Home About Contact Notes

Ethical Hacking, Forensics, Infosec, PenTesting (40):

Blogs, Info, News (18):

blackMORE Ops http://www.blackmoreops.com/

CyberPunk https://n0where.net/

Darknet http://www.darknet.org.uk/

GBHackers https://gbhackers.com/

gHacks Technology News http://www.ghacks.net/

Hackers Arise! https://www.hackers-arise.com/

Hacker Noon https://hackernoon.com/

Hacks, Mods & Circuitry http://mods-n-hacks.wonderhowto.com/

HighOn.Coffee https://highon.coffee/

Information Security Buzz http://www.informationsecuritybuzz.com/

Irongeek.com http://www.irongeek.com/

Kaspersky Lab Daily https://usblog.kaspersky.com/

KitPloit http://www.kitploit.com/

Null Byte http://null-byte.wonderhowto.com/

Packet Storm https://packetstormsecurity.com/

SANS Penetration Testing Blog https://pen-testing.sans.org/blog

SecTools.Org http://sectools.org/

The Hacker News http://thehackernews.com/

DNS/IP Leak Detection (2):

DNS Leak Test https://www.dnsleaktest.com/

IPLEAK.NET https://ipleak.net/

Forums (3):

Binary Revolution Hacking Forums http://www.binrev.com/forums/

Enigma Group's Hacking Forum http://www.enigmagroup.org/forums/

Evilzone https://evilzone.org/

On-the-fly encryption (OTFE) (3):

AES Crypt https://www.aescrypt.com/ Android, iOS, Linux, OS X, Windows

AxCrypt http://www.axantum.com/AxCrypt/ Windows

VeraCrypt https://veracrypt.codeplex.com/ Linux, OS X, Windows

Public Proxy IP Lists (5):

Free Proxy List http://free-proxy-list.net/

Hide My Ass! http://proxylist.hidemyass.com/

idcloak http://www.idcloak.com/proxylist/proxy-list.html

Nova Proxy http://www.proxynova.com/proxy-server-list/

SamAir http://samair.ru/

Secure Web Browsers (4):

Brave is open source, and built by a team of privacy focused, performance oriented pioneers of the web, founded by the inventor of Javascript and co-founder of Mozilla.

Dragon by Comodo is a fast and versatile Internet Browser based on Chromium, with highest level of security!

IceDragon (based on Firefox) features privacy and performance enhancements over the Firefox core browser as well as additional features such as SiteInspector malware scanning, Comodo Secure DNS and improved social media functionality.

Tor Browser lets you use Tor on Microsoft Windows, Apple MacOS, or GNU/Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).

Vulnerability Databases, Info, News (5):

Common Vulnerabilities and Exposures (CVE) https://cve.mitre.org/

Exploit Database https://www.exploit-db.com/

National Vulnerability Database (NVD) https://nvd.nist.gov/home.cfm

Open Sourced Vulnerability Database (OSVDB) http://osvdb.org/

United States Computer Emergency Readiness Team (US-CERT) https://www.us-cert.gov/