cover image for Essentials

Essentials

R

6ixCode

Exploit-db

SecurityFocus

VulnHub

Exploit Exercises

SecLists

List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads

Metasploit Unleashed

0Day Security Enumeration Guide

Pen-test methodology

OH SHINT! It's A Blog