====== ~~ Vulnhub - Resources ~~ ====== [[resources|Retour]] Cette page est une copie texte brut de la page de ressources de Vulnhub. Je mettrai en forme + tard. (Free) Virtual Networks (VPNs) ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN Gh0st Networks: http://www.gh0st.net/ Hacking Lab: https://www.hacking-lab.com/ p0wnlabs: http://p0wnlabs.com/ pwn0: https://pwn0.com/ PentestIT: https://lab.pentestit.ru/ Custom Personal Targets Hack A Server: https://hackaserver.com/ Hack Me: http://hack.me/ Hack This: https://www.hackthis.co.uk/ Smash The Stack: http://smashthestack.org/ Hack The Box: https://www.hackthebox.gr/ SecAdvise: https://labs.secadvise.com/ DarkHive: http://darkhive.net/ Avatao: https://avatao.com/ Root-Me: https://www.root-me.org/ Archive/Repository Security Conference Library: http://archive.liquidmatrix.org/ Shell-Storm.org Repository: http://repo.shell-storm.org/CTF/ Books Assembly Language Step-by-Step: Programming with Linux [ISBN-13: 978-047-04-9702-9]: http://www.amazon.com/Assembly-Language-Step-Step-Programming/dp/0470497025/ Brute Force Vulnerability Discovery [ISBN-13: 978-032-1-44611-4]: http://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119/ Bug Hunter's Diary [ISBN-13: 978-1-59327-385-9]: http://nostarch.com/bughunter Hacking: The Art of Exploitation [ISBN-13: 978-159-327-144-2]: http://www.amazon.co.uk/Hacking-Art-Exploitation-Book-Package/dp/1593271441/ Metasploit: The Penetration Tester's Guide [ISBN-13: 978-159-3-27288-3]: http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ Operating Systems Design and Implementation (3rd Edition) [ISBN-13: 978-013-142-938-3]: http://www.amazon.com/Operating-Systems-Design-Implementation-Edition/dp/0131429388/ The Art of Exploitation (2nd Edition) [ISBN-13: 978-1-59327-144-2]: http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ The Shellcoder's Handbook [ISBN-13: 978-0-76454-468-2]: http://www.amazon.com/The-Shellcoders-Handbook-Discovering-Exploiting/dp/0764544683/ The Web Application Hacker's Handbook (2nd Edition) [ISBN-13: 978-1-11802-647-2]: http://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/ Misc Bug crowd: http://bugcrowd.com/ CTF Time: http://ctftime.org/ CTF365: http://ctf365.com/ Hacker Cons: http://hackercons.org/ Hat Force: https://www.hatforce.com/ Intense School: http://www.intenseschool.com/resources/ SECore: https://secore.info/ We Chall: https://www.wechall.net/ WirelessPentest: http://www.wirelesspentest.com/ (WayBackMachine) Programming Codec Ademy: http://www.codecademy.com/ Learn {Python,Ruby,C,Regex,SQL,CLI} The Hard Way: http://learnpythonthehardway.org/book/ Learn {Python,Java,C,JavaScript,PHP,Shell,C#}: http://learn-c.org/ PHP - The Right Way.: http://www.phptherightway.com/ Rails for Zombies: http://railsforzombies.org/ Security Courses ComputerSecurityStudent: https://www.computersecuritystudent.com/ eLearn Security: http://www.elearnsecurity.com/ Hacking Dojo: http://hackingdojo.com/ MDSec: http://mdsec.net/ Offensive Security: https://www.offensive-security.com/ Security Tube Training: http://securitytube-training.com/ The Hacker Academy: http://www.thehackeracademy.com/ Training Material nets.ec (used to be called "Blackhat Library"): https://nets.ec/Main_Page Codecademy: http://www.codecademy.com/ Corelan: https://www.corelan.be/index.php/articles/ End Game (How to Get Started in CTF): http://www.endgame.com/ Hacking Cisco: http://hackingcisco.blogspot.com/ Metasploit Unleashed: http://www.offensive-security.com/metasploit-unleashed/ N00b pentesting: http://n00bpentesting.com/lessons/ Open Security Training: http://opensecuritytraining.info/ Pentest Standard: http://www.pentest-standard.org/index.php/Main_Page Router Gods: http://www.routergods.com/ SWEET (Secure WEb dEvelopment Teaching): http://www.csis.pace.edu/~lchen/sweet/ SEED: Vulnerability and Attack Labs: http://www.cis.syr.edu/~wedu/seed/all_labs.html/ Security Tube: http://www.securitytube.net/