This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Find a file
Omar Santos d635666852
Merge pull request #326 from santosomar/prompt-injection-examples-update
Update README.md with additional examples of prompt injection techniques
2025-07-06 16:15:26 -04:00
.github/workflows Add link checking workflow and directory overview 2025-06-26 10:54:33 -04:00
adversarial_emulation Update README.md 2025-01-26 21:03:18 -05:00
ai_research Update README.md with additional examples of prompt injection techniques 2025-07-06 16:13:08 -04:00
buffer_overflow_example Create memory_safe_languages.md 2025-01-03 09:46:16 -05:00
bug-bounties Update README.md 2024-03-21 07:22:16 -04:00
build_your_own_lab Delete build_your_own_lab/websploit/install.sh 2025-04-26 02:32:53 -04:00
capture_the_flag Update encrypt.py 2020-05-11 01:59:25 -04:00
car_hacking Update README.md 2024-04-25 10:19:32 -04:00
certifications Update cybersec_certifications.md 2024-10-27 18:11:05 -03:00
cheat_sheets Create nikto.md 2025-03-20 12:48:25 -04:00
cloud_resources Update README.md 2024-08-03 20:15:47 -04:00
cracking_passwords Update cracked.md 2024-08-03 20:38:32 -04:00
crypto Update crypto_algorithms.md 2025-01-31 07:44:34 -05:00
darkweb_research Update README.md 2023-11-02 15:52:51 -04:00
devsecops Create building_devsecops_pipelines.md 2023-08-20 17:00:04 -04:00
dfir Update README.md 2022-06-28 10:07:41 -04:00
docker-and-k8s-security Create container_technology_concepts.md 2024-08-03 19:39:23 -04:00
exploit_development Update README.md 2023-07-03 15:19:43 -04:00
foundational_cybersecurity_concepts adding more resources and videos 2024-11-13 20:46:22 -08:00
fuzzing_resources Update README.md 2024-12-10 16:06:33 -05:00
game_hacking Create README.md 2019-02-06 13:03:34 -05:00
honeypots_honeynets Create cloud_honeynet.md 2023-08-25 17:02:11 -04:00
iot_hacking Update wireless_iot.md 2023-11-08 16:09:36 -05:00
linux-hardening Add files via upload 2023-07-25 14:59:13 -04:00
metasploit_resources adding metasploit info 2018-01-17 22:57:47 -05:00
methodology Update README.md 2024-02-02 18:52:42 -05:00
mobile_security Add files via upload 2022-05-12 15:39:31 -04:00
more_payloads updating payloads 2021-07-28 01:24:01 -04:00
networking Create README.md 2023-01-06 15:43:21 -05:00
oreilly_resources Update README.md 2024-12-09 19:45:22 -05:00
osint Update README.md 2025-06-11 13:07:09 +01:00
pcaps Delete pcaps/lala.pcap 2025-07-06 15:39:17 -04:00
pen_testing_reports Update README.md 2023-10-12 11:43:30 -04:00
post_exploitation Update README.md 2024-08-29 14:12:27 -04:00
programming_and_scripting_for_cybersecurity Create check_weak_crypto.py 2023-09-18 19:58:44 -04:00
python_ruby_and_bash Create python_sniffer.py 2021-09-17 12:45:38 -04:00
recon Create nikto.md 2024-12-10 15:58:50 -05:00
regulations Merge pull request #276 from The-Art-of-Hacking/regulations-broken-link 2025-03-19 10:43:18 -04:00
reverse_engineering Update README.md 2024-07-19 15:03:11 -04:00
sbom Create csaf_vex_example.json 2021-08-21 21:40:36 -04:00
SCOR Create serverless.md 2024-04-08 17:04:20 -04:00
social_engineering Update README.md 2020-12-16 13:20:52 -05:00
threat_hunting Create threat_hunting_process.md 2023-08-20 15:23:24 -04:00
threat_intelligence Create stix_edb106cb2a6c45cc815d578514649a6dc894fa9f7415ae1d8032409e8f1f7e2f.json 2025-02-14 18:54:13 -05:00
virl_topologies adding VIRL topology 2018-06-02 01:19:42 -04:00
vulnerability_scanners Link Updates 2021-02-04 14:00:46 -08:00
vulnerable_servers organizing learning platforms 2024-11-27 00:59:08 -05:00
web_application_testing Create burpsuite_plugins.json 2024-08-17 01:17:55 -04:00
who-and-what-to-follow Update who-and-what-to-follow/README.md 2025-04-14 01:06:54 -04:00
windows Create using_bloodhound.md 2024-09-28 01:40:49 -04:00
wireless_resources Merge pull request #290 from The-Art-of-Hacking/wifi-lab 2025-04-14 00:59:48 -04:00
.gitignore Update .gitignore 2025-06-26 11:04:56 -04:00
ai_agentic_tools_for_cybersecurity.md Create ai_agentic_tools_for_cybersecurity.md 2025-02-11 05:19:08 +01:00
CONTRIBUTING.md Update CONTRIBUTING.md 2018-11-18 22:52:59 -05:00
LICENSE Update LICENSE 2023-08-08 23:19:58 -04:00
lychee.toml Add link checking workflow and directory overview 2025-06-26 10:54:33 -04:00
more_tools.md Add DotDotPwn - Directory Traversal Fuzzer 2023-10-23 18:33:33 -07:00
new_tools.md Adding new tools 2023-07-04 13:20:03 +00:00
README.md Add link checking workflow and directory overview 2025-06-26 10:54:33 -04:00

Typing SVG

This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos.

Overview

The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.

Key Areas of Focus

  • Ethical Hacking Techniques: Guidance on building your hacking environment, learning offensive security techniques, bug bounties, vulnerability research, and exploit development.

  • Reverse Engineering & Malware Analysis: In-depth insights into reverse engineering and analyzing malicious software.

  • Threat Intelligence & Threat Hunting: Resources for understanding, tracking, and proactively searching for potential threats.

  • Digital Forensics & Incident Response (DFIR): Real-life penetration testing reports, techniques, and tools related to digital forensics and incident response.

  • AI Security Research: Exploration of artificial intelligence and machine learning in the context of cybersecurity. This includes researching potential security vulnerabilities in AI algorithms, developing robust AI models resistant to adversarial attacks, understanding AI-driven threat detection, and creating tools that leverage AI to enhance security measures, and more.

How to Use

You can clone this repository or download specific resources to deepen your understanding in the aforementioned areas. For detailed explanations and practical applications, refer to the books, video courses, and training by Omar Santos.

Contributing

If you wish to contribute, please read the CONTRIBUTING.md file.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Contact

For any inquiries or feedback, please feel free to contact Omar Santos.

Directory Overview

Below is a quick reference to major sections in this repository. Each folder contains documentation or tools related to the topic indicated by its name.