R
6ixCode
Exploit-db
SecurityFocus
VulnHub
Exploit Exercises
SecLists
List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
Metasploit Unleashed
0Day Security Enumeration Guide
Pen-test methodology
OH SHINT! It's A Blog