Nytro Posted May 25, 2014 Report Posted May 25, 2014 [h=2]Resources[/h] [h=4](Free) Virtual Networks (VPNs)[/h] ChaosVPN: ChaosVPN - CCCHHWikiGh0st Networks: Gh0st NetworksHacking Lab: https://www.hacking-lab.com/p0wnlabs: p0wnlabs .:. Welcome to p0wnlabspwn0: https://pwn0.com/ [h=4]Custom Personal Targets[/h] Hack A Server: https://hackaserver.com/Hack Me: http://hack.me/ [h=4]Archive/Repository[/h] Security Conference Library: liquidmatrix | jumpoffShell-Storm.org Repository: shell-storm | Repository [h=4]Books[/h] Assembly Language Step-by-Step: Programming with Linux [iSBN-13: 978-047-04-9702-9]: Assembly Language Step-by-Step: Programming with Linux: Jeff Duntemann: 9780470497029: Amazon.com: BooksBrute Force Vulnerability Discovery [iSBN-13: 978-032-1-44611-4]: Fuzzing: Brute Force Vulnerability Discovery: Michael Sutton, Adam Greene, Pedram Amini: 9780321446114: Amazon.com: BooksBug Hunter's Diary [iSBN-13: 978-1-59327-385-9]: Bug Hunter's Diary | No Starch PressHacking: The Art of Exploitation [iSBN-13: 978-159-327-144-2]: Hacking: The Art of Exploitation Book/CD Package 2nd Edition: Amazon.co.uk: Jon Erickson: BooksMetasploit: The Penetration Tester's Guide [iSBN-13: 978-159-3-27288-3]: Metasploit: The Penetration Tester's Guide: David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni: 9781593272883: Amazon.com: BooksOperating Systems Design and Implementation (3rd Edition) [iSBN-13: 978-013-142-938-3]: Operating Systems Design and Implementation (3rd Edition): Andrew S Tanenbaum, Albert S Woodhull: 9780131429383: Amazon.com: BooksThe Art of Exploitation (2nd Edition) [iSBN-13: 978-1-59327-144-2]: Hacking: The Art of Exploitation, 2nd Edition: Jon Erickson: 9781593271442: Amazon.com: BooksThe Shellcoder's Handbook [iSBN-13: 978-0-76454-468-2]: The Shellcoder's Handbook: Discovering and Exploiting Security Holes: Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell: 0785555877092: Amazon.com: BooksThe Web Application Hacker's Handbook (2nd Edition) [iSBN-13: 978-1-11802-647-2]: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws: Dafydd Stuttard, Marcus Pinto: 9781118026472: Amazon.com: Books [h=4]Misc[/h] Bug crowd: http://bugcrowd.com/CTF Time: http://ctftime.org/CTF365: Capture The Flag 365Hacker Cons: HackerCons.org - CalendarHat Force: https://www.hatforce.com/Intense School: Intense School | IT Training & Free Resources | IT Training & Free ResourcesSECore: https://secore.info/Security Distro: SecurityDistro - Security DistributionsWe Chall: https://www.wechall.net/WirelessPentest: http://www.wirelesspentest.com/ [h=4]Programming[/h] Codec Ademy: Learn to code | CodecademyLearn Python The Hard Way: Learn PythonLearn-c: Welcome - Learn C - Free Interactive C TutorialPHP - The Right Way.: PHP: The Right WayRails for Zombies: Code School - Rails for Zombies [h=4]Security Courses[/h] eLearn Security: http://www.elearnsecurity.com/Hacking Dojo: The Hacking DojoMDSec: MDSec - On-Demand Training LabsOffensive Security: http://www.offensive-security.com/Security Tube Training: http://securitytube-training.com/The Hacker Academy: The Hacker Academy [h=4]Training Material[/h] Blackhat Library: Security101 - Blackhat Techniques - Hacking Tutorials - Vulnerability Research - Security ToolsCodecademy: Learn to code | CodecademyCorelan: https://www.corelan.be/index.php/articles/Hacking Cisco: Hacking CiscoMetasploit Unleashed: http://www.offensive-security.com/metasploit-unleashed/N00b pentesting: n00bpentesting.com - n00bpentesting Resources and Information. This website is for sale!Open Security Training: WelcomePentest Standard: The Penetration Testing Execution StandardRouter Gods: RouterGodsSecurity Tube: Welcome to SecurityTube.netSursa: Resources ~ VulnHub 1 Quote