Resources
Link digest curated for your reading pleasure. I collect the links and documents below as a database of things I have learnt or things I might need to refer to in the future. For suggestions, dead links or just to have a discussion, please contact me.
Interesting findings
Bitcoin
Cryptography
- Principles of Modern Cryptography - Dan Boneh, Victor Shoup
- New Directions in Cryptography - Whitfield Diffie, Martin Hellman
- A digital signature based on a conventional encryption function
- Cryptographic Apparatus and Method (Diffie-Hellman Key Exchange) - Diffie, Hellman, Merkle
- Cryptographic Communications System and Method (RSA)- Rivest, Shamir, Adleman
- An Efficient Protocol for Authenticated Key Agreement (Elliptic-Curve Diffie-Hellman, ECDH) - Law, Qu, Menezes, Solinas, Vanstone
- The Elliptic Curve Digital Signature Algorithm - Johnson, Menezes
- Introduction to Cryptography - Video lectures by Prof. Christof Paar
Cypherpunks
Programming
Security
- CISSP: Certified Information Systems Security Professions (Study Guide)
- Guide to Malware Incident Prevention and Handling for Desktops and Laptops - NIST
- The Basic Building Blocks of Malware - J. Shin, D. F. Spears, University of Wyoming
- Network Intrusion Detection. IEEE Network, 1994 - B. Mukherjee, L. T. Heberlein, K. N. Levitt
- Cisco Network-Based Intrusion Detection - Functionalities and Configuration
- Data Mining for Network Intrusion Detection: How to Get Started. The MITRE Corporation. - E. Bloedorn, A. D. Christiansen, W. Hill, C. Skorupka, L. M. Talbot, J. Tivel
- Network Intrusion Detection Systems - False Positive Reduction Through Anomaly Detection - E. Zambon, D. Bolzoni
- Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection - T. H. Ptacek, T. N. Newsham, Secure Networks, Inc. 1998.
- Meltdown Attack - M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg
- Spectre Attacks: Exploiting Speculative Execution - P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, Y. Yarom
- A Red Teamer’s guide to pivoting - Artem Kordatenko
- How to Build a Successful Information Security Career - Daniel Miessler
- Awesome Red Teaming - Ultimate Red Teams Resource List
- Pentest Tips and Tricks - EK
- Fuzzy Security
Security - Penetration Testing Practice
- KeepNote - Best note keeping tool for documentation and organization
- Immunity Debugger - Debugger that can be used to write exploits, analyze malware and reverse engineer binary files.
- Metasploit Framework - Mega tool for vulnerability scanning, exploit execution and payload deployment
- Nmap - Powerful network and host scanner
- Ettercap - Man in the middle attack tool
- Bettercap - Man in the middle attack and credential sniffing tool (a.k.a. Ettercap on steroids, or Ninja Etercap)
- mitmproxy - HTTPS proxy for man in the middle attacks
- Wireshark - Network packet and protocol analyzer
- w3af - Web application security audit framework
- Burpsuite - Web application vulnerability scanner
- Cain & Abel - Windows password cracker
- John the Ripper - Password cracking
- sqlninja - SQL Server injection and takeover tool
- BeEF - Browswer exploitation framework
- Nikto - Web server vulnerability scanner
Blogs
Audiovisual
- SecurityTube - Huge collection of security and hacking related videos
Forums
Products
Documentaries