https://attack.mitre.org/ https://cve.mitre.org/ https://nvd.nist.gov/ https://www.exploit-db.com/ https://www.kali.org/ http://searchsystems.net https://www.hackerone.com/ https://www.zerodayinitiative.com/ https://zerodium.com/ https://www.bugcrowd.com/ https://www.openbugbounty.org/ https://www.synack.com/ https://www.yeswehack.com/ https://humanhackingbook.com/ ipconfig.io ipinfo.io http://www.darkreading.com/ https://forums.hak5.org/ http://www.knowthetrade.com/ http://www.getmon.com http://www.scambusters.org/ https://www.us-cert.gov/ https://krebsonsecurity.com/ https://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl https://badssl.com/ The Basics of Hacking and Penetration Testing https://forums.kali.org/ Bogon IP addresses: IPv4 RFC5735: https://datatracker.ietf.org/doc/html/rfc5735 IPv6 RFC5165: https://datatracker.ietf.org/doc/html/rfc5156 https://datatracker.ietf.org/doc/html/rfc6890 https://datatracker.ietf.org/doc/html/rfc8190 http://www.networksecuritytoolkit.org/nst/index.html https://www.vulnhub.com/ http://www.fakenamegenerator.com/ https://go.recordedfuture.com/cyber-daily-rss https://www.internetlivestats.com/ https://builtwith.com/ http://www.securitywizardry.com/radar.htm http://atlas.arbor.net/ https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html https://www.skillset.com/certifications/ceh https://krebsonsecurity.com/ http://breachlevelindex.com/ https://www.shodan.io/ https://www.binaryedge.io/ http://www.securitywizardry.com/radar.htm http://cybermap.kaspersky.com/ http://map.ipviking.com/ https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top https://krebsonsecurity.com/2015/01/whos-attacking-whom-realtime-attack-trackers/ http://www.computerworld.com/article/2849263/doxxing-defense-remove-your-personal-info-from-data-brokers.html https://inteltechniques.com/ https://operational-security.com http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html http://centralops.net/co/ http://en.wikipedia.org/wiki/List_of_DNS_record_types http://www.opus1.com/www/traceroute.html http://www.googleguide.com/ https://docs.google.com/document/d/1ydVaJJeL1EYbWtlfj9TPfBTE5IBADkQfZrQaBZxqXGs/edit http://www.powersearchingwithgoogle.com/ https://www.itprotoday.com/compute-engines/what-are-netbios-suffixes-16th-character https://drk1wi.github.io/portspoof/ https://mediatemple.net/community/products/dv/204643950/understanding-an-email-header https://blogs.technet.microsoft.com/askcore/2013/03/24/alternate-data-streams-in-ntfs/ https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/providers/filesystem-provider/get-item-for-filesystem?view=powershell-6 http://www.eicar.org/ https://www.virustotal.com/en/ https://www.virusbulletin.com/ https://vulners.com http://www.sandboxie.com/ https://haveibeenpwned.com/ https://spycloud.com/ https://crackstation.net http://cecs.wright.edu/~pmateti/Courses/3900/Lectures/Passwords/rainbow-tables.html http://project-rainbowcrack.com/ https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/ https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots http://blog.tonercartridgedepot.com/category/security/ http://www.geek.com/apple/iphone-accelerometer-can-be-used-to-log-keyboard-keystrokes-1432665/ http://www.yubico.com/products/yubikey-hardware/ https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/ https://www.cirt.net/passwords http://www.techdirt.com/articles/20121130/07495221185/tor-exit-node-operator-charged-with-distributing-child-porn.shtml https://www.torproject.org/ http://www.proxy4free.com/list/webproxy1.html https://www.snort.org/documents/snort-rule-infographic http://www.netcraft.com/ http://twofactorauth.org/ https://www.fakenamegenerator.com/ http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx http://archive.org/ https://archive.fo/ https://perma.cc/ https://www.arin.net/ https://www.malware-traffic-analysis.net/ http://www.phishtank.com/ http://cofense.com/ http://knowbe4.com/ http://darkpatterns.org/ https://browserleaks.com/ https://panopticlick.eff.org/ http://pleaserobme.com/ http://www.clarkhoward.com/news/clark-howard/personal-finance-credit/credit-freeze-and-thaw-guide/nFbL/ https://www.civic.com/ https://www.wombatsecurity.com/ http://www.knowbe4.com/ http://www.prolexic.com/ https://www.neustar.biz/ https://www.grc.com/ https://www.grc.com/fingerprints.htm https://www.grc.com/dns/benchmark.htm https://www.ssllabs.com/ https://lastpass.com/linkedin/ https://lastpass.com/lastfm/ https://lastpass.com/eharmony/ http://www.securityspace.com/smysecure/index.html https://www.tinfoilsecurity.com/ https://securitytxt.org/ https://disclose.io/ http://langalaxy.com/ http://checkusernames.com/ https://www.namecheckr.com/ https://www.owasp.org https://www.owasp.org/index.php/Webscarab https://www.owasp.org/index.php/Webgoat http://www.wechall.net/ https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project http://demo.testfire.net/ http://google-gruyere.appspot.com/ https://exploit-exercises.lains.space/ http://smashthestack.org/ http://www.overthewire.org/wargames/ http://www.offensive-security.com/metasploit-unleashed/Requirements http://www.dvwa.co.uk/ https://www.hackthebox.eu/ https://www.vulnhub.com/ http://www.samurai-wtf.org https://medium.com/@chandrapal/history-of-metasploitables-af318e0954b1 http://en.wikipedia.org/wiki/Kryptos http://www.newscientist.com/article/mg21528785.600-frankenstein-virus-creates-malware-by-pilfering-code.html#.Ug5cFpKyDa9 http://www.tomsguide.com/us/how-to-bluesniper-pt1,review-408.html http://www.aircrack-ng.org/ https://www.xda-developers.com/ https://www.howardforums.com/ https://www.privacytools.io/ https://thatoneprivacysite.net/vpn-comparison-chart/ https://torrentfreak.com/vpn-services-keep-anonymous-2018/ https://thebestvpn.com/118-vpns-logging-policy/ https://www.patreon.com/posts/8719981 http://www.cacetech.com/products/catalog/ https://www.tamos.com/products/commwifi/ https://mypeek.wildpackets.com/driver_downloads.php http://techland.time.com/2012/03/02/the-cell-phone-jammer-on-the-bus-goes-jam-jam-jam/ https://www.microsoft.com/en-us/evalcenter/ https://veracrypt.codeplex.com/ https://www.ciphershed.org/ https://www.cellstream.com/intranet/reference-reading/tipsandtricks/332-capturing-wi-fi-wlan-packets-on-windows-for-free.html https://tldrlegal.com/ http://www.forensicfocus.com/ https://www.darkreading.com/12-free-ready-to-use-security-tools/d/d-id/1333014 https://www.regular-expressions.info/quickstart.html https://dnstwister.report/ https://themarkup.org/blacklight NCSI https://web.archive.org/web/20190121015846/https://blogs.technet.microsoft.com/networking/2012/12/20/the-network-connection-status-icon/ http://www.msftncsi.com/ncsi.txt http://www.msftconnecttest.com/connecttest.txt dns.msftncsi.com