https://portswigger.net/web-security/all-materials/detailed
 * Researcher Resources - Getting Started - Security Research -
   Bugcrowd Forum
   [https://forum.bugcrowd.com/t/researcher-resources-getting-started/115
 * Ignitetechnologies (Hacking Articles ) · GitHub
   [https://github.com/Ignitetechnologies
 * Using Burp to Test for the OWASP Top Ten | Burp Suite Support Center
   [https://support.portswigger.net/customer/portal/articles/1969845-using-burp-to-test-for-the-owasp-top-ten
 * WPSec - Online WordPress Security Scanner [https://blog.wpsec.com/
 * Top FREE Network Monitoring Tools in 2019 - DNSstuff
   [https://www.dnsstuff.com/free-network-monitoring-software
 * Upgrading shells to fully interactive TTYs
   [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
 * Introduction · pentestbook [https://chryzsh.gitbooks.io/pentestbook/
 * Johackim - Hacker indépendant [https://johackim.com/
 * Getting Started in Bug Bounties - Jack Cable - Medium
   [https://medium.com/@cablej/getting-started-in-bug-bounties-9990fae0e8e8
 * Archive [https://hackso.me/archive/
 * Cybersecurity Training | The Cyber Mentor
   [https://www.thecybermentor.com/
 * GitHub - xwiki-labs/alternative-internet: A collection of
   interesting new networks and tech aiming at decentralisation (in
   some form). [https://github.com/xwiki-labs/alternative-internet
 * Basics | Grav Documentation [https://learn.getgrav.org/16
 * GitHub - ngalongc/bug-bounty-reference: Inspired by
   https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty
   write-up that is categorized by the bug nature
   [https://github.com/ngalongc/bug-bounty-reference
 * CAIDA: Center for Applied Internet Data Analysis
   [http://www.caida.org/home/
 * Hacker House Demo [https://demos.hacker.house/
 * Auto-hébergement Raspberry Pi [http://cpalui.free.fr/
 * Stanislas.io – Blog de Stanislas Quastana [https://stanislas.io/
 * Joemccray's Pastebin - Pastebin.com [https://pastebin.com/u/joemccray
 * GitHub - manala/ansible-roles: Manala ansible roles
   [https://github.com/manala/ansible-roles
 * PTF : The penetration tester framework | crowd42's blog
   [https://crowd42.github.io/blog/ptf/
 * Pentest Blog - Self-Improvement to Ethical Hacking
   [https://www.pentest.com.tr/exploits/
 * Penetration Testing Active Directory, Part I – root@Hausec
   [https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
 * Open Source Patch Management: Options for DIYers
   [https://www.esecurityplanet.com/applications/open-source-patch-management.html
 * Hack The Box – WriteUp – FriendZone – Arnotic
   [https://www.arnotic.com/2019/07/14/hack-the-box-writeup-friendzone/
 * HACK Alternative à NetCat | Dyrk
   [https://dyrk.org/2016/05/16/hack-alternative-a-netcat/
 * jetlib.sec [https://sec.jetlib.com/
 * Pilat Rando [https://pilat-rando.fr/informations/mentions-legales/
 * All learning materials
   [https://portswigger.net/web-security/all-materials
 * 0x00sec - The Home of the Hacker [https://0x00sec.org/
 * The Magic of Learning — tech.bitvijays.com
   [https://bitvijays.github.io/content.html
 * hackNos - Rahul Gehlaut [https://www.hacknos.com/
 * Blog XMCO | We deliver security expertise [https://blog.xmco.fr/
 * 22 SSH Examples, Practical Tips & Tunnels | HackerTarget.com
   [https://hackertarget.com/ssh-examples-tunnels/
 * The UNIX and Linux Forums - Free Linux and Unix Tech Support
   [https://www.unix.com/
 * Advanced English lessons [https://www.englishpage.com/index.html
 * Securing your Synology NAS, Part 2 - Mike Tabor
   [https://miketabor.com/securing-synology-nas/
 * GitHub - rastating/shiva: An Ansible playbook to provision a host
   for penetration testing and CTF challenges
   [https://github.com/rastating/shiva
 * A system administrator's guide to getting started with Ansible -
   FAST!
   [https://www.redhat.com/en/blog/system-administrators-guide-getting-started-ansible-fast
 * Security Alerts / safecomputing.umich.edu
   [https://www.safecomputing.umich.edu/security-alerts/
 * Bulk-Adding IPTables Rules | KrazyWorks
   [https://www.krazyworks.com/bulk-adding-iptables-rules/
 * The Penetration Testing Execution Standard
   [http://www.pentest-standard.org/index.php/Main_Page
 * Web Server Malware Investigating – Laskowski-Tech
   [https://laskowski-tech.com/resources/web-server-malware-investigating/
 * Top 10 web hacking techniques of 2020 - nominations open |
   PortSwigger Research
   [https://portswigger.net/research/top-10-web-hacking-techniques-of-2020-nominations-open
 * Recherche pour "OWASP" - Le blog de Clever Age
   [https://blog.clever-age.com/fr/?s=OWASP
 * Researcher Resources - How to become a Bug Bounty Hunter - Security
   Research - Bugcrowd Forum
   [https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
 * The SQL Injection Knowledge Base
   [https://www.websec.ca/kb/sql_injection
 * IntelTechniques.com | OSINT & Privacy Services by Michael Bazzell |
   Open Source Intelligence [https://inteltechniques.com/links.html
 * Web Security Blog - PortSwigger [https://portswigger.net/blog
 * Security Archives - DNSstuff [https://www.dnsstuff.com/security
 * NetPublic » Sécurité sur Internet
   [http://www.netpublic.fr/liste/ressources-netpublic/formation-numerique/securite-sur-internet/
 * Investigations of Compromised Linux Web Servers – Laskowski-Tech
   [https://laskowski-tech.com/2017/09/25/investigations-of-compromised-linux-web-servers/
 * HTB: Bastion | 0xdf hacks stuff
   [https://0xdf.gitlab.io/2019/09/07/htb-bastion.html
 * GitHub - EdOverflow/bugbounty-cheatsheet: A list of interesting
   payloads, tips and tricks for bug bounty hunters.
   [https://github.com/edoverflow/bugbounty-cheatsheet
 * GitHub - bugbountyforum/BBF-university: The official BBF university.
   [https://github.com/bugbountyforum/BBF-university
 * Bug Bounty Forum [https://bugbountyforum.com/
 * Getting Started | Hacker101 [https://www.hacker101.com/
 * Hacker101 | HackerOne Platform Documentation
   [https://docs.hackerone.com/hackers/hacker101.html
 * Profile Settings [https://hackerone.com/settings/profile/edit
 * Cybersécurité : tous les articles sur siecledigital.fr
   [https://siecledigital.fr/technologie/cybersecurite/
 * All commands [https://www.commandlinefu.com/commands/browse
 * SQLBolt - Learn SQL - Introduction to SQL [https://sqlbolt.com/
 * Bugcrowd University | Bugcrowd [https://www.bugcrowd.com/university/
 * Podcast Episode 112: what it takes to be a top bug hunter |
   [https://securityledger.com/2018/09/podcast-episode-112-what-it-takes-to-be-a-top-bug-hunter/
 * Web penetration testing [https://guif.re/webpentest
 * Outils | Hackers Republic [https://www.hackersrepublic.org/outils
 * Hackers Republic | Accueil [https://www.hackersrepublic.org/
 * Secjuice.com [https://www.secjuice.com/
 * Introduction to Kali Linux Revealed
   [https://kali.training/lessons/introduction/
 * Kali-Linux-Revealed-1st-edition.pdf
   [https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf
 * Resource for people preparing for Offensive security Certified
   Penetration Tester [https://www.reddit.com/r/oscp/
 * CVE - Search CVE List [https://cve.mitre.org/cve/search_cve_list.html
 * OSSTMM 3 - OSSTMM.3.pdf [http://www.isecom.org/mirror/OSSTMM.3.pdf
 * Passing OSCP - scund00r
   [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
 * Introduction · OSCP - Useful Resources
   [https://backdoorshell.gitbooks.io/oscp-useful-links/content/
 * Penetration Testing • Security Training Share
   [https://securityonline.info/
 * Managing Containers with LXD: A Brief Introduction - Selectel Blog
   [https://blog.selectel.com/managing-containers-lxd-brief-introduction/
 * bashoneliners.com | Bash One-Liners [http://www.bashoneliners.com/
 * Universal Leet (L337, L33T, 1337) Converter
   [http://www.robertecker.com/hp/research/leet-converter.php?lang=en
 * Sign in to freeCodeCamp | freeCodeCamp
   [https://auth.freecodecamp.org/login?state=g6Fo2SAyWHJ6M1BCZ1RGTXF6bnVKZ1FTVDlHWHByNFZMdGJzRaN0aWTZIHpMMTJPblFTVE1XSVpaei1uQjRzLW1TX3E4dThqSXc4o2NpZNkgYVVEdjlqVnFUZnhCUkUxbDYwTkE1QWY3eVRDR0U0Y3k&client=aUDv9jVqTfxBRE1l60NA5Af7yTCGE4cy&protocol=oauth2&response_type=code&redirect_uri=http%3A%2F%2Fwww.freecodecamp.org%2Fauth%2Fauth0%2Fcallback&scope=openid%20profile%20email
 * HackinGeeK - ethical hacking dojo [https://hackingeek.com/
 * GTFOBins [https://gtfobins.github.io/#+sudo
 * MyExperiments - Local Linux privilege escalation overview
   [https://myexperiments.io/linux-privilege-escalation.html
 * Liste de Proxy Public Premium (https ssl, socks 4/5) | Hidester
   [https://hidester.com/fr/listeproxy/
 * Actualités Archives - ADACIS [https://www.adacis.net/category/actu/
 * CECyF – L'association de coopération pour l'éducation, la formation
   et la recherche contre la cybercriminalité [https://www.cecyf.fr/
 * List of Operating Systems for OSINT (Open-Source Intelligence) -
   PenTestIT
   [http://pentestit.com/operating-systems-open-source-intelligence-osint-list/
 * AD-Attack-Defense/README.md at master ·
   infosecn1nja/AD-Attack-Defense · GitHub
   [https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md
 * Protect Against Malicious POST Requests | Perishable Press
   [https://perishablepress.com/protect-post-requests/
 * OSINT Framework [https://osintframework.com/
 * Flare-On 2019 - CTF [https://tuanlinh.gitbook.io/ctf/flare-on-2019
 * How I Hacked 40 Websites in 7 minutes | Hacker Noon
   [https://hackernoon.com/how-i-hacked-40-websites-in-7-minutes-5b4c28bc8824
 * https://www.amanhardikar.com/mindmaps/Practice.html
   [https://www.amanhardikar.com/mindmaps/Practice.html
 * GitHub - ManhNho/AWAE-OSWE [https://github.com/ManhNho/AWAE-OSWE
 * Protégez-vous efficacement contre les failles web - OpenClassrooms
   [https://openclassrooms.com/fr/courses/2091901-protegez-vous-efficacement-contre-les-failles-web?status=published
 * Learn to hack, collaborate with security researchers and learn about
   bugbounties | BugBountyNotes.com [https://www.bugbountynotes.com/
 * Attack-Defense Online Lab [https://attackdefense.com/
 * Cyb3rsick – Laughing @ ya [https://cyb3rsick.com/
 * Attaques Archives - Information Security
   [https://www.information-security.fr/comprendre-infosec/attaques/
 * Categories [https://hackso.me/categories/
 * Blog Archive - Core dump overflow
   [http://chousensha.github.io/blog/archives/
 * where to start - Core dump overflow
   [http://chousensha.github.io/where-to-start/
 * http://www.vapidlabs.com/index.php [http://www.vapidlabs.com/index.php
 * x89k [https://x89k.cf/infosec/2018/11/03/oscpsurvivalguide.html
 * CTF Challenges - Hacking Articles
   [https://www.hackingarticles.in/ctf-challenges1/
 * The Conversation : des analyses de l’actualité par des
   universitaires et chercheurs [https://theconversation.com/fr
 * Net Admin Archives - Comparitech
   [https://www.comparitech.com/net-admin/
 * Blog | Blog pour hackers
   [https://www.securiteinfo.com/blog-pour-hackers/blog
 * PwnDefend – Modern Cyber Defence [https://www.pwndefend.com/
 * Labtainers - Center for Cybersecurity and Cyber Operations - Naval
   Postgraduate School [https://nps.edu/web/c3o/labtainers
 * Labtainer Lab Summary - Center for Cybersecurity and Cyber
   Operations - Naval Postgraduate School
   [https://nps.edu/web/c3o/labtainer-lab-summary1
 * Docker: Creating a Pivoting Lab and Exploiting it | by Kiranghimire
   | InfoSec Write-ups
   [https://infosecwriteups.com/docker-creating-a-pivoting-lab-and-exploiting-it-a66646dc2cf3
 * Authentification Tout savoir sur Authentification | Techniques de
   l'Ingénieur
   [https://www.techniques-ingenieur.fr/search.html?advancedSearch=true&query=authentification&dm=40a4&sc=3f&types=7208df
 * Le Guide Du SecOps - Blog 🇫🇷 publiant des articles de Cybersecurité
   (Off./Def.), SysAdmin et DevSecOps [https://le-guide-du-secops.fr/
 * Episode 1 | Malicious Life [https://malicious.life/episode/episode-1/
 * « Cinéma du réel » : treize films à voir sur Mediapart | Mediapart
   [https://www.mediapart.fr/studio/documentaires/culture-et-idees/cinema-du-reel-treize-films-voir-sur-mediapart?fbclid=PAAabRamK93F5Ja8gt_cZtY6nSuJfvjgVHtN9xNydbX9i7FmW3MtP5HAt_Sz4
 * Identifier des signaux faibles via Twitter sur les services de
   Cybersécurité | DATA VISUALIZATION & SOCIAL NETWORK ANALYSIS
   [https://cartorezo.wordpress.com/2019/09/02/identifier-des-signaux-faibles-via-twitter-sur-les-services-de-cybersecurite/
 * L’art de la cyberguerre : Sun Tzu et la cybersécurité
   [https://www.cybersecurite-solutions.com/lart-de-la-cyberguerre-sun-tzu-et-la-cybersecurite/
 * b
   [https://www.post.lu/business/blog/articles/cybersecurite/technical-corner
 * Accueil - MiniMachines.net [https://www.minimachines.net/
 * MisterMatos : Les bons plans en temps réel de Minimachines
   [https://www.minimachines.net/mistermatos
 * Patrik Hudak [https://0xpatrik.com/
 * https://johnhammond.org/ [https://johnhammond.org/
 * 0x20 - @BitK_ & @sakiirsecurity | Objectif top10 CtfTime, faire un
   bon ctf, les voyages, une anecdote croustillante par Hack'n Speak
   [https://podcasters.spotify.com/pod/show/hacknspeak/episodes/0x20---BitK_--sakiirsecurity--Objectif-top10-CtfTime--faire-un-bon-ctf--les-voyages--une-anecdote-croustillante-e27irq0
 * Federated timeline - DEF CON Social [https://defcon.social/public
 * Blog | Sam Curry [https://samcurry.net/blog/
 * Signalements réguliers d’incidents liés au rançongiciel Qakbot -
   Mise à jour 2 - Centre canadien pour la cybersécurité
   [https://www.cyber.gc.ca/fr/alertes-avis/signalements-reguliers-dincidents-lies-au-rancongiciel-qakbot
 * Who’s Attacking Whom? Realtime Attack Trackers – Krebs on Security
   [https://krebsonsecurity.com/2015/01/whos-attacking-whom-realtime-attack-trackers/
 * Infosec Resources - IT Security Training & Resources by Infosec
   [https://resources.infosecinstitute.com/
 * Inf0Sec - Blog de sécurité informatique [https://inf0sec.fr/
 * ethicalhackingguru.com [https://ethicalhackingguru.com/
 * Sébastien Koubar | Investisseur, Youtubeur
   [https://www.sebastienkoubar.com/
 * Portefeuille Portefeuille Dividendes de Sébastien Koubar • Moning 🚀
   [https://moning.co/fr/sebastien-kou...=very_safe&filtertype=dividend_safety|fr]
 * Secrets de Sébastien Koubar : ETF, actions, dividendes, ...
   [https://sinvestir.fr/sebastien-koubar-interview/
 * Formation Matthieu Louvet - La Bourse Démocratisée
   [https://sinvestir.fr/formation-matthieu-louvet/?lk=bannarti&el=pdv_apres_ebook
 * Malware Sources | PenTestIT [https://pentestit.com/malware-sources/
 * Evilginx : le phishing passe à la vitesse supérieure
   [https://blog.easi.net/fr/solutions/security/evilginx-bringing-phishing-to-a-whole-new-level-0
 * Usbek & Rica - Pourquoi n’avoir « rien à cacher » n'est pas une
   raison pour accepter la surveillance de masse
   [https://usbeketrica.com/fr/article/pourquoi-n-avoir-rien-a-cacher-n-est-pas-une-raison-pour-accepter-la-surveillance-de-masse
 * Usbek & Rica [https://usbeketrica.com/fr
 * Top 10 Twitter Accounts to Follow for Threat Intelligence -
   SOCRadar® Cyber Intelligence Inc.
   [https://socradar.io/top-10-twitter-accounts-to-follow-for-threat-intelligence/
 * security [https://pberba.github.io/security/
 * code.gouv.fr - Nouveaux logiciels libres au SILL
   [https://spote.developpement-durable.gouv.fr/spip.php?page=sill
 * Fiverr / résultats de recherche pour « pentesting »
   [https://fr.fiverr.com/search/gigs?query=pentesting&source=top-bar&ref_ctx_id=321582e43870b7d369d89c3a03e3ae1e&search_in=everywhere&search-autocomplete-original-term=pentesting
 * 283c4427b276a3ca8a13e145ed4d56c4cec0e3e3199c077b94893a0a3bcce4ef_1.jpg (Image JPEG, 1080 × 1441 pixels) [https://img.ifunny.co/images/283c4427b276a3ca8a13e145ed4d56c4cec0e3e3199c077b94893a0a3bcce4ef_1.jpg
 * CV MORANGE Cécile [https://cecilemorange.fr/
 * 5 Powerful Tools to Check IP and URL Reputation - The Sec Master
   [https://thesecmaster.com/5-powerful-tools-to-check-ip-and-url-reputation/
 * Blog ⋆ IpCisco [https://ipcisco.com/ipcisco-blog/
 * SELinux | n0tes.fr [https://n0tes.fr/2023/10/16/SELinux/
 * Awesome Cyber Security University |
   awesome-cyber-security-university
   [https://brootware.github.io/awesome-cyber-security-university/
 * [[img width="50" height="50" alt="front-page port 80-shoopyu"
   src="https://www.thebigredgroup.com/wp-content/uploads/2021/06/top-six.jpg"|fr] Cybersecurity Resources 💻🛡️ | 𝔩𝔬𝔠𝔞𝔩 𝔥𝔬𝔰𝔱 [https://thelocalhost.blog/posts/cybersec-resources/
 * MSSEC – Le Blog [https://blog.mssec.fr/
 * Blog | Predatech [https://predatech.co.uk/blog/
 * Information & Cyber Security Policy Templates
   [https://purplesec.us/resources/cyber-security-policy-templates/
   THM_HTB
 * Raphaël Richard - Notes [https://raphaelrichard-sec.fr/learning-notes
 * hack_smarter - Twitch [https://www.twitch.tv/hack_smarter
 * OffSecOfficial - Twitch [https://www.twitch.tv/offsecofficial
 * GitHub - rng70/TryHackMe-Roadmap: a list of 350+ Free TryHackMe
   rooms to start learning cybersecurity with THM
   [https://github.com/rng70/tryhackme-roadmap
 * Le meilleur Hacking Articles
   [https://www.hackingarticles.in/red-teaming/
 * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists
 * RequestBin.com — A modern request bin to collect, inspect and debug
   HTTP requests and webhooks [https://requestbin.com/
 * Apprenez les bases du langage Python - OpenClassrooms
   [https://openclassrooms.com/fr/courses/7168871-apprenez-les-bases-du-langage-python
 * Global Community CTF: Bootup Event
   [https://ranges.io/event/9d7eeea2-2837-11ec-90a8-313035303735/challenge/677e0556-2cea-11ec-9d84-396437373036
 * 0xsp | offensive cheatsheet
   [https://0xsp.com/offensive/offensive-cheatsheet
 * Kali In The Browser (Guacamole) | Kali Linux Documentation
   [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
 * CTF Challenge - Web App Security Challenges [https://ctfchallenge.com/
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/
 * Welcome! [https://suip.biz/
 * https://tryhackme.com/room/encryptioncrypto101
   [https://tryhackme.com/room/encryptioncrypto101
   THM
 * TryHackMe | Hip Flask [https://tryhackme.com/room/hipflask
 * Awesome Cyber Security University |
   awesome-cyber-security-university
   [https://brootware.github.io/awesome-cyber-security-university/
 * https://tryhackme.com/room/lazyadmin
   [https://tryhackme.com/room/lazyadmin
 * https://tryhackme.com/room/passwordattacks
   [https://tryhackme.com/room/passwordattacks
 * https://tryhackme.com/module/privilege-escalation
   [https://tryhackme.com/module/privilege-escalation
 * https://tryhackme.com/room/introtoisac
   [https://tryhackme.com/room/introtoisac
 * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre
 * https://tryhackme.com/room/ctfcollectionvol1
   [https://tryhackme.com/room/ctfcollectionvol1
 * https://tryhackme.com/room/lfibasics
   [https://tryhackme.com/room/lfibasics
 * https://tryhackme.com/room/localpotato
   [https://tryhackme.com/room/localpotato
 * https://www.reddit.com/r/tryhackme/?rdt=33600
   [https://www.reddit.com/r/tryhackme/?rdt=33600
 * https://www.revshells.com/ [https://www.revshells.com/
 * https://github.com/Wh1teDrvg0n/safeVPN-THM
   [https://github.com/Wh1teDrvg0n/safeVPN-THM
 * https://github.com/Orange-Cyberdefense/arsenal
   [https://github.com/Orange-Cyberdefense/arsenal
 * https://www.youtube.com/watch?v=2qUWfrqAwdI
   [https://www.youtube.com/watch?v=2qUWfrqAwdI
 * https://tryhackme.com/login [https://tryhackme.com/login
 * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali
 * https://tryhackme.com/room/dvwa [https://tryhackme.com/room/dvwa
 * https://tryhackme.com/room/pyramidofpainax
   [https://tryhackme.com/room/pyramidofpainax
 * https://github.com/rng70/tryhackme-roadmap
   [https://github.com/rng70/tryhackme-roadmap
 * https://github.com/rng70/Hacking-Resources
   [https://github.com/rng70/Hacking-Resources
 * https://tryhackme.com/room/breachingad
   [https://tryhackme.com/room/breachingad
 * https://tryhackme.com/module/recent-threats
   [https://tryhackme.com/module/recent-threats
 * https://tryhackme.com/room/atomicredteam
   [https://tryhackme.com/room/atomicredteam
 * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab
 * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/
 * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali
 * https://tryhackme.com/path/outline/redteaming
   [https://tryhackme.com/path/outline/redteaming
 * https://tryhackme.com/module/network-security-evasion
   [https://tryhackme.com/module/network-security-evasion
 * https://tryhackme.com/path/outline/blueteam
   [https://tryhackme.com/path/outline/blueteam
 * https://tryhackme.com/module/red-team-initial-access
   [https://tryhackme.com/module/red-team-initial-access
 * https://tryhackme.com/room/lazyadmin
   [https://tryhackme.com/room/lazyadmin
 * https://tryhackme.com/room/passwordattacks
   [https://tryhackme.com/room/passwordattacks
 * https://tryhackme.com/module/privilege-escalation
   [https://tryhackme.com/module/privilege-escalation
 * https://tryhackme.com/module/red-team-fundamentals
   [https://tryhackme.com/module/red-team-fundamentals
 * https://tryhackme.com/room/pythonforcybersecurity
   [https://tryhackme.com/room/pythonforcybersecurity
 * https://tryhackme.com/room/introtoisac
   [https://tryhackme.com/room/introtoisac
 * https://tryhackme.com/room/mitre [https://tryhackme.com/room/mitre
 * https://tryhackme.com/room/agentsudoctf
   [https://tryhackme.com/room/agentsudoctf
 * https://tryhackme.com/room/bpsplunk
   [https://tryhackme.com/room/bpsplunk
 * https://tryhackme.com/room/ctfcollectionvol1
   [https://tryhackme.com/room/ctfcollectionvol1
 * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab
 * https://tryhackme.com/room/lfibasics
   [https://tryhackme.com/room/lfibasics
 * https://tryhackme.com/room/blog [https://tryhackme.com/room/blog
 * https://tryhackme.com/room/investigatingwindows3
   [https://tryhackme.com/room/investigatingwindows3
 * https://tryhackme.com/room/webenumerationv2
   [https://tryhackme.com/room/webenumerationv2
 * https://tryhackme.com/room/bufferoverflowprep
   [https://tryhackme.com/room/bufferoverflowprep
 * https://tryhackme.com/room/owasptop10
   [https://tryhackme.com/room/owasptop10
 * https://tryhackme.com/module/cyber-security-awareness
   [https://tryhackme.com/module/cyber-security-awareness
 * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1
 * https://tryhackme.com/room/introtox8664
   [https://tryhackme.com/room/introtox8664
 * https://tryhackme.com/paths [https://tryhackme.com/paths
 * https://tryhackme.com/forum/ [https://tryhackme.com/forum/
 * https://help.tryhackme.com/using-tryhackme
   [https://help.tryhackme.com/using-tryhackme
 * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe
 * https://tryhackme.com/room/ccpentesting
   [https://tryhackme.com/room/ccpentesting
 * https://tryhackme.com/room/adventofcyber3
   [https://tryhackme.com/room/adventofcyber3
 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath
 * https://tryhackme.com/room/hololive
   [https://tryhackme.com/room/hololive
 * https://tryhackme.com/resources/blog
   [https://tryhackme.com/resources/blog
 * https://docs.tryhackme.com/ [https://docs.tryhackme.com/
 * https://tryhackme.com/path/outline/pentesting
   [https://tryhackme.com/path/outline/pentesting
 * https://discord.com/channels/521382216299839518/546650767495397376
   [https://discord.com/channels/521382216299839518/546650767495397376
 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
   [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
 * https://tryhackme.com/room/cowboyhacker
   [https://tryhackme.com/room/cowboyhacker
 * https://tryhackme.com/room/easyctf [https://tryhackme.com/room/easyctf
 * https://tryhackme.com/room/easypeasyctf
   [https://tryhackme.com/room/easypeasyctf
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://tryhackme.com/room/encryptioncrypto101
   [https://tryhackme.com/room/encryptioncrypto101
 * https://tryhackme.com/paths [https://tryhackme.com/paths
 * https://tryhackme.com/room/introdigitalforensics
   [https://tryhackme.com/room/introdigitalforensics
 * https://tryhackme.com/room/operatingsystemsecurity
   [https://tryhackme.com/room/operatingsystemsecurity
 * https://tryhackme.com/room/snortchallenges2
   [https://tryhackme.com/room/snortchallenges2
 * https://tryhackme.com/room/runtimedetectionevasion
   [https://tryhackme.com/room/runtimedetectionevasion
 * https://tryhackme.com/room/dirtypipe
   [https://tryhackme.com/room/dirtypipe
 * https://tryhackme.com/room/intro2windows
   [https://tryhackme.com/room/intro2windows
 * https://tryhackme.com/room/securityawarenessintro
   [https://tryhackme.com/room/securityawarenessintro
 * https://tryhackme.com/p/JohnHammond
   [https://tryhackme.com/p/JohnHammond
 * https://tryhackme.com/room/winadbasics
   [https://tryhackme.com/room/winadbasics
 * https://www.reddit.com/r/tryhackme/?rdt=33600
   [https://www.reddit.com/r/tryhackme/?rdt=33600
 * https://tryhackme.com/room/investigatingwindows3
   [https://tryhackme.com/room/investigatingwindows3
 * https://tryhackme.com/room/webenumerationv2
   [https://tryhackme.com/room/webenumerationv2
 * https://tryhackme.com/room/bufferoverflowprep
   [https://tryhackme.com/room/bufferoverflowprep
 * https://tryhackme.com/room/owasptop10
   [https://tryhackme.com/room/owasptop10
 * https://tryhackme.com/module/cyber-security-awareness
   [https://tryhackme.com/module/cyber-security-awareness
 * https://tryhackme.com/room/introtox8664
   [https://tryhackme.com/room/introtox8664
 * https://tryhackme.com/dashboard [https://tryhackme.com/dashboard
 * https://tryhackme.com/forum/ [https://tryhackme.com/forum/
 * https://help.tryhackme.com/using-tryhackme
   [https://help.tryhackme.com/using-tryhackme
 * https://tryhackme.com/room/ccpentesting
   [https://tryhackme.com/room/ccpentesting
 * https://docs.tryhackme.com/ [https://docs.tryhackme.com/
 * https://discord.com/channels/521382216299839518/546650767495397376
   [https://discord.com/channels/521382216299839518/546650767495397376
 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
   [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
 * https://tryhackme.com/room/cowboyhacker
   [https://tryhackme.com/room/cowboyhacker
 * https://tryhackme.com/room/easyctf [https://tryhackme.com/room/easyctf
 * https://tryhackme.com/room/easypeasyctf
   [https://tryhackme.com/room/easypeasyctf
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://tryhackme.com/room/introdigitalforensics
   [https://tryhackme.com/room/introdigitalforensics
 * https://tryhackme.com/room/operatingsystemsecurity
   [https://tryhackme.com/room/operatingsystemsecurity
 * https://tryhackme.com/room/snortchallenges2
   [https://tryhackme.com/room/snortchallenges2
 * https://tryhackme.com/room/runtimedetectionevasion
   [https://tryhackme.com/room/runtimedetectionevasion
 * https://tryhackme.com/room/dirtypipe
   [https://tryhackme.com/room/dirtypipe
 * https://tryhackme.com/room/securityawarenessintro
   [https://tryhackme.com/room/securityawarenessintro
 * TryHackMe | Login [https://tryhackme.com/login
 * TryHackMe | Forum [https://tryhackme.com/forum/
 * TryHackMe | Cyber Security Training [https://tryhackme.com/
 * What rooms should you do? A free guide for beginners
   [https://blog.tryhackme.com/free_path/
 * Using TryHackMe - TryHackMe [https://help.tryhackme.com/using-tryhackme
 * TryHackMe | Throwback Network [https://tryhackme.com/network/throwback
 * RequestBin.com — A modern request bin to collect, inspect and debug
   HTTP requests and webhooks [https://requestbin.com/
 * DarkSec - YouTube [https://www.youtube.com/c/DarkSec/playlists
 * TryHackMe | HackPark [https://tryhackme.com/room/hackpark
 * darksec [https://darkstar7471.com/resources.html
 * TryHackMe Documentation | TryHackMe Documentation
   [https://docs.tryhackme.com/
 * https://tryhackme.com/dashboard [https://tryhackme.com/dashboard
 * https://tryhackme.com/room/pyramidofpainax
   [https://tryhackme.com/room/pyramidofpainax
 * https://tryhackme.com/room/breachingad
   [https://tryhackme.com/room/breachingad
 * https://tryhackme.com/module/recent-threats
   [https://tryhackme.com/module/recent-threats
 * https://tryhackme.com/room/atomicredteam
   [https://tryhackme.com/room/atomicredteam
 * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/
 * https://tryhackme.com/room/kali [https://tryhackme.com/room/kali
 * https://tryhackme.com/path/outline/redteaming
   [https://tryhackme.com/path/outline/redteaming
 * https://tryhackme.com/module/network-security-evasion
   [https://tryhackme.com/module/network-security-evasion
 * https://tryhackme.com/path/outline/blueteam
   [https://tryhackme.com/path/outline/blueteam
 * https://tryhackme.com/module/red-team-initial-access
   [https://tryhackme.com/module/red-team-initial-access
 * https://tryhackme.com/module/red-team-fundamentals
   [https://tryhackme.com/module/red-team-fundamentals
 * https://tryhackme.com/room/pythonforcybersecurity
   [https://tryhackme.com/room/pythonforcybersecurity
 * https://tryhackme.com/room/agentsudoctf
   [https://tryhackme.com/room/agentsudoctf
 * https://tryhackme.com/room/bpsplunk
   [https://tryhackme.com/room/bpsplunk
 * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab
 * https://tryhackme.com/room/lfibasics
   [https://tryhackme.com/room/lfibasics
 * https://tryhackme.com/module/cyber-security-awareness
   [https://tryhackme.com/module/cyber-security-awareness
 * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1
 * https://tryhackme.com/forum/ [https://tryhackme.com/forum/
 * https://help.tryhackme.com/using-tryhackme
   [https://help.tryhackme.com/using-tryhackme
 * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe
 * https://tryhackme.com/room/ccpentesting
   [https://tryhackme.com/room/ccpentesting
 * https://tryhackme.com/room/adventofcyber3
   [https://tryhackme.com/room/adventofcyber3
 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath
 * https://tryhackme.com/resources/blog
   [https://tryhackme.com/resources/blog
 * https://docs.tryhackme.com/ [https://docs.tryhackme.com/
 * https://tryhackme.com/path/outline/pentesting
   [https://tryhackme.com/path/outline/pentesting
 * https://discord.com/channels/521382216299839518/546650767495397376
   [https://discord.com/channels/521382216299839518/546650767495397376
 * https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
   [https://static-labs.tryhackme.cloud/sites/careers-quiz/?role=sa
 * https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
   [https://greenorangge1.medium.com/windows-fundamentals-1-6f3863a98b6b
 * https://tryhackme.com/paths [https://tryhackme.com/paths
 * https://tryhackme.com/room/intro2windows
   [https://tryhackme.com/room/intro2windows
 * https://tryhackme.com/room/securityawarenessintro
   [https://tryhackme.com/room/securityawarenessintro
 * https://tryhackme.com/p/JohnHammond
   [https://tryhackme.com/p/JohnHammond
 * https://tryhackme.com/room/winadbasics
   [https://tryhackme.com/room/winadbasics
 * TryHackMe | Holo [https://tryhackme.com/room/hololive
 * https://tryhackme.com/module/red-team-initial-access
   [https://tryhackme.com/module/red-team-initial-access
 * https://tryhackme.com/module/red-team-fundamentals
   [https://tryhackme.com/module/red-team-fundamentals
 * https://tryhackme.com/room/agentsudoctf
   [https://tryhackme.com/room/agentsudoctf
 * https://tryhackme.com/room/bpsplunk
   [https://tryhackme.com/room/bpsplunk
 * https://tryhackme.com/room/sqlilab [https://tryhackme.com/room/sqlilab
 * https://tryhackme.com/room/blog [https://tryhackme.com/room/blog
 * https://tryhackme.com/room/bof1 [https://tryhackme.com/room/bof1
 * https://tryhackme.com/paths [https://tryhackme.com/paths
 * https://tryhackme.com/my-machine/ [https://tryhackme.com/my-machine/
 * https://tryhackme.com/p/7nKe [https://tryhackme.com/p/7nKe
 * https://tryhackme.com/room/adventofcyber3
   [https://tryhackme.com/room/adventofcyber3
 * https://tryhackme.com/room/wreath [https://tryhackme.com/room/wreath
 * https://tryhackme.com/room/hololive
   [https://tryhackme.com/room/hololive
 * https://tryhackme.com/resources/blog
   [https://tryhackme.com/resources/blog
 * https://tryhackme.com/path/outline/pentesting
   [https://tryhackme.com/path/outline/pentesting
 * https://tryhackme.com/paths [https://tryhackme.com/paths
 * https://tryhackme.com/room/intro2windows
   [https://tryhackme.com/room/intro2windows
 * TryHackMe | 7nKe [https://tryhackme.com/p/7nKe
 * TryHackMe | My Machine [https://tryhackme.com/my-machine/
 * TryHackMe | 7nKe profile [https://tryhackme.com/p/7nKe
 * TryHackMe | CC: Pen Testing [https://tryhackme.com/room/ccpentesting
 * TryHackMe | Advent of Cyber 3 (2021)
   [https://tryhackme.com/room/adventofcyber3
 * TryHackMe | Wreath [https://tryhackme.com/room/wreath
   Liens_SEC_GitHubSec
 * https://github.com/Wh1teDrvg0n/safeVPN-THM
   [https://github.com/Wh1teDrvg0n/safeVPN-THM
 * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit
 * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
 * https://github.com/qazbnm456/awesome-web-security
   [https://github.com/qazbnm456/awesome-web-security
 * https://github.com/Hack-with-Github/Awesome-Hacking
   [https://github.com/Hack-with-Github/Awesome-Hacking
 * https://github.com/swisskyrepo/PayloadsAllTheThings
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * https://github.com/carlospolop/PEASS-ng
   [https://github.com/carlospolop/PEASS-ng
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
 * https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers [https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers
 * https://github.com/rng70/Hacking-Resources/blob/195e3bcee00383a05dd6c8ed97d5cfcd2a14b7c6/Bug%20Bounty/Bug%20bounty%20Hunting.pdf [https://github.com/rng70/Hacking-Resources/blob/195e3bcee00383a05dd6c8ed97d5cfcd2a14b7c6/Bug%20Bounty/Bug%20bounty%20Hunting.pdf
 * https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf [https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf
 * https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties [https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties
 * https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets
 * https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
   [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
 * https://github.com/AfvanMoopen/tryhackme-
   [https://github.com/AfvanMoopen/tryhackme-
 * https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html
   [https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html
 * https://auto.pwnspot.com/ [https://auto.pwnspot.com/
 * https://github.com/vavkamil/awesome-bugbounty-tools
   [https://github.com/vavkamil/awesome-bugbounty-tools
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks
 * https://hackersploit.org/ [https://hackersploit.org/
 * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges
 * https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity
   [https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity
 * https://github.com/sansinstitute/slingshot
   [https://github.com/sansinstitute/slingshot
 * https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 [https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0
 * https://github.com/denisidoro/navi [https://github.com/denisidoro/navi
 * https://github.com/Orange-Cyberdefense/GOAD
   [https://github.com/Orange-Cyberdefense/GOAD
 * https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/
   [https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/
 * https://github.com/rkhal101/Web-Security-Academy-Series
   [https://github.com/rkhal101/Web-Security-Academy-Series
 * https://github.com/OlivierLaflamme/Cheatsheet-God
   [https://github.com/OlivierLaflamme/Cheatsheet-God
 * https://www.youtube.com/watch?v=ZK-h5xei07k
   [https://www.youtube.com/watch?v=ZK-h5xei07k
 * https://github.com/rkhal101/Web-Security-Academy-Series
   [https://github.com/rkhal101/Web-Security-Academy-Series
 * https://github.com/danielthatcher?tab=repositories
   [https://github.com/danielthatcher?tab=repositories
 * https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell
   [https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell
 * https://github.com/Orange-Cyberdefense/GOAD
   [https://github.com/Orange-Cyberdefense/GOAD
 * https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
 * https://www.bugbountyhunter.com/vulnerability/?type=xss
   [https://www.bugbountyhunter.com/vulnerability/?type=xss
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * https://0ut3r.space/2020/07/25/shodan-dorks/
   [https://0ut3r.space/2020/07/25/shodan-dorks/
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * https://www.sans.org/cyberaces/system-administration/
   [https://www.sans.org/cyberaces/system-administration/
 * https://ethicalhackersacademy.com/ [https://ethicalhackersacademy.com/
 * https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388
 * https://cheatsheet.haax.fr/ [https://cheatsheet.haax.fr/
 * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/
 * https://www.puckiestyle.nl/pass-the-hash/
   [https://www.puckiestyle.nl/pass-the-hash/
 * https://github.com/Wh1teDrvg0n/safeVPN-THM
   [https://github.com/Wh1teDrvg0n/safeVPN-THM
 * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
   [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
 * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit
 * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
 * https://github.com/qazbnm456/awesome-web-security
   [https://github.com/qazbnm456/awesome-web-security
 * https://github.com/Hack-with-Github/Awesome-Hacking
   [https://github.com/Hack-with-Github/Awesome-Hacking
 * https://github.com/swisskyrepo/PayloadsAllTheThings
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * https://github.com/carlospolop/PEASS-ng
   [https://github.com/carlospolop/PEASS-ng
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
 * https://www.hackingarticles.in/web-penetration-testing/
   [https://www.hackingarticles.in/web-penetration-testing/
 * https://github.com/enaqx/awesome-pentest
   [https://github.com/enaqx/awesome-pentest
 * https://github.com/S3cur3Th1sSh1t/Pentest-Tools
   [https://github.com/S3cur3Th1sSh1t/Pentest-Tools
 * https://github.com/Tib3rius/Pentest-Cheatsheets
   [https://github.com/Tib3rius/Pentest-Cheatsheets
 * https://github.com/superkojiman?tab=repositories
   [https://github.com/superkojiman?tab=repositories
 * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside
 * https://gtfobins.github.io/ [https://gtfobins.github.io/
 * https://lolbas-project.github.io/ [https://lolbas-project.github.io/
 * https://github.com/0dayCTF [https://github.com/0dayCTF
 * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development
 * https://www.hackingarticles.in/netcat-for-pentester/
   [https://www.hackingarticles.in/netcat-for-pentester/
 * http://www.vulnweb.com/ [http://www.vulnweb.com/
 * https://www.revshells.com/ [https://www.revshells.com/
 * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/
 * https://www.youtube.com/watch?v=h0MqCRYH1mk
   [https://www.youtube.com/watch?v=h0MqCRYH1mk
 * https://github.com/0dayCTF/awesome-shodan-queries
   [https://github.com/0dayCTF/awesome-shodan-queries
 * https://tzusec.com/category/guides/kali-linux/password-attacks/
   [https://tzusec.com/category/guides/kali-linux/password-attacks/
 * https://github.com/GTFOBins/GTFOBins.github.io
   [https://github.com/GTFOBins/GTFOBins.github.io
 * https://github.com/LOLBAS-Project/LOLBAS
   [https://github.com/LOLBAS-Project/LOLBAS
 * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/
 * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
   [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
 * https://www.trenchesofit.com/resources/
   [https://www.trenchesofit.com/resources/
 * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/n3tsky/Pentest-Tools
   [https://github.com/n3tsky/Pentest-Tools
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
   [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://rderik.com/blog/using-radare2-to-patch-a-binary/
   [https://rderik.com/blog/using-radare2-to-patch-a-binary/
 * https://gef.readthedocs.io/en/master/commands/ropper/
   [https://gef.readthedocs.io/en/master/commands/ropper/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://gef.readthedocs.io/en/master/
   [https://gef.readthedocs.io/en/master/
 * https://beta.hackndo.com/assembly-basics/
   [https://beta.hackndo.com/assembly-basics/
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://md5hashing.net/ [https://md5hashing.net/
 * https://hashcat.net/wiki/doku.php?id=example_hashes
   [https://hashcat.net/wiki/doku.php?id=example_hashes
 * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
   [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
 * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial
 * https://github.com/OJ/gobuster#vhost-mode-options
   [https://github.com/OJ/gobuster#vhost-mode-options
 * https://erev0s.com/tools/web-application-assessment-check-list/
   [https://erev0s.com/tools/web-application-assessment-check-list/
 * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf
 * https://reconshell.com/web-attack-cheat-sheet/
   [https://reconshell.com/web-attack-cheat-sheet/
 * https://oscp.infosecsanyam.in/brute-force
   [https://oscp.infosecsanyam.in/brute-force
 * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5
 * https://github.com/Hack-with-Github/Free-Security-eBooks
   [https://github.com/Hack-with-Github/Free-Security-eBooks
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
   [https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
 * https://github.com/SecureAuthCorp/impacket
   [https://github.com/SecureAuthCorp/impacket
 * https://wtfbins.wtf/ [https://wtfbins.wtf/
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://github.com/Hack-with-Github/Free-Security-eBooks
   [https://github.com/Hack-with-Github/Free-Security-eBooks
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://www.threatable.io/ [https://www.threatable.io/
 * https://t.me/s/HackerVideos/ [https://t.me/s/HackerVideos/
 * https://osintframework.com/ [https://osintframework.com/
 * https://github.com/blindfuzzy/LHF [https://github.com/blindfuzzy/LHF
 * https://haax.fr/fr/ [https://haax.fr/fr/
 * https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist
 * https://github.com/andrew-d/static-binaries
   [https://github.com/andrew-d/static-binaries
 * https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys
 * https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
   [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
 * https://vk9-sec.com/ssh2john-how-to/
   [https://vk9-sec.com/ssh2john-how-to/
 * https://github.com/vavkamil/awesome-bugbounty-tools
   [https://github.com/vavkamil/awesome-bugbounty-tools
 * https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md
 * https://github.com/clong/DetectionLab
   [https://github.com/clong/DetectionLab
 * https://github.com/hposton/python-for-cybersecurity
   [https://github.com/hposton/python-for-cybersecurity
 * https://github.com/Orange-Cyberdefense/arsenal
   [https://github.com/Orange-Cyberdefense/arsenal
 * https://www.bugbountyhunter.com/ [https://www.bugbountyhunter.com/
 * https://www.kitploit.com/ [https://www.kitploit.com/
 * https://github.com/CyberSecurityUP/Awesome-PenTest-Practice
   [https://github.com/CyberSecurityUP/Awesome-PenTest-Practice
 * https://github.com/yarrick/iodine [https://github.com/yarrick/iodine
 * https://gitlab.com/An0nUD4Y/hiddeneye
   [https://gitlab.com/An0nUD4Y/hiddeneye
 * https://pequalsnp-team.github.io/cheatsheet/steganography-101
   [https://pequalsnp-team.github.io/cheatsheet/steganography-101
 * https://github.com/Orange-Cyberdefense/arsenal
   [https://github.com/Orange-Cyberdefense/arsenal
 * https://www.hackingarticles.in/web-penetration-testing/
   [https://www.hackingarticles.in/web-penetration-testing/
 * https://github.com/enaqx/awesome-pentest
   [https://github.com/enaqx/awesome-pentest
 * https://github.com/S3cur3Th1sSh1t/Pentest-Tools
   [https://github.com/S3cur3Th1sSh1t/Pentest-Tools
 * https://github.com/Tib3rius/Pentest-Cheatsheets
   [https://github.com/Tib3rius/Pentest-Cheatsheets
 * https://github.com/superkojiman?tab=repositories
   [https://github.com/superkojiman?tab=repositories
 * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/
 * https://github.com/Wh1teDrvg0n/safeVPN-THM
   [https://github.com/Wh1teDrvg0n/safeVPN-THM
 * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
   [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
 * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit
 * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
 * https://github.com/qazbnm456/awesome-web-security
   [https://github.com/qazbnm456/awesome-web-security
 * https://github.com/Hack-with-Github/Awesome-Hacking
   [https://github.com/Hack-with-Github/Awesome-Hacking
 * https://github.com/swisskyrepo/PayloadsAllTheThings
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * https://github.com/carlospolop/PEASS-ng
   [https://github.com/carlospolop/PEASS-ng
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
 * https://www.hackingarticles.in/web-penetration-testing/
   [https://www.hackingarticles.in/web-penetration-testing/
 * https://github.com/enaqx/awesome-pentest
   [https://github.com/enaqx/awesome-pentest
 * https://github.com/S3cur3Th1sSh1t/Pentest-Tools
   [https://github.com/S3cur3Th1sSh1t/Pentest-Tools
 * https://github.com/Tib3rius/Pentest-Cheatsheets
   [https://github.com/Tib3rius/Pentest-Cheatsheets
 * https://github.com/superkojiman?tab=repositories
   [https://github.com/superkojiman?tab=repositories
 * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside
 * https://gtfobins.github.io/ [https://gtfobins.github.io/
 * https://lolbas-project.github.io/ [https://lolbas-project.github.io/
 * https://github.com/0dayCTF [https://github.com/0dayCTF
 * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development
 * https://www.hackingarticles.in/netcat-for-pentester/
   [https://www.hackingarticles.in/netcat-for-pentester/
 * https://www.revshells.com/ [https://www.revshells.com/
 * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/
 * https://www.youtube.com/watch?v=h0MqCRYH1mk
   [https://www.youtube.com/watch?v=h0MqCRYH1mk
 * https://github.com/0dayCTF/awesome-shodan-queries
   [https://github.com/0dayCTF/awesome-shodan-queries
 * https://tzusec.com/category/guides/kali-linux/password-attacks/
   [https://tzusec.com/category/guides/kali-linux/password-attacks/
 * https://github.com/GTFOBins/GTFOBins.github.io
   [https://github.com/GTFOBins/GTFOBins.github.io
 * https://github.com/LOLBAS-Project/LOLBAS
   [https://github.com/LOLBAS-Project/LOLBAS
 * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/
 * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
   [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
 * https://www.trenchesofit.com/resources/
   [https://www.trenchesofit.com/resources/
 * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/n3tsky/Pentest-Tools
   [https://github.com/n3tsky/Pentest-Tools
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
   [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://rderik.com/blog/using-radare2-to-patch-a-binary/
   [https://rderik.com/blog/using-radare2-to-patch-a-binary/
 * https://gef.readthedocs.io/en/master/commands/ropper/
   [https://gef.readthedocs.io/en/master/commands/ropper/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://gef.readthedocs.io/en/master/
   [https://gef.readthedocs.io/en/master/
 * https://beta.hackndo.com/assembly-basics/
   [https://beta.hackndo.com/assembly-basics/
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://md5hashing.net/ [https://md5hashing.net/
 * https://hashcat.net/wiki/doku.php?id=example_hashes
   [https://hashcat.net/wiki/doku.php?id=example_hashes
 * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
   [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
 * https://github.com/OJ/gobuster#vhost-mode-options
   [https://github.com/OJ/gobuster#vhost-mode-options
 * https://erev0s.com/tools/web-application-assessment-check-list/
   [https://erev0s.com/tools/web-application-assessment-check-list/
 * https://reconshell.com/web-attack-cheat-sheet/
   [https://reconshell.com/web-attack-cheat-sheet/
 * https://oscp.infosecsanyam.in/brute-force
   [https://oscp.infosecsanyam.in/brute-force
 * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5
 * https://github.com/superkojiman?tab=repositories
   [https://github.com/superkojiman?tab=repositories
 * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside
 * https://gtfobins.github.io/ [https://gtfobins.github.io/
 * https://lolbas-project.github.io/ [https://lolbas-project.github.io/
 * https://github.com/0dayCTF [https://github.com/0dayCTF
 * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development
 * https://www.hackingarticles.in/netcat-for-pentester/
   [https://www.hackingarticles.in/netcat-for-pentester/
 * https://www.revshells.com/ [https://www.revshells.com/
 * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/
 * https://www.youtube.com/watch?v=h0MqCRYH1mk
   [https://www.youtube.com/watch?v=h0MqCRYH1mk
 * https://github.com/0dayCTF/awesome-shodan-queries
   [https://github.com/0dayCTF/awesome-shodan-queries
 * https://tzusec.com/category/guides/kali-linux/password-attacks/
   [https://tzusec.com/category/guides/kali-linux/password-attacks/
 * https://github.com/GTFOBins/GTFOBins.github.io
   [https://github.com/GTFOBins/GTFOBins.github.io
 * https://github.com/LOLBAS-Project/LOLBAS
   [https://github.com/LOLBAS-Project/LOLBAS
 * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/
 * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
   [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
 * https://www.trenchesofit.com/resources/
   [https://www.trenchesofit.com/resources/
 * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/n3tsky/Pentest-Tools
   [https://github.com/n3tsky/Pentest-Tools
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
   [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://rderik.com/blog/using-radare2-to-patch-a-binary/
   [https://rderik.com/blog/using-radare2-to-patch-a-binary/
 * https://gef.readthedocs.io/en/master/commands/ropper/
   [https://gef.readthedocs.io/en/master/commands/ropper/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://gef.readthedocs.io/en/master/
   [https://gef.readthedocs.io/en/master/
 * https://beta.hackndo.com/assembly-basics/
   [https://beta.hackndo.com/assembly-basics/
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://md5hashing.net/ [https://md5hashing.net/
 * https://hashcat.net/wiki/doku.php?id=example_hashes
   [https://hashcat.net/wiki/doku.php?id=example_hashes
 * Open-source-tools-for-CTI/Darknet.md at master ·
   BushidoUK/Open-source-tools-for-CTI · GitHub
   [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md
 * PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master ·
   swisskyrepo/PayloadsAllTheThings · GitHub
   [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
 * GitHub - qazbnm456/awesome-web-security: 🐶 A curated list of Web
   Security materials and resources.
   [https://github.com/qazbnm456/awesome-web-security
 * GitHub - Hack-with-Github/Awesome-Hacking: A collection of various
   awesome lists for hackers, pentesters and security researchers
   [https://github.com/Hack-with-Github/Awesome-Hacking
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * GitHub - carlospolop/PEASS-ng: PEASS - Privilege Escalation Awesome
   Scripts SUITE (with colors) [https://github.com/carlospolop/PEASS-ng
 * All Sites - Stack Exchange [https://stackexchange.com/sites
 * 0x00sec - The Home of the Hacker [https://0x00sec.org/
 * 500+ latest Verified Deep Web Links | DARK WEB Links
   [https://darkweblink.com/deep-web-links/
 * How To Search Popular Hacker Forums On The Dark Web | DWL
   [https://darkweblink.com/search-hacker-forums-dark-web/
 * PowerSploit/PowerUp.ps1 at master · PowerShellMafia/PowerSploit ·
   GitHub
   [https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1
 * About [https://blog.openthreatresearch.com/about/
   muscu
 * Abdominals - MuscleWiki
   [https://musclewiki.com/Bodyweight/Male/Abdominals
   VTT
 * Client web BRouter
   [https://brouter.de/brouter-web/#map=12/45.3812/4.5422/cyclosm&profile=trekking-ignore-cr
 * CyclOSM: OpenStreetMap-based bicycle map
   [https://www.cyclosm.org/#map=13/45.3708/4.4416/cyclosm
 * - Carte des randonnées et promenades - SityTrail
   [https://www.sitytrail.com/fr/map/trails/?f_depart=within_4.452209472656251%2C45.39495432805337%2C4.627990722656251%2C45.472530908551526&f_rel_activity=202
 * Aide en ligne de l'application mobile - Wiki - SityTrail
   [https://www.sitytrail.com/fr/wiki/70b2c778-634f-4516-a434-55e2d7769e59/
 * Bras Pivotant Van-Swing Spécial Jumpy / Expert / ProAce / Vivaro
   avec Ouverture à Gauche - Attelage-Accessoire-Auto
   [https://attelage-accessoire-auto.com/peugeot-expert/7436-bras-pivotant-van-swing-special-jumpy-expert-proace-vivaro-avec-ouverture-a-gauche.html
 * Client web BRouter
   [https://brouter.de/brouter-web/#map=13/45.3709/4.4416/cyclosm&lonlats=4.378052,45.358506;4.515896,45.370334&profile=trekking-ignore-cr
 * Nos Circuits - www.boisnoirs.fr
   [https://www.boisnoirs.fr/espace-vtt-ffc/nos-circuits/
 * Parcours vtt - 8 Balcon de la Drôme - Saillans
   [https://www.cirkwi.com/fr/circuit/238269-8-balcon-de-la-drome
 * Recherche de randos VTT avec traces GPS
   [https://www.utagawavtt.com/search?...&q=1,2,3&k=0&l=all&u=1&ak=11974&aa=50|fr]
 * France [https://www.freizeitkarte-osm.de/garmin/en/france.html
 * BBBike extracts OpenStreetMap [https://garmin3.bbbike.org/
 * Recherche de randos VTT avec traces GPS
   [https://www.utagawavtt.com/search?...&q=1,2,3&k=0&l=all&u=1&ak=11974&aa=50|fr]
 * Stage de pilotage VTT dans la vallée de l'Eyrieux -
   Perfectionnez-vous pour plus de plaisir à VTT! - Ardèche
   [https://www.pmpv-ardeche.com/fr/sejours-pmpv-ardeche/stage-de-pilotage-vtt-dans-la-vallee-de-l-eyrieux/29-perfectionnez-vous-pour-plus-de-plaisir-a-vtt.htm
 * Stage enduro VTT niveau 3 & 4 - ORIENTATION VÉLO
   [https://www.orientation-velo.com/stage-vtt-niveau-3-enduro/
 * VTTAE.fr - Le Magazine du VTT à assistance électrique
   [https://vttae.fr/
 * Les caractéristiques des pneus VTT -
   [https://www.cycletyres.fr/blog/les-caracteristiques-des-pneus-vtt.html
 * Pilotage VTT - 5 exercices pour progresser facilement et rapidement
   ! - YouTube [https://www.youtube.com/watch?v=opvVK9t7ahw
 * PILOTAGE VTT : Apprendre à faire le bunny-up / bunny hop en 1 jour -
   YouTube [https://www.youtube.com/watch?v=uVPbyXWCNeg
 * MTB Hopper Balance
   [https://mohawkscycles.fr/fr/accueil/1100328-mtb-hopper-balance-4779047700162.html
 * Pilotage VTT - Comment faire un Manual ? - YouTube
   [https://www.youtube.com/watch?v=CBPpwdRCeqI&list=PL009Lcswci7HFGK4ZVCsZCA-mPhn-9JCh
 * POUR MON GPS GARMIN – QUELLE CARTOGRAPHIE ? - www.actuduvttgps.fr
   [https://www.actuduvttgps.fr/2018/02/17/pour-mon-gps-garmin-quelle-cartographies/
   TV_Film_video
 * Netflix Codes : trouvez les catégories cachées sur Netflix (liste
   complète) [https://www.netflix-codes.com/fr
 * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/
   COUPONS
 * 50% Off Hack The Box EU COUPON CODE: (5 ACTIVE) Oct 2023
   [https://www.wethrift.com/hack-the-box-eu
   A_TRIER
 * Protection de la messagerie par SPF et DKIM – IØ Expertises
   [https://www.io-expertises.fr/protection-de-la-messagerie-par-spf-et-dkim/
 * Black Hills Information Security, a Penetration Testing Company -
   Projects [https://www.blackhillsinfosec.com/projects/
 * Antionline Forums - Maximum Security for a Connected World
   [https://www.antionline.com/forums.php?s=d3d6fe6e34f4dc1bda42e6f3fd789545
 * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking
   #Luvz [https://www.0x0ff.info/
 * Nothink! [http://www.nothink.org/
 * Ventoy : Booter Plusieurs Images Sur Une Seule Clé USB
   [https://holory.fr/ventoy-booter-plusieurs-iso/
 * Page 6 of 28 for Blog Eleven Labs | Blog Eleven Labs
   [https://blog.eleven-labs.com/page/6/
 * GDPR Solutions | Black Hat Ethical Hacking
   [https://www.blackhatethicalhacking.com/guest/gdpr-solutions/
 * Transférer des données hors de l'UE | CNIL
   [https://www.cnil.fr/fr/transferer-des-donnees-hors-de-lue
 * Platform Downloads | OmniSci
   [https://www.omnisci.com/platform/downloads
 * 👍 Pouce Vers Le Haut Emoji [https://emojiterra.com/fr/pouce-leve/
 * logiciel pfsense | www.osnet.eu
   [https://www.osnet.eu/fr/articles-by-category/logiciel-pfsense
 * Ansible TLDR [https://blog.karolak.fr/2020/09/23/ansible-tldr/
 * JeffProd | Le hachage perceptuel (perceptual hashing)
   [https://fr.jeffprod.com/blog/2018/le-hachage-perceptuel/
 * APPRENDRE PYTHON: FORMATION COMPLÈTE GRATUITE 2021 - YouTube
   [https://www.youtube.com/watch?v=LamjAFnybo0
 * Shell Ransomware [https://mediashare.fr/post/shell-ransomware
 * Building a Custom Malware Analysis Lab Environment - SentinelLabs
   [https://labs.sentinelone.com/building-a-custom-malware-analysis-lab-environment/
 * GitHub - rshipp/awesome-malware-analysis: Defund the Police.
   [https://github.com/rshipp/awesome-malware-analysis#deobfuscation
 * Qu’est-ce que le modèle OSI ? | Cloudflare
   [https://www.cloudflare.com/fr-fr/learning/ddos/glossary/open-systems-interconnection-model-osi/
 * Documentation technique | Microsoft Docs
   [https://docs.microsoft.com/fr-fr/documentation/
 * I-BlockList | Lists [https://www.iblocklist.com/lists?category=country
 * Veyon | Contrôle d'ordinateur et gestion de classe multiplateforme
   [https://veyon.io/fr/#screenshots
 * Seeing Red: The Fun Stuff - ericooi.com
   [https://www.ericooi.com/seeing-red-the-fun-stuff/
 * Télécharger une machine virtuelle Windows - Développement
   d’applications Windows | Microsoft Developer
   [https://developer.microsoft.com/fr-fr/windows/downloads/virtual-machines/
 * Python | Opensource.com [https://opensource.com/tags/python
 * Chess.com
   [https://www.chess.com/lessons/opening-principles/control-the-center
 * The Julia Programming Language [https://julialang.org/
 * lichess.org [https://lichess.org/jvk3tpXw
 * Take It Easy
   [https://mynoise.net/NoiseMachines/paulNagleSequenceGenerator.php
 * Virtualbox : le dossier COMPLET - malekal.com
   [https://www.malekal.com/virtualbox-le-dossier-complet/
 * OCTO Vault
   [https://blog.octo.com/gardez-les-cles-de-votre-infrastructure-a-labri-avec-vault/
 * Speaking7 - online chat [https://speaking7.com/#/chat
 * SQLBolt - Learn SQL - SQL Lesson 1: SELECT queries 101
   [https://sqlbolt.com/lesson/select_queries_introduction
 * Les ressources d'un web entrepreneur indépendant
   [https://ston3o.me/ressources/
 * Not All Password Managers Are Created Equal: Which is the Best? |
   Hacker Noon
   [https://hackernoon.com/not-all-password-managers-are-created-equal-which-is-the-best-891v346e
 * GitHub - sindresorhus/awesome: 😎 Awesome lists about all kinds of
   interesting topics [https://github.com/sindresorhus/awesome
 * GitHub - stamparm/maltrail: Malicious traffic detection system
   [https://github.com/stamparm/maltrail#demo-pages
 * Security Symposium - August 22, 2019 - BrightTALK
   [https://www.brighttalk.com/summit/4551-security-symposium/
 * Homputer Security - Blog d'information sur la sécurité informatique
   [https://homputersecurity.com/
 * Welcome to Ptest Method’s documentation! — Ptest Method 1
   documentation [https://ptestmethod.readthedocs.io/en/latest/index.html
 * Firefox Send [https://send.firefox.com/
 * File / Disk Size Converter - WintelGuy.com
   [https://wintelguy.com/filesizeconv.pl/?un1=8&un2=208
 * Mises à jour automatiques sous CentOS 7 avec yum-cron – Microlinux
   [https://www.microlinux.fr/yum-cron-centos-7/
 * Search Results for httpd in Arch Linux [https://pkgs.org/download/httpd
 * hide.me [https://nl.hideproxy.me/index.php
 * IP [http://www.myipconfig.com/
 * SSL Server Test: mon.switchy.pro (Powered by Qualys SSL Labs)
   [https://www.ssllabs.com/ssltest/analyze.html?d=mon.switchy.pro&latest
 * IP Neighbour : Find sites on the same IP address
   [https://www.ipneighbour.com/#/lookup/37.58.160.78
 * SenderBase [http://www.senderbase.org/
 * SSL Checker - SSL Certificate Verify
   [https://www.sslshopper.com/ssl-checker.html
 * Achat nom de domaine Particulier Entreprise Revendeur - Namebay
   [https://www.namebay.com/
 * KPROXY - Free Anonymous Web Proxy - Anonymous Proxy
   [http://server5.kproxy.com/
 * Errata Security [https://blog.erratasec.com/
 * Scan results for www.pierre-ricaud.com
   [https://securityheaders.com/?q=www.pierre-ricaud.com&followRedirects=on
 * BASH | Admin Linux [https://www.admin-linux.fr/category/bash/
 * Cheatssheets [https://devhints.io/
 * Présentation du statut | Downdetector [https://downdetector.fr/
 * Global DNS Propagation Checker - What's My DNS?
   [https://www.whatsmydns.net/#A/handilor.fr
 * | Getting started | British Council
   [https://learnenglish.britishcouncil.org/getting-started?promo_id=fr01&promo_name=free-resources&promo_creative=cards&promo_position=homepage
 * DJ4E - Django for Everybody [https://www.dj4e.com/lessons
 * WA4E - Web Applications for Everybody [https://www.wa4e.com/lessons
 * Yandex [https://yandex.com/
 * Ipio [https://ipinfo.io/
 * Pocket Explore [https://getpocket.com/explore/
 * kexp [https://kexp.org/listen/
 * Packages Search - pkgs.org [https://pkgs.org/
 * Sport | Sikana [https://www.sikana.tv/fr/sport
 * Écouter FIP en direct et gratuit [http://www.radio-en-ligne.fr/fip
 * Ecosia – Le moteur de recherche qui plante des arbres
   [https://www.ecosia.org/?ref=icon-search&addon=firefox&addonversion=4.0.4
 * Téléchargement Youtube Mp4 | Youtube Mp4
   [https://youtube-mp4.download/fr/free-converter
 * English-Video.net [https://www.english-video.net/p/fr/1
 * Essai | L'exposition expliquée par Canon
   [http://www.canonoutsideofauto.ca/play/
 * Email temporaire – Email à usage unique - Email anonyme
   [https://temp-mail.org/fr/
 * 01 Day - French - Discourses - Vipassana Meditation - YouTube
   [https://www.youtube.com/watch?v=asQh1BpDhJo&list=PLAETbiXQpqZV5_n1ssOO2ivXP8VarBl7j
 * DC Challenges [http://www.five86.com/
 * Programming / Coding / Hacking music vol.8 (CONNECTING) - YouTube
   [https://www.youtube.com/watch?v=x2RTQCn0N5Q&list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y&index=6
 * 5 Kali Linux tricks that you may not know · Pentester Land
   [https://pentester.land/tips-n-tricks/2018/11/09/5-kali-linux-tricks-that-you-may-not-know.html
 * HL 2.0 [https://academy.hacking-lab.com/
 * Shop HL [https://shop.hacking-lab.com/
 * Compass Security [https://www.compass-security.com/en/
 * Kali Linux [https://www.kali.org/
 * Kali Training [https://kali.training/
 * Kali Tools [https://tools.kali.org/
 * Kali Docs [https://www.kali.org/docs/
 * Kali Forums [https://forums.kali.org/
 * NetHunter [https://www.kali.org/kali-linux-nethunter/
 * Offensive Security [https://www.offensive-security.com/
 * Recon - Rowbot's PenTest Notes [https://guide.offsecnewbie.com/recon
 * G [https://encrypted.google.com/
 * Ecosia [https://www.ecosia.org/
 * Reverso
   [https://www.reverso.net/translationresults.aspx?lang=FR&direction=francais-anglais
 * Pocket [https://app.getpocket.com/?src=navbar
 * Santé.fr - Centres de vaccination covid-19
   [https://www.sante.fr/cf/centres-vaccination-covid.html#dep-42
 * Débuter avec Firefox [https://www.mozilla.org/fr/firefox/central/
 * Getting Started [https://www.mozilla.org/en-US/firefox/central/
 * Pen Magazine International [https://pen-online.com/fr/
 * Ansible quickstart cheatsheet [https://devhints.io/ansible-guide
 * MDN [https://developer.mozilla.org/fr/
 * Online Markdown Editor - Dillinger, the Last Markdown Editor ever.
   [https://dillinger.io/
 * LesFuretsCTF | La Sécurité Informatique est notre passion.
   [https://lesfuretsctf.wordpress.com/
 * Ansible : les bases (1/6) – d3vpasha
   [https://d3vpasha.wordpress.com/2017/04/01/ansible/
 * RDM - The Devolutions Blog
   [https://blog.devolutions.net/category/tipstricks
 * Resources - Visualising Data
   [https://www.visualisingdata.com/resources/
 * Knowledge Base | Liquid Web [https://www.liquidweb.com/kb/
 * Infosec Reactions — when windows 10 installer says its the most
   secure...
   [https://securityreactions.tumblr.com/post/168478724214/when-windows-10-installer-says-its-the-most-secure
 * Documentation SecuriteInfo.com
   [https://www.securiteinfo.com/divers/documentation_securite_informatique.shtml
 * https://www.the-webcam-network.com/
   [https://www.the-webcam-network.com/
 * Ventoy : Booter Plusieurs Images Sur Une Seule Clé USB
   [https://holory.fr/ventoy-booter-plusieurs-iso/
 * Ethical hacking and penetration testing - InfoSec, IT, Kali Linux,
   BlackArch [https://miloserdov.org/
 * Getting Started with Exploit Development
   [https://dayzerosec.com/blog/2021/02/02/getting-started.html
 * BREAKDEV [https://breakdev.org/
 * Ultimate OSINT with Shodan: 100+ great Shodan queries – osintme.com
   [https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/
 * technique et droit du numérique = le blog tout en BD !
   [https://technique-et-droit-du-numerique.fr/
 * Comment s'inscrire sur Mastodon, l'alternative à Twitter ? -
   Numerama
   [https://www.numerama.com/tech/936461-comment-sinscrire-sur-mastodon-lalternative-a-twitter.html
 * Installation automatique – WordPress en Français
   [https://fr.wordpress.org/support/article/automated-installation/#aps-plesk
 * Vidéos humoristes et comiques français : vidéos sketchs comiques
   [http://youhumourpro.com/
 * ChannelStream | Les directs sportif en streaming
   [https://channelstream.es/chaine-tv.php
 * Free WiFi map - search for free WiFi hotspots: list of public places
   with free WiFi - Wi-Fi Space [https://wifispc.com/
 * GeoFS - Free Online Flight Simulator [https://www.geo-fs.com/
 * Catalog of Courses | Harvard University
   [https://pll.harvard.edu/catalog
 * DigitalDefynd - Find the Best + Free Courses Online
   [https://digitaldefynd.com/
 * Livres audio gratuits les plus aimés | Litterature audio.com
   [https://www.litteratureaudio.com/classement-de-nos-livres-audio-gratuits-les-plus-apprecies
 * Creating a pocket pentest platform with P4wnP1: Part 1 :: Gideon
   Wolfe [https://gideonwolfe.com/posts/security/p4wnp1/
 * juice-shop-ctf-cli - npm
   [https://www.npmjs.com/package/juice-shop-ctf-cli
 * Keren Elazari | Speaker | TED
   [https://www.ted.com/speakers/keren_elezari
 * Guide retraite I La retraite en clair
   [https://www.la-retraite-en-clair.fr/preparer-administrativement-retraite/depart-retraite-demarches-entreprendre/guide-retraite
 * Top 77 Similar websites like vulnweb.com and alternatives
   [https://www.sitelike.org/similar/vulnweb.com/
 * Malicious VBA Macro's: Trials and Tribulations :: John Woodman's
   Security Blog
   [https://john-woodman.com/research/malicious-vba-macros-trials-tribulations/
 * Sync passwords with KeePass to OneDrive, Google Drive, and Dropbox –
   4sysops
   [https://4sysops.com/archives/sync-passwords-with-keepass-to-onedrive-google-drive-and-dropbox/
 * Welcome! [https://suip.biz/
 * Getting Started [https://www.mozilla.org/en-US/firefox/central/
 * Homepage [https://manjaro.org/
 * Forum [http://forum.manjaro.org/
 * Wiki [http://wiki.manjaro.org/index.php/Main_Page
 * Manjaro Discover Software [https://discover.manjaro.org/
 * Mozilla News [http://blog.mozilla.com/
 * GL.iNet Admin Panel [http://192.168.8.1/#/login
 * 20130808150808772272449.pdf
   [https://www.trxtraining.fi/files/20130808150808772272449.pdf
 * Kali Linux [https://www.kali.org/
 * Kali Tools [https://www.kali.org/tools/
 * Kali Docs [https://www.kali.org/docs/
 * Kali Forums [https://forums.kali.org/
 * Cyber Security news - Latest Security News | Security Magazine
   [https://gbhackers.com/
 * Kali NetHunter [https://www.kali.org/kali-nethunter/
 * Exploit-DB [https://www.exploit-db.com/
 * Google Hacking DB [https://www.exploit-db.com/google-hacking-database
 * OffSec [https://www.offensive-security.com/
 * xavki - YouTube
   [https://www.youtube.com/channel/UCs_AZuYXi6NA9tkdbhjItHQ
 * Introduction and string - #Python 01 - YouTube
   [https://www.youtube.com/watch?v=4PcdtrBtHrM&list=PLn6POgpklwWr7m35ZLEul4lFJQfO4PfGQ
 * 12 Secure File Sharing Services to Send Data Privately - Geekflare
   [https://geekflare.com/secure-file-sharing/
 * La méthode OSIRIS
   [https://www.actionco.fr/Thematique/methodologie-1246/fiche-outils-10181/La-methode-OSIRIS-324155.htm

   RECHERCHE_AI_IA
 * OpenAI Platform [https://platform.openai.com/apps
 * Andi - Search for the next generation [https://andisearch.com/
 * Certificat.fr | leader dans les solutions de cybersécurité |
   Certificat [https://www.certificat.fr/fr
 * sousreddits [https://www.reddit.com/subreddits/
 * Presearch [https://presearch.com/
 * Titi [https://beta.sayhello.so/
 * searx [https://searx.thegpm.org/
 * ATI [https://www.alltheinternet.com/
 * Bing [https://www.bing.com/?FORM=Z9FD1
 * AIO [https://all-io.net/
 * Startpage [https://www.startpage.com/?sc=U1UF8TURdrdn20&t=default
 * Mojeek [https://www.mojeek.com/
 * Open Directories [https://www.reddit.com/r/opendirectories/
 * Programmable Search Engine
   [https://cse.google.com/cse?cx=c46414ccb6a943e39
 * Hurricane Electric BGP Toolkit [https://bgp.he.net/
 * Biznar: Deep Web Business Search
   [https://biznar.com/biznar/desktop/en/search.html
 * BASE (Bielefeld Academic Search Engine): Recherche avancée
   [https://www.base-search.net/Search/Advanced
 * What is OSINT? 15 top open source intelligence tools | CSO Online
   [https://www.csoonline.com/article/3445357/what-is-osint-top-open-source-intelligence-tools.html?page=2
 * Reverse IP Lookup - ViewDNS.info
   [http://viewdns.info/reverseip/?host=www.easyback-auto.com&t=1
 * RequestBin — Collect, inspect and debug HTTP requests and webhooks
   [https://requestb.in/
 * Top 100 Bad Addresses | IP Address and Robot Database | Access
   Watch: The Web Traffic Intelligence Engine
   [https://access.watch/database/addresses/bad
 * DNSdumpster.com - dns recon and research, find and lookup dns
   records [https://dnsdumpster.com/
 * G Suite [https://toolbox.googleapps.com/apps/main/
 * Port Check Tool [https://www.yougetsignal.com/tools/open-ports/
 * DNSstuff [http://www.dnsstuff.com/
 * View HTTP Request and Response Header [http://web-sniffer.net/
 * Access Watch: Open Source Web Traffic Processor [https://access.watch/
 * What Is My IP | Whats My IP | IP Location [https://www.whatismyip.net/
 * Programming Buddy Club - Premium Udemy Courses for Free‎
   [http://www.programmingbuddy.club/search?updated-max=2017-09-15T07%3A19%3A00-07%3A00&max-results=8#PageNo=3
 * Phonebook.cz - Intelligence X [https://phonebook.cz/
 * bastion - RefSeek [https://www.refseek.com/search?q=bastion
 * WorldCat.org : le plus grand catalogue de bibliothèques au monde
   [https://www.worldcat.org/
 * Home - Springer [https://link.springer.com/
 * Social Buzz – Free Social Mentions Search and Monitoring
   [https://www.social-searcher.com/social-buzz/?wblng=&ntw=&psttyp=&searchid=&period=&value=&fbpage=&q5=adista.fr
 * EXFiLTRATED [https://www.exfiltrated.com/querystart.php
 * YOU [https://you.com/
 * Welcome! [https://w-e-b.site/
 * Grayhatwarfare [https://grayhatwarfare.com/
 * PHOTOCALL.TV - Televisión y radio online [https://photocall.tv/
 * Toolbox | DNSstuff | DNSreport Results for togetherinbahrain.com
   [http://www.dnsstuff.com/tools#dnsReport
   PDCAD
 * Startpage Résultats de la Recherche
   [https://www.startpage.com/sp/search
 * 10 meilleurs logiciels de contrôle à distance pour PC - malekal.com
   [https://www.malekal.com/meilleurs-logiciels-controle-distance-pc/#RustDesck_open_source_et_gratuit
 * Quels sont les meilleurs logiciels de contrôle à distance ? Notre
   comparatif 2022
   [https://www.clubic.com/telecharger/actus-logiciels/best-pick-371301-comparatif-des-meilleurs-logiciels-de-controle-a-distance-2021-.html
 * Les 12 meilleurs logiciels de prise en main à distance
   [https://digitiz.fr/blog/logiciels-prise-en-main-a-distance/
 * Comment désinstaller Iperius Remote
   [https://www.iperiusremote.com/18463/comment-desinstaller-iperius-remote
 * Accès à distance | Connexion à distance | Zoho Assist
   [https://www.zoho.com/fr/assist/
 * TeamViewer – Le logiciel de connectivité à distance
   [https://www.teamviewer.com/fr/
 * Solution web tout-en-un d'assistance et d'accès à distance - IT
   remote [https://itremote.com/
 * Caracteristiques | Supremo
   [https://www.supremocontrol.com/fr/caracteristiques/
 * ConnectWise Access Management (CAM)
   [https://control.connectwise.com/access-management
 * Logiciel de bureau à distance intuitif d'AnyDesk
   [https://anydesk.com/fr/solutions/remote-desktop
 * Installation :: Documentation for RustDesk
   [https://rustdesk.com/docs/en/self-host/install/
 * Startpage Résultats de la Recherche
   [https://www.startpage.com/do/dsearch?query=dameware&cat=web&pl=ext-ff&language=francais&extVersion=1.3.0
 * Logiciel de contrôle à distance - Outil de bureau à distance |
   Dameware [https://www.dameware.com/fr/dameware-mini-remote-control
   Hashicorp_VAULT
 * Tutorials | Vault | HashiCorp Developer
   [https://developer.hashicorp.com/vault/tutorials?ajs_aid=c86cf749-bb48-41b6-967a-4ab4c759c7b4&product_intent=vault
   XSS
 * pfSense : obtention d’un reverse-shell root à partir d’une XSS |
   Connect - Editions Diamond
   [https://connect.ed-diamond.com/MISC/misc-094/pfsense-obtention-d-un-reverse-shell-root-a-partir-d-une-xss
 * XSS 101 - Brute XSS [https://brutelogic.com.br/blog/xss101/
 * HackinGeeK L'art subtil d'exploiter la vulnérabilité XSS
   [https://hackingeek.com/xss-exploitation/
 * 5 Practical Scenarios for XSS Attacks | Pentest-Tools.com Blog
   [https://pentest-tools.com/blog/xss-attacks-practical-scenarios/
 * Excess XSS: A comprehensive tutorial on cross-site scripting
   [https://excess-xss.com/
 * XSS - NetSec [https://nets.ec/XSS
 * La faille XSS - Protégez-vous efficacement contre les failles web -
   OpenClassrooms
   [https://openclassrooms.com/fr/courses/2091901-protegez-vous-efficacement-contre-les-failles-web/2680167-la-faille-xss
 * BugBountyHunting.com - A community-curated Resource for Bug Bounty
   Hunting [https://www.bugbountyhunting.com/?q=xss
 * SQL Injection | pentestmonkey
   [https://pentestmonkey.net/category/cheat-sheet/sql-injection
 * Cross-Site Scripting (XSS) Cheat Sheet - 2021 Edition | Web Security
   Academy
   [https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
 * Cheatsheet: XSS that works in 2021 – Sam's Hacking Wonderland
   [https://netsec.expert/posts/xss-in-2021/
 * Cheatsheet: XSS that works in 2021 – Sam's Hacking Wonderland
   [https://netsec.expert/posts/xss-in-2021/#javascript-event-based-xss
 * Free online XSS scanner [https://www.xss-scanner.com/
 * https://www.bugbountyhunter.com/vulnerability/?type=xss
   [https://www.bugbountyhunter.com/vulnerability/?type=xss
 * Sboxr | Scanner for DOM XSS and Client-side Security
   [https://sboxr.com/
 * From XSS to RCE: The loca1gh0st exercise
   [https://loca1gh0s7.github.io/MFH-from-XSS-to-RCE-loca1gh0st-exercise/
 * Cross Site Scripting (XSS) Attack Tutorial with Examples, Types &
   Prevention
   [https://www.softwaretestinghelp.com/cross-site-scripting-xss-attack-test/#1_Reflected_XSS
 * SQL injection cheat sheet | Web Security Academy
   [https://portswigger.net/web-security/sql-injection/cheat-sheet
 * XSS game: Level 1 [https://xss-game.appspot.com/level1
 * From XSS CSRF + Command Injection To Reverse Shell – Cyber Security
   Architect | Red/Blue Teaming | Exploit/Malware Analysis
   [https://rioasmara.com/2020/09/21/from-xss-csrf-command-injection-to-reverse-shell/
 * XSS Reverse Shell · GitHub
   [https://gist.github.com/ivanvza/08d75112ee41dec3e92d0ff59505c678
 * GitHub - s0md3v/AwesomeXSS: Awesome XSS stuff
   [https://github.com/s0md3v/AwesomeXSS
 * GitHub - payloadbox/xss-payload-list: 🎯 Cross Site Scripting ( XSS
   ) Vulnerability Payload List
   [https://github.com/payloadbox/xss-payload-list
 * JSshell - A JavaScript Reverse Shell!Kalilinuxtutorials
   [https://kalilinuxtutorials.com/jsshell/
 * xss-payload-list/Intruder/xss-payload-list.txt at master ·
   payloadbox/xss-payload-list · GitHub
   [https://github.com/payloadbox/xss-payload-list/blob/master/Intruder/xss-payload-list.txt
   Revshell
 * PayloadsAllTheThings/Methodology and Resources/Reverse Shell
   Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
   [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#powershell
   Search_Surface_exposée_dork_vuln
 * Cyber Defense Search Engine | ONYPHE [https://www.onyphe.io/
 * site:*.github.io intext:cheatsheet+offensive+pentesting wpscan -
   Recherche Google
   [https://www.google.com/search?q=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&sca_esv=570671288&ei=2XkdZauqHL2lkdUPg4iOkAY&ved=0ahUKEwjr-pmk0NyBAxW9UqQEHQOEA2IQ4dUDCA8&uact=5&oq=site%3A*.github.io+intext%3Acheatsheet%2Boffensive%2Bpentesting+wpscan&gs_lp=Egxnd3Mtd2l6LXNlcnAiPnNpdGU6Ki5naXRodWIuaW8gaW50ZXh0OmNoZWF0c2hlZXQrb2ZmZW5zaXZlK3BlbnRlc3Rpbmcgd3BzY2FuSMoUUO8BWIcScAF4AJABAJgBPaABhgOqAQE3uAEDyAEA-AEB4gMEGAEgQYgGAQ&sclient=gws-wiz-serp
 * DorkSearch - Speed up your Google Dorking [https://www.dorksearch.com/
 * Hosts Search - Censys
   [https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q=unyc.io
 * AutoSploit = Shodan/Censys/Zoomeye + Metasploit - PenTestIT
   [http://pentestit.com/autosploit-shodan-censys-zoomeye-metasploit/
 * Shodan Hacks [https://0ut3r.space/2020/07/25/shodan-dorks/
 * crt.sh | Certificate Search [https://crt.sh/
 * Censys [https://censys.io/
   Reverse
 * PE-bear | hasherezade's 1001 nights
   [https://hshrzd.wordpress.com/pe-bear/
 * PE Bear - looking inside
   [https://institute.sektor7.net/view/courses/red-team-operator-malware-development-essentials/214144-portable-executable/624071-pe-bear-looking-inside
 * How to start RE/malware analysis? | hasherezade's 1001 nights
   [https://hshrzd.wordpress.com/how-to-start/
 * Introduction to Reverse Engineering with Ghidra | Hackaday.io
   [https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra
   CERT
 * Alertes et Vulnérabilités | Portail du CERT Santé
   [https://cyberveille-sante.gouv.fr/alertes-et-vulnerabilites
 * CERT-EU News Monitor
   [https://cert.europa.eu/cert/filteredition/en/CERT-LatestNews.html
 * Submission list :: Infosec - CERT-PA
   [https://infosec.cert-pa.it/analyze/submission.html
 * Points de contrôle Active Directory – CERT-FR
   [https://www.cert.ssi.gouv.fr/dur/CERTFR-2020-DUR-001/
 * CERT-FR [https://cyberowl.mousqueton.io/#/CERT-FR
   PENTEST
 * Pentest – Tests d’intrusion et audits de sécurité | Vaadata
   [https://www.vaadata.com/fr/
 * BurpSuite - Intercepter toutes les requêtes HTTP - Le guide
   [https://docs.bluekeys.org/guide/cyber-securite/outils/burpsuite-introduction
 * Exploit Education :: Andrew Griffiths' Exploit Education
   [https://exploit.education/
 * Spyse — Internet Assets Search Engine [https://spyse.com/
 * OSINT Framework [https://osintframework.com/
 * 0x0ff.info – Sécurité Informatique et Juridique – #InfoSec #Hacking
   #Luvz [https://www.0x0ff.info/
 * ViewDNS.info - Your one source for DNS related tools!
   [https://viewdns.info/
 * HackTricks - HackTricks [https://book.hacktricks.xyz/
 * Wikipedia:10,000 most common passwords - Wikipedia
   [https://en.wikipedia.org/wiki/Wikipedia:10,000_most_common_passwords
 * 0x00sec - The Home of the Hacker [https://0x00sec.org/
 * Hack Today — The Home of Hackers! [https://www.hacktoday.io/
 * hacking_tools_cheat_sheet_v1.0.pdf
   [https://blog.compass-security.com/wp-content/uploads/2019/10/hacking_tools_cheat_sheet_v1.0.pdf
 * NaviSec Delta [https://delta.navisec.io/
 * GTFOBins [https://gtfobins.github.io/
 * Browserling – Online cross-browser testing
   [https://www.browserling.com/
 * Nothink! [http://www.nothink.org/
 * Web | WebFu Staging [https://web-central.appspot.com/web/
 * PentesterLab Bootcamp [https://pentesterlab.com/bootcamp
 * BHaFSec Pentesting Notes Wiki
   [http://www.bhafsec.com/wiki/index.php/Main_Page
 * GreyNoise Visualizer [https://viz.greynoise.io/
 * Hacking/OSCP cheatsheet :: Ceso Adventures
   [https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
 * OffSecNewbie.com – My Offensive Security Journey
   [https://offsecnewbie.com/
 * Kali - Packages · GitLab [https://gitlab.com/kalilinux/packages
 * PenTest [https://guide.offsecnewbie.com/
 * Pentest Practice [https://www.pentestpractice.com/challenges
 * TryHackMe [https://tryhackme.com/
 * JoeMCRAY- Pentest+ 2020 - Pastebin.com [https://pastebin.com/b1hepFjq
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/
 * IppSec - Search [https://ippsec.rocks/
 * What rooms should you do? A free guide for beginners
   [https://blog.tryhackme.com/free_path/
 * Hackplayers · GitHub [https://github.com/Hackplayers
 * Tags | 0xdf hacks stuff [https://0xdf.gitlab.io/tags.html
 * Hack The Box :: Penetration Testing Labs [https://www.hackthebox.eu/
 * WarGames – Pentesting Fun Stuff [https://n0w4n.nl/category/wargames/
 * What is CTF and how to get Started - Complete Guide for Beginners to
   Advanced - Haxf4rall [https://haxf4rall.com/2019/06/29/ctf-guide/
 * OSINT Framework [https://osintframework.com/
 * GitHub - uppusaikiran/awesome-ctf-cheatsheet: CTF Cheatsheet
   [https://github.com/uppusaikiran/awesome-ctf-cheatsheet
 * Canarytokens [https://canarytokens.org/generate
 * OWASP ZAP – ADDO Authentication Workshop
   [https://www.zaproxy.org/addo-auth-workshop/
 * OWASP ZAP – ZAP in Ten [https://www.zaproxy.org/zap-in-ten/
 * Online - Reverse Shell Generator [https://www.revshells.com/
 * NaviSec Delta [https://delta.navisec.io/
 * Comprehensive Guide to John the Ripper. Part 1: Introducing and
   Installing John the Ripper - Ethical hacking and penetration testing
   [https://miloserdov.org/?p=4961
 * Code-Breaking, Cipher and Logic Puzzle solving tools | Boxentriq
   [https://www.boxentriq.com/code-breaking
 * Analyse your HTTP response headers [https://securityheaders.com/
 * Browserling – Online cross-browser testing
   [https://www.browserling.com/
 * Using Mutillidae II - YouTube
   [https://www.youtube.com/playlist?list=PLZOToVAK85MrsyNmNp0yyUTBXqKRTh623
 * Credential & Data Theft Attack Catalog
   [https://www.netwrix.com/attack.html
 * Mimikatz – Active Directory Security
   [https://adsecurity.org/?page_id=1821
 * OWASP Top 10 training - YouTube
   [https://www.youtube.com/playlist?list=PLvmvp9IEWvXy3IKim5ri667Y8oTjC3e2E
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/open-source-intelligence-osint/
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/
 * DuckToolKit [https://ducktoolkit.com/userscripts#
 * Ethical Hacking (Part 13): Office Macro Attacks | by Michael Whittle
   | Level Up Coding
   [https://levelup.gitconnected.com/ethical-hacking-part-13-office-macro-attacks-3a8a0cad14b7
 * Powershell reverse shell with Social-Engineering-Toolkit | by David
   Artykov | Purple Team | Medium
   [https://medium.com/purple-team/powershell-reverse-shell-with-social-engineering-toolkit-90506e891269
 * VBA-Macro-Projects/Reverse-Shell.vba at main ·
   JohnWoodman/VBA-Macro-Projects · GitHub
   [https://github.com/JohnWoodman/VBA-Macro-Projects/blob/main/Reverse-Shell.vba
 * PowerLessShell + MaliciousMacroMSBuild = Shells
   [https://www.doyler.net/security-not-included/powerlessshell-maliciousmacromsbuild
 * Ethical Hacking (Part 7): Metasploit Penetration Testing Framework |
   by Michael Whittle | Level Up Coding
   [https://levelup.gitconnected.com/ethical-hacking-part-7-metasploit-penetration-testing-framework-b768dac407a
 * adhdproject.github.io/Powercat.md at master ·
   adhdproject/adhdproject.github.io · GitHub
   [https://github.com/adhdproject/adhdproject.github.io/blob/master/Windows/Powercat.md
 * cmd.exe, Windows: Run a Windows (“DOS”) batch cmd script minimized ·
   GitHub [https://gist.github.com/jbutko/7857977
 * Free and Instant API Penetration Testing | No-Code
   [https://www.ethicalcheck.dev/index.html
 * A strategy to land your first pentest job | by PentesterLab |
   PentesterLab
   [https://blog.pentesterlab.com/a-strategy-to-land-your-first-pentest-job-25209a351689
 * Cure53 – Fine penetration tests for fine websites [https://cure53.de/
 * Windows elevation of privileges [https://guif.re/windowseop
 * Privilege Escalation - Operator Up
   [https://obscuritylabs.github.io/operator-up/windows/priv_esc/
 * The Ultimate List of SANS Cheat Sheets | SANS Institute
   [https://www.sans.org/blog/the-ultimate-list-of-sans-cheat-sheets/?utm_medium=Social&utm_source=Twitter&utm_content=NA%20Central%20Cheat%20Sheets%20Blog%2005%202020&utm_campaign=SANS%20Blog
 * Exploiting PrivExchange - c:\rusher blog
   [https://chryzsh.github.io/exploiting-privexchange/
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/web-pentest/tools/burpsuite/
 * Index - Nuclei - Community Powered Vulnerability Scanner
   [https://nuclei.projectdiscovery.io/nuclei/get-started/
 * Outils de test d’intrusion - System & Network security
   [https://www.benatich.fr/?p=148
 * WebApp PenTest Archives • Penetration Testing
   [https://securityonline.info/category/penetration-testing/webapp-pentest/
 * AutoPWN Suite | AutoPWN Suite Wiki [https://auto.pwnspot.com/
 * Top 20 Google Hacking Techniques - Best Google Dorks and Hacks
   [https://securitytrails.com/blog/google-hacking-techniques
 * ZAPCon [https://zapcon.io/
 * Infinite Logins [https://infinitelogins.com/
 * HOME | Trimarc Security [https://www.trimarcsecurity.com/
 * About – Active Directory Security [https://adsecurity.org/?page_id=8
 * Presentations | Trimarc Content Hub
   [https://www.hub.trimarcsecurity.com/presentations
 * Pentest : Comment réaliser des tests d’intrusion sur une application
   mobile Android ? | by Linkvalue | Sep, 2022 | Blog Linkvalue —
    société de conseil IT
   [https://blog.link-value.fr/tests-dintrusion-sur-une-application-mobile-android-d99d4401d9d4
 * Projects | OWASP Foundation [https://owasp.org/projects/#tab=Features
 * Security Knowledge Framework [https://secureby.design/labs/view
 * Ethical hacking and penetration testing - Page 6 - InfoSec, IT, Kali
   Linux, BlackArch [https://miloserdov.org/?paged=6
 * Site Tree - Ethical hacking and penetration testing
   [https://miloserdov.org/?page_id=2
 * QR code generator for text [https://suip.biz/?act=qr-text
 * Montre connectée hybride avec électrocardiogramme, fréquence
   cardiaque et oxymètre - ScanWatch | Withings
   [https://www.withings.com/fr/fr/scanwatch
 * 💬1 - Top 5 Penetration Testing Methodology and Standards | Astra
   Security
   [https://www.getastra.com/blog/security-audit/penetration-testing-methodology/
 * Online Nmap scanner - nmap.online [https://nmap.online/
 * Features [https://www.hacksplaining.com/features
 * Compliance standards templates and samples - Dradis Academy
   [https://dradisframework.com/academy/industry/compliance/
 * FAQ - The Penetration Testing Execution Standard
   [http://www.pentest-standard.org/index.php/FAQ
 * Pentesting Cheatsheets - Red Teaming Experiments
   [https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets
 * Write-up Factory [https://writeup.raw.pm/
 * uploadserver · PyPI [https://pypi.org/project/uploadserver/
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/windows-systems/exploitation/remote_execution_techniques/
 * Pentest Tips and Tricks – EK
   [https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
 * adista.fr | FullHunt [https://fullhunt.io/search?query=adista.fr
 * grep.app | code search [https://grep.app/
 * Netlas: adista.fr
   [https://app.netlas.io/responses/?q=adista.fr&page=1&indices=
 * 30 Search Engines for Cybersecurity Researchers (Part 2 of 3) | by
   Secpy Community | Sep, 2022 | InfoSec Write-ups
   [https://infosecwriteups.com/30-search-engines-for-cybersecurity-researchers-part-2-of-3-3412d6a35118
 * DorkSearch - Speed up your Dorking [https://dorksearch.com/
 * 30 Search Engines for Cybersecurity Researchers (Part 1 of 3) | by
   Secpy Community | Sep, 2022 | InfoSec Write-ups
   [https://infosecwriteups.com/30-search-engines-for-cybersecurity-researchers-part-1-of-3-faf68bfc6be8
 * 💀 Sploitus | Exploit & Hacktool Search Engine [https://sploitus.com/
 * Scrapoxy [http://scrapoxy.io/
 * Kali Tools | Kali Linux Tools [https://www.kali.org/tools/
 * Sign Up for Proving Grounds | Offensive Security
   [https://portal.offensive-security.com/sign-up/pg
 * 0xBEN - Notes & Cheat Sheets [https://notes.benheater.com/
 * Pure PowerShell Infosec Cheatsheet - InfosecMatter
   [https://www.infosecmatter.com/pure-powershell-infosec-cheatsheet/
 * Bug Bounty Tips #1 - InfosecMatter
   [https://www.infosecmatter.com/bug-bounty-tips-1/
 * Virtual x86 [http://copy.sh/v86/
 * Send a report | Zerodisclo [https://zerodisclo.com/p/Send-a-report
 * All of the Best Links and Resources on Cyber Security. - s0cm0nkey's
   Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * A few subjects [https://asecuritysite.com/subjects
 * Red - Web App Hacking - s0cm0nkey's Security Reference Guide
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/web-app-hacking
 * Jok3r v3 - Network & Web Pentest Automation Framework
   [https://www.jok3r-framework.com/
 * Public info gathering - Pentest Book
   [https://pentestbook.six2dez.com/recon/public-info-gathering
 * /home/six2dez/.pentest-book - Pentest Book
   [https://pentestbook.six2dez.com/
 * 19 Hacking Cheat Sheets - Cheatography.com: Cheat Sheets For Every
   Occasion [https://cheatography.com/tag/hacking/
 * Wiki / Cheat-Sheet de pentesting | “Hacking Wiki”
   [https://ruuand.github.io/
 * PwnWiki.io [http://pwnwiki.io/#!scripting/powershell.md
 * Docker && Kubernetes - Pentest Book
   [https://pentestbook.six2dez.com/enumeration/cloud/docker-and-and-kubernetes
 * Rana Khalil - YouTube [https://www.youtube.com/@RanaKhalil101
 * Intigriti - Bug Bounty & Agile Pentesting Platform
   [https://app.intigriti.com/researcher/dashboard
 * Silent Signal Techblog [https://blog.silentsignal.eu/
 * CS253 - Web Security [https://web.stanford.edu/class/cs253/
 * NoobLinux - Linux Tutorials Aimed at Beginners [https://nooblinux.com/
 * sqlmap Cheat Sheet: Commands for SQL Injection Attacks + PDF & JPG
   [https://www.comparitech.com/net-admin/sqlmap-cheat-sheet/
 * Advanced Google Dorking Commands | Cybrary
   [https://www.cybrary.it/blog/0p3n/advanced-google-dorking-commands/
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
 * Injecter du code malveillant dans un script (Netcat reverse shell) -
   Le Guide Du SecOps
   [https://le-guide-du-secops.fr/2021/10/25/injecter-un-code-malveillant-dans-un-script-shell-pour-prendre-le-controle-dun-serveur-linux-netcat-reverse-shell/
 * Blog | hackers-arise [https://www.hackers-arise.com/
 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp -
   Introduction | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185
 * Penetration Testing Bootcamp - YouTube
   [https://www.youtube.com/playlist?list=PLBf0hzazHTGOepimcP15eS6Y-aR4m6ql3
 * Red Team Guide - Red Team Notes 2.0
   [https://dmcxblue.gitbook.io/red-team-notes-2-0/files/red-team-guide
 * Offensive Security Cheatsheet [https://cheatsheet.haax.fr/web-pentest/
 * Checklist - Local Windows Privilege Escalation - HackTricks
   [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation
 * GitHub - PYMaster-ft/BurpSuite-Cheatsheet
   [https://github.com/PYMaster-ft/BurpSuite-Cheatsheet
 * Scan Web Applications for Common Vulnerabilities Using Metasploit’s
   WMAP – Spyboy blog
   [https://spyboy.blog/2020/11/15/scan-web-applications-for-common-vulnerabilities-using-metasploits-wmap/
 * Scan Web Applications for Common Vulnerabilities Using Metasploit’s
   WMAP – Spyboy blog
   [about:reader?url=https%3A%2F%2Fspyboy.blog%2F2020%2F11%2F15%2Fscan-web-applications-for-common-vulnerabilities-using-metasploits-wmap%2F
 * WMAP Web Scanner - Metasploit Unleashed
   [https://www.offsec.com/metasploit-unleashed/wmap-web-scanner/
 * Home - SecWiki [https://wiki.zacheller.dev/
 * Full TTYs - HackTricks
   [https://book.hacktricks.xyz/generic-methodologies-and-resources/shells/full-ttys
 * Assets Discovery | 0xffsec Handbook
   [https://0xffsec.com/handbook/information-gathering/assets-discovery/
 * Linux Privilege Escalation – Resources – Siren Security
   [https://sirensecurity.io/blog/linux-privilege-escalation-resources/
 * Intro - my_offsec_notes [https://p1yushsecurity.gitbook.io/offsec/
 * Welcome to Ptest Method’s documentation! — Ptest Method 1
   documentation [https://ptestmethod.readthedocs.io/en/latest/
 * LeakIX [https://leakix.net/
 * Exploit Notes [https://exploit-notes.hdks.org/
 * Mind Maps [https://www.amanhardikar.com/mindmaps.html
 * Products – HotWAN [https://hotwan.com/products/
 * Pentest | Notes [https://natsec.github.io/notes/pentest.html#ressources
 * Notes | Here be my notes 😉 [https://natsec.github.io/notes/
 * Introduction - The Hacker Recipes [https://www.thehacker.recipes/
 * Active directory pentesting: cheatsheet and beginner guide
   [https://www.hackthebox.com/blog/active-directory-penetration-testing-cheatsheet-and-guide
 * evilsocket [https://www.evilsocket.net/
 * Top Five Ways I Got Domain Admin on Your Internal Network before
   Lunch (2018 Edition) | by Adam Toscher | Medium
   [https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
 * Red Teaming – Resources – Siren Security
   [https://sirensecurity.io/blog/red-teaming-resources/
 * Azure Penetration Testing Articles | hausec [https://hausec.com/azure/
 * LOLBAS [https://lolbas-project.github.io/#
 * Lessons from Penetration Testing: 7 Real-World Findings
   [https://www.mitnicksecurity.com/blog/lessons-from-penetration-testing
 * purify video – watch purified youtube videos with no ads
   [https://purify-video.github.io/?v=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DUZ-5S-mFDCY
 * Comment auditer l’Active Directory ? Avec Ping Castle
   [https://rm3a.fr/comment-auditer-lactive-directory/
 * Extraire des hachages de mots de passe du fichier ntds.dit
   [https://blog.netwrix.fr/2023/01/11/extraire-des-hachages-de-mots-de-passe-du-fichier-ntds-dit/
 * How to Backup Active Directory Domain Controller? | Windows OS Hub
   [https://woshub.com/backup-active-directory-domain-controller/
 * Tutoriel pour la bonté NTDS (VSSADMIN, WMIS, NTDS.dit, SYSTEME)
   [https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/tutorial-for-ntds-goodness-vssadmin-wmis-ntds.dit-system/
 * Extracting Hashes and Domain Info From ntds.dit - ropnop blog
   [https://blog.ropnop.com/extracting-hashes-and-domain-info-from-ntds-dit/
 * ropnop blog - ropnop blog [https://blog.ropnop.com/
   Tuto
 * Premiers pas avec Vagrant
   [https://computerz.solutions/first-step-vagrant/
 * Vagrant – Welcome to /dev/null [http://www.morot.fr/vagrant/
 * Apprendre à utiliser Git et GitHub | Cours Complet (2020) - Pierre
   Giraud [https://www.pierre-giraud.com/git-github-apprendre-cours/
 * ansible [https://blog.stephane-robert.info/tags/ansible/
 * Kali Linux: Tutorial, What is, How to install - javatpoint
   [https://www.javatpoint.com/kali-linux
 * GitHub - M507/AWAE-Preparation: This repository will contain all
   trainings and tutorials I have done/read to prepare for OSWE / AWAE.
   [https://github.com/M507/AWAE-Preparation
 * Tutoriel : Renvoyer un mot de passe par e-mail : la méthode Vernam
   [http://sdz.tdct.org/sdz/renvoyer-un-mot-de-passe-par-e-mail-la-methode-vernam.html
 * Make Tech Easier - Computer Tutorials, Tips and Tricks
   [https://www.maketecheasier.com/
 * HTTP Parameters
   [https://www.tutorialspoint.com/http/http_parameters.htm
 * How to Learn Penetration Testing: A Beginners Tutorial - This
   tutorial will cover all the basics of getting into pentesting,
   starting from 0.
   [https://www.codemopolitan.com/learn-penetration-testing/
 * RIP Tutorial (Stack Overflow Documentation) [https://riptutorial.com/
 * KUBERNETES - FORMATIONS POUR DEBUTER | TUTOS FR #0 - YouTube
   [https://www.youtube.com/watch?v=37VLg7mlHu8&list=PLn6POgpklwWqfzaosSgX2XEKpse5VY2v5
 * Unix Tutorial [https://www.unixtutorial.org/
 * Ansible – tutoriaux français | Xavki
   [https://xavki.blog/ansible-tutoriaux-francais/
 * Hacking with Netcat part 2: Bind and reverse shells - Hacking
   Tutorials
   [https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
 * Cyber-Sec-Resources/How-To Tutorials at master ·
   scspcommunity/Cyber-Sec-Resources · GitHub
   [https://github.com/scspcommunity/Cyber-Sec-Resources/tree/master/How-To%20Tutorials
 * Meet Guru99 - Free Training Tutorials & Video for IT Courses
   [https://www.guru99.com/
 * RIP Tutorial [https://riptutorial.com/fr/home
 * How to install Malware Detect ( maldetect or LMD ) in Debian 8 -
   Syslint.com
   [https://syslint.com/blog/tutorial/how-to-install-malware-detect-maldetect-or-lmd-in-debian-8/
 * Learn HTML5, CSS3, Javascript - video style tutorials
   [http://thecodeplayer.com/
 * Free Ethical Hacking Tutorials: Course for Beginners
   [https://www.guru99.com/ethical-hacking-tutorials.html
 * Meet Guru99 - Free Training Tutorials & Video for IT Courses
   [https://www.guru99.com/
 * FuzzySecurity | Tutorials [http://www.fuzzysecurity.com/tutorials.html
 * Ansible installation with pipenv — Ansible tutorial 0.1.0
   documentation
   [https://gdevops.gitlab.io/tuto_ansible/installation/installation.html#
 * leucos/ansible-tuto: Ansible tutorial
   [https://github.com/leucos/ansible-tuto
 * RIP Tutorial (Stack Overflow Documentation) [https://riptutorial.com/
 * Liste d'articles, tutoriels et projets Devops, Cloud
   [https://devopssec.fr/tags/ansible?page=2
 * MySQL DROP DATABASE - How to Delete a Database in MySQL Server
   [http://www.mysqltutorial.org/mysql-drop-database/
 * Network Admin Tools - Software Reviews, Tutorials, Guides for IT
   Pro's [https://www.netadmintools.com/
 * instinct-de-survie
   [https://instinct-de-survie.forumgratuit.org/f57-tutoriels-videos
 * Tutoriel bivouac par la légion étrangère en guyane
   [https://instinct-de-survie.forumgratuit.org/t12599-tutoriel-bivouac-par-la-legion-etrangere-en-guyane
 * Ansible Tutorial
   [https://www.codereviewvideos.com/course/ansible-tutorial
 * The Python Tutorial — Python 3.7.1 documentation
   [https://docs.python.org/fr/3/tutorial/appetite.html
 * An Introduction to Networking Terminology, Interfaces, and Protocols
   | DigitalOcean
   [https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols
 * Meet Guru99 - Free Training Tutorials & Video for IT Courses
   [https://www.guru99.com/
 * SQL Injection Tutorial: Learn with Example
   [https://www.guru99.com/learn-sql-injection-with-practical-example.html
 * Free Ethical Hacking Tutorials: Course for Beginners
   [https://www.guru99.com/ethical-hacking-tutorials.html
 * SSTec Tutorials - YouTube
   [https://www.youtube.com/channel/UCHvUTfxL_9bNQgqzekPWHtg/videos
 * Calculs et variables avec pyton - Python Programmation Cours
   Tutoriel Informatique Apprendre
   [http://apprendre-python.com/page-apprendre-variables-debutant-python
 * Functions - Learn Python - Free Interactive Python Tutorial
   [https://www.learnpython.org/en/Functions
 * Kali linux pentesting tutorials
   [https://www.facebook.com/kali.linux.pentesting.tutorials
 * All Security Tutorials | Hackertron
   [https://hackertron.com/all-security-tutorials/
 * GitHub - leucos/ansible-tuto: Ansible tutorial
   [https://github.com/leucos/ansible-tuto
 * Ansible tutorials — Ansible tutorial 0.1.0 documentation
   [https://gdevops.gitlab.io/tuto_ansible/tutorials/tutorials.html
 * Ansible tutorial for absolute beginners & experienced | GoLinuxCloud
   [https://www.golinuxcloud.com/ansible-tutorial/
 * Streaming Tutorials | Cyber Aces | Free online cybersecurity courses
   [https://tutorials.cyberaces.org/tutorials.html
 * cyberchef tuto at DuckDuckGo
   [https://duckduckgo.com/?t=ffab&q=cyberchef+tuto&ia=web
 * Haproxy – tutoriaux français | Xavki top top top
   [https://xavki.blog/haproxy-tutoriaux-francais/
 * Tutorials | DigitalOcean
   [https://www.digitalocean.com/community/tutorials
 * GitHub - cirosantilli/linux-cheat: Linux tutorials and cheatsheets.
   Minimal examples. Mostly user-land CLI utilities. Linux kernel at:
   https://github.com/cirosantilli/linux-kernel-module-cheat
   [https://github.com/cirosantilli/linux-cheat
 * Tutorials Archives | Liquid Web
   [https://www.liquidweb.com/kb/category/tutorials/
 * Tutorials - Intellipaat Blog [https://intellipaat.com/blog/tutorials/
 * Learn Python - Free Interactive Python Tutorial
   [https://www.learnpython.org/
 * OSForensics video demonstrations
   [https://www.osforensics.com/faqs-and-tutorials/video_demonstrations.html
 * OSForensics video demonstrations
   [https://www.osforensics.com/faqs-and-tutorials/video_demonstrations.html
 * BugBounty Writeups, Tutorials and Disclosed Issues |
   BugBountyNotes.com [https://www.bugbountynotes.com/writeups
 * Penetration Testing Archives - Page 2 of 3 - k4linux - Linux
   Tutorials
   [https://k4linux.com/category/hacking/penetration-testing/page/2
 * Présentation des rôles Ansible
   [https://hackademy.io/tutoriel-videos/roles-ansible
 * Kali Linux Tutorials - YouTube [https://www.youtube.com/user/kalinuxx
 * CVE-2021-34527 : PrintNightmare Vulnerability, Exploit and
   Remediation | ThreatIT - Cyber Security News, Articles & Tutorials
   [https://threatit.com/articles/cve-2021-34527-printnightmare-vulnerability-exploit-and-remediation/
 * CTF Cheat sheet | Les tutos de Processus
   [https://lestutosdeprocessus.fr/ctf-cheat-sheet/
 * Video tutorials - PortSwigger
   [https://portswigger.net/burp/documentation/desktop/tutorials?utm_source=burp_suite_community&utm_medium=learn_tab&utm_campaign=tutorials
 * Créer un serveur d'e-mails sous Windows Server - Windows Server -
   Tutoriels - InformatiWeb Pro
   [https://www.informatiweb-pro.net/admin-systeme/win-server/windows-server-creer-un-serveur-d-e-mails.html
 * Tutoriels – Kali-linux.fr [https://www.kali-linux.fr/tutoriels
 * A step-by-step on the computer buffer overflow vulnerability
   tutorials on Intel x86 processor and C standard function call
   [https://www.tenouk.com/Bufferoverflowc/Bufferoverflow4.html
 * Devops Tutorials - Xavki [https://xavki.blog/devops-tutos/
 * Sécurité : Actualités, cours, tutoriels, FAQ, forum...
   [https://securite.developpez.com/
 * Video Tutorials - Burp Suite Professional - PortSwigger
   [https://portswigger.net/burp/pro/video-tutorials
 * Kali Linux Burp Suite Tutorial - Linux Tutorials - Learn Linux
   Configuration [https://linuxconfig.org/kali-linux-burp-suite-tutorial
 * Free Tutorials Books - PDF Drive [https://www.pdfdrive.com/category/65
 * APPRENDRE PYTHON TUTO PROGRAMMATION COMPLET DÉBUTAN... - YouTube
   [https://www.youtube.com/watch?v=oUJolR5bX6g
 * Archives des Trucs et astuces - Easytutoriel
   [https://www.easytutoriel.com/category/trucs-astuces
 * Buffer Overflow to Run Root Shell - Full Tutorial | Defend the Web
   [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial
 * Python Tutorial for Beginners: Learn Programming Basics PDF
   [https://www.guru99.com/python-tutorials.html
 * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial
 * https://riptutorial.com/python/awesome-learning/tutorial
   [https://riptutorial.com/python/awesome-learning/tutorial
 * https://riptutorial.com/ebook/python
   [https://riptutorial.com/ebook/python
 * IT-Connect | Tutoriels - Cours informatique - Tests - Vidéos
   [https://www.it-connect.fr/
 * 20 Best Python Certificate Courses 2022 AUGUST UPDATED
   [https://digitaldefynd.com/best-python-tutorial-class-certification-course-training-online/
 * Apprendre à programmer avec Python 3 • Tutoriels • Zeste de Savoir
   [https://zestedesavoir.com/tutoriels/799/apprendre-a-programmer-avec-python-3/
 * Top 10 meilleurs VPN gratuits pour PC 2021
   [https://www.tutomiel.com/meilleurs-vpn-gratuits-8380.htm
 * How to install VMware Workstation on Ubuntu 22.04 Jammy Jellyfish
   Linux - Linux Tutorials - Learn Linux Configuration
   [https://linuxconfig.org/vmware-server-2-0-2-ubuntu-10-04-installation
 * TUTORIEL BUBBLE - Comment bien démarrer ? - YouTube
   [https://www.youtube.com/watch?v=n61Dxwm_ekQ
 * GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive
   reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit
   ARM architectures.
   [https://github.com/mytechnotalent/Reverse-Engineering
 * How To Write Your First Python 3 Program | DigitalOcean
   [https://www.digitalocean.com/community/tutorials/how-to-write-your-first-python-3-program
 * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack
   [https://crax.tube/
 * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack
   [https://crax.tube/
 * CraxTube - Tutorials & Guides | Crack, Spam, Card & Hack
   [https://crax.tube/
 * Red Team Server - Penetration Testing Tools, ML and Linux Tutorials
   [https://reconshell.com/red-team-server/
 * Windows Red Team Cheat Sheet - Penetration Testing Tools, ML and
   Linux Tutorials [https://reconshell.com/windows-red-team-cheat-sheet/
 * Bug Bounty Tools - Penetration Testing Tools, ML and Linux Tutorials
   [https://reconshell.com/bug-bounty-tools/
 * FREE Reverse Engineering Tutorial - Penetration Testing Tools, ML
   and Linux Tutorials
   [https://reconshell.com/free-reverse-engineering-tutorial/
 * List of Free Python Resources - Penetration Testing Tools, ML and
   Linux Tutorials [https://reconshell.com/list-of-free-python-resources/
 * Awesome CyberSec Resources - Penetration Testing Tools, ML and Linux
   Tutorials [https://reconshell.com/awesome-cybersec-resources/
 * Tutoriels sur les pneus vélo : montage, réparation et compatibilités
   [https://www.cycletyres.fr/blog/tutoriels-pneu-velo
 * Tuto Wheeling /manual : comment réussir facilement à cabrer son vélo
   - YouTube [https://www.youtube.com/watch?v=AE3Dpf75T50
 * Reconshell - Penetration Testing Tools, ML and Linux Tutorials
   [https://reconshell.com/
 * Didacticiel de création de scripts Windows Powershell
   [https://blog.netwrix.fr/2018/09/26/tutoriel-de-windows-powershell-scripting-pour-debutants/
 * Grafana Dashboard Tutorial - SEC557 Public Wiki
   [https://sec557.com/grafana/
 * Python Introduction
   [https://codingpointer.com/python-tutorial/python-intro
 * Index of /Video/ [http://s28.bitdl.ir/Video/
 * Index of /Video/Linkedin.Learning.Python.for.Non-Programmers-XQZT/
   [http://s28.bitdl.ir/Video/Linkedin.Learning.Python.for.Non-Programmers-XQZT/
 * Index of
   /Video/Linkedin.Learning.Penetration.Testing.with.Metasploit-XQZT/
   [http://s28.bitdl.ir/Video/Linkedin.Learning.Penetration.Testing.with.Metasploit-XQZT/
 * Proxy d'attaque OWASP Zed - Un Aperçu - YouTube
   [https://www.youtube.com/watch?v=bf2YuqgaeWo&list=PLH8n_ayg-60J9i3nsLybper-DR3zJw6Z5
   CyberLab
 * Cylab Play - Vulnerable Apps | cylab.be
   [https://cylab.be/resources/cylab-play?accept-cookies=1
   VMware
 * Install VMware Workstation Player on Ubuntu 22.04 LTS - Linux Shout
   [https://linux.how2shout.com/install-vmware-workstation-player-on-ubuntu-22-04-lts/
 * XCP-ng documentation | XCP-ng Documentation [https://docs.xcp-ng.org/
   lab
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/
 * WebSploit Labs - by Omar Santos [https://websploit.org/
 * Attacking Active Directory: 0 to 0.9 | zer1t0
   [https://zer1t0.gitlab.io/posts/attacking_ad/?s=09
 * Penetration Testing Bootcamp |fr] Penetration Testing Bootcamp -
   Setting Up A Pentesting Lab | Class Central Classroom
   [https://www.classcentral.com/classroom/youtube-penetration-testing-bootcamp-53185/6108cc9fd9b54
 * GitHub - WazeHell/vulnerable-AD: Create a vulnerable active
   directory that's allowing you to test most of the active directory
   attacks in a local lab [https://github.com/WazeHell/vulnerable-AD
 * Creating a Windows AD Lab Environment at Home – // Chox Security
   Blog
   [https://chox.ca/2022/02/17/creating-a-windows-ad-lab-environment-at-home/
 * GitHub - KevOtt/AD-Lab-Generator: Tool for populating an Active
   Directory Lab with a randomized set of users and groups.
   [https://github.com/KevOtt/AD-Lab-Generator
 * Docker: Creating a Pivoting Lab and Exploiting it | by Kiranghimire
   | InfoSec Write-ups
   [https://infosecwriteups.com/docker-creating-a-pivoting-lab-and-exploiting-it-a66646dc2cf3
 * GitHub - Cimihan123/VulnLab [https://github.com/Cimihan123/VulnLab
 * Creating a Windows AD Lab Environment at Home – // Chox Security
   Blog
   [https://chox.ca/2022/02/17/creating-a-windows-ad-lab-environment-at-home/
 * MegaCorp One - Nanotechnology Is the Future
   [https://www.megacorpone.com/
 * Labtainers - Center for Cybersecurity and Cyber Operations - Naval
   Postgraduate School [https://nps.edu/web/c3o/labtainers
 * build a HACKING lab with DOCKER containers (become a hacker) |fr] Jon
   Good
   [https://jongood.com/build-a-hacking-lab-with-docker-containers-become-a-hacker/
 * Trying DetectionLab
   [https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html
 * Building a Cybersecurity Homelab for Detection & Monitoring -
   Cyberwox Academy
   [https://cyberwoxacademy.com/building-a-cybersecurity-homelab-for-detection-monitoring/
 * Building A Test Lab For Pentesting Guide | White Oak Security
   [https://www.whiteoaksecurity.com/blog/building-a-test-lab-for-pentesting/
 * Ethical Hacking Bootcamp by Omar Santos - Pen Testing
   [https://bootcamp.h4cker.org/
 * Home | BustaKube [https://www.bustakube.com/
 * Supercar Showdown - Supercar Showdown [https://hack-yourself-first.com/
 * XSS Challenges (by yamagata21) - Stage #1 [https://xss-quiz.int21h.jp/
 * Solutions to the wargame XSS Challenges at xss-quiz.int21h.jp |
   Daniel 'MaTachi' Jonsson
   [https://matachi.github.io/blog/2013/11/28/solutions-to-the-wargame-xss-challenges-at-xss-quiz-int21h-jp/
 * Technical - Omar Santos - Building Web Application Labs with
   WebSploit - YouTube [https://www.youtube.com/watch?v=417J_65sNck
 * Omar@VetSecCon [https://h4cker.org/vetseccon/
 * Station 3 - DEF CON Red Team Village
   [https://redteamvillage.io/station3.html
 * h4cker/vulnerable_servers at master · The-Art-of-Hacking/h4cker ·
   GitHub
   [https://github.com/The-Art-of-Hacking/h4cker/tree/master/vulnerable_servers
 * Acunetix Web Vulnerability Scanner - Test websites
   [http://www.vulnweb.com/
 * GOAD Lab Setup :: Greg Scharf — Development & Security
   [https://blog.gregscharf.com/2023/04/14/goad-setup/
 * Mayfly [https://mayfly277.github.io/
 * GOAD - part 1 - reconnaissance and scan | Mayfly
   [https://mayfly277.github.io/posts/GOADv2-pwning_part1/
 * WPScan Usage Example Enumeration + Exploit | CYBERPUNK
   [https://www.cyberpunk.rs/wpscan-usage-example
 * How to Create a Virtual Hacking Lab: The Ultimate Hacker Setup
   [https://www.stationx.net/how-to-create-a-virtual-hacking-lab/
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/#requirments
 * Untitled :: Pwning OWASP Juice Shop
   [https://pwning.owasp-juice.shop/companion-guide/latest/
 * Sign in - Immersive Labs [https://immersivelabs.online/signin
 * BadBlood : remplir un Active Directory vulnérable rapidement
   [https://www.it-connect.fr/populer-un-active-directory-vulnerable-rapidement-avec-badblood/
   Graph
 * Cytoscape: An Open Source Platform for Complex Network Analysis and
   Visualization [https://cytoscape.org/index.html
   DevOps
 * Apprendre et Maitriser Terraform l'outil d'Infrastructure As Code
   [https://blog.stephane-robert.info/post/introduction-terraform/
 * Blog gratuit pour apprendre le DevOps et le Cloud
   [https://devopssec.fr/
 * priximmo/sommaire-xavki-devops-fr
   [https://github.com/priximmo/sommaire-xavki-devops-fr
 * GitHub - trimstray/the-book-of-secret-knowledge: A collection of
   awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and
   more. Especially for System and Network Administrators, DevOps,
   Pentesters or Security Researchers.
   [https://github.com/trimstray/the-book-of-secret-knowledge
 * d3vpasha – DevOps [https://d3vpasha.wordpress.com/
 * Tous les cours et examens
   [https://www.redhat.com/fr/services/training/all-courses-exams?f%5B0%5D=taxonomy_training%3ACours&f%5B1%5D=taxonomy_courses_by_curriculum%3ADevOps
 * DEVOPS - La Grotte du Barbu [https://www.grottedubarbu.fr/tag/devops/
 * First 5 Minutes on Setup Linux Server Security – Mitesh Shah
   [https://miteshshah.github.io/devops/lemp/first-5-minutes-on-setup-linux-server-security/
 * ZAP in Ten [https://www.alldaydevops.com/zap-in-ten
 * All Day DevOps | The World's Largest DevOps Conference
   [https://www.alldaydevops.com/
 * devops_4_hackers/Lab1/completed at master · jivoi/devops_4_hackers ·
   GitHub
   [https://github.com/jivoi/devops_4_hackers/tree/master/Lab1/completed
 * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
   [https://workshop.hackerops.dev/
 * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
   [https://workshop.hackerops.dev/
 * DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
   - YouTube [https://www.youtube.com/watch?v=hK8N1QUpeM8
 * Parcours de formation Devops - Xavki [https://xavki.blog/
 * Déployer simplement une VM sur Azure avec Terraform | Arcanexus
   [https://www.arcanexus.com/blog/terraform-azure-vm
 * Liste des cours complets Devops, Cloud [https://devopssec.fr/categories
 * Votre première VM dans Azure… déployée avec Ansible bien sûr !
   [https://blog.zwindler.fr/2018/08/07/premiere-vm-dans-azure-avec-ansible-bien-sur/
 * GitHub - stephrobert/awesome-french-devops: Une liste de liens
   permettant de se former aux outils utilisés dans le domaine du
   Devops [https://github.com/stephrobert/awesome-french-devops/
 * Cours complet gratuit pour comprendre le DevOps
   [https://devopssec.fr/category/comprendre-le-devops
 * Terraform - Xavki [https://xavki.blog/terraform-formation-francais/
 * Xavier / SOMMAIRE XAVKI · GitLab
   [https://gitlab.com/xavki/sommaire-xavki-tutos-fr
 * How to Connect to Kubernetes Clusters Using Boundary
   [https://www.hashicorp.com/blog/how-to-connect-to-kubernetes-clusters-using-boundary
 * Boundary authentification & keycloak & OIDC (Partie 2) - YouTube
   [https://www.youtube.com/watch?v=boW8Ed1ZzG0&list=PLtBjphVrKuHW-djkHyLaedCsg7VHXzV3e&index=8
 * HashiCorp - Boundary - YouTube
   [https://www.youtube.com/playlist?list=PLtBjphVrKuHW-djkHyLaedCsg7VHXzV3e
 * The Cloud Native Wiki | Aqua
   [https://www.aquasec.com/cloud-native-academy/
 * Kubernetes Deployment Tutorial - yaml explained + Demo - YouTube
   [https://www.youtube.com/watch?v=y_vy9NVeCzo&list=PL5aURjJ6mdUedh8rPBXJ5w_ogdD9PM0D7
 * Play with Kubernetes [https://labs.play-with-k8s.com/
 * Play with Kubernetes [https://labs.play-with-k8s.com/
 * Kubernetes Tutorial: Learn the Basics and Get Started | Scalyr
   [https://www.sentinelone.com/blog/kubernetes-tutorial-learn-basics/?utm_campaignid=19179764064
 * https://2021-09-enix.container.training/
   [https://2021-09-enix.container.training/
 * Avant d'accéder à YouTube
   [https://consent.youtube.com/m?continue=https%3A%2F%2Fwww.youtube.com%2Fplaylist%3Flist%3DPLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd%26cbrd%3D1&gl=FR&m=0&pc=yt&hl=fr&src=1
 * https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd&cbrd=1 [https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd&cbrd=1
 * 2019.03 Kubernetes workshop at QCON London - YouTube
   [https://www.youtube.com/playlist?list=PLBAFXs0YjviJwCoxSUkUPhsSxDJzpZbJd
 * Table of Contents - The Docker Handbook
   [https://docker-handbook.farhan.dev/table-of-contents
 * GitHub - controlplaneio/simulator: Kubernetes Security Training
   Platform - focusing on security mitigation
   [https://github.com/controlplaneio/simulator
 * Provisioning Kubernetes clusters on GCP with Terraform and GKE
   [https://learnk8s.io/terraform-gke
 * Xavier / Tutoriels kubernetes · GitLab
   [https://gitlab.com/xavki/presentations-kubernetes
 * Cours tutoriel complet pour apprendre l'orchestrateur Kubernetes
   (k8s)
   [https://devopssec.fr/article/cours-complet-apprendre-orchestrateur-kubernetes-k8s
 * Tuto Docker - Comprendre Docker (Partie1) - Wanadev
   [https://www.wanadev.fr/23-tuto-docker-comprendre-docker-partie1/
 * Overview | Docker Documentation [https://docs.docker.com/get-started/
 * TUTOS.EU : Docker : introduction et prise en main
   [https://www.tutos.eu/3448#divParagraphe1
 * Docker - tutoriaux français - Xavki
   [https://xavki.blog/docker-tutoriaux-francais/
 * Docker Documentation: How to Build, Share, and Run | Docker
   Documentation [https://docs.docker.com/
 * A Docker Tutorial for Beginners [https://docker-curriculum.com/
 * GitHub - prakhar1989/docker-curriculum: A comprehensive tutorial on
   getting started with Docker!
   [https://github.com/prakhar1989/docker-curriculum
 * Docker Crash Course for Absolute Beginners NEW - YouTube
   [https://www.youtube.com/watch?v=pg19Z8LL06w
 * / ViewPure [https://www.viewpure.com/pg19Z8LL06w?ref=bkmk
 * 1ère séance : Loi de financement rectificative de la sécurité
   sociale pour 2023 (suite) - Jeudi 16 février 2023 - Vidéos de
   l'Assemblée nationale
   [https://videos.assemblee-nationale.fr/video.12937977_63eddf0ced133
 * build a HACKING lab with DOCKER containers (become a hacker) |fr] Jon
   Good
   [https://jongood.com/build-a-hacking-lab-with-docker-containers-become-a-hacker/
 * 🏗️ Getting Started with Docker | dockerlabs
   [https://dockerlabs.collabnix.com/
 * Xavier / Docker V2 · GitLab
   [https://gitlab.com/xavki/docker-v2/-/tree/main/
 * How To Dockerize Your Pen-testing Lab feat. Kali Linux |
   HackerNoon
   [https://hackernoon.com/automating-your-pentest-lab-with-docker-2j9e33wa
 * Docker : manipuler les conteneurs - YouTube
   [https://www.youtube.com/watch?v=IdMp7RhFVdA&list=PLn6POgpklwWq0iz59-px2z-qjDdZKEvWd&index=4
 * The Ultimate Docker Cheat Sheet | dockerlabs
   [https://dockerlabs.collabnix.com/docker/cheatsheet/
 * Docker Cheat Sheet: Complete Guide (2023) - InterviewBit
   [https://www.interviewbit.com/docker-cheat-sheet/#networking
 * Amazon EKS Workshop :: Amazon EKS Workshop
   [https://www.eksworkshop.com/
 * Introduction à hashicorp Vault
   [https://blog.stephane-robert.info/post/introduction-vault/
 * DevOps Tutorial [https://www.geeksforgeeks.org/devops-tutorial/
 * SaltStack - formation et tutoriels gratuits - Xavki
   [https://xavki.blog/saltstack-formation-et-tutoriels-gratuits/
 * Débuter avec Salt (Saltstack) - JN Community
   [https://community.jaguar-network.com/debuter-avec-salt-saltstack/
 * Le Site d'un Consultant DevOps | Stéphane ROBERT
   [https://blog.stephane-robert.info/
   Infographie
 * 6 000+ Cybersecurity banque d'images et photos libres de droit ·
   Téléchargement gratuit · Photos Pexels
   [https://www.pexels.com/fr-fr/chercher/cybersecurity/
   Microsoft
 * Formation Microsoft 365 [https://support.microsoft.com/fr-fr/training
 * How to install the PowerShell Active Directory module – 4sysops
   [https://4sysops.com/wiki/how-to-install-the-powershell-active-directory-module/#windows-11
 * Enable PowerShell remoting – 4sysops
   [https://4sysops.com/wiki/enable-powershell-remoting/
 * Vérifier que les mots de passe de votre AD ne sont pas compromis
   (gratuitement !) – MSSEC
   [https://blog.mssec.fr/verifier-que-les-mots-de-passe-de-votre-ad-ne-sont-pas-compromis-gratuitement/
 * Windows Server 2019 | Microsoft Evaluation Center
   [https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2019
 * Windows 10 Enterprise | Microsoft Evaluation Center
   [https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise
 * Déploiement des services AD DS dans une nouvelle organisation |
   Microsoft Learn
   [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/plan/deploying-ad-ds-in-a-new-organization?source=recommendations
 * Présentation des services de domaine Active Directory | Microsoft
   Learn
   [https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview
 * Comment Mettre En Place Active Directory Et Un Domaine • Informerick
   [https://informerick.com/tutoriels-informatique/installer-active-directory/
   AI-IA
 * Education – Google AI [https://ai.google/education/
 * Google AI [https://ai.google/
 * New chat [https://chat.openai.com/chat
 * Tournesol [https://tournesol.app/
 * AgentGPT [https://agentgpt.reworkd.ai/fr
 * Albus, AI App, explore any topic - powered by ChatGPT
   [https://albus.org/
 * ElevenLabs - Prime AI Text to Speech | Voice Cloning
   [https://beta.elevenlabs.io/
 * LegiGPT [https://legigpt.fr/
 * Tome - AI-powered storytelling [https://tome.app/
 * Otter.ai - Voice Meeting Notes & Real-time Transcription
   [https://otter.ai/
 * AllThingsAI - The Complete Resource of AI tools & Services
   [https://www.allthingsai.com/
 * GetChatGPT - AI Tool Reviews, Pricing and Alternatives 2023 |
   Futurepedia [https://www.futurepedia.io/tool/getchatgpt
 * All Ai Websites [https://www.allaiwebsites.com/
 * FilePursuit- Discover Everything!, Search the web for files, videos,
   audios, eBooks and much more. [https://filepursuit.com/
 * Learn anything [https://www.tutorai.me/
 * Quizify | Create amazing quizzes 20X faster with AI
   [https://quizify.com/courses/1650
 * Assistant d'éducation - Les meilleures IA par Chatgpt.fr
   [https://chatgpt.fr/ia/assistant-deducation/
 * Perplexity AI [https://www.perplexity.ai/
 * Consensus - Evidence-Based Answers, Faster [https://consensus.app/
 * Andi - Search for the next generation [https://andisearch.com/
 * GitHub - sunner/ChatALL: Concurrently chat with ChatGPT, Bing Chat,
   Bard, Alpaca, Vicuna, Claude, ChatGLM, MOSS, 讯飞星火, 文心一言 and
   more, discover the best answers [https://github.com/sunner/ChatALL
 * ‎Essayez Bard, une expérience d'IA conversationnelle par Google
   [https://bard.google.com/
 * Pi, your personal AI [https://pi.ai/talk
 * Future Tools - Find The Exact AI Tool For Your Needs
   [https://www.futuretools.io/
 * HeyGen - AI Spokesperson Video Creator
   [https://app.heygen.com/guest/labs
 * FAQ | Codeium · Free AI Code Completion & Chat [https://codeium.com/faq
 * AnonChatGPT [https://anonchatgpt.com/
 * Phind: AI search engine [https://www.phind.com/
 * Paraphrasing Tool - QuillBot AI [https://quillbot.com/
 * Mapping Ideas That Change the World [https://www.mymap.ai/signup
 * AI Human Generator – Generate and Modify People Online
   [https://generated.photos/human-generator
 * Chromox-Transforming Ideas into Visual Stories
   [https://chromox.alkaidvision.com/
 * Copilot for Microsoft 365 – Microsoft Adoption
   [https://adoption.microsoft.com/en-us/copilot/
 * Build Web Apps with No-Code | Momen [https://momen.app/
 * Copilot for Microsoft 365 – Microsoft Adoption
   [https://adoption.microsoft.com/fr-fr/copilot/
 * AI In Cybersecurity | Using AI In Cybersecurity | How AI Can Be Used
   in Cyber Security | Simplilearn - YouTube
   [https://www.youtube.com/watch?v=GqVGS-y8YnY
 * 🔥 AI Specialist Course 2023 | AI Specialist Training For 2023 | AI
   Basics In 9 Hours | Simplilearn - YouTube
   [https://www.youtube.com/watch?v=XMeWuc_ycPQ
 * AI Course With Python | Learn Artificial Intelligence With Python In
   10 Hours | Simplilearn - YouTube
   [https://www.youtube.com/watch?v=26U2PChW2_s
 * Artificial Intelligence Full Course 2024 | AI Full Course | AI And
   ML Full Course | Intellipaat - YouTube
   [https://www.youtube.com/watch?v=tzzz8w53FV4
 * Artificial Intelligence Tutorial | Artificial Intelligence Course |
   Intellipaat - YouTube [https://www.youtube.com/watch?v=UkZzM-jxLv4
 * Introduction à l’intelligence artificielle - 1 - Décider - YouTube
   [https://www.youtube.com/watch?v=skxUjKIFGXQ&list=PLDyuailkzLlp5JTH8N-Oj3ATkCfmhdBqQ
 * VulnerabilityGPT: Cybersecurity in the Age of LLM and AI - YouTube
   [https://www.youtube.com/watch?v=IV9BasOlcZ4
 * Cours IA-3SIQ- Introduction Partie 1 - Les Fondements de
   L'intelligence Artificielle - YouTube
   [https://www.youtube.com/watch?v=TktDkyL217w&list=PLa40Uw4EW9hxI2OYTEKiDyIggoLOCa0U_
 * ChatGPT : La Formation Ultime | Tutoriel Ultra Complet pour
   Débutants - YouTube [https://www.youtube.com/watch?v=8i25HfT6EB8
 * Intelligence Artificielle 1.1 : Agents intelligents - motivation -
   YouTube
   [https://www.youtube.com/watch?v=stuU2TK3t0Q&list=PL6Xpj9I5qXYGhsvMWM53ZLfwUInzvYWsm
 * Pricing | Fireflies.ai [https://fireflies.ai/pricing
 * AI Chat [https://deepai.org/chat
 * Your Personal English Coach | Elsaspeak
   [https://elsaspeak.com/en/product
 * 10 meilleurs outils d'IA pour l'éducation (2023) - Unite.AI
   [https://www.unite.ai/fr/10-meilleurs-outils-d%27IA-pour-l%27%C3%A9ducation/
 * Voice Notepad - Speech to Text with Google Speech Recognition
   [https://dictation.io/speech
 * About [https://faceless.video/about
 * There's An AI For That (TAAFT) - The #1 AI Aggregator
   [https://theresanaiforthat.com/
 * LegiGPT [https://legigpt.fr/?s=09
 * Scrape and Monitor Data from Any Website with No Code
   [https://www.browse.ai/
 * Unblocked [https://getunblocked.com/?ref=taaft
 * Social Media Marketing made easy with AI | Predis.ai
   [https://predis.ai/
   TipsAndCheats
 * Passing OSCP - scund00r
   [https://scund00r.com/all/oscp/2018/02/25/passing-oscp.html
 * Cheat Sheets - Toddington
   [https://www.toddington.com/resources/cheat-sheets/
 * Resources - Toddington [https://www.toddington.com/resources/
 * Nmap Cheat Sheet [https://highon.coffee/blog/nmap-cheat-sheet/
 * ASafety » Reverse-shell one-liner Cheat Sheet
   [https://www.asafety.fr/reverse-shell-one-liner-cheat-sheet/
 * Wfuzz bruteforcing web applications – All things in moderation
   [https://hydrasky.com/network-security/wfuzz-bruteforcing-web-applications/
 * Browserling – Online cross-browser testing
   [https://www.browserling.com/
   Ebook
 * Free Learning - Free Programming eBooks from Packt
   [https://www.packtpub.com/packt/offers/free-learning
 * Teen/Young adult - Download Audiobooks & eBooks for iPhone, Android,
   Kindle and more! [http://www.loyalbooks.com/genre/Teen_Young_adult
 * Web Penetration Testing With Kali Linux - Second Edition - Web
   Penetration Testing With Kali Linux - Second Edition - Juned Ahmed
   Ansari.pdf
   [http://mirror.thelifeofkenneth.com/sites/qt.vidyagam.es/library/Kali%20Linux/Web%20Penetration%20Testing%20With%20Kali%20Linux%20-%20Second%20Edition/Web%20Penetration%20Testing%20With%20Kali%20Linux%20-%20Second%20Edition%20-%20Juned%20Ahmed%20Ansari.pdf
 * Telecharger Ebook Bien-être en PDF, EPUB - 1001Ebooks
   [https://epub.1001ebooks.com/livres/bien-etre/page/3/
 * Index of Ebooks [https://prakash-khadka.com.np/ebooks/
 * Download ebooks as you want · GitHub
   [https://gist.github.com/baiwfg2/af827b8b75eebf8ab29f5531a0d265ce
 * Télécharger des ebooks gratuitement [https://ww4.bookys-ebooks.com/
 * Plus de 8000 livres audio gratuits ! | Litterature audio.com
   [https://www.litteratureaudio.com/
 * Médiathèque Numérique Loire - MNL - Autoformation
   [https://mediatheque-numerique.loire.fr/Default/autoformation.aspx
 * Free Learning | Daily Programming eBook from Packt
   [https://www.packtpub.com/free-learning
 * Bouquineux.com [http://www.bouquineux.com/
 * OnRead.com - instant free e-book download. Read books online via
   this free e-book library. Become a literary critic and write your
   own review to any book. [https://www.onread.com/
 * Un instant… [https://www.wowebook.com/
 * Les meilleurs auteurs de romans "Feel good"
   [https://toplivre.fr/feel-good/
   Anonymity
 * Web Hacker's Favorites HackerFox :: Collections :: Modules pour
   Firefox
   [https://addons.mozilla.org/fr/firefox/collections/yehgdotnet/webhacker/
 * Web Application Security Penetration Testing :: Collections ::
   Add-ons for Firefox
   [https://addons.mozilla.org/en-gb/firefox/collections/adammuntner/webappsec/
 * Web Hacker's Favorites HackerFox :: Collections :: Add-ons for
   Firefox
   [https://addons.mozilla.org/en-gb/firefox/collections/yehgdotnet/webhacker/?page=2
 * Initiation à I2P « [http://korben.info/comment-installer-i2p.html
 * Installer un serveur OpenVPN « Admin6
   [http://www.admin6.fr/2011/01/installer-un-serveur-openvpn/
 * Browserling – Online cross-browser testing
   [https://www.browserling.com/
   download
 * INE - OSCP Security Technology Course » downTURK - Download Fresh
   Hidden Object Games
   [https://www.downturk.net/2613961-ine-oscp-security-technology-course.html
 * Humble Bundle | game bundles, book bundles, software bundles, and
   more [https://www.humblebundle.com/
   Statistique
 * Worldometer - real time world statistics
   [https://www.worldometers.info/
   Splunk
 * Login | Splunk CORPO
   [https://splunk.rmidom.intra/splunk/sh/fr-FR/account/login?return_to=%2Fsplunk%2Fsh%2Ffr-FR%2F
 * Recherche | Splunk 7.1.2
   [https://splunk.rmidom.intra/splunk/sh/fr-FR/app/search/search?q=search%20index%3Dadista_perfmon&display.page.search.mode=fast&dispatch.sample_ratio=1&earliest=-30d%40d&latest=now&sid=1559061781.134084
 * Login | Splunk - STE
   [http://91.103.232.104:8000/fr-FR/account/login?return_to=%2Ffr-FR%2Fapp%2Fsearch%2Fsearch
 * Splunk 7.x Fundamentals Part 1 (eLearning)
   [https://education.splunk.com/user/consume/course_pathway/485b7741-6009-37ae-9260-46112541ecbf/103/0c7b5e68-a8f5-3708-90cd-15ae9de711fd?complete=0&tab=overview
 * Registration Request Received
   [https://inter.viewcentral.com/events/cust/register_action.aspx
 * Splunk Fundamentals 1
   [https://www.splunk.com/en_us/training/courses/splunk-fundamentals-1.html
   RaspBerry
 * Votre lab de hacking sur Raspberry Pi III - Part 2 – Kali-linux.fr
   [https://www.kali-linux.fr/installation/lab-hacking-raspberry-pi-3-kali-linux-installation
 * STICKY FINGER’S KALI-PI – Pre-installed | Re4son
   [https://whitedome.com.au/re4son/sticky-fingers-kali-pi-pre-installed-image/
 * How to Turn a Raspberry Pi into a Low-Power Network Storage Device
   [http://www.howtogeek.com/139433/how-to-turn-a-raspberry-pi-into-a-low-power-network-storage-device/
 * Make Your Own Raspberry Pi NAS - SmallNetBuilder
   [http://www.smallnetbuilder.com/nas/nas-howto/32053-make-your-own-raspberry-pi-nas
 * R-Pi NAS - eLinux.org [http://elinux.org/R-Pi_NAS
 * How to build a Raspberry Pi cluster - Raspberry Pi
   [https://www.raspberrypi.com/tutorials/cluster-raspberry-pi-tutorial/
 * Raspberry Pi tutorials - Raspberry Pi
   [https://www.raspberrypi.com/tutorials/
 * Raspberry Pi Projects | Cybercademy
   [https://cybercademy.org/raspberry-pi-projects/
 * 8 Ways a Raspberry Pi Can Help You Learn Online Security Skills
   [https://www.makeuseof.com/tag/raspberry-pi-learn-online-security/#poisontap-the-evil-pi-zero
 * Détection d’intrusion (IDS) avec Suricata sur Raspberry Pi -
   Framboise 314, le Raspberry Pi à la sauce française....
   [https://www.framboise314.fr/detection-dintrusion-ids-avec-suricata-sur-raspberry-pi/
 * How to Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+
   « Null Byte :: WonderHowTo
   [https://null-byte.wonderhowto.com/how-to/build-beginner-hacking-kit-with-raspberry-pi-3-model-b-0184144/
 * Home Assistant [https://www.home-assistant.io/
 * DShield Honeypot - SANS Internet Storm Center
   [https://isc.sans.edu/honeypot.html
 * Raspberry Pi OS – Raspberry Pi [https://www.raspberrypi.com/software/
 * Les 50 meilleurs projets Raspberry Pi – Hiver 2022 | All3DP
   [https://all3dp.com/fr/1/meilleur-projet-raspberry-pi/
 * A portable WiFI router/NAS/Docker using RaspAP on Raspberry Pi 4
   with USB/SSD boot device | by David Herron | ITNEXT
   [https://itnext.io/a-portable-wifi-router-nas-docker-using-raspap-on-raspberry-pi-4-with-usb-ssd-boot-device-a64cd4a68d6f
 * Using a Raspberry Pi as a Bluetooth speaker with PipeWire
   [https://www.collabora.com/news-and-blog/blog/2022/09/02/using-a-raspberry-pi-as-a-bluetooth-speaker-with-pipewire-wireplumber/
 * Recalbox Home | recalbox.com [https://www.recalbox.com/fr/
 * Tuto Installation Debian Jessie sur Chromebook Asus C300 /
   Installation de Debian / Debian-facile
   [https://debian-facile.org/viewtopic.php?id=14052
 * How to Setup a Raspberry Pi Network Scanner - Pi My Life Up
   [https://pimylifeup.com/raspberry-pi-network-scanner/
 * RPi Network Vulnerability Scanner - Pensive Security Blog
   [https://pensivesecurity.io/blog/2020/11/16/RPi-Network-Vulnerability-Scanner/
 * GitHub - lukewegryn/rpi-vuln-scan: OpenVAS docker container with
   custom automation script. [https://github.com/lukewegryn/rpi-vuln-scan
 * Build a Raspberry Pi Scanner that Tracks the Devices Connected to
   Your Local Network - Make:
   [https://makezine.com/projects/build-raspberry-pi-network-scanner/
 * Raspberry Pi Network Scanner Project Overview | Cybercademy
   [https://cybercademy.org/raspberry-pi-network-scanner-project-overview/
 * Comment transformez un Raspberry Pi en serveur VPN avec PiVPN
   [https://www.clubic.com/raspberry-pi/dossier-365094-transformez-un-raspberry-pi-en-serveur-vpn-avec-pivpn.html
 * Free Dynamic DNS - Managed DNS - Managed Email - Domain Registration
   - No-IP [https://www.noip.com/
 * OpenVPN : Installer un Serveur VPN sur Raspberry Pi (en 5 min) –
   RaspberryTips
   [https://raspberrytips.fr/installer-serveur-vpn-raspberry-pi/
 * How to install a Wazuh server on a Raspberry Pi 4B - Jacob Riggs |
   Blog
   [https://jacobriggs.io/blog/posts/how-to-install-a-wazuh-siem-server-on-a-raspberry-pi-4b-26.html
 * Pwnagotchi Tutorial #piday #raspberrypi « Adafruit Industries –
   Makers, hackers, artists, designers and engineers!
   [https://blog.adafruit.com/2023/07/21/pwnagotchi-tutorial-piday-raspberrypi/
 * Pwnagotchi on a Raspberry Pi 3 with Adafruit 3.5 LCD | Matt Gibson
   [https://mattgibson.ca/installing-pwnagotchi-on-a-raspberry-pi-3-with-adafruit-3.5-lcd/
 * Installation et configuration Pi Hole sur Raspberry Pi – My blog
   [https://oleks.ca/2021/06/24/installation-et-configuration-pi-hole-sur-raspberry-pi/
 * CIRCL » CIRCLean - USB key sanitizer
   [https://www.circl.lu/projects/CIRCLean/
   Util
 * JSON Web Tokens - jwt.io [https://jwt.io/#debugger-io
 * PentesterLab Bootcamp [https://pentesterlab.com/bootcamp
 * GitHub - manala/manalize: Provides ready-to-use environments for
   various projects through manala ansible roles
   [https://github.com/manala/manalize
 * World's Fastest VPN and Privacy Protection | hide.me
   [https://hide.me/en/
 * samsclass.info: Sam Bowne Class Information [https://samsclass.info/
 * CFP Time [https://www.cfptime.org/home
 * Zero-Day [https://zero-day.io/
   GitHub
 * https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
   [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
 * https://github.com/AfvanMoopen/tryhackme-
   [https://github.com/AfvanMoopen/tryhackme-
 * https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html
   [https://manpages.ubuntu.com/manpages/bionic/fr/man8/hping3.8.html
 * https://auto.pwnspot.com/ [https://auto.pwnspot.com/
 * https://github.com/vavkamil/awesome-bugbounty-tools
   [https://github.com/vavkamil/awesome-bugbounty-tools
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/red-offensive/offensive-toolbox/recon-frameworks
 * https://hackersploit.org/ [https://hackersploit.org/
 * https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges [https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/#escalate-privileges
 * https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity
   [https://github.com/GoVanguard/Getting-into-InfoSec-and-Cybersecurity
 * https://github.com/sansinstitute/slingshot
   [https://github.com/sansinstitute/slingshot
 * https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 [https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0
 * https://github.com/denisidoro/navi [https://github.com/denisidoro/navi
 * https://github.com/Orange-Cyberdefense/GOAD
   [https://github.com/Orange-Cyberdefense/GOAD
 * https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/
   [https://vk9-sec.com/category/red-team/anonymity/anonymity-anonymity/
 * https://github.com/rkhal101/Web-Security-Academy-Series
   [https://github.com/rkhal101/Web-Security-Academy-Series
 * https://github.com/OlivierLaflamme/Cheatsheet-God
   [https://github.com/OlivierLaflamme/Cheatsheet-God
 * https://www.youtube.com/watch?v=ZK-h5xei07k
   [https://www.youtube.com/watch?v=ZK-h5xei07k
 * https://github.com/rkhal101/Web-Security-Academy-Series
   [https://github.com/rkhal101/Web-Security-Academy-Series
 * https://github.com/danielthatcher?tab=repositories
   [https://github.com/danielthatcher?tab=repositories
 * https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell
   [https://www.yolospacehacker.com/fr/toolbox.php?cat=Webshell
 * https://github.com/Orange-Cyberdefense/GOAD
   [https://github.com/Orange-Cyberdefense/GOAD
 * https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * https://0ut3r.space/2020/07/25/shodan-dorks/
   [https://0ut3r.space/2020/07/25/shodan-dorks/
 * https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
   [https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide/
 * https://www.sans.org/cyberaces/system-administration/
   [https://www.sans.org/cyberaces/system-administration/
 * https://ethicalhackersacademy.com/ [https://ethicalhackersacademy.com/
 * https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388 [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388
 * https://cheatsheet.haax.fr/ [https://cheatsheet.haax.fr/
 * https://gchq.github.io/CyberChef/ [https://gchq.github.io/CyberChef/
 * https://www.puckiestyle.nl/pass-the-hash/
   [https://www.puckiestyle.nl/pass-the-hash/
 * https://github.com/Wh1teDrvg0n/safeVPN-THM
   [https://github.com/Wh1teDrvg0n/safeVPN-THM
 * https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
   [https://www.kali.org/docs/general-use/guacamole-kali-in-browser/
 * https://wh1tedrvg0n.com/htb-lame/ [https://wh1tedrvg0n.com/htb-lame/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit
 * https://0xdf.gitlab.io/tags.html [https://0xdf.gitlab.io/tags.html
 * https://beta.hackndo.com/archives/ [https://beta.hackndo.com/archives/
 * https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/Darknet.md
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
 * https://github.com/qazbnm456/awesome-web-security
   [https://github.com/qazbnm456/awesome-web-security
 * https://github.com/Hack-with-Github/Awesome-Hacking
   [https://github.com/Hack-with-Github/Awesome-Hacking
 * https://github.com/swisskyrepo/PayloadsAllTheThings
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * https://github.com/carlospolop/PEASS-ng
   [https://github.com/carlospolop/PEASS-ng
 * https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md
 * https://www.hackingarticles.in/web-penetration-testing/
   [https://www.hackingarticles.in/web-penetration-testing/
 * https://github.com/enaqx/awesome-pentest
   [https://github.com/enaqx/awesome-pentest
 * https://github.com/S3cur3Th1sSh1t/Pentest-Tools
   [https://github.com/S3cur3Th1sSh1t/Pentest-Tools
 * https://github.com/Tib3rius/Pentest-Cheatsheets
   [https://github.com/Tib3rius/Pentest-Cheatsheets
 * https://github.com/superkojiman?tab=repositories
   [https://github.com/superkojiman?tab=repositories
 * https://book.hacktricks.xyz/ [https://book.hacktricks.xyz/
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://github.com/superkojiman/hacktricks
   [https://github.com/superkojiman/hacktricks
 * https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside [https://book.hacktricks.xyz/pentesting/pentesting-network#discovering-hosts-from-the-outside
 * https://gtfobins.github.io/ [https://gtfobins.github.io/
 * https://lolbas-project.github.io/ [https://lolbas-project.github.io/
 * https://github.com/0dayCTF [https://github.com/0dayCTF
 * https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/ [https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/
 * https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development [https://github.com/infosecn1nja/Red-Teaming-Toolkit#Payload%20Development
 * https://www.hackingarticles.in/netcat-for-pentester/
   [https://www.hackingarticles.in/netcat-for-pentester/
 * http://www.vulnweb.com/ [http://www.vulnweb.com/
 * https://www.revshells.com/ [https://www.revshells.com/
 * https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/ [https://www.hackingarticles.in/msfvenom-cheatsheet-windows-exploitation/
 * https://www.youtube.com/watch?v=h0MqCRYH1mk
   [https://www.youtube.com/watch?v=h0MqCRYH1mk
 * https://github.com/0dayCTF/awesome-shodan-queries
   [https://github.com/0dayCTF/awesome-shodan-queries
 * https://tzusec.com/category/guides/kali-linux/password-attacks/
   [https://tzusec.com/category/guides/kali-linux/password-attacks/
 * https://github.com/GTFOBins/GTFOBins.github.io
   [https://github.com/GTFOBins/GTFOBins.github.io
 * https://github.com/LOLBAS-Project/LOLBAS
   [https://github.com/LOLBAS-Project/LOLBAS
 * https://0xdf.gitlab.io/ [https://0xdf.gitlab.io/
 * https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
   [https://github.com/carlospolop/PEASS-ng/tree/master/winPEAS
 * https://www.trenchesofit.com/resources/
   [https://www.trenchesofit.com/resources/
 * https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/ [https://www.trenchesofit.com/2020/09/12/oscp-buffer-overflow-write-up/
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/n3tsky/Pentest-Tools
   [https://github.com/n3tsky/Pentest-Tools
 * https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
   [https://gist.github.com/JamesHovious/814b4d2edb2119d3c2fe
 * https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
   [https://github.com/hum4nG0D/OSCP_Bufferovrflw_Prep
 * https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst [https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
 * https://rderik.com/blog/using-radare2-to-patch-a-binary/
   [https://rderik.com/blog/using-radare2-to-patch-a-binary/
 * https://gef.readthedocs.io/en/master/commands/ropper/
   [https://gef.readthedocs.io/en/master/commands/ropper/
 * https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
   [https://www.youtube.com/watch?v=XVYgBetSvS8&t=2490s
 * https://gef.readthedocs.io/en/master/
   [https://gef.readthedocs.io/en/master/
 * https://beta.hackndo.com/assembly-basics/
   [https://beta.hackndo.com/assembly-basics/
 * https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/ [https://zestedesavoir.com/articles/100/introduction-aux-buffer-overflows/
 * https://md5hashing.net/ [https://md5hashing.net/
 * https://hashcat.net/wiki/doku.php?id=example_hashes
   [https://hashcat.net/wiki/doku.php?id=example_hashes
 * https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
   [https://github.com/openwall/john/blob/bleeding-jumbo/run/ssh2john.py
 * https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial [https://defendtheweb.net/article/buffer-overflow-to-run-root-shell-full-tutorial
 * https://github.com/OJ/gobuster#vhost-mode-options
   [https://github.com/OJ/gobuster#vhost-mode-options
 * https://erev0s.com/tools/web-application-assessment-check-list/
   [https://erev0s.com/tools/web-application-assessment-check-list/
 * https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf [https://wpscan.com/howto-find-wordpress-plugin-vulnerabilities-wpscan-ebook.pdf
 * https://reconshell.com/web-attack-cheat-sheet/
   [https://reconshell.com/web-attack-cheat-sheet/
 * https://oscp.infosecsanyam.in/brute-force
   [https://oscp.infosecsanyam.in/brute-force
 * https://md5hashing.net/hash/md5 [https://md5hashing.net/hash/md5
 * https://github.com/Hack-with-Github/Free-Security-eBooks
   [https://github.com/Hack-with-Github/Free-Security-eBooks
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
   [https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
 * https://github.com/SecureAuthCorp/impacket
   [https://github.com/SecureAuthCorp/impacket
 * https://wtfbins.wtf/ [https://wtfbins.wtf/
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://github.com/Hack-with-Github/Free-Security-eBooks
   [https://github.com/Hack-with-Github/Free-Security-eBooks
 * https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerry [https://github.com/Hack-with-Github/Free-Security-eBookshttps://github.com/swisskyrepo/PayloadsAllTheThingshttps://github.com/skavngr/rapidscanhttps://github.com/Moham3dRiahi/XAttackerhttps://github.com/Moham3dRiahi/Th3inspectorhttps://github.com/drwetter/Penetration-Testinghttps://github.com/Sharpforcehttps://github.com/infosecn1nja/Red-Teaming-Toolkithttps://github.com/m4ll0k/Awesome-Hacking-Toolshttps://github.com/Und3rf10w/kali-anonsurfhttps://github.com/ariokio/cheathttps://github.com/adon90/pentest_compilationhttps://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Modehttps://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linuxhttps://github.com/guifre/Elevatorhttps://github.com/tomnomnom?tab=repositorieshttps://github.com/sindresorhus/awesome#securityhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/danielmiessler/SecListshttps://github.com/g0tmi1k/mpchttps://github.com/DataSploit/datasploithttps://github.com/famavott/osint-scraperhttps://github.com/lcashdol/wppluginxsshttps://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.phphttps://github.com/jrespeto/maltrievehttps://github.com/entropy1337/infernal-twinhttps://github.com/s4n7h0/xvwahttps://github.com/entropy1337/MobileApp-Pentest-Cheatsheethttps://github.com/entropy1337/awesome-web-hackinghttps://github.com/nahamsec/bbhthttps://mitmproxy.org/https://github.com/Wh1t3Rh1n0/deb2kalihttps://github.com/OlivierLaflamme/Cheatsheet-Godhttps://gtfobins.github.io/#+file%20uploadhttps://github.com/michalmalik/linux-re-101https://github.com/Re4son/mix-recon/https://github.com/swagger-api/swagger-codegenhttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.mdhttps://github.com/blindfuzzy/LHFhttps://osintframework.com/https://github.com/vulnersCom/getsploithttps://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-tochttps://github.com/Cillian-Collins/dirscraperhttps://github.com/xillwillx/Sherlockhttps://github.com/codingo/VHostScanhttps://github.com/rastating/shivahttps://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLEhttps://github.com/ngalongc/bug-bounty-referencehttps://github.com/OWASP/Amasshttps://github.com/rowbot1?tab=repositorieshttps://www.youtube.com/watch?v=FQRuRmMkcDghttps://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016https://github.com/m4ll0k/WAScanhttps://moretip.com/webmap-nmap-web-dashboard-and-reporting/https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.mdhttps://github.com/nahamsec/CMSFuzzhttps://github.com/volatilityfoundation/volatility/wiki/Memory-Sampleshttps://github.com/RustyShackleford221/OSCP-Prephttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/jakejarvis/awesome-shodan-querieshttps://github.com/rewardone/OSCPRepohttps://github.com/rshipp/awesome-malware-analysishttps://github.com/JusticeRage/Manalyzehttps://github.com/epinna/tplmaphttps://github.com/Sjord/jwtdemo/https://github.com/jbarone/xxelabhttps://github.com/DiogoMRSilva/websitesVulnerableToSSTIhttps://github.com/lmammino/jwt-crackerhttps://github.com/LordNoteworthy/al-khaserhttps://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.mdhttps://github.com/philhagen/sof-elkhttps://github.com/philhagen/sof-elk/blob/main/VM_README.mdhttps://onceupon.github.io/Bash-Oneliner/#awkhttps://project-awesome.org/fabacab/awesome-cybersecurity-blueteamhttps://github.com/eteran/edb-debuggerhttps://github.com/AonCyberLabs/Windows-Exploit-Suggester?utm_source=pocket_mylisthttps://github.com/IvanVoronov/Scanners-Boxhttps://github.com/Frissi0n/GTFONowhttps://github.com/ehmatthes/pcc_2ehttps://github.com/stanfrbd/searchcvehttps://github.com/PAPAMICA/scriptshttps://github.com/samratashok/nishanghttps://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheethttps://github.com/DefectDojo/django-DefectDojohttps://github.com/ffuf/ffufhttps://github.com/carlospolop/PEASS-nghttps://github.com/x90skysn3k/brutesprayhttps://github.com/ExploitEducationhttps://github.com/jivoi?tab=repositorieshttps://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resourceshttps://github.com/payloadbox/command-injection-payload-listhttps://github.com/jagregory/abrash-zen-of-asmhttps://github.com/Cyb3rWard0ghttps://github.com/dievus/threader3000https://github.com/dievus/printspooferhttps://github.com/kgretzky/evilginx2https://github.com/muraenateam/muraenahttps://github.com/drk1wi/Modlishkahttps://github.com/AlgoSecure/Pollenisatorhttps://github.com/fluentpython/example-code-2ehttps://github.com/dostoevskylabs/dostoevsky-pentest-noteshttps://github.com/NoorQureshi/kali-linux-cheatsheethttps://snowscan.io/https://github.com/Yavuzlar/VulnLabhttps://blog.void.yt/HTB/index.htmlhttps://github.com/0dayCTF/awesome-shodan-querieshttps://github.com/skelsec/pypykatzhttps://github.com/sc0tfree/updoghttps://github.com/NetSPI/PowerUpSQLhttps://github.com/GTFOBins/GTFOBins.github.iohttps://github.com/LOLBAS-Project/LOLBAShttps://github.com/pry0cc/axiomhttps://github.com/jivoi/pentesthttps://github.com/Ignitetechnologies/BurpSuite-For-Pentesterhttps://github.com/curated-intel/Ukraine-Cyber-Operationshttps://github.com/Kirtar22/Presentationshttps://github.com/Kirtar22/Litmus_Testhttps://github.com/Z4nzu/hackingtoolhttps://github.com/kaiiyer/awesome-vulnerablehttps://github.com/OWASP/Vulnerable-Web-Applicationhttps://github.com/sec4you/VulnLabshttps://github.com/webpwnized/mutillidaehttps://thehackerish.com/how-to-install-owasp-juice-shop/https://github.com/juliocesarfort/public-pentesting-reportshttps://github.com/PowerDNS-Admin/PowerDNS-Adminhttps://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388https://github.com/tdubs/bgp-recon
 * https://www.threatable.io/ [https://www.threatable.io/
 * https://t.me/s/HackerVideos/ [https://t.me/s/HackerVideos/
 * https://osintframework.com/ [https://osintframework.com/
 * https://github.com/blindfuzzy/LHF [https://github.com/blindfuzzy/LHF
 * https://haax.fr/fr/ [https://haax.fr/fr/
 * https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester?utm_source=pocket_mylist
 * https://github.com/andrew-d/static-binaries
   [https://github.com/andrew-d/static-binaries
 * https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys [https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys
 * https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
   [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
 * https://vk9-sec.com/ssh2john-how-to/
   [https://vk9-sec.com/ssh2john-how-to/
 * https://github.com/vavkamil/awesome-bugbounty-tools
   [https://github.com/vavkamil/awesome-bugbounty-tools
 * https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md
 * https://github.com/clong/DetectionLab
   [https://github.com/clong/DetectionLab
 * https://github.com/hposton/python-for-cybersecurity
   [https://github.com/hposton/python-for-cybersecurity
 * https://github.com/Orange-Cyberdefense/arsenal
   [https://github.com/Orange-Cyberdefense/arsenal
 * https://www.bugbountyhunter.com/ [https://www.bugbountyhunter.com/
 * https://www.kitploit.com/ [https://www.kitploit.com/
 * https://github.com/CyberSecurityUP/Awesome-PenTest-Practice
   [https://github.com/CyberSecurityUP/Awesome-PenTest-Practice
 * https://github.com/yarrick/iodine [https://github.com/yarrick/iodine
 * https://gitlab.com/An0nUD4Y/hiddeneye
   [https://gitlab.com/An0nUD4Y/hiddeneye
 * GitHub - Hack-with-Github/Free-Security-eBooks: Free Security and
   Hacking eBooks
   [https://github.com/Hack-with-Github/Free-Security-eBooks
 * GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads
   and bypass for Web Application Security and Pentest/CTF
   [https://github.com/swisskyrepo/PayloadsAllTheThings
 * GitHub - Moham3dRiahi/Th3inspector: Th3Inspector 🕵️ Best Tool For
   Information Gathering 🔎 [https://github.com/Moham3dRiahi/Th3inspector
 * drwetter/Penetration-Testing: List of awesome penetration testing
   resources, tools and other shiny things
   [https://github.com/drwetter/Penetration-Testing
 * Sharpforce [https://github.com/Sharpforce
 * infosecn1nja/Red-Teaming-Toolkit: A collection of open source and
   commercial tools that aid in red team operations.
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit
 * m4ll0k/Awesome-Hacking-Tools: Awesome Hacking Tools
   [https://github.com/m4ll0k/Awesome-Hacking-Tools
 * Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf
   modules to Kali Linux [https://github.com/Und3rf10w/kali-anonsurf
 * ariokio/cheat: cheat allows you to create and view interactive
   cheatsheets on the command-line. It was designed to help remind *nix
   system administrators of options for commands that they use
   frequently, but not frequently enough to remember.
   [https://github.com/ariokio/cheat
 * Privilege escalation: Linux - Hacker's Grimoire
   [https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux
 * Meterpreter Paranoid Mode · rapid7/metasploit-framework Wiki
   [https://github.com/rapid7/metasploit-framework/wiki/Meterpreter-Paranoid-Mode
 * GitHub - guifre/Elevator: Automates elevation of privileges in Linux
   like systems [https://github.com/guifre/Elevator
 * tomnomnom (Tom Hudson) / Repositories · GitHub
   [https://github.com/tomnomnom?tab=repositories
 * sindresorhus/awesome: Curated list of awesome lists
   [https://github.com/sindresorhus/awesome#security
 * GitHub - blindfuzzy/LHF: A modular recon tool for pentesting
   [https://github.com/blindfuzzy/LHF
 * OSINT Framework [https://osintframework.com/
 * danielmiessler/SecLists: SecLists is the security tester's
   companion. It's a collection of multiple types of lists used during
   security assessments, collected in one place. List types include
   usernames, passwords, URLs, sensitive data patterns, fuzzing
   payloads, web shells, and many more.
   [https://github.com/danielmiessler/SecLists
 * g0tmi1k/mpc: MSFvenom Payload Creator (MSFPC)
   [https://github.com/g0tmi1k/mpc
 * DataSploit/datasploit: An #OSINT Framework to perform various recon
   techniques on Companies, People, Phone Number, Bitcoin Addresses,
   etc., aggregate all the raw data, and give data in multiple formats.
   [https://github.com/DataSploit/datasploit
 * famavott/osint-scraper: Social Recon
   [https://github.com/famavott/osint-scraper
 * GitHub - lcashdol/wppluginxss: Scripts I used to automate XSS
   discovery in wordpress plugins.
   [https://github.com/lcashdol/wppluginxss
 * wp-login-logger/wp-admin.php at master · lcashdol/wp-login-logger ·
   GitHub
   [https://github.com/lcashdol/wp-login-logger/blob/master/wp-admin.php
 * GitHub - jrespeto/maltrieve: A tool to retrieve malware directly
   from the source for security researchers.
   [https://github.com/jrespeto/maltrieve
 * GitHub - entropy1337/infernal-twin: wireless hacking - This is
   automated wireless hacking tool
   [https://github.com/entropy1337/infernal-twin
 * GitHub - s4n7h0/xvwa: XVWA is a badly coded web application written
   in PHP/MySQL that helps security enthusiasts to learn application
   security. [https://github.com/s4n7h0/xvwa
 * GitHub - entropy1337/MobileApp-Pentest-Cheatsheet: The Mobile App
   Pentest cheat sheet was created to provide concise collection of
   high value information on specific mobile application penetration
   testing topics.
   [https://github.com/entropy1337/MobileApp-Pentest-Cheatsheet
 * GitHub - entropy1337/awesome-web-hacking: A list of web application
   security [https://github.com/entropy1337/awesome-web-hacking
 * nahamsec/bbht: A script to set up a quick Ubuntu 17.10 x64 box with
   tools I use. [https://github.com/nahamsec/bbht
 * mitmproxy - an interactive HTTPS proxy [https://mitmproxy.org/
 * Wh1t3Rh1n0/deb2kali: A Script to Convert Debian Linux into Kali
   Linux [https://github.com/Wh1t3Rh1n0/deb2kali
 * OlivierLaflamme/Cheatsheet-God: Penetration Testing / OSCP Biggest
   Reference Bank / Cheatsheet
   [https://github.com/OlivierLaflamme/Cheatsheet-God
 * GTFOBins [https://gtfobins.github.io/#+file%20upload
 * michalmalik/linux-re-101: A collection of resources for linux
   reverse engineering [https://github.com/michalmalik/linux-re-101
 * GitHub - Re4son/mix-recon: Reconnaissance scripts for penetration
   testing [https://github.com/Re4son/mix-recon/
 * GitHub - swagger-api/swagger-codegen: swagger-codegen contains a
   template-driven engine to generate documentation, API clients and
   server stubs in different languages by parsing your OpenAPI /
   Swagger definition. [https://github.com/swagger-api/swagger-codegen
 * the-book-of-secret-knowledge/README.md at master ·
   trimstray/the-book-of-secret-knowledge
   [https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md
 * GitHub - blindfuzzy/LHF: A modular recon tool for pentesting
   [https://github.com/blindfuzzy/LHF
 * OSINT Framework [https://osintframework.com/
 * the-book-of-secret-knowledge/README.md at master ·
   trimstray/the-book-of-secret-knowledge
   [https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/README.md#web-tools-toc
 * GitHub - Cillian-Collins/dirscraper: OSINT scanning tool which
   discovers and maps directories found in javascript files hosted on a
   website. [https://github.com/Cillian-Collins/dirscraper
 * GitHub - xillwillx/Sherlock [https://github.com/xillwillx/Sherlock
 * GitHub - codingo/VHostScan: A virtual host scanner that performs
   reverse lookups, can be used with pivot tools, detect catch-all
   scenarios, work around wildcards, aliases and dynamic default pages.
   [https://github.com/codingo/VHostScan
 * GitHub - rastating/shiva: An Ansible playbook to provision a host
   for penetration testing and CTF challenges
   [https://github.com/rastating/shiva
 * GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: This repository was
   created and developed by Ammar Amer @cry__pto Only. Updates to this
   repository will continue to arrive until the number of links reaches
   2000 links at any time soon.Learn Ethical Hacking and penetration
   testing .hundreds of ethical hacking & penetration testing & red
   team & cyber security & computer science resources.
   [https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
 * GitHub - ngalongc/bug-bounty-reference: Inspired by
   https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty
   write-up that is categorized by the bug nature
   [https://github.com/ngalongc/bug-bounty-reference
 * GitHub - OWASP/Amass: In-depth Attack Surface Mapping and Asset
   Discovery [https://github.com/OWASP/Amass
 * rowbot1 / Repositories · GitHub
   [https://github.com/rowbot1?tab=repositories
 * Instalar 4nonimizer Kali Linux - YouTube
   [https://www.youtube.com/watch?v=FQRuRmMkcDg
 * GitHub - swisskyrepo/ESIEA_SECURE_EDITION_2016: Write-up of the ESE
   CTF (FR) [https://github.com/swisskyrepo/ESIEA_SECURE_EDITION_2016
 * GitHub - m4ll0k/WAScan: WAScan - Web Application Scanner
   [https://github.com/m4ll0k/WAScan
 * WebMap - Nmap Web Dashboard And Reporting - MORETIP
   [https://moretip.com/webmap-nmap-web-dashboard-and-reporting/
 * security/privilege_escalation_-_linux.md at master · xapax/security
   · GitHub
   [https://github.com/xapax/security/blob/master/privilege_escalation_-_linux.md
 * nahamsec/CMSFuzz [https://github.com/nahamsec/CMSFuzz
 * Memory Samples · volatilityfoundation/volatility Wiki · GitHub
   [https://github.com/volatilityfoundation/volatility/wiki/Memory-Samples
 * GitHub - RustyShackleford221/OSCP-Prep: A comprehensive
   guide/material for anyone looking to get into infosec or take the
   OSCP exam [https://github.com/RustyShackleford221/OSCP-Prep
 * Open-source-tools-for-CTI/README.md at master ·
   BushidoUK/Open-source-tools-for-CTI · GitHub
   [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md
 * GitHub - jakejarvis/awesome-shodan-queries: 🔍 A collection of
   interesting, funny, and depressing search queries to plug into
   https://shodan.io/ 👩‍💻
   [https://github.com/jakejarvis/awesome-shodan-queries
 * GitHub - rewardone/OSCPRepo: A list of commands, scripts, resources,
   and more that I have gathered and attempted to consolidate for use
   as OSCP (and more) study material. Commands in 'Usefulcommands'
   Keepnote. Bookmarks and reading material in 'BookmarkList'
   CherryTree. Reconscan Py2 and Py3. Custom ISO building.
   [https://github.com/rewardone/OSCPRepo
 * GitHub - rshipp/awesome-malware-analysis: Defund the Police.
   [https://github.com/rshipp/awesome-malware-analysis
 * GitHub - JusticeRage/Manalyze: A static analyzer for PE executables.
   [https://github.com/JusticeRage/Manalyze
 * GitHub - epinna/tplmap: Server-Side Template Injection and Code
   Injection Detection and Exploitation Tool
   [https://github.com/epinna/tplmap
 * GitHub - Sjord/jwtdemo: Practice hacking JWT tokens
   [https://github.com/Sjord/jwtdemo/
 * GitHub - lmammino/jwt-cracker: Simple HS256 JWT token brute force
   cracker [https://github.com/lmammino/jwt-cracker
 * GitHub - LordNoteworthy/al-khaser: Public malware techniques used in
   the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
   [https://github.com/LordNoteworthy/al-khaser
 * Open-source-tools-for-CTI/README.md at master ·
   BushidoUK/Open-source-tools-for-CTI · GitHub
   [https://github.com/BushidoUK/Open-source-tools-for-CTI/blob/master/README.md
 * GitHub - philhagen/sof-elk: Configuration files for the SOF-ELK VM,
   used in SANS FOR572 [https://github.com/philhagen/sof-elk
 * sof-elk/VM_README.md at main · philhagen/sof-elk · GitHub
   [https://github.com/philhagen/sof-elk/blob/main/VM_README.md
 * Bash-Oneliner | A collection of handy Bash One-Liners and terminal
   tricks for data processing and Linux system maintenance.
   [https://onceupon.github.io/Bash-Oneliner/#awk
 * | Curated list of awesome lists | Project-Awesome.org
   [https://project-awesome.org/fabacab/awesome-cybersecurity-blueteam
 * GitHub - eteran/edb-debugger: edb is a cross-platform
   AArch32/x86/x86-64 debugger. [https://github.com/eteran/edb-debugger
 * GitHub - IvanVoronov/Scanners-Box: A powerful hacker toolkit
   collected more than 10 categories of open source scanners from
   Github - 安全行业从业者自研开源扫描器合辑
   [https://github.com/IvanVoronov/Scanners-Box
 * GitHub - Frissi0n/GTFONow: Automatic privilege escalation for
   misconfigured capabilities, sudo and suid binaries
   [https://github.com/Frissi0n/GTFONow
 * GitHub - ehmatthes/pcc_2e: Online resources for Python Crash Course
   (Second Edition), from No Starch Press
   [https://github.com/ehmatthes/pcc_2e
 * GitHub - stanfrbd/searchcve [https://github.com/stanfrbd/searchcve
 * GitHub - PAPAMICA/scripts: Mes différents scripts
   [https://github.com/PAPAMICA/scripts
 * GitHub - samratashok/nishang: Nishang - Offensive PowerShell for red
   team, penetration testing and offensive security.
   [https://github.com/samratashok/nishang
 * GitHub - CompassSecurity/Hacking_Tools_Cheat_Sheet
   [https://github.com/CompassSecurity/Hacking_Tools_Cheat_Sheet
 * GitHub - ffuf/ffuf: Fast web fuzzer written in Go
   [https://github.com/ffuf/ffuf
 * GitHub - carlospolop/PEASS-ng: PEASS - Privilege Escalation Awesome
   Scripts SUITE (with colors) [https://github.com/carlospolop/PEASS-ng
 * GitHub - x90skysn3k/brutespray: Brute-Forcing from Nmap output -
   Automatically attempts default creds on found services.
   [https://github.com/x90skysn3k/brutespray
 * ExploitEducation (Exploit Education) · GitHub
   [https://github.com/ExploitEducation
 * jivoi (EK_) / Repositories · GitHub
   [https://github.com/jivoi?tab=repositories
 * GitHub - payloadbox/command-injection-payload-list: 🎯 Command
   Injection Payload List
   [https://github.com/payloadbox/command-injection-payload-list
 * GitHub -
   gerryguy311/Free_CyberSecurity_Professional_Development_Resources:
   An awesome list of FREE resources for training, conferences,
   speaking, labs, reading, etc that are free. Originally built during
   COVID-19 for cybersecurity professionals with downtime can take
   advantage of to improve their skills and marketability to come out
   on the other side ready to rock. Now its taken on a life of its own
   and will persist, COVID be damned.
   [https://github.com/gerryguy311/Free_CyberSecurity_Professional_Development_Resources
 * GitHub - jagregory/abrash-zen-of-asm: Markdown source for Michael
   Abrash's Zen of Assembly Language (1990)
   [https://github.com/jagregory/abrash-zen-of-asm
 * Cyb3rWard0g (Roberto Rodriguez) [https://github.com/Cyb3rWard0g
 * GitHub - dievus/threader3000: Multi-threaded Python Port Scanner
   with Nmap Integration [https://github.com/dievus/threader3000
 * GitHub - dievus/printspoofer [https://github.com/dievus/printspoofer
 * GitHub - kgretzky/evilginx2: Standalone man-in-the-middle attack
   framework used for phishing login credentials along with session
   cookies, allowing for the bypass of 2-factor authentication
   [https://github.com/kgretzky/evilginx2
 * GitHub - muraenateam/muraena: Muraena is an almost-transparent
   reverse proxy aimed at automating phishing and post-phishing
   activities. [https://github.com/muraenateam/muraena
 * GitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.
   [https://github.com/drk1wi/Modlishka
 * GitHub - AlgoSecure/Pollenisator: Collaborative pentest tool with
   highly customizable tools [https://github.com/AlgoSecure/Pollenisator
 * GitHub - fluentpython/example-code-2e: Example code for Fluent
   Python, 2nd edition (O'Reilly, 2021)
   [https://github.com/fluentpython/example-code-2e
 * GitHub - dostoevskylabs/dostoevsky-pentest-notes: Notes for taking
   the OSCP in 2097. Read in book form on GitBook
   [https://github.com/dostoevskylabs/dostoevsky-pentest-notes
 * GitHub - NoorQureshi/kali-linux-cheatsheet: Kali Linux Cheat Sheet
   for Penetration Testers
   [https://github.com/NoorQureshi/kali-linux-cheatsheet
 * snowscan.io [https://snowscan.io/
 * Ech0 - Hack The Box [https://blog.void.yt/HTB/index.html
 * GitHub - 0dayCTF/awesome-shodan-queries: 🔍 A collection of
   interesting, funny, and depressing search queries to plug into
   https://shodan.io/ 👩‍💻
   [https://github.com/0dayCTF/awesome-shodan-queries
 * GitHub - skelsec/pypykatz: Mimikatz implementation in pure Python
   [https://github.com/skelsec/pypykatz
 * GitHub - sc0tfree/updog: Updog is a replacement for Python's
   SimpleHTTPServer. It allows uploading and downloading via HTTP/S,
   can set ad hoc SSL certificates and use http basic auth.
   [https://github.com/sc0tfree/updog
 * GitHub - NetSPI/PowerUpSQL: PowerUpSQL: A PowerShell Toolkit for
   Attacking SQL Server [https://github.com/NetSPI/PowerUpSQL
 * GitHub - GTFOBins/GTFOBins.github.io: GTFOBins is a curated list of
   Unix binaries that can be used to bypass local security restrictions
   in misconfigured systems
   [https://github.com/GTFOBins/GTFOBins.github.io
 * GitHub - pry0cc/axiom: The dynamic infrastructure framework for
   everybody! Distribute the workload of many different scanning tools
   with ease, including nmap, ffuf, masscan, nuclei, meg and many more!
   [https://github.com/pry0cc/axiom
 * GitHub - LOLBAS-Project/LOLBAS: Living Off The Land Binaries And
   Scripts - (LOLBins and LOLScripts)
   [https://github.com/LOLBAS-Project/LOLBAS
 * GitHub - jivoi/pentest: offsec batteries included
   [https://github.com/jivoi/pentest
 * GitHub - Ignitetechnologies/BurpSuite-For-Pentester
   [https://github.com/Ignitetechnologies/BurpSuite-For-Pentester
 * GitHub - curated-intel/Ukraine-Cyber-Operations: Curated
   Intelligence is working with analysts from around the world to
   provide useful information to organisations in Ukraine looking for
   additional free threat intelligence. Slava Ukraini. Glory to
   Ukraine. [https://github.com/curated-intel/Ukraine-Cyber-Operations
 * GitHub - Kirtar22/Presentations: Presentations
   [https://github.com/Kirtar22/Presentations
 * GitHub - Kirtar22/Litmus_Test: Detecting ATT&CK techniques & tactics
   for Linux [https://github.com/Kirtar22/Litmus_Test
 * GitHub - Z4nzu/hackingtool: ALL IN ONE Hacking Tool For Hackers
   [https://github.com/Z4nzu/hackingtool
 * How to install OWASP Juice Shop - OWASP Top 10 training -
   thehackerish [https://thehackerish.com/how-to-install-owasp-juice-shop/
 * GitHub - juliocesarfort/public-pentesting-reports: Curated list of
   public penetration test reports released by several consulting firms
   and academic security groups
   [https://github.com/juliocesarfort/public-pentesting-reports
 * GitHub - PowerDNS-Admin/PowerDNS-Admin: A PowerDNS web interface
   with advanced features
   [https://github.com/PowerDNS-Admin/PowerDNS-Admin
 * Resources-For-Bug-Bounty
   [https://jeweled-lathe-d5e.notion.site/Resources-For-Bug-Bounty-14abca4df5be40838df4689afb384388
 * GitHub - h0ek/ransim: Ransomware simulator
   [https://github.com/h0ek/ransim
 * GitHub - tdubs/bgp-recon: Perform live BGP reconnaissance against
   telnet based Looking Glass servers - scripts and parsers
   [https://github.com/tdubs/bgp-recon
 * bugcrowd-levelup-subdomain-enumeration/README.md at master ·
   appsecco/bugcrowd-levelup-subdomain-enumeration · GitHub
   [https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration/blob/master/README.md
 * GitHub - OWASP/CheatSheetSeries: The OWASP Cheat Sheet Series was
   created to provide a concise collection of high value information on
   specific application security topics.
   [https://github.com/OWASP/CheatSheetSeries
 * CheatSheetSeries/cheatsheets at master · OWASP/CheatSheetSeries ·
   GitHub
   [https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
 * GitHub - Clutchisback1/GIT_THEM: Just a quick and dirty little
   script import all the github goodies I like to play with.
   [https://github.com/Clutchisback1/GIT_THEM
 * Beefhooks! :: H4cklife!! — No-life it [https://h4cklife.org/beefhook/
 * GitHub - ANSSI-FR/AD-control-paths: Active Directory Control Paths
   auditing and graphing tools
   [https://github.com/ANSSI-FR/AD-control-paths
 * Ciphey/README.md at master · Ciphey/Ciphey · GitHub
   [https://github.com/Ciphey/Ciphey/blob/master/translations/fr/README.md
 * GitHub - Orange-Cyberdefense/GOAD: game of active directory
   [https://github.com/Orange-Cyberdefense/GOAD
 * Game Of Active Directory v2 | Mayfly
   [https://mayfly277.github.io/posts/GOADv2/
 * Active Directory Mindmap Upgrade | Mayfly
   [https://mayfly277.github.io/posts/Upgrade-Active-Directory-mindmap/
 * GitHub - ageitgey/face_recognition: The world's simplest facial
   recognition api for Python and the command line
   [https://github.com/ageitgey/face_recognition
 * GitHub - JoelGMSec/PSRansom: PowerShell Ransomware Simulator with C2
   Server [https://github.com/JoelGMSec/PSRansom
 * GitHub - codesiddhant/Jasmin-Ransomware: Jasmin Ransomware is an
   advanced red team tool (WannaCry Clone) used for simulating real
   ransomware attacks. Jasmin helps security researchers to overcome
   the risk of external attacks.
   [https://github.com/codesiddhant/Jasmin-Ransomware
 * GitHub - lawndoc/RanSim: Ransomware simulation script written in
   PowerShell. Useful for testing your defenses and backups against
   real ransomware-like activity in a controlled setting.
   [https://github.com/lawndoc/RanSim
 * GitHub - leeberg/CashCatRansomwareSimulator: A simple windows
   ransomware simulator that will rename .TXT files a ransomware
   extension to simulate ransomware behavior for testing various
   monitoring tools [https://github.com/leeberg/CashCatRansomwareSimulator
 * GitHub - sevagas/macro_pack: macro_pack is a tool by @EmericNasi
   used to automatize obfuscation and generation of Office documents,
   VB scripts, shortcuts, and other formats for pentest, demo, and
   social engineering assessments. The goal of macro_pack is to
   simplify exploitation, antimalware bypass, and automatize the
   process from malicious macro and script generation to final document
   generation. It also provides a lot of helpful features useful for
   redteam or security research. [https://github.com/sevagas/macro_pack
 * GitHub - redeye-framework/Redeye
   [https://github.com/redeye-framework/Redeye
 * GitHub - lobuhi/byp4xx: Pyhton script for HTTP 40X responses
   bypassing. Features: Verb tampering, headers, #bugbountytips,
   User-Agents, extensions, default credentials and fuzzing.
   [https://github.com/lobuhi/byp4xx
 * GitHub - D3Ext/AORT: All in One Recon Tool for Bug Bounty
   [https://github.com/D3Ext/AORT
 * D3Ext (D3Ext) · GitHub [https://github.com/D3Ext
 * nishang/Invoke-PowerShellTcpOneLine.ps1 at master ·
   samratashok/nishang · GitHub
   [https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcpOneLine.ps1
 * GitHub - Processus-Thief/HEKATOMB: Hekatomb is a python script that
   connects to LDAP directory to retrieve all computers and users
   informations. Then it will download all DPAPI blob of all users from
   all computers and uses Domain backup keys to decrypt them.
   [https://github.com/Processus-Thief/HEKATOMB
 * GitHub - JohnHammond/notes: An Obsidian vault to Github Pages
   workflow to hopefully make me take notes
   [https://github.com/JohnHammond/notes
 * GitHub - jobindjohn/obsidian-publish-mkdocs: A Template to Publish
   Obsidian/Foam Notes on Github Pages (uses MkDocs)
   [https://github.com/jobindjohn/obsidian-publish-mkdocs
 * GitHub - trevorbryant/hacktop-popos: Ansible playbooks to install
   various utility and security tools to localhost
   [https://github.com/trevorbryant/hacktop-popos
 * GitHub - lfaoro/trailblaze: TrailBlaze 🔥 SSH Pentest & Audit
   [https://github.com/lfaoro/trailblaze
 * GitHub - RoganDawes/P4wnP1: P4wnP1 is a highly customizable USB
   attack platform, based on a low cost Raspberry Pi Zero or Raspberry
   Pi Zero W. [https://github.com/RoganDawes/P4wnP1
 * GitHub - screetsec/TheFatRat: Thefatrat a massive exploiting tool :
   Easy tool to generate backdoor and easy tool to post exploitation
   attack like browser attack and etc . This tool compiles a malware
   with popular payload and then the compiled malware can be execute on
   windows, android, mac . The malware that created with this tool also
   have an ability to bypass most AV software protection .
   [https://github.com/screetsec/TheFatRat
 * GitHub - g0tmi1k/msfpc: MSFvenom Payload Creator (MSFPC)
   [https://github.com/g0tmi1k/msfpc
 * GitHub - scriptchildie/MaliciousVBA: Reverse shell macro using Word
   VBA [https://github.com/scriptchildie/MaliciousVBA
 * nishang/Shells at master · samratashok/nishang · GitHub
   [https://github.com/samratashok/nishang/tree/master/Shells
 * GitHub - tobor88/ReversePowerShell: Functions that can be used to
   gain Reverse Shells with PowerShell
   [https://github.com/tobor88/ReversePowerShell#ways-to-install-or-import-the-module
 * GitHub - 0xPoly/Centry: Panic button for protection against cold
   boot attacks [https://github.com/0xPoly/Centry
 * GitHub - justcallmekoko/Tinyduck: The super tiny USB Rubber Ducky
   [https://github.com/justcallmekoko/Tinyduck
 * GitHub - toolswatch/blackhat-arsenal-tools: Official Black Hat
   Arsenal Security Tools Repository
   [https://github.com/toolswatch/blackhat-arsenal-tools
 * OWASP OWTF [https://owtf.github.io/#download
 * GitHub - owtf/owtf: Offensive Web Testing Framework (OWTF), is a
   framework which tries to unite great tools and make pen testing more
   efficient http://owtf.org https://twitter.com/owtfp
   [https://github.com/owtf/owtf
 * GitHub - fabienvauchelles/scrapoxy: Scrapoxy hides your scraper
   behind a cloud. It starts a pool of proxies to send your requests.
   Now, you can crawl without thinking about blacklisting!
   [https://github.com/fabienvauchelles/scrapoxy
 * GitHub - yarrick/iodine: Official git repo for iodine dns tunnel
   [https://github.com/yarrick/iodine
 * GitHub - alebov/AD-lab: An active directory laboratory for
   penetration testing. [https://github.com/alebov/AD-lab
 * GitHub - lazywinadmin/PowerShell: PowerShell functions and scripts
   (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
   [https://github.com/lazywinadmin/PowerShell
 * Certstream [https://certstream.calidog.io/
 * Reverse shells - The Portal of Knowledge
   [https://alamot.github.io/reverse_shells/
 * https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0
   [https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0
 * GitHub - mkaring/ConfuserEx: An open-source, free protector for .NET
   applications [https://github.com/mkaring/ConfuserEx
 * GitHub - MysticRyuujin/guac-install: Script for installing Guacamole
   on Ubuntu [https://github.com/MysticRyuujin/guac-install
 * noVNC [https://novnc.com/info.html
 * GitHub - epi052/feroxbuster: A fast, simple, recursive content
   discovery tool written in Rust. [https://github.com/epi052/feroxbuster
 * WADComs [https://wadcoms.github.io/
 * GitHub - WADComs/WADComs.github.io: WADComs is an interactive cheat
   sheet, containing a curated list of offensive security tools and
   their respective commands, to be used against Windows/AD
   environments. [https://github.com/WADComs/WADComs.github.io
 * GitHub - rclone/rclone: "rsync for cloud storage" - Google Drive,
   S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google
   Cloud Storage, Yandex Files [https://github.com/rclone/rclone
 * GitHub - D1rkMtr/FilelessRemotePE: Loading Fileless Remote PE from
   URI to memory with argument passing and ETW patching and NTDLL
   unhooking and No New Thread technique
   [https://github.com/D1rkMtr/FilelessRemotePE
 * GitHub - hktalent/scan4all: Official repository vuls Scan:
   15000+PoCs; 23 kinds of application password crack; 7000+Web
   fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz,
   HW, awesome BugBounty( ͡° ͜ʖ ͡°)... [https://github.com/hktalent/scan4all
 * A script that prepares Kali by collecting many useful tools of trade
   in /root/tools directory, installing requirements, seting them up,
   preparing .bashrc etc. · GitHub
   [https://gist.github.com/mgeeky/39d1681e44804f089d1553cc7597e628
 * NSSM - the Non-Sucking Service Manager [https://nssm.cc/
 * Red Teaming Toolkit Collection - 0xsp SRD
   [https://0xsp.com/offensive/red-teaming-toolkit-collection/
 * GitHub - cisagov/ScubaGear: Automation to assess the state of your
   M365 tenant against CISA's baselines
   [https://github.com/cisagov/ScubaGear
 * GitHub - tmenochet/PowerScan: Script collection for reconnaissance,
   post-exploitation & hunting on Windows networks
   [https://github.com/tmenochet/PowerScan
 * GitHub - Jon-Murray/PasswordStats: A tool to gather more thorough
   password statistics from password dumps.
   [https://github.com/Jon-Murray/PasswordStats
 * GitHub - iphelix/pack: PACK (Password Analysis and Cracking Kit)
   [https://github.com/iphelix/pack
 * The Web Application Hacker's Handbook - Task Checklist -
   Github-Flavored Markdown · GitHub
   [https://gist.github.com/jhaddix/6b777fb004768b388fefadf9175982ab
 * InfosecMatter (InfosecMatter) · GitHub
   [https://github.com/InfosecMatter
 * GitHub - choupit0/MassVulScan: Bash script which quickly identifies
   open network ports and any associated vulnerabilities / Script Bash
   qui permet d'identifier rapidement les ports réseaux ouverts et les
   éventuelles vulnérabilités associées.
   [https://github.com/choupit0/MassVulScan
 * GitHub - marcan/takeover.sh: Wipe and reinstall a running Linux
   system via SSH, without rebooting. You know you want to.
   [https://github.com/marcan/takeover.sh
 * Red Canary · GitHub [https://github.com/redcanaryco/
 * GitHub - dionach/NtdsAudit: An Active Directory audit utility
   [https://github.com/dionach/NtdsAudit
 * GitHub - bambish/ScanQLi: SQLi scanner to detect SQL vulns
   [https://github.com/bambish/ScanQLi
 * ScanQLi — SQLi Scanner to Detect SQL Vulnerabilites | by Ismail
   Tasdelen | Medium
   [https://ismailtasdelen.medium.com/scanqli-sqli-scanner-to-detect-sql-vulnerabilites-ce23257d7a99
 * fuzzdb/attack/sql-injection at master · fuzzdb-project/fuzzdb ·
   GitHub
   [https://github.com/fuzzdb-project/fuzzdb/tree/master/attack/sql-injection
 * GitHub - utkusen/leviathan: wide range mass audit toolkit
   [https://github.com/utkusen/leviathan
 * GitHub - stamparm/DSSS: Damn Small SQLi Scanner
   [https://github.com/stamparm/DSSS
 * GitHub - awnumar/blind-sql-bitshifting: A blind SQL injection module
   that uses bitshfting to calculate characters.
   [https://github.com/awnumar/blind-sql-bitshifting
 * GitHub - codingo/NoSQLMap: Automated NoSQL database enumeration and
   web application exploitation tool. [https://github.com/codingo/NoSQLMap
 * GitHub - koutto/jok3r: Jok3r v3 BETA 2 - Network and Web Pentest
   Automation Framework [https://github.com/koutto/jok3r
 * koutto (koutto) / Repositories · GitHub
   [https://github.com/koutto?tab=repositories
 * GitHub - FaVorith/recursive-virustotal: Recursively calculates the
   hash of all files in a given path and checks them against the
   Virustotal threat database
   [https://github.com/FaVorith/recursive-virustotal
 * GitHub - thehackingsage/kali-nethunter: Kali Nethunter for OnePlus
   3T & MI9T [https://github.com/thehackingsage/kali-nethunter
 * GitHub - vs4vijay/MultiScanner: Security Tool which scans a target
   using OpenVAS, Zap, and Nexpose. And consolidates the scan result.
   [https://github.com/vs4vijay/MultiScanner
 * GitHub - vxunderground/MalwareSourceCode: Collection of malware
   source code for a variety of platforms in an array of different
   programming languages.
   [https://github.com/vxunderground/MalwareSourceCode
 * Scripts/Security at 7f22a727073ba1185e06b9ef42475f33279c645e ·
   znb/Scripts · GitHub
   [https://github.com/znb/Scripts/tree/7f22a727073ba1185e06b9ef42475f33279c645e/Security
 * GitHub - docker/docker-bench-security: The Docker Bench for Security
   is a script that checks for dozens of common best-practices around
   deploying Docker containers in production.
   [https://github.com/docker/docker-bench-security
 * GitHub - finalduty/cis-benchmarks-audit: Simple command line tool to
   check for compliance against CIS Benchmarks
   [https://github.com/finalduty/cis-benchmarks-audit
 * GitHub - vulhub/vulhub: Pre-Built Vulnerable Environments Based on
   Docker-Compose [https://github.com/vulhub/vulhub
 * GitHub - JonGood/vulhub-lab: Automate building a home lab with
   vulnerable docker containers. [https://github.com/JonGood/vulhub-lab
 * GitHub - oliverwiegers/pentest_lab: Local penetration testing lab
   using docker-compose. [https://github.com/oliverwiegers/pentest_lab
 * GitHub - We5ter/Scanners-Box: A powerful and open-source toolkit for
   hackers and security automation - 安全行业从业者自研开源扫描器合辑
   [https://github.com/We5ter/Scanners-Box
 * GitHub - security-cheatsheet/wireshark-cheatsheet: Wireshark Cheat
   Sheet [https://github.com/security-cheatsheet/wireshark-cheatsheet
 * GitHub - Prashant-Bhapkar/Awesome-Security-Resources: Vulnerability
   Assessment and Penetration Testing Tools (Information Security /
   Cyber security)
   [https://github.com/Prashant-Bhapkar/Awesome-Security-Resources
 * GitHub - six2dez/reconftw: reconFTW is a tool designed to perform
   automated recon on a target domain by running the best set of tools
   to perform scanning and finding out vulnerabilities
   [https://github.com/six2dez/reconftw
 * GitHub - six2dez/pentest-book [https://github.com/six2dez/pentest-book
 * six2dez (six2dez) · GitHub [https://github.com/six2dez
 * OSCP-Human-Guide/oscp_human_guide.md at master ·
   six2dez/OSCP-Human-Guide · GitHub
   [https://github.com/six2dez/OSCP-Human-Guide/blob/master/oscp_human_guide.md
 * GitHub - AonCyberLabs/Windows-Exploit-Suggester: This tool compares
   a targets patch levels against the Microsoft vulnerability database
   in order to detect potential missing patches on the target. It also
   notifies the user if there are public exploits and Metasploit
   modules available for the missing bulletins.
   [https://github.com/AonCyberLabs/Windows-Exploit-Suggester
 * GitHub - six2dez/OneListForAll: Rockyou for web fuzzing
   [https://github.com/six2dez/OneListForAll
 * GitHub - six2dez/WebHackersWeapons: ⚔️ Web Hacker's Weapons / A
   collection of cool tools used by Web hackers. Happy hacking , Happy
   bug-hunting [https://github.com/six2dez/WebHackersWeapons
 * GitHub - cytopia/pwncat: pwncat - netcat on steroids with Firewall,
   IDS/IPS evasion, bind and reverse shell, self-injecting shell and
   port forwarding magic - and its fully scriptable with Python (PSE)
   [https://github.com/cytopia/pwncat
 * GitHub - BishopFox/sliver: Adversary Emulation Framework
   [https://github.com/BishopFox/sliver
 * 0xor0ne (0xor0ne) · GitHub [https://github.com/0xor0ne
 * GitHub - 0xor0ne/awesome-list: My personal awesome list
   [https://github.com/0xor0ne/awesome-list
 * GitHub - anchore/grype: A vulnerability scanner for container images
   and filesystems [https://github.com/anchore/grype
 * GitHub - tanprathan/MobileApp-Pentest-Cheatsheet: The Mobile App
   Pentest cheat sheet was created to provide concise collection of
   high value information on specific mobile application penetration
   testing topics.
   [https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet
 * GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection
   [https://github.com/asciimoo/wuzz
 * GitHub - aaaguirrep/offensive-docker: Offensive Docker is an image
   with the more used offensive tools to create an environment easily
   and quickly to launch assessment to the targets.
   [https://github.com/aaaguirrep/offensive-docker?s=09
 * GitHub - 0xJs/RedTeaming_CheatSheet: Pentesting cheatsheet with all
   the commands I learned during my learning journey. Will try to to
   keep it up-to-date. [https://github.com/0xJs/RedTeaming_CheatSheet?s=09
 * GitHub - FortyNorthSecurity/Egress-Assess: Egress-Assess is a tool
   used to test egress data detection capabilities
   [https://github.com/FortyNorthSecurity/Egress-Assess
 * GitHub - c4s73r/NetworkNightmare: Network Pentesting Mindmap by
   Caster [https://github.com/c4s73r/NetworkNightmare
 * GitHub - sensepost/JBaah: HTTP Brute Forcer (Java replacement for
   SP's CrowBar). [https://github.com/sensepost/JBaah
 * GitHub - knassar702/scant3r: ScanT3r - Module based Bug Bounty
   Automation Tool [https://github.com/knassar702/scant3r
 * AllVideoPocsFromHackerOne/weakness at main ·
   zeroc00I/AllVideoPocsFromHackerOne · GitHub
   [https://github.com/zeroc00I/AllVideoPocsFromHackerOne/tree/main/weakness?s=09
 * GitHub - woj-ciech/Kamerka-GUI: Ultimate Internet of
   Things/Industrial Control Systems reconnaissance tool.
   [https://github.com/woj-ciech/Kamerka-GUI
 * GitHub - cipher387/osint_stuff_tool_collection: A collection of
   several hundred online tools for OSINT
   [https://github.com/cipher387/osint_stuff_tool_collection
 * GitHub - khast3x/Redcloud: Automated Red Team Infrastructure
   deployement using Docker [https://github.com/khast3x/Redcloud
 * Build Your Own Cybersecurity Lab and Cyber Range - Omar Santos
   [https://h4cker.org/labs/
 * GitHub - The-Art-of-Hacking/h4cker: This repository is primarily
   maintained by Omar Santos (@santosomar) and includes thousands of
   resources related to ethical hacking / penetration testing, digital
   forensics and incident response (DFIR), vulnerability research,
   exploit development, reverse engineering, and more.
   [https://github.com/The-Art-of-Hacking/h4cker
 * Mindmap/Mitre Attack at main · Ignitetechnologies/Mindmap · GitHub
   [https://github.com/Ignitetechnologies/Mindmap/tree/main/Mitre%20Attack?s=09
 * GitHub - dievus/Active-Directory-Exploitation-Cheat-Sheet: A cheat
   sheet that contains common enumeration and attack methods for
   Windows Active Directory.
   [https://github.com/dievus/Active-Directory-Exploitation-Cheat-Sheet
 * GitHub - dievus/PowerShellForPentesters: Course repository for
   PowerShell for Pentesters Course
   [https://github.com/dievus/PowerShellForPentesters
 * GitHub - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet: A
   cheat sheet that contains common enumeration and attack methods for
   Windows Active Directory.
   [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet
 * vmware-host-modules/INSTALL at master · mkubecek/vmware-host-modules
   · GitHub
   [https://github.com/mkubecek/vmware-host-modules/blob/master/INSTALL
 * GitHub - vitaly-kamluk/bitscout: Remote forensics meta tool
   [https://github.com/vitaly-kamluk/bitscout
 * GitHub - meirwah/awesome-incident-response: A curated list of tools
   for incident response
   [https://github.com/meirwah/awesome-incident-response#disk-image-creation-tools
 * GitHub - vulnersCom/nmap-vulners: NSE script based on Vulners.com
   API
   [https://github.com/vulnersCom/nmap-vulners?rel=nofollow,noopener,noreferrer&target=_blank
 * GitHub - AfvanMoopen/tryhackme-: All Solutions
   [https://github.com/AfvanMoopen/tryhackme-
 * GitHub - Cimihan123/VulnLab [https://github.com/Cimihan123/VulnLab
 * GitHub - veggiemonk/awesome-docker: A curated list of Docker
   resources and projects [https://github.com/veggiemonk/awesome-docker
 * GitHub - Orange-Cyberdefense/GOAD: game of active directory
   [https://github.com/Orange-Cyberdefense/GOAD?s=09
 * Game Of Active Directory v2 | Mayfly
   [https://mayfly277.github.io/posts/GOADv2/?s=09
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/web-pentest/tools/ffuf/
 * nishang/Get-WebCredentials.ps1 at master · samratashok/nishang ·
   GitHub
   [https://github.com/samratashok/nishang/blob/master/Gather/Get-WebCredentials.ps1
 * GitHub - mdiplo/Medias_francais: Qui possède quoi ?
   [https://github.com/mdiplo/Medias_francais
 * GitHub - deepfence/ThreatMapper: Open source cloud native security
   observability platform. Linux, K8s, AWS Fargate and more.
   [https://github.com/deepfence/ThreatMapper
 * GitHub - d3mondev/puredns: Puredns is a fast domain resolver and
   subdomain bruteforcing tool that can accurately filter out wildcard
   subdomains and DNS poisoned entries.
   [https://github.com/d3mondev/puredns
 * Trickest · GitHub [https://github.com/trickest
 * GitHub - trimstray/sandmap: Nmap on steroids. Simple CLI with the
   ability to run pure Nmap engine, 31 modules with 459 scan profiles.
   [https://github.com/trimstray/sandmap
 * GitHub - KevOtt/AD-Lab-Generator: Tool for populating an Active
   Directory Lab with a randomized set of users and groups.
   [https://github.com/KevOtt/AD-Lab-Generator
 * GitHub - superkojiman/onetwopunch: Use unicornscan to quickly scan
   all open ports, and then pass the open ports to nmap for detailed
   scans. [https://github.com/superkojiman/onetwopunch
 * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains
   cutting-edge open-source security tools (OST) for a red teamer and
   threat hunter.
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit?s=09
 * GitHub - infosecn1nja/Red-Teaming-Toolkit: This repository contains
   cutting-edge open-source security tools (OST) for a red teamer and
   threat hunter.
   [https://github.com/infosecn1nja/Red-Teaming-Toolkit?s=09#Reconnaissance
 * GitHub - AutomatedLab/AutomatedLab: AutomatedLab is a provisioning
   solution and framework that lets you deploy complex labs on HyperV
   and Azure with simple PowerShell scripts. It supports all Windows
   operating systems from 2008 R2 to 2022, some Linux distributions and
   various products like AD, Exchange, PKI, IIS, etc.
   [https://github.com/AutomatedLab/AutomatedLab
 * GitHub - WazeHell/vulnerable-AD: Create a vulnerable active
   directory that's allowing you to test most of the active directory
   attacks in a local lab [https://github.com/WazeHell/vulnerable-AD
 * GitHub - chvancooten/CloudLabsAD: Terraform + Ansible deployment
   scripts for an Active Directory lab environment.
   [https://github.com/chvancooten/CloudLabsAD
 * GitHub - dievus/PowerShellForPentesters: Course repository for
   PowerShell for Pentesters Course
   [https://github.com/dievus/PowerShellForPentesters/
 * GitHub - gephi/gephi: Gephi - The Open Graph Viz Platform
   [https://github.com/gephi/gephi
 * AnonUD4Y / HiddenEye · GitLab [https://gitlab.com/An0nUD4Y/hiddeneye
 * GitHub - owasp-amass/amass: In-depth attack surface mapping and
   asset discovery [https://github.com/owasp-amass/amass
 * Releases · owasp-amass/amass
   [https://github.com/owasp-amass/amass/releases
 * GitHub - s0md3v/be-a-hacker: roadmap for a self-taught hacker
   [https://github.com/s0md3v/be-a-hacker
 * GitHub - Zeyad-Azima/Offensive-Resources: A Huge Learning Resources
   with Labs For Offensive Security Players
   [https://github.com/Zeyad-Azima/Offensive-Resources?s=09
 * GitHub - m3n0sd0n4ld/GooFuzz: GooFuzz is a tool to perform fuzzing
   with an OSINT approach, managing to enumerate directories, files,
   subdomains or parameters without leaving evidence on the target's
   server and by means of advanced Google searches (Google Dorking).
   [https://github.com/m3n0sd0n4ld/GooFuzz
 * GitHub - s0md3v/JShell: JShell - Get a JavaScript shell with XSS.
   [https://github.com/s0md3v/JShell
 * GitHub - i3visio/osrframework: OSRFramework, the Open Sources
   Research Framework is a AGPLv3+ project by i3visio focused on
   providing API and tools to perform more accurate online researches.
   [https://github.com/i3visio/osrframework
 * Pentest Everything - Pentest Everything
   [https://viperone.gitbook.io/pentest-everything/
 * GitHub - x4nth055/ethical-hacking-tools-python: Python programs &
   tools built in the Ethical Hacking with Python EBook
   [https://github.com/x4nth055/ethical-hacking-tools-python
 * GitHub - google/tsunami-security-scanner: Tsunami is a general
   purpose network security scanner with an extensible plugin system
   for detecting high severity vulnerabilities with high confidence.
   [https://github.com/google/tsunami-security-scanner
 * GitHub - activecm/passer: Passive service locator, a python sniffer
   that identifies servers, clients, names and much more
   [https://github.com/activecm/passer
 * GitHub - activecm/threat-tools: Tools for simulating threats
   [https://github.com/activecm/threat-tools
 * GitHub - cisagov/cset: Cybersecurity Evaluation Tool
   [https://github.com/cisagov/cset
 * GitHub - Ne0nd0g/merlin: Merlin is a cross-platform
   post-exploitation HTTP/2 Command & Control server and agent written
   in golang. [https://github.com/Ne0nd0g/merlin
 * GitHub - OWASP/Nettacker: Automated Penetration Testing Framework -
   Open-Source Vulnerability Scanner - Vulnerability Management
   [https://github.com/OWASP/Nettacker
 * pentesting-tools · GitHub Topics · GitHub
   [https://github.com/topics/pentesting-tools
 * GitHub - 0xffsec/webdojo: A learning and testing environment for web
   application hacking and pentesting. [https://github.com/0xffsec/webdojo
 * GitHub - Porchetta-Industries/CrackMapExec: A swiss army knife for
   pentesting networks
   [https://github.com/Porchetta-Industries/CrackMapExec
 * GitHub - mpgn/CrackMapExec: A swiss army knife for pentesting
   networks [https://github.com/mpgn/CrackMapExec
 * snovvcrash’s gists · GitHub [https://gist.github.com/snovvcrash/
 * README - Pentester's Promiscuous Notebook
   [https://ppn.snovvcrash.rocks/
 * GitHub - aas-n/spraykatz: Credentials gathering tool automating
   remote procdump and parse of lsass process.
   [https://github.com/aas-n/spraykatz
 * Invuls / Pentest projects / Pentest-Collaboration-Framework · GitLab
   [https://gitlab.com/invuls/pentest-projects/pcf
 * GitHub - adamcorvin/homeserver
   [https://github.com/adamcorvin/homeserver
 * h4cker/bug-bounties at master · The-Art-of-Hacking/h4cker · GitHub
   [https://github.com/The-Art-of-Hacking/h4cker/tree/master/bug-bounties
 * topotam (topotam) / Repositories · GitHub
   [https://github.com/topotam?tab=repositories
 * h4cker/web_application_testing at master · The-Art-of-Hacking/h4cker
   · GitHub
   [https://github.com/The-Art-of-Hacking/h4cker/tree/master/web_application_testing
 * GitHub - INIT6Source/Hacker_Hiring_Discords: List of
   Hacker/Infosec/CyberSec Discord servers with Hiring/Jobs/Career
   channels [https://github.com/INIT6Source/Hacker_Hiring_Discords
 * GitHub - HowToFind-bot/osint-tools: OSINT open-source tools catalog
   [https://github.com/HowToFind-bot/osint-tools
 * GitHub - wuseman/EMAGNET: Automated hacking tool that will find
   leaked databases with 97.1% accurate to grab mail + password
   together from recent uploads from https://pastebin.com. Bruteforce
   support for spotify accounts, instagram accounts, ssh servers,
   microsoft rdp clients and gmail accounts
   [https://github.com/wuseman/EMAGNET
 * GitHub - rng70/TryHackMe-Roadmap: a list of 350+ Free TryHackMe
   rooms to start learning cybersecurity with THM
   [https://github.com/rng70/tryhackme-roadmap
 * Hacking-Resources/Burp Suite/Burp Suite Cookbook.pdf at master ·
   rng70/Hacking-Resources · GitHub
   [https://github.com/rng70/Hacking-Resources/blob/master/Burp%20Suite/Burp%20Suite%20Cookbook.pdf
 * GitHub - rng70/Hacking-Resources: This repository contains some
   resources for ethical hackers penetration tester 😊 This may contain
   some files, tools, books, and links that need to be used for good
   purposes only. Do not do any illegal work using these sources.
   [https://github.com/rng70/Hacking-Resources#book-list
 * Hacking-Resources/Bug Bounty/Bug bounty Hunting.pdf at master ·
   rng70/Hacking-Resources · GitHub
   [https://github.com/rng70/Hacking-Resources/blob/master/Bug%20Bounty/Bug%20bounty%20Hunting.pdf
 * GitHub - hideckies/aut0rec0n: An automatic reconnaissance
   command-line tool. [https://github.com/hideckies/aut0rec0n
 * GitHub - hideckies/fuzzagotchi: Automatic web fuzzer.
   [https://github.com/hideckies/fuzzagotchi
 * GitHub - LittleJake/ip-blacklist: Plaintext blacklist IP, update 4
   hourly. [https://github.com/LittleJake/ip-blacklist
 * Offensive Security Cheatsheet
   [https://cheatsheet.haax.fr/open-source-intelligence-osint/platforms-hunting/tinder/
 * GitHub - gpakosz/.tmux: 🇫🇷 Oh my tmux! My self-contained, pretty &
   versatile tmux configuration made with ❤️
   [https://github.com/gpakosz/.tmux/tree/master
 * GitHub - foobarto/redteam-notebook: Collection of commands, tips and
   tricks and references I found useful during preparation for OSCP
   exam. [https://github.com/foobarto/redteam-notebook
 * redteam-notebook/ at master · foobarto/redteam-notebook · GitHub
   [https://github.com/foobarto/redteam-notebook?search=1
 * OWASP OWTF [https://owtf.github.io/
 * OWASP OWTF · GitHub [https://github.com/owtf/
 * GitHub - fin3ss3g0d/evilgophish: evilginx3 + gophish
   [https://github.com/fin3ss3g0d/evilgophish
 * AVIator - Antivirus Evasion Project
   [https://www.kitploit.com/2023/01/aviator-antivirus-evasion-project.html
 * Tableaunoir [https://tableaunoir.github.io/
 * GitHub - decoder-it/LocalPotato
   [https://github.com/decoder-it/LocalPotato
 * GitHub - GhostPack/SharpRoast: DEPRECATED SharpRoast is a C# port of
   various PowerView's Kerberoasting functionality.
   [https://github.com/GhostPack/SharpRoast
 * GitHub - threatexpress/random_c2_profile: Cobalt Strike random C2
   Profile generator [https://github.com/threatexpress/random_c2_profile
 * https://www.localpotato.com/localpotato_html/LocalPotato.html
   [https://www.localpotato.com/localpotato_html/LocalPotato.html
 * GitHub - swisskyrepo/Wordpresscan: WPScan rewritten in Python + some
   WPSeku ideas [https://github.com/swisskyrepo/Wordpresscan
 * GitHub - outflanknl/RedELK: Red Team's SIEM - tool for Red Teams
   used for tracking and alarming about Blue Team activities as well as
   better usability in long term operations.
   [https://github.com/outflanknl/RedELK
 * GitHub - IppSec/forward-shell
   [https://github.com/IppSec/forward-shell/tree/master
 * Parrot Security [https://parrotlinux.org/download/
 * Home [https://netbox.dev/
 * GitHub - HuntDownProject/HEDnsExtractor: raw html extractor from
   Hurricane Electric portal
   [https://github.com/HuntDownProject/HEDnsExtractor
 * GitHub - sator-sdk/DNS-Enumeration: DNS enumeration techniques and
   commands [https://github.com/sator-sdk/DNS-Enumeration
 * ddos-attack-tools · GitHub Topics · GitHub
   [https://github.com/topics/ddos-attack-tools?o=desc&s=updated
 * GitHub - wazuh/wazuh: Wazuh - The Open Source Security Platform.
   Unified XDR and SIEM protection for endpoints and cloud workloads.
   [https://github.com/wazuh/wazuh
 * GitHub - BankSecurity/Red_Team: Some scripts useful for red team
   activities [https://github.com/BankSecurity/Red_Team
 * GitHub - shr3ddersec/Shr3dKit: Red Team Tool Kit
   [https://github.com/shr3ddersec/Shr3dKit
 * GitHub - DataDog/stratus-red-team: :cloud: Granular, Actionable
   Adversary Emulation for the Cloud
   [https://github.com/DataDog/stratus-red-team
 * GitHub - RedTeamOperations/RedCloud-OS: RedCloudOS is a Cloud
   Adversary Simulation Operating System for Red Teams to assess the
   Cloud Security of Leading Cloud Service Providers (CSPs)
   [https://github.com/RedTeamOperations/RedCloud-OS
 * GitHub - mohamedhossam07/SimpleRedTeamTechniques: Simple
   implementation of cybersecurity offensive tools
   [https://github.com/mohamedhossam07/SimpleRedTeamTechniques
 * hakanonymos (hakanonymos) · GitHub [https://github.com/hakanonymos
 * GitHub - brootware/awesome-cyber-security-university: 🎓 Because
   Education should be free. Contributions welcome! 🕵️
   [https://github.com/brootware/awesome-cyber-security-university
 * evilsocket (evilsocket) / Repositories · GitHub
   [https://github.com/evilsocket?tab=repositories
 * GitHub - decalage2/awesome-security-hardening: A collection of
   awesome security hardening guides, tools and other resources
   [https://github.com/decalage2/awesome-security-hardening
 * GitHub - Harden365/Harden365: Protect your data in minutes !
   [https://github.com/Harden365/Harden365
 * pentest · GitHub Topics · GitHub [https://github.com/topics/pentest
 * GitHub - A-poc/RedTeam-Tools: Tools and Techniques for Red Team /
   Penetration Testing [https://github.com/A-poc/RedTeam-Tools#evilgophish
 * GitHub - teamghsoftware/security-cheatsheets: CHEAT SHEET DE
   SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING
   [https://github.com/teamghsoftware/security-cheatsheets
 * Create Active Directory Test Environment (Complete Guide) - Active
   Directory Pro
   [https://activedirectorypro.com/create-active-directory-test-environment/#lesson-3
 * External - Web - HTB Academy (CPTS)
   [https://nukercharlie.gitbook.io/htb-academy-cpts/
 * jakescheetz (jakescheetz) / Repositories · GitHub
   [https://github.com/jakescheetz?tab=repositories
 * GitHub - jakescheetz/OSCP: High level cheatsheet that was designed
   to make checks on the OSCP more manageable. This repository however
   could also be used for your own studying or for evaluating test
   systems like on HackTheBox or TryHackMe. DM me via Twitter
   (@FindingUrPasswd) to request any specific additions to the content
   that you think would also be helpful!
   [https://github.com/jakescheetz/OSCP
 * GitHub - rackerlabs/scantron: A distributed nmap / masscan scanning
   framework complete with scan scheduling, engine pooling, subsequent
   scan port diff-ing, and an API client for automation workflows.
   [https://github.com/rackerlabs/scantron
 * GitHub - rackerlabs/scantron: A distributed nmap / masscan scanning
   framework complete with scan scheduling, engine pooling, subsequent
   scan port diff-ing, and an API client for automation workflows.
   [https://github.com/rackerlabs/scantron/tree/master
 * GitHub - sysdream/ligolo: Reverse Tunneling made easy for
   pentesters, by pentesters https://sysdream.com/
   [https://github.com/sysdream/ligolo
 * GitHub - anderspitman/awesome-tunneling: List of ngrok alternatives
   and other ngrok-like tunneling software and services. Focus on
   self-hosting. [https://github.com/anderspitman/awesome-tunneling
 * GitHub - xli1996/Simple_ransomware: Simple ransomware that is used
   to study better defense ways
   [https://github.com/xli1996/Simple_ransomware
 * GitHub - deadbits/vigil-llm: ⚡ Vigil ⚡ Detect prompt injections,
   jailbreaks, and other potentially risky Large Language Model (LLM)
   inputs [https://github.com/deadbits/vigil-llm
 * GitHub - AlteredSecurity/365-Stealer: 365-Stealer is a phishing
   simualtion tool written in python3. It can be used to execute
   Illicit Consent Grant Attack.
   [https://github.com/AlteredSecurity/365-Stealer
 * GitHub - wifiphisher/wifiphisher: The Rogue Access Point Framework
   [https://github.com/wifiphisher/wifiphisher
 * GitHub - htr-tech/zphisher: An automated phishing tool with 30+
   templates. This Tool is made for educational purpose only ! Author
   will not be responsible for any misuse of this toolkit !
   [https://github.com/htr-tech/zphisher
 * Powershell Script to keep the mouse moving · GitHub
   [https://gist.github.com/MatthewSteeples/ce7114b4d3488fc49b6a#file-mousemove-ps1
 * GitHub - MalwareSamples/Linux-Malware-Samples: Linux Malware Sample
   Archive including various types of malicious ELF binaries and
   viruses. Be careful!
   [https://github.com/MalwareSamples/Linux-Malware-Samples
 * Flangvik (Flangvik) / Repositories · GitHub
   [https://github.com/Flangvik?tab=repositories
 * GitHub - djadmin/awesome-bug-bounty: A comprehensive curated list of
   available Bug Bounty & Disclosure Programs and Write-ups.
   [https://github.com/djadmin/awesome-bug-bounty
 * GitHub - detectify/cs-challenge: Detectify Crowdsource Challenge
   [https://github.com/detectify/cs-challenge
 * GitHub - davidprowe/BadBlood: BadBlood by @davidprowe, Secframe.com,
   fills a Microsoft Active Directory Domain with a structure and
   thousands of objects. The output of the tool is a domain similar to
   a domain in the real world. After BadBlood is ran on a domain,
   security analysts and engineers can practice using tools to gain an
   understanding and prescribe to securing Active Directory. Each time
   this tool runs, it produces different results. The domain, users,
   groups, computers and permissions are different. Every. Single.
   Time. [https://github.com/davidprowe/BadBlood
 * GitHub - its-a-feature/Mythic: A collaborative, multi-platform, red
   teaming framework [https://github.com/its-a-feature/Mythic
 * GitHub - bats3c/darkarmour: Windows AV Evasion
   [https://github.com/bats3c/darkarmour
 * GitHub - fortra/impacket: Impacket is a collection of Python classes
   for working with network protocols. [https://github.com/fortra/impacket
 * GitHub - berylliumsec/nebula: AI-Powered Ethical Hacking Assistant
   [https://github.com/berylliumsec/nebula#compatibility
 * GitHub - berylliumsec/nebula: AI-Powered Ethical Hacking Assistant
   [https://github.com/berylliumsec/nebula
 * GitHub - Casualtek/Cyberwatch: Building a consolidated RSS feed for
   articles about cyberattacks [https://github.com/Casualtek/Cyberwatch
 * Casualtek (Casualtek) / Repositories · GitHub
   [https://github.com/Casualtek?tab=repositories
 * GitHub - JMousqueton/Badware: Ransomware for demonstration
   [https://github.com/jmousqueton/badware
 * GitHub - JMousqueton/CTI-MSTeams-Bot: 🤖 Bot to get the last Cyber
   Security information in a Microsoft Teams channel 🏴‍☠️
   [https://github.com/JMousqueton/CTI-MSTeams-Bot
 * nebula: AI-Powered Ethical Hacking Assistant
   [https://securityonline.info/nebula-ai-powered-ethical-hacking-assistant/
 * GitHub - Hackstur/JokerShell: PowerShell pranks pack for trolling
   coworkers [https://github.com/Hackstur/JokerShell/tree/master
 * GitHub - MalwareSamples/Malware-Feed: Bringing you the best of the
   worst files on the Internet.
   [https://github.com/MalwareSamples/Malware-Feed/tree/master
 * GitHub - enaqx/awesome-pentest: A collection of awesome penetration
   testing resources, tools and other shiny things
   [https://github.com/enaqx/awesome-pentest#web-exploitation
 * GitHub - Velocidex/velociraptor: Digging Deeper....
   [https://github.com/Velocidex/velociraptor
   Python
 * https://www.geeksforgeeks.org/python-programming-language/?ref=lbp
   [https://www.geeksforgeeks.org/python-programming-language/?ref=lbp
 * https://www.py4e.com/ [https://www.py4e.com/
 * https://www.geeksforgeeks.org/python-3-basics/
   [https://www.geeksforgeeks.org/python-3-basics/
 * https://www.pierre-giraud.com/python-apprendre-programmer-cours/
   [https://www.pierre-giraud.com/python-apprendre-programmer-cours/
 * https://www.pierre-giraud.com/python-apprendre-programmer-cours/
   [https://www.pierre-giraud.com/python-apprendre-programmer-cours/
 * https://riptutorial.com/python/awesome-learning/tutorial
   [https://riptutorial.com/python/awesome-learning/tutorial
 * https://www.programiz.com/python-programming/online-compiler/
   [https://www.programiz.com/python-programming/online-compiler/
 * https://riptutorial.com/ebook/python
   [https://riptutorial.com/ebook/python
 * https://www.sololearn.com/ [https://www.sololearn.com/
 * https://www.youtube.com/watch?v=oUJolR5bX6g
   [https://www.youtube.com/watch?v=oUJolR5bX6g
 * https://www.youtube.com/watch?v=LamjAFnybo0
   [https://www.youtube.com/watch?v=LamjAFnybo0
 * https://www.docstring.fr/formations/parcours/la-formation-complete-python [https://www.docstring.fr/formations/parcours/la-formation-complete-python
 * https://www.w3schools.com/python/ [https://www.w3schools.com/python/
 * https://www.guru99.com/python-tutorials.html
   [https://www.guru99.com/python-tutorials.html
 * https://developers.google.com/edu/python/
   [https://developers.google.com/edu/python/
 * https://pymbook.readthedocs.io/en/latest/index.html
   [https://pymbook.readthedocs.io/en/latest/index.html
 * https://www.sans.org/cyberaces/system-administration/
   [https://www.sans.org/cyberaces/system-administration/
 * https://openclassrooms.com/fr/paths/556-developpeur-web
   [https://openclassrooms.com/fr/paths/556-developpeur-web
 * https://github.com/ageitgey/face_recognition
   [https://github.com/ageitgey/face_recognition
 * https://zestedesavoir.com/tutoriels/2514/un-zeste-de-python/
   [https://zestedesavoir.com/tutoriels/2514/un-zeste-de-python/
 * https://www.dr-chuck.com/ [https://www.dr-chuck.com/
 * https://www.youtube.com/watch?v=UjeNA_JtXME&list=PLlRFEj9H3Oj7Bp8-DfGpfAfDBiblRfl5p [https://www.youtube.com/watch?v=UjeNA_JtXME&list=PLlRFEj9H3Oj7Bp8-DfGpfAfDBiblRfl5p
 * https://www.programiz.com/python-programming/online-compiler/
   [https://www.programiz.com/python-programming/online-compiler/
 * https://www.sololearn.com/ [https://www.sololearn.com/
 * PY4E - Python for Everybody [https://www.py4e.com/lessons/memory
 * Python for Everybody - Full University Python Course - YouTube
   [https://www.youtube.com/watch?v=8DvywoWv6fI&list=RDLV8DvywoWv6fI&start_radio=1&rv=8DvywoWv6fI&t=526
 * Lesson 1 - Python Programming (Automate the Boring Stuff with
   Python) - YouTube
   [https://www.youtube.com/watch?v=1F_OgqRuSdI&list=PL0-84-yl1fUnRuXGFe_F7qSH1LEnn9LkW
 * Lesson 2 - Python Programming (Automate the Boring Stuff with
   Python) - YouTube
   [https://www.youtube.com/watch?v=7qHMXu99d88&list=PL0-84-yl1fUnRuXGFe_F7qSH1LEnn9LkW&index=2
 * 01 Character Input
   [https://www.practicepython.org/exercise/2014/01/29/01-character-input.html
 * Learn How to Code | Codecademy
   [https://www.codecademy.com/learn/learn-how-to-code
 * futurecoder : Le code du futur, c'est vous !
   [https://fr.futurecoder.io/
 * Python on Exercism [https://exercism.org/users/sign_in
 * Python programming language Tutorial - Mind Luster
   [https://www.mindluster.com/certificate/40
 * Python Code - Python Programming Tutorials and Recipes
   [https://thepythoncode.com/
 * Ethical Hacking Tutorials - Python Code
   [https://thepythoncode.com/topic/ethical-hacking
 * Ouverture et lecture des fichiers en Python – Très Facile
   [https://www.tresfacile.net/ouverture-et-lecture-des-fichiers-en-python/
 * Cours Python – Très Facile [https://www.tresfacile.net/cours-python/
 * Developer Roadmaps - roadmap.sh [https://roadmap.sh/
 * Course Outline | Zero To Mastery Academy
   [https://academy.zerotomastery.io/courses/694968/lectures/12410323
 * Un bref guide de Python dans la cybersécurité
   [https://geekflare.com/fr/python-in-cybersecurity/
   APPRENDRE
 * Skilleos | Cours pour Professionnels en ligne | Skilleos
   [https://www.skilleos.com/pro?orderBy=ranking
 * Neurosciences : les méandres du cerveau - Replay
   [https://replay.bpi.fr/captations/neurosciences-les-meandres-du-cerveau/
 * Tyler Vigen (@TylerVigen) / X [https://twitter.com/TylerVigen
 * https://www.serious-games.simulang.com/en/games
   [https://www.serious-games.simulang.com/en/games
 * À la Une du Replay - Replay [https://replay.bpi.fr/
 * Exposition Illusions, vous n'allez pas y croire !
   [https://www.illusions-expo.be/ressources/
 * Nuage d'étiquettes - jeunessejecoute.ca
   [https://jeunessejecoute.ca/nuage-detiquettes/?etiquettes=outils-de-pleine-conscience
 * Biais Cognitifs | Codex des Biais Cognitifs
   [https://inertian.wixsite.com/codexbiais
   ANGLAIS
 * engine - pronunciation of engine by Macmillan Dictionary
   [https://www.macmillandictionary.com/pronunciation/british/engine
 * NBC News NOW | NBC News [https://www.nbcnews.com/now?icid=now_hp_header
 * CBS News Live -CBS News [https://www.cbsnews.com/live/#x
 * ABC News Live - ABC News [https://abcnews.go.com/Live
 * Voice of America - Learn American English with VOA Learning English
   [https://learningenglish.voanews.com/
 * LanguageTool - Online Grammar, Style & Spell Checker
   [https://languagetool.org/#plugins
 * https://langonaute.com/ [https://langonaute.com/
 * Top 2000 English Vocabulary Words used in Speaking
   [https://www.talkenglish.com/vocabulary/top-2000-vocabulary.aspx
 * Reverso | Traduction gratuite, Dictionnaire, Grammaire
   [https://www.reverso.net/text_translation.aspx?lang=FR
 * RhinoSpike : English Recordings
   [https://rhinospike.com/language/eng/recordings/
 * Learn English with EnglishClass101.com - YouTube
   [https://www.youtube.com/user/ENGLISHCLASS101/videos
 * Apprendre des Langues Gratuitement avec de la Musique!
   [https://fr.lyricstraining.com/
 * International Crises and Verb Forms
   [https://learningenglish.voanews.com/a/international-crises-and-verb-forms/6464983.html
 * ESL English Listening & Adult Literacy - News - Audiobooks - Songs -
   Radio Dramas
   [https://esl-bits.net/ESL.English.Listening.Short.Stories/ESL.Listening.Short.Stories.html
 * English Exercises ESL [https://agendaweb.org/
 * Apprendre l'anglais | Cambridge English
   [https://www.cambridgeenglish.org/ch/fr/learning-english/
 * HowStuffWorks - Learn How Everything Works!
   [https://www.howstuffworks.com/
 * SC Media | How EDR was supposed to help with alert overload
   [https://www.scmagazine.com/video/endpoint-security/how-edr-was-supposed-to-help-with-alert-overload
 * Online English Language Practice Events | Pep Talk Radio
   [https://www.peptalkradio.com/english-language-club/
 * Beginner to pre-intermediate | LearnEnglish
   [https://learnenglish.britishcouncil.org/grammar/beginner-to-pre-intermediate
 * Pre-Intermediate Grammar | Past Simple or Past Continuous Exercise |
   esl-lounge Student
   [https://www.esl-lounge.com/student/grammar/2g50-past-simple-or-past-continuous-worksheet.php
 * BBC Radio - 6 Minute English - Downloads
   [https://www.bbc.co.uk/programmes/p02pc9tn/episodes/downloads
 * Speak Better English with Harry | Podcast on Spotify
   [https://open.spotify.com/show/4NHIIVB3DkjH70yhE3pbcd
 * Simple Past and Past Continuous Exercise | ENGLISH PAGE
   [https://www.englishpage.com/verbpage/verbs3.htm
 * Past Simple and Past Continuous Exercise 2
   [https://www.perfect-english-grammar.com/past-simple-past-continuous-exercise-2.html
 * English for Schools - Kids - l'univers dédié aux enfants
   [https://kids.englishforschools.fr/
 * Matt Cutts: Try something new for 30 days | TED Talk
   [https://www.ted.com/talks/matt_cutts_try_something_new_for_30_days?language=en&subtitle=fr
 * Speak & Improve [https://app.speakandimprove.com/
 * HelloTalk | Free Language Exchange | Language Partners
   [https://www.hellotalk.com/?lang=fr
 * Border Crossings [https://www.voanews.com/live/audio/60
 * 3 Steps to Quiet Confidence in Business English (Podcast)
   [https://www.allearsenglish.com/aee-1815-3-step-formula-to-convey-quiet-confidence-in-english/
 * Speak English Now Podcast with Georgiana's mini-stories
   [https://speakenglishpodcast.com/types-of-humor-in-english/
 * Podcast - Speak English Now Podcast with Georgiana's mini-stories -
   Speak English Podcast with Online English teacher Georgiana
   [https://speakenglishpodcast.com/podcast/
 * Créer un compte gratuit - Memrise [https://app.memrise.com/bienvenue#1
 * HelloTalk | Free Language Exchange | Language Partners
   [https://www.hellotalk.com/
 * Langotalk: Learn Languages 6x Faster with AI
   [https://www.langotalk.org/onboarding/OnboardingAccount
 * Lessons Worth Sharing | TED-Ed
   [https://ed.ted.com/lessons?direction=desc&sort=featured-position
 * Beginner & elementary exercises (A1 – A2 level) page 1 – Speakspeak
   [https://speakspeak.com/english-grammar-exercises/elementary
 * Apprendre des Langues Gratuitement avec de la Musique!
   [https://fr.lyricstraining.com/#nr
 * Speak English with Gliglish  🇺🇸
   [https://gliglish.com/convo/93aff4e5-9944-403e-9403-c0adce833fff
 * 30 Day Meditation Challenge for Beginners - One Mind Dharma
   [https://oneminddharma.com/30-day-meditation-challenge/
 * Index of /Ebook/ [https://ielts-house.net/Ebook/
 * Index of /books/ [https://www.ircambridge.com/books/
 * a | Search Online Etymology Dictionary
   [https://www.etymonline.com/search?q=a
   Podcast
 * Coalcast :: H4cklife!! — No-life it [https://h4cklife.org/coalcast/
 * LINC [http://linc.cnil.fr/
 * SHAttered - CloudBleed - NoLimitSecu
   [https://www.nolimitsecu.fr/shattered-cloudbleed/
 * Alertes | Accompagnement Cybersécurité des Structures de Santé
   [https://cyberveille-sante.gouv.fr/alertes
 * Security Strategy – phoenixNAP Blog
   [https://phoenixnap.com/blog/category/security-strategy
 * Learning English Broadcast
   [https://learningenglish.voanews.com/a/4789244.html?withmediaplayer=1
 * Podcast [https://learningenglish.voanews.com/podcasts
 * Podcasts : Technology : NPR
   [https://www.npr.org/podcasts/2061/technology
 * English Speaking Video Lessons
   [https://www.talkenglish.com/video/english-speaking-video.aspx
 * securitycast [http://headshot.ambersail.net/securitycast
 * Liste des Podcasts sur la Cyber et la Sécurité - Space &
   Cybersecurity Info
   [https://www.spacesecurity.info/liste-des-podcast-secu/
 * NoLimitSecu - Podcast dédié à la cyber sécurité
   [https://www.nolimitsecu.fr/
 * Le Comptoir Sécu : Le Comptoir Sécu [https://www.comptoirsecu.fr/
 * Hackstock | Podcast [https://hackstock.net/podcasts
 * Des podcasts Tech à écouter en français - Human Coders Blog
   [https://blog.humancoders.com/podcast-tech-francais-2649/
 * La French Connection - Episodes [https://securite.fm/
 * BtoBradio.TV | Cyber Radio.TV - L'invité
   [https://btobradio.tv/radios/cyber-radio-tv/linvite-10
 * BtoBradio.TV | Accueil [https://btobradio.tv/
 * NoLimitSecu - Page 2 sur 45 - Podcast dédié à la cyber sécurité
   [https://www.nolimitsecu.fr/page/2/
 * Podcast francophone de sensibilisation & vulgarisation de la
   cybersécurité [https://www.cybersecuriteallday.fr/
 * Objectif CYBER - Capgemini France
   [https://www.capgemini.com/fr-fr/perspectives/publications/objectif-cyber/
 * La cybersécurité expliquée à ma grand-mère | Ausha
   [https://podcast.ausha.co/la-cyber-securite-expliquee-a-ma-grand-mere
 * Distorsion - Des histoires étranges de l'ère numérique - Podcast
   Québécois [https://www.distorsionpodcast.com/
 * 0x20 - @BitK_ & @sakiirsecurity | Objectif top10 CtfTime, faire un
   bon ctf, les voyages, une anecdote croustillante par Hack'n Speak
   [https://podcasters.spotify.com/pod/show/hacknspeak/
 * Riskintel Média | Nos émissions
   [https://www.riskintel.fr/nos-rediffusions
 * Les podcasts sur la cybersécurité - Guardia Cybersecurity School
   [https://guardia.school/boite-a-outils/les-podcasts-sur-la-cybersecurite.html
   Léon
 * Les 10 applications utiles pour voyager en camping-car
   [https://generationvoyage.fr/applications-camping-car/#4-maps-me
 * Porte-vélos SD260
   [https://www.european-trading-company.fr/PBSCProduct.asp?ItmID=38446530
 * Porte-vélos 2 vélos - Spécial monospace et utilitaire-
   [https://attelage-accessoire-auto.com/porte-velos-pour-2-velos/5223-porte-velos-strada-2-velos-inclinable.html
 * SD260 PORTE-VELO POUR CAMPING-CAR & UTILITAIRE - YouTube
   [https://www.youtube.com/watch?v=W5VhxFS-d6I
 * European Trading Company - Télécharger nos catalogues
   [https://www.european-trading-company.fr/PBCPPlayer.asp?ID=1961541
 * ⁣Porte-velos LAS SD260 - pour 2 velos installation sur la rotule
   dattelage capacite de chargement: 60 kgchez Rameder
   [https://www.rameder.fr/porte-velos-las-sd260-194880.html#description
 * Au fil de l'eau…vergnat Les cascades en Auvergne
   [https://www.eauvergnat.fr/les-cascades-en-auvergne
 * Les cascades en Auvergne – Google My Maps
   [https://www.google.com/maps/d/viewer?mid=1jWRKgMhH9Y86alnuuQl7RMiMSd4&ll=45.455396336560625%2C3.4486185400752856&z=9
 * Que visiter en Haute-Loire ? Mon guide complet ! -
   [https://www.votretourdumonde.com/que-visiter-en-haute-loire/
 * Les cascades en Auvergne – Google My Maps
   [https://www.google.com/maps/d/viewer?mid=1jWRKgMhH9Y86alnuuQl7RMiMSd4&ll=45.5827795575992%2C3.936368309385476&z=10
 * Les 10 plus belles cascades de France (la 3e est incroyable !) |
   Détours en France
   [https://www.detoursenfrance.fr/patrimoine/patrimoine-naturel/tour-de-france-des-cascades-extraordinaires-3538
 * Les plus belles cascades de France : nos coups de cœur
   [https://www.routard.com/contenu-dossier/cid139815-les-plus-belles-cascades-de-france-nos-coups-de-coeur.html
 * Randonnées : A pied - Explore la Vanoise
   [https://rando.vanoise.com/search?practices=4
 * La randonnée pédestre | Parc national de la Vanoise
   [https://www.vanoise-parcnational.fr/fr/des-decouvertes/decouvrir-le-parc/la-randonnee-pedestre
 * 33 idées de randonnées itinérantes - FFRandonnée
   Auvergne-Rhône-Alpes
   [https://auvergne-rhone-alpes.ffrandonnee.fr/html/4599/33-suggestions-de-randonnees-itinerantes
 * Portail des parcs nationaux de France [https://parcsnationaux.fr/fr
 * Publications et documents | Portail des parcs nationaux de France
   [https://parcsnationaux.fr/fr/publications-et-documents
 * QuelleRandonneePourMoiCetteAnnee_2019 - OneDrive
   [https://ffrandonnee-my.sharepoint.com/personal/aura_ffrandonnee_fr/_layouts/15/onedrive.aspx?id=%2Fpersonal%2Faura%5Fffrandonnee%5Ffr%2FDocuments%2FCatalogues%20Itin%C3%A9rance%20AURA%2FQuelleRandonneePourMoiCetteAnnee%5F2019%2FCatalogue%20itin%C3%A9rance%20AURA%5F33suggestions%2Epdf&parent=%2Fpersonal%2Faura%5Fffrandonnee%5Ffr%2FDocuments%2FCatalogues%20Itin%C3%A9rance%20AURA%2FQuelleRandonneePourMoiCetteAnnee%5F2019&ga=1
 * Roadtrip sur la Route des Grandes Alpes : les étapes incontournables
   [https://generationvoyage.fr/visiter-route-des-grandes-alpes/
 * Tourisme en France : guide voyage pour partir en France
   [https://generationvoyage.fr/visiter/france/
 * Tourisme en Auvergne-Rhône-Alpes : guide voyage pour partir en
   Auvergne-Rhône-Alpes
   [https://generationvoyage.fr/visiter/france/auvergne-rhone-alpes/
 * Stickers Van Life Deco | MPA Déco
   [https://www.mpadeco.com/stickers-van-life
 * Toits alternatifs - À la découverte d'autres modes de vies
   [https://toitsalternatifs.fr/
 * Bring Your Van Design Ideas To Life [https://get.vanspace3d.com/
 * Google Flights [https://www.google.com/travel/flights/
 * 134 Cool and Unusual Things to Do in Rome - Atlas Obscura
   [https://www.atlasobscura.com/things-to-do/rome-italy
 * Distances, directions, consommation et prix de carburant, les
   péages, limites de vitesse, France et l'Europe [https://ladistance.fr/
 * Le chemin vers Saint-Jacques-de-Compostelle d'Aubrac à Conques en
   Aveyron [https://www.st-jacques-aveyron.com/
 * Les villages traversés - Chemin de Saint-Jacques en Aveyron
   [https://www.st-jacques-aveyron.com/fr/decouvrez/villages-traverses.php
 * Stage de Survie près de Saint-Étienne au Parc Naturel Régional du
   Pilat - Loire 42
   [https://www.adrenactive.com/stage-de-survie-saint-etienne-6357.htm
 * Journée Stage de Survie dans la Nature du Parc du Pilat près de
   Saint-Etienne
   [https://www.sport-decouverte.com/stage-survie-proche-saint-etienne.html
 * Stage de survie à Lyon - Au parc du pilât
   [https://www.babasport.fr/activites/3231-stage-de-survie-jours-nuit-saint-etienne
 * Stage de survie dans le Parc du Pilat proche de Lyon
   [https://www.funbooker.com/fr/annonce/stage-de-survie-dans-le-parc-du-pilat-proche-saint-etienne/voir
 * Alpha survie - Stages de survie - bushcraft - famille
   [https://alphasurvie.net/
   Trade_Crypto
 * Heures de trading et événements de marché d'eToro
   [https://www.etoro.com/fr/trading/market-hours-and-events/
 * En savoir plus sur eToro et découvrez des informations utiles
   [https://www.etoro.com/learn-more
 * Investir sur les marchés financiers les plus tradés sur eToro
   [https://www.etoro.com/discover
 * Votre voyage commence maintenant | Binance Academy
   [https://academy.binance.com/fr/start-here
 * sébastien Koubar at DuckDuckGo
   [https://duckduckgo.com/?q=s%C3%A9bastien+Koubar&t=ffab&atb=v340-1&ia=web
   Blog_A_Lire
 * Fondation Jean-Jaurès - Accueil [https://www.jean-jaures.org/
 * The Conversation : des analyses de l’actualité par des
   universitaires et chercheurs [https://theconversation.com/fr
 * Secure access using HashiCorp Boundary & inlets PRO Better Together
   [https://johansiebens.dev/posts/2020/10/secure-access-using-hashicorp-boundary-inlets-pro-better-together/
 * On veut vous faire croire que vous n'avez rien à cacher | François
   Charlet [https://francoischarlet.ch/2016/rien-a-cacher/
 * 40 Best Open-Source Privacy Tools -
   [https://paulponraj.com/40-best-open-source-privacy-tools/
 * ALPHV ransomware gang analysis -
   [https://www.intrinsec.com/alphv-ransomware-gang-analysis/
 * Montage d'un serveur de mail complet (postfix, postgrey,
   amavisd-new, clamav, spamassassin etc) - Le blog de Michauko
   [https://michauko.org/blog/montage-dun-serveur-de-mail-complet-postfix-postgrey-amavisd-new-clamav-spamassassin-etc-590/
 * 7 Minute Security [https://7ms.us/
 * Avec un VPN, le FAI a-t-il accès à vos échanges ?
   [https://desgeeksetdeslettres.com/avec-un-vpn-le-fai-a-t-il-acces-a-vos-echanges/
 * Home - riseup.net [https://riseup.net/en
 * Accueil - riseup.net [https://riseup.net/
 * Comment être anonyme sur internet
   [https://desgeeksetdeslettres.com/logiciels-pour-surfer-anonymement-sur-internet/
 * Learn Ethical Hacking Course Online [https://ethicalhackersacademy.com/
 * Ethical Hackers Academy
   [https://ethicalhackersacademy.com/blogs/ethical-hackers-academy
 * Les nouveaux pirates - Saison 0
   [https://redteamdefense.org/saison-0/les-nouveaux-pirates
 * Guide d’Autodéfense Numérique [https://guide.boum.org/
 * BUG HUNTER UNIVERSITY - YouTube
   [https://www.youtube.com/playlist?list=PLY-vqlMAnJ9bGoI82H1BB8BE4A8H2OCA-
 * Gilbert Gosseyn - AgoraVox le média citoyen
   [https://www.agoravox.fr/auteur/gilbert-gosseyn
 * 10 Médias Alternatifs Libres & Indépendants à Suivre
   [https://www.jeremybackpacker.com/liste-medias-independants/
 * Quand nos bulletins de salaire témoignent d’un siècle d’histoire et
   de conquêtes sociales - Basta!
   [https://basta.media/retraites-greve-nos-bulletins-de-salaire-temoignent-d-un-siecle-et-demi-d-histoire-de-conquetes-sociales
 * LES PRÉDICTIONS DE NOSTRADAMUS, les prophéties de Nostradamus
   [https://predictions-nostradamus.com/
 * PuppyPi - Google Drive
   [https://drive.google.com/drive/folders/1sgG2CQcXimtivb-J_ILMTr9niWKPPdqN
 * Quantfury | Trading Honnête pour Tous [https://quantfury.com/french/
 * 💻 Besoin d'un dépannage informatique ? Assistance informatique
   [https://yoojo.fr/informatique
 * Get Started Now - Talent Desire
   [https://www.talentdesire.com/get-started-now/
 * Référentiels d’exigences | Agence nationale de la sécurité des
   systèmes d'information
   [https://www.ssi.gouv.fr/administration/qualifications/prestataires-de-services-de-confiance-qualifies/referentiels-exigences/
 * How to Test Endpoint Security with Red Teaming | CrowdStrike
   [https://www.crowdstrike.com/blog/how-to-test-endpoint-security-with-red-teaming/
 * Detectify Labs - Writeups, ethical hacker insights, security
   guidance [https://labs.detectify.com/
 * Detectify Crowdsource | Hack the planet [https://cs.detectify.com/apply
 * Build optimized websites quickly, focus on your content | Docusaurus
   [https://docusaurus.io/
 * OgmaSec / NJ8 [https://www.mickaeldorigny.com/
 * Julien Mousqueton [https://julien.io/
   Crypto_trading_investissement
 * 🧩 Voici le meilleur portefeuille d'investissement
   [https://www.beatmarket.fr/p/voici-le-meilleur-portefeuille-dinvestissement
 * Formation Christopher Wangen - Réussir en Crypto
   [https://formations.christopher-wangen.fr/reussir-en-crypto
 * 10 meilleurs sites pour acheter du Bitcoin par carte bancaire ou
   virement [https://cryptonaute.fr/comment-acheter-bitcoin/
 * GitHub - sobolevn/awesome-cryptography: A curated list of
   cryptography resources and links.
   [https://github.com/sobolevn/awesome-cryptography/
 * Comment gagner des cryptos gratuitement ? 14 méthodes fiables
   [https://cryptonaute.fr/guide-crypto/gagner-bitcoin-gratuit/
 * En savoir plus sur la blockchain et les cryptomonnaies | Binance
   Academy [https://academy.binance.com/fr
 * Générateur de porte-monnaie papier universel pour Bitcoin et autres
   monnaies cryptographiques [https://walletgenerator.net/
 * Prix des cryptomonnaies, graphiques et capitalisations boursières |
   CoinMarketCap [https://coinmarketcap.com/fr/
 * Nexo: Buy, Exchange, and Store Bitcoin & Crypto [https://nexo.com/
 * The crypto wallet for Defi, Web3 Dapps and NFTs | MetaMask
   [https://metamask.io/
 * Thibaut Crypto
   [https://www.thibautcrypto.com/thibaut-crypto?fbclid=PAAaafcydyZa44yFQbmwB-Pt6_DRtrVLGhVo6f9AfGqC3s-S1EWLozEMcRuWc
 * Les meilleurs bots de trading pour la crypto-monnaie - Cryptonaute
   [https://cryptonaute.fr/meilleurs-robot-trading-crypto-bitcoin/
 * petite annonce paiement en bitcoin at DuckDuckGo
   [https://duckduckgo.com/?q=petite+annonce+paiement+en+bitcoin&t=ffab&ia=web
 * Acheter des Bitcoins avec Paypal ou Carte Bancaire - comparatif et
   frais 2018 | Bitcoin Cours | Cours du Bitcoin euro/dollar temps
   réel/historique/bourse
   [http://www.bitcoincours.com/p/acheter-bitcoin.html
 * VirWoX // Acheter et vendre des Linden Dollar, Avination C$ ou OMC,
   pour des Euros, US$, des Francs Suisses ou des GBP.
   [https://www.virwox.com/index.php?language=fr
 * LocalBitcoins.com : Le moyen le plus rapide et le plus simple pour
   vendre et acheter des bitcoins [https://localbitcoins.com/fr/
 * Analyse technique - Comment lire les graphiques boursiers ?
   [https://www.abcbourse.com/apprendre/11_comment_lire_un_graphique.html
 * Gagner des bitcoin facilement sans investir | Bitcoin Cours | Cours
   graphique du Bitcoin BTC et BCH
   [https://www.bitcoincours.com/p/gagner-des-bitcoins-facilement.html
 * 11 Best Bitcoin Mining Software 2018 (Mac, Windows, Linux)
   [https://www.buybitcoinworldwide.com/mining/software/
 * 38m:30s - FreeBitco.in - Win free bitcoins every hour!
   [https://freebitco.in/?op=home#
 * Acheter des bitcoins Cash près de Lyon, France
   [https://localbitcoins.com/buy-bitcoins-with-cash/1051126418/lyon-france/
 * Goliaths Aide [https://support.goliaths.io/fr
 * Highest Paying Bitcoin Faucet 2018 | BITCOIN SITES
   [http://www.bit-sites.com/2017/09/highest-paying-bitcoin-faucet-2018.html
 * Address: 1H3exgCJ65j3inUUDKPkGAJgrb2pLGR4u4 | Blockchain Explorer
   [https://www.blockchain.com/btc/address/1H3exgCJ65j3inUUDKPkGAJgrb2pLGR4u4
 * Welcome | bitinvestllc [https://bitinvestllc.com/
 * Acheter et vendre des bitcoins instantanément | Paxful
   [https://paxful.com/fr
 * Home - Bitcoin Private Keys [https://allprivatekeys.net/
 * Investissez en communauté dès 2€ - Goliaths
   [https://www.goliaths.io/old-home-3
 * CASINO GUICHARD PERRACHON Cours Action CO, Cotation Bourse Euronext
   Paris - Boursorama [https://www.boursorama.com/cours/1rPCO/
 * Netinvestissement | Conseil en gestion de patrimoine :
   défiscalisation et placements [https://www.net-investissement.fr/
 * All Bitcoin private keys and Altcoin private keys.
   [https://allprivatekeys.com/
 * Profitabilité de minage | Kryptex
   [https://www.kryptex.com/fr/mining-profitability
 * Awesome Miner - Manage and monitor mining operations
   [https://www.awesomeminer.com/
 * Earn Free Bitcoins - bitprivatekeys
   [https://allprivatekeys.net/earn-free-btc/
 * Centre d’aide | Quantfury - Le trading honnête de tous
   [https://trading.quantfury.com/help_center
 * 10 Meilleurs Sites pour Acheter Bitcoin en 2023 - En toute sécurité
   [https://cryptoast.fr/classement-top-10-meilleurs-sites-pour-acheter-bitcoin-2021/
 * Académie eToro : Les connaissances pour investir
   [https://www.etoro.com/fr/academy/
 * Débuter dans les cryptomonnaies : Guides & Astuces | Cointribune
   [https://www.cointribune.com/guides-crypto/bien-debuter/
 * Débuter en crypto monnaie | Guide et tutoriel pour les débutants
   [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/#projet
 * Débuter en crypto monnaie | Guide et tutoriel pour les débutants
   [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/#plateformes
 * Débuter en crypto monnaie | Guide et tutoriel pour les débutants
   [https://cryptonaute.fr/guide-crypto/debuter-en-crypto-monnaie/
 * Guide cryptomonnaies, tutoriels, info et actualités des
   cryptomonnaies [https://cryptomonnaie.guide/
 * Fire Faucet - The Best Auto Faucet [https://firefaucet.win/#!
 * Avis firefaucet.win, meilleur faucet 2022 - Cryptomonnaie guide
   [https://cryptomonnaie.guide/avis-firefaucet-win-meilleur-faucet-2022/
 * Sondages Rémunérés: Le TOP des sites qui payent vraiment
   [https://www.leclubargent.com/sondages-remuneres/
 * TradeGPT 360 Evix - Evex Trading Automatique Site Officiel |
   TradesGPT 3.0 [https://tradegpt360ai.com/lang_fr/?
 * Cryptocurrency Prices, Charts And Market Capitalizations |
   CoinMarketCap [https://coinmarketcap.com/
 * Investopedia [https://www.investopedia.com/
 * XAUUSD 2034.570 ▼ −0.54%
   [https://fr.tradingview.com/chart/?symbol=OANDA%3AXAUUSD
 * Apprendre Le TRADING de A à Z Pour les DÉBUTANTS en 2024 (Formation
   Gratuite) - YouTube [https://www.youtube.com/watch?v=M-KMPhYlsW4
 * Benjamin Deleuze - Trading - YouTube
   [https://www.youtube.com/@BenjaminDeleuzeTrading
 * Hasheur - YouTube [https://www.youtube.com/@Hasheur
 * Guide du débutant Binance | Binance Support
   [https://www.binance.com/fr/support/faq/guide-du-d%C3%A9butant-binance-c780097f75dd450a82d17f1e84153276

Title: url: Modify Cancel

jeudi, janvier 14 2016

Eden of child

Le plus beau jeux.... Pas le plus simple ni le meilleur simplement le plus beau... Quelque extrait ci dessous...

Lire la suite...

samedi, mai 18 2013

The future is here

2045

samedi, octobre 13 2012

Portable software

Portable software = aucune installation... Ah si quand même au moins le soft de base. Sinon il faut prendre appli par appli selon ces besoins... Attention ça ne veut pas dire pas de trace etc... lire le billet de Korben. Simplement c'est plus "confortable"... de plus certaine sont cibler : photographie, graphisme, sécurité, audio, vidéo, etc...

Lire la suite...

Trace de packet, or packet capture

Une liste de site pour downloader des traces...

Lire la suite...

dimanche, novembre 27 2011

Mordu de CLI

Google en mode CLI. Y'a des fous sur cette terre, remarquez y'a aussi des fous qui utilisent ce que font d'autre fou...
Enfin bon voici le lien : google en CLI

Linux Home Networking

J'adore ce site car il est simple précis concis.
Le lien : ici

Un SAN avec la distribution OpenFiler en cluster Actif/Passif en ISCSI

Réalisation notable du mois de novembre :

La demande est simple :
- faire un cluster SAN en OpenSource.... A moindre coût, pour la maison ou plus ;). Pour de la virtualisation, ESXi, Redhat, ou autre serveur de virtualisation ayant la possibilité d'utiliser du ISCSI.

La recherche nous donnes les liens suivant, impossible de passer outre :
- le how to de how to forge : le lien ici
- la doc (pas très positive, le bonne chance à la fin laisse un peu septique...) : le lien ici
- le site OpenFiler quand même propose lui aussi son tuto : le lien ici

En fait il en ressort que le plus souvent ça ne va pas fonctionner comme prévu, il va manquer un paramètre ou une virgule voire un point virgule...

Après de nombreux essai infructueux, j'ai enfin réussis en regroupant les divers tuto trouvés sur internet. Le principe et le concept sont les mêmes que sur les liens ci-dessus
Il fonctionne et ça marche, avec deux, trois, ou plus serveur OpenFiler, montés sur un ou plusieurs ESXi ou autre machine acceptant du ISCSI.

Le lien principal avec une méthode qui fonctionne (testé et approuvé) : ici : http://www.eduardocamposjimenez.es/2010/12/sistema-iscsi-en-alta-disponibilidad-usando-openfiler-drbd-y-heartbeat/