- Download Kaki Linux: Official link
- Download Parrot OS : Official link
- 10 Most Common Types: Malware Attacks
- Educa web: Official link
- Cybersecurity vs IT security vs Information Secuirty
- Tips for best practices
- Youtube explanation: link
- Have I been pwned? official link
Homepage | Documentation | Github repository |
---|---|---|
Official documentation | Nmap Github | |
Official documentation | Nmap Github | |
Official documentation | Crowdsec Github | |
Official documentation | Wifite Github |
First lesson - Python for Cybersecurity
Almost everything you need to know about XSS
Wikipedia: link
Layer | What does it do? | Where is it implemented? |
---|---|---|
7º Application | Where humans process data and information | Software |
6º Presentation | Ensures data is in a usable format | Software |
5º Session | Capable of maintaining connections | Software |
4º Transport | Data is forwarded to a service capable of handling requests | Connects the software and hardware layers |
3º Network Layer | Responsible for which path packets should travel on a network | Hardware |
2º Data Link | Responsible for which physical devices packets should go to | Hardware |
1º Physical | The physical infrastructure to transport data | Hardware |
Differences between them
- Cyber Security: JAVATPOINT tutorial
- SQL injection: W3Schools
- Ethical hacking: JAVATPOINT tutorial
What is a cybersecurity software for?: link
Shell Scripting on Windows
- Antivirus online Xataka
- Surf on the net without ads and safely
- Tool to code and decode data: CyberChef
- Pirani policies: picture
- The art of hacking: Official link
- Awesome Machine Learning for Cyber Security: Official link
- Security Study Plan: Official link
- A web hacking toolkit: docker image
15 Critical Security Tips for Web Development in 2023: Official link
How to close or open Firewall ports in Windows 10? Official link
Does encryption make the firewall irrelevant?: Official link
How to prevent all them?: Official link
- Defacement: definition
- Web spoofing: Official link
- Glossary of Cybersecurity Terms: Official link
- Challenges: Official link
- SIEM, IDS and IPS: Official link
- Vulnerable OS: Blog
Recommendations: RedesZone |
---|
Hack The Box: Official link |
Tryhackme: Official link |
Pentester Lab: Official link |
VulnHub: Official link |
HackThis: Official link |
Google Gruyere: Official link |
OverTheWire: Official link |
bWAPP: Official link |
Offensive Security: Official link |
Cybrary: Official link |
HackThisSite: Official link |
Root Me: Official link |
Live Hacking Attack: Geekflare link
Google Dorking , also known as Google Haking, is a hacker technique which consists of applying Google's advanced search to find specific information on the Internet by filtering the results with operators (known as dorks).
- Incibe: Google dorks help you to find information about yourself online.
- Google dorking: Useful link
- GHDB (Google Hacking DataBase): Google dorks
- S4VITAR: Youtube channel
- TheGoodHacker: Youtube channel
The Ultimate Ports & Protocols List: Official link
TOP 10: Official link
- Tmux Cheat Sheet & Quick Reference: Official link
- Youtube tutorial: Official link
Exploit created by the NSA as a cyberattack tool Avast link
Security Certification Roadmap: Official link