- Awesome repo contains methodologies and tools,https://github.com/swisskyrepo/PayloadsAllTheThings
- https://github.com/vasanthk/how-web-works
- hackerone hacking101, bugcrowd
- pwning owasp juice shop, https://leanpub.com/juice-shop
- https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project/Pages/Online
- The Tangled Web: A Guide to Securing Modern Web Applications
- https://juice-shop.herokuapp.com
- bugbountynotes
- https://blog.quarkslab.com/reverse-engineering-a-philips-trimedia-cpu-based-ip-camera-part-1.html
- https://www.pentestpartners.com/security-blog/cisco-rv130-its-2019-but-yet-strcpy/
- https://www.malwaretech.com/
- https://www.google.com/search?client=ubuntu&channel=fs&q=Platform+Firmware+Security+Defense+for+Enterprise+System+Administrators+and+Blue+Teams&ie=utf-8&oe=utf-8
- https://preossec.com/
- https://github.com/Screetsec/Vegile
- https://web.archive.org/web/20190322165819/https://techbizweb.com/hacking-microcontroller-firmware-through-a-usb/
- https://medium.com/@appmattus/android-security-ssl-pinning-1db8acb6621e
- https://web.archive.org/web/20150430170555/http://sla.ckers.org/forum/, phrack
- https://medium.com/@douglasbellonrocha/defend-from-hackers-using-computer-networking-fundamentals-d80275f37af3
- https://web.archive.org/web/20190427103403/https://medium.com/@and_sanford/the-world-of-cybersecurity-f0b14429e1c4
- https://medium.com/swlh/smuggler-and-cove-a-poc-for-data-exfiltration-using-scapy-e44649feae6
- https://web.archive.org/web/20190720164257/https://medium.com/@ehsahil/recon-my-way-82b7e5f62e21
- http://pentestit.com/list-of-open-source-c2-post-exploitation-frameworks/
- https://web.archive.org/web/20190808041736/https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
- https://blog.cobalt.io/is-your-serverless-app-secure-d863055deaf6
- https://github.com/m4ll0k/Awesome-Hacking-Tools
- https://github.com/sbilly/awesome-security
- https://checkmarx.gitbooks.io/go-scp/
- https://github.com/guardrailsio/awesome-golang-security
- http://qnimate.com/same-origin-policy-in-nutshell/
- https://web.archive.org/web/20190806081016/https://www.fugue.co/blog/a-technical-analysis-of-the-capital-one-cloud-misconfiguration-breach
- https://github.com/Ignitetechnologies/Privilege-Escalation
- https://web.archive.org/web/20190905160156/https://research.securitum.com/xss-in-google-colaboratory-bypassing-content-security-policy/
- https://portswigger.net/kb/issues/00500100_open-redirection-reflected, https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e, https://web.archive.org/web/20190613132934/https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e
- https://github.com/EdOverflow/can-i-take-over-xyz
- https://medium.com/@0xHyde/exploiting-history-back-3ec789c124dd. https://web.archive.org/web/20190928062359/https://medium.com/@0xHyde/exploiting-history-back-3ec789c124dd
- https://stackoverflow.com/questions/3338642/updating-address-bar-with-new-url-without-hash-or-reloading-the-page
- go to exploit db search for tcp, ....
- https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
- Docker -> https://blog.ropnop.com/docker-for-pentesters/
- https://security.stackexchange.com/questions/46836/what-is-mutation-xss-mxss
- https://www.youtube.com/watch?v=lG7U3fuNw3A
- https://github.com/cure53/DOMPurify
- https://github.com/google/closure-library
- https://github.com/s0md3v/AwesomeXSS
- https://web.archive.org/web/20190407180420/https://github.com/robocyber/Awesome-XSS-Payloads/blob/master/ADVANCED%20XSS
- https://brutelogic.com.br/blog/cors-enabled-xss/
- https://stackoverflow.com/questions/29951847/why-does-cors-allow-sending-data-to-any-server
- https://web.archive.org/web/20190729082300/https://blog.cloudflare.com/a-gentle-introduction-to-linux-kernel-fuzzing/
- https://blog.0daylabs.com/category-jsp/
- https://lab.wallarm.com/how-to-trick-csp-in-letting-you-run-whatever-you-want-73cb5ff428aa
- https://www.vulnhub.com/resources/
- https://github.com/The-Art-of-Hacking
- https://web.archive.org/web/20190421080152/https://blog.thousandeyes.com/using-bgp-reroute-traffic-ddos/
- https://linuxacademy.com/blog/amazon-web-services-2/aws_shield/
- https://javapipe.com/blog/iptables-ddos-protection/
(link: http://pwnable.kr) pwnable.kr (link: https://pwnable.tw) pwnable.tw (link: https://ctflearn.com) ctflearn.com (link: https://www.root-me.org) root-me.org (link: https://www.hackthebox.eu) hackthebox.eu (link: https://www.hacking-lab.com) hacking-lab.com (link: https://microcorruption.com) microcorruption.com (link: https://crackmes.one) crackmes.one (link: https://ctflearn.com/) ctflearn.com
https://keyfindings.blog/2019/08/25/unravelling-the-norton-scam-final-chapter/