forked from daattali/beautiful-jekyll
-
Notifications
You must be signed in to change notification settings - Fork 10
/
Copy pathd4rks0c1ety.html
72 lines (62 loc) · 2.97 KB
/
d4rks0c1ety.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
<!-- Author : Rahul Indra -->
<!DOCTYPE html>
<html>
<head>
<!-- glitch CSS -->
<link href="assets/css/core/glitch.css" rel="stylesheet">
<link href="https://fonts.googleapis.com/css?family=Niramit" rel="stylesheet">
<title>d4rks0c1ety</title>
<link rel="stylesheet" type="text/css" href="assets/css/core/dark.css">
</head>
<body>
<script src="assets/js/animate.js"></script>
<header>
<div class="glitch">
<h1>d4rks0c1ety</h1>
<h1>d4rks0c1ety</h1>
<h1>d4rks0c1ety</h1>
</div>
<br><br><br>
<p>CTF Team of IIEST Shibpur</p>
</header>
<h2>Binary Exploitation</h2>
<ul>
<li><a target="_blank"
href="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN">LiveOverflow Binary
Hacking</a></li>
<li><a target="_blank" href="https://github.com/hsfareed/Resources-for-learning-ethical-hacking">Resources for
Ethical Hacking</a></li>
<li><a target="_blank" href="http://security.cs.rpi.edu/courses/binexp-spring2015/">Modern Binary Exploitation</a>
</li>
<li><a target="_blank" href="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0">Introductory Intel x86:
Architecture, Assembly, Applications, & Alliteration</a></li>
<li><a target="_blank" href="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177">Intermediate Intel x86:
Architecture, Assembly, Applications, & Alliteration</a></li>
<li><a target="_blank" href="http://www.opensecuritytraining.info/Training.html">Advance Intel x86: Architecture,
Assembly, Applications, & Alliteration</a></li>
<li><a target="_blank" href="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw">Introduction
to Reverse Engineering Software</a></li>
</ul>
<h2>Web Hacking</h2>
<ul>
<li><a target="_blank" href="https://www.hacker101.com/" rel="nofollow">Hacker101-Web Hacking</a></li>
<li><a target="_blank"
href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf"
rel="nofollow">The Web Application Hacker's Handbook</a></li>
<li><a target="_blank" href="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents"
rel="nofollow">OWASP Guide</a></li>
</ul>
<h2>War Games</h2>
<ul>
<li><a target="_blank" href="https://io.netgarage.org/" rel="nofollow">IO Wargame</a></li>
<li><a target="_blank" href="http://pwnable.kr/" rel="nofollow">Pwnable KR</a></li>
<li><a target="_blank" href="https://pwnable.tw/" rel="nofollow">Pwnable TW</a></li>
<li><a target="_blank" href="http://overthewire.org/wargames/" rel="nofollow">OverTheWire</a></li>
<li><a target="_blank" href="http://reversing.kr/" rel="nofollow">Reversing KR</a></li>
<li><a target="_blank" href="http://w3challs.com/" rel="nofollow">W3Challs</a></li>
<li><a target="_blank" href="https://www.hackthebox.eu/" rel="nofollow">Hack the Box</a></li>
<li><a target="_blank" href="http://webhacking.kr/" rel="nofollow">WebHacking KR</a></li>
</ul>
<!-- flag : accessdenied{1_kn0w_abt_d4rks0c1ety_n0w} -->
</body>
</html>