Security-Resources
                                
                                
                                
                                    Security-Resources copied to clipboard
                            
                            
                            
                        Sharing our knowledge and resources in the field of cyber security.
  
PWNLAB.ME
PwnLab.Me Türkiyedeki Siber Güvenlik ekosistemini canlandırmak, ekosisteme yeni insanlar kazandırmak ve bu alanda edinilen bilgi ve tecrübeyi Siber Güvenlik meraklılarıyla paylaşmayı hedefleyen gönüllü bir Siber Güvenlik Topluluğudur.
Contact Us
PWNLAB SECURITY RESOURCES
Bu repo, Siber Güvenlik alanına ilgi duyan herkesin burada bulunan kaynaklardan faydalanması için PwnLab.Me Siber Güvenlik Topluluğu tarafından oluşturulup genel erişime açılmıştır.
Table of Contents
- 
Archives
 - 
Blogs
 - 
Telegram Channel
 - 
Youtube Channel
 - 
CTF
 - 
Tools
 - 
Documents
 
Archives
https://mega.nz/folder/1cgAAKTQ#TsXutcd8w6GKFVfAJ_owaQ
https://arsiv.kekikakademi.workers.dev/ → user:pass → @KekikAkademi:@KekikKitap
https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
https://www.kgay4all.com/seioqueseiporleroqueleio/Security/
https://drive.google.com/drive/folders/1CdrveRU2iXGabR-nQ-G1o9GC4GusU-92?usp=sharing
https://predb.me/
https://github.com/LuNiZz/siber-guvenlik-sss
https://www.linode.com/docs/guides/
https://viperone.gitbook.io/pentest-everything/
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
https://cloudflare.github.io/
https://www.microsoft.com/en-us/securityengineering
https://www.gnupg.org/documentation/manuals/gcrypt/
Blogs
https://www.hackingarticles.in/
https://0x00sec.org/
https://0xffsec.com/
https://medium.com/
https://pwnlab.me/
https://blog.shiftleft.io/
https://bishopfox.com/blog/
https://infosecwriteups.com/
https://www.schneier.com/
https://www.ericconrad.com/
https://danielmiessler.com/blog/
https://www.redtimmy.com/blog/
http://bc-security.org/blog
http://rastamouse.me/
https://hakluke.medium.com/
https://hausec.com/
https://inteltechniques.com/blog/
https://whitton.io/
https://tisiphone.net/
https://taosecurity.blogspot.com/
https://blog.zsec.uk/
https://grahamcluley.com/
https://benjaminstrick.com/blog/
https://blog.bushidotoken.net/
https://www.intelligencewithsteve.com/blog
https://keyfindings.blog/
https://www.osinteditor.com/
https://www.osintme.com/
https://www.osintcombine.com/blog
https://vvhack.org/
Telegram Channel
https://t.me/CyberSec_TR
https://t.me/library_Sec/1524
https://t.me/cloudandcybersecurity
https://t.me/parrotsecturkey
https://t.me/AdliBilisimTurkiye
https://t.me/KekikAkademi
YouTube Channel
[ Cover6 Solutions ] https://www.youtube.com/c/Cover6Solutions/
[ Hak5 ] https://www.youtube.com/user/Hak5Darren
[ DEFCONConference ] https://www.youtube.com/user/DEFCONConference
[ stacksmashing ] https://www.youtube.com/c/stacksmashing
[ Authentic8 ] https://www.youtube.com/user/Authentic8TV
[ conINT ] https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos
[ OSINT Dojo ] https://www.youtube.com/osintdojo
[ Mehmet D. INCE ] https://www.youtube.com/c/MehmetDursunInce/
[ Can Deger ] https://www.youtube.com/c/CanDeger/
[ Utku Sen ] https://www.youtube.com/c/UtkuSenYoutube/
[ Atil Samancioglu ] https://www.youtube.com/channel/UCnmAu7FF7LeoyTozrMVtTxQ/
[ Omer Citak ] https://www.youtube.com/user/Om3rCitak/
[ Z-winK University (ZU) - Bug Bounty Education ] https://www.youtube.com/channel/UCDl4jpAVAezUdzsDBDDTGsQ/videos
[ Jeremy's IT Lab ] https://www.youtube.com/c/JeremysITLab
CTF
https://tryhackme.com/
https://hackthebox.com/
https://www.vulnhub.com/
https://portswigger.net/web-security/all-labs
https://ctf.pwnlab.me/
https://ctftime.org/
https://hackmyvm.eu/
https://www.cyberseclabs.co.uk/
https://www.root-me.org/
https://www.hackerone.com/
https://pentesterlab.com/
https://www.revshells.com/
https://blueteamlabs.online/
https://anarplex.net/
https://www.wechall.net/active_sites
https://overthewire.org/wargames/
https://vulnmachines.com/
https://ctflearn.com/
https://247ctf.com/
https://cryptohack.org/
https://ctf.cybersoc.wales/
https://cryptohack.org/
Tools
Exploits Database
https://www.shodan.io/
http://www.exploit-db.com/
http://packetstormsecurity.com/
https://www.rapid7.com/db/
https://cxsecurity.com/
https://packetstormsecurity.com/
https://vuldb.com/
https://vulners.com/
https://sploitus.com/
https://www.vulnerability-lab.com/
https://en.0day.today/
Vulnerabilities Database
https://nvd.nist.gov/
http://www.secdocs.org/
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://www.kb.cert.org/vuls/
http://lwn.net/Vulnerabilities/
http://www.vulnerability-lab.com/
http://www.securityfocus.com/bid
https://secunia.com/community/advisories/search/
http://denimgroup.com/resources-threadfix/
SSL/TLS Checker
https://www.cdn77.com/tls-test
https://gf.dev/tls-test
https://www.wormly.com/test_ssl/
https://www.digicert.com/help/
https://crt.sh/
Hacking Tutorials
http://www.ehacking.net/
http://www.securitytube.net/
http://www.hacking-tutorial.com/
https://www.offensive-security.com/
http://breakthesecurity.cysecurity.org/
http://www.spacerogue.net/wordpress/
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://vimeo.com/channels/fullscopesecurity
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
Virus Scan
http://fuckingscan.me/
http://v2.scan.majyx.net/
http://nodistribute.com/
http://www.file2scan.net/
http://anubis.iseclab.org/
https://anonscanner.com/
http://virusscan.jotti.org/it
https://www.virustotal.com/nl/
https://urlscan.io/
https://urlhaus.abuse.ch/browse/
https://otx.alienvault.com/
IOC Search
https://www.threatcrowd.org/listMalware.php?antivirus=Spook
https://otx.alienvault.com/pulse/617bc03687a50f0425bed393
http://www.covert.io/threat-intelligence/
Phishing Database
https://phishtank.org/
Tools Download
http://insecure.org/
http://www.kitploit.com/
http://www.toolswatch.org/
http://tools.kali.org/tools-listing
http://www.romhacking.net/utilities/
http://www.blackarch.org/tools.html
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
https://gexos.github.io/Hacking-Tools-Repository/
http://www.darknet.org.uk/category/hacking-tools/
https://pentest-tools.com/reconnaissance/google-hacking
Network Online Tools
https://dnslytics.com/
http://bgp.he.net/
http://www.dnswatch.info/
http://www.tcpiputils.com/
http://services.ce3c.be/ciprg/
http://www.yougetsignal.com/
http://www.coffer.com/mac_find/
http://www.nirsoft.net/countryip/
http://www.sockets.com/services.htm
https://mxtoolbox.com/
IP Lookup
http://ip-api.com/
http://ipaddress.com/
http://whatstheirip.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://www.my-ip-neighbors.com/
http://freegeoip.net/static/index.html
http://www.ip-adress.com/ipaddresstolocation/
Information Gathering & OSINT
https://projectdiscovery.io/#/
https://www.wappalyzer.com/
https://tweetfeed.live/
https://wheregoes.com/trace/2022349876/
https://hunter.io/
https://spyse.com/
https://pulsedive.com/
https://www.greynoise.io/
https://publicwww.com/
https://wigle.net/
https://reposify.com/
https://www.binaryedge.io/
https://fullhunt.io/
https://sploitus.com/
https://gephi.org/
https://intelx.io/
https://tinfoleak.com/
https://lookup.icann.org/
https://www.robtex.com/
https://www.whoxy.com/
https://censys.io/
https://reverseip.domaintools.com/
https://who.is/
https://domainbigdata.com/
https://zoomeye.org/
https://leakix.net/
https://analyze.intezer.com/
https://onyphe.io/
https://netlas.io/
https://dnsdumpster.com/
https://any.run/
Encrypt / Decrypt
http://crypo.in.ua/tools/
http://codebeautify.org/encrypt-decrypt
http://www.yellowpipe.com/yis/tools/encrypter/
http://www.tools4noobs.com/online_tools/decrypt/
http://textmechanic.com/Encryption-Generator.html
https://www.base64decode.org/
Online Hash Crackers
http://www.cmd5.org/
http://hashcrack.in/en
https://crackstation.net/
http://passcracking.com/
http://md5.rednoize.com/
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.md5crack.com/
http://md5decryption.com/
http://www.cloudcracker.net/
https://hdb.insidepro.com/en
http://www.onlinehashcrack.com/
http://www.md5this.com/index.php
http://www.netmd5crack.com/cracker/
http://www.tydal.nu/article/md5-crack/
https://isc.sans.edu/tools/reversehash.html
Anonymous Test
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/
SMS
http://receive-sms-now.com/
http://www.receivesmsonline.net/
http://www.receive-sms-online.info/
Fake Identity
https://fakena.me/
http://www.fakenamegenerator.com/
http://names.igopaygo.com/people/fake_person
Steganography
http://exif.regex.info/exif.cgi
https://www.pic2map.com/
https://exiftool.org/
https://cleanup.pictures/
Forensics
https://29a.ch/photo-forensics/#forensic-magnifier
https://github.com/GuidoBartoli/sherloq
Documents
Linux Tutorial
https://www.comparitech.com/net-admin/kali-linux-cheat-sheet/
https://www.maketecheasier.com/guide-to-mastering-linux/
https://linoxide.com/linux-directory-structure/
Reverse Engineering & Malware Analysis
https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/
https://www.sans.org/blog/how-you-can-start-learning-malware-analysis/?utm_medium=Social&utm_source=Twitter&utm_content=CM%20DFIR%20blog&utm_campaign=FOR610
https://storage.ey.md/Technology%20Related/Programming%20%26%20Reversing/Tuts4You%20Collection/Tutorials/
https://0x00sec.org/t/fileless-malware/26973
https://github.com/hasherezade/malware_training_vol1
https://zeltser.com/malware-analysis-webcast/
https://sechub.medium.com/blue-team-system-live-analysis-part-1-a-proactive-hunt-8258feb7cb14
https://sechub.medium.com/blue-team-system-live-analysis-part-2-windows-rules-and-tools-fc42be6c060d
https://www.youtube.com/playlist?list=PLniOzp3l9V83Yf52IXJTvW9rjstdqkduP
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/analyzing-pdf-malware-part-1/
https://soolidsnake.github.io/2021/07/17/hellokitty_linux.html
Digital Forensics & Steganography
https://www.meridiandiscovery.com/articles/word-forensic-analysis-compound-file-binary/
https://github.com/cugu/awesome-forensics
https://www.forensicfocus.com/articles/a-linux-forensics-starter-case-study/
Cyber Intelligence
https://chrome.google.com/webstore/detail/fake-profile-detector-dee/jbpcgcnnhmjmajjkgdaogpgefbnokpcc?hl=en-US
https://protectioncircle.org/2017/03/06/the-osint-connection-intelligence-in-executive-protection/
https://systemweakness.com/osint-on-gmail-accounts-fc60d785ff87
https://niiconsulting.com/checkmate/2020/09/passive-subdomain-enumeration-part-1/
https://niiconsulting.com/checkmate/2020/10/active-subdomain-enumeration-part-2/
https://medium.com/katies-five-cents/faqs-on-getting-started-in-cyber-threat-intelligence-f567f267348e
https://www.scythe.io/library/threat-thursday-top-ransomware-ttps
https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html
https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/
http://www.pentest-standard.org/index.php/Intelligence_Gathering
https://inteltechniques.com/osintbook/
http://www.securitysift.com/passive-reconnaissance/
https://www.youtube.com/user/irongeek/search
https://www.youtube.com/channel/UCjzceWf-OT3ImIKztzGkipA/videos
https://www.youtube.com/c/0x4rk%C3%98/videos
https://www.youtube.com/user/Authentic8TV
https://www.youtube.com/channel/UCBtSOceclpKcvunVNw82tFQ/videos
https://www.youtube.com/osintdojo
https://www.youtube.com/playlist?list=PL7yUP1guJz7fZNfZM-zkUieKSeA1TCG2S
https://www.youtube.com/watch?v=p4JgIu1mceI
https://courses.thecyberinst.org/courses/osintmini
https://courses.thecyberinst.org/courses/osint-challenge
https://www.geoguessr.com/
https://www.tracelabs.org/initiatives/search-party
https://kit.exposingtheinvisible.org/en/
https://cyberdefenders.org/blueteam-ctf-challenges/38
https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence
https://www.osinttechniques.com/
https://www.phishlabs.com/blog/
Penetration Testing
https://attack.mitre.org/
https://application.security/
https://owasp.org/www-project-juice-shop/
https://portswigger.net/web-security
https://cheatsheetseries.owasp.org/
https://github.com/xdavidhu/awesome-google-vrp-writeups
https://wiki.owasp.org/index.php/OWASP_favicon_database
https://medium.com/@raymond-lind/ssrf-lfi-in-uploads-feature-321d83b93ec0
https://blog.shiftleft.io/node-js-vulnerability-cheatsheet-447b0c9bdb99
https://infosecwriteups.com/everything-you-need-to-know-about-clickjacking-a522b188f2fe
https://ozguralp.medium.com/bigquery-sql-injection-cheat-sheet-65ad70e11eac
https://github.com/TheKingOfDuck/fuzzDicts
https://github.com/danielmiessler/SecLists
Cryptography
https://www.youtube.com/c/CihangirTezcan/videos
https://github.com/mdisec/crpyto101-egitim
Network Security
https://mehmetdmrbg.medium.com/kablosuz-a%C4%9F-sizma-tekni%CC%87kleri%CC%87-nelerdi%CC%87r-ve-kablosuz-a%C4%9F-g%C3%BCvenli%CC%87%C4%9Fi%CC%87-nasil-sa%C4%9Flanir-22c492501d49
https://barisinceisci.wordpress.com/2022/01/29/kablosuz-aglarda-802-1x-ile-ag-guvenliginin-saglanmasi/
Wordlist
https://nordpass.com/most-common-passwords-list/
https://github.com/berzerk0/Probable-Wordlists
https://github.com/utkusen/turkce-wordlist
https://github.com/xajkep/wordlists
https://blog.g0tmi1k.com/2011/06/dictionaries-wordlists/
https://github.com/danielmiessler/SecLists
Siber Tehdit İstihbaratı Yayınları
https://AlienVault.com : Düşmanları profilleyen çoklu kaynaklar bulundurur.
https://Cyveilance.com : Benzersiz tehdit oyuncuları ile beslenir ve cezai yaptırımları belirtir.
https://EmergingThreats.net : Çeşitli yayınları bulunmaktadır.
https://FireEye.com : Dinamik Tehdit İstihbarat servisidir.
https://HackSurfer.com : İşinize uyarlanmış bilgiler sunar.
https://InternetIdentity.com : Tehdit, büyük veri çözümü ActiveTrust'ten beslenir.
https://RecordedFuture.com : Web'den gerçek zamanlı tehdit zekâsı verileri sunar
https://SecureWorks.com : Yayınlar ve ayrıca belgeler sağlar.
https://Symantec.com : DeepInsight da dahil olmak üzere çeşitli konularda yayınları vardır.
https://Spytales.com : Tehdit aktörlerinin geçmişi, bugünü ve geleceği hakkında bilmeniz gereken bilgiler sunar.
https://Team-Cymru.com : Tehdit istihbarat ve Bogon listeleri sunar.
https://TheCyberThreat : Kendi Twitter yayınlarını sunar . Üst düzey ve kapsamlı yayınlardır.
https://ThingsCyber.com : Günümüz savunmasıyla ilgili siber çatışma ve siber güvenlik konusundaki kritik noktaları belirtir.
https://ThreatConnect.com : Cyber Squared tarafından bilgi paylaşımına odaklanmış bir servistir.
https://ThreatGrid.com : Birleşik kötü amaçlı yazılım analizi üzerine çalışır.
https://ThreatIntelligenceReview.com : Tehdit istihbarat kaynaklarının incelemesi ve güncellenmesi üzerine çalışır.
https://ThreatStop.com : IP kaynağına göre Bontet’lerin engellenmesi üzerine çalışır.
https://ThreatStream.com
https://ThreatTrack.com : Kötü amaçlı URL'lerin, IP'lerin ve kötü amaçlı yazılım / kimlik avı ile ilgili verilerin akışı ile çalışmaktadır.
https://Verisigninc.com