- tbhm: The Bug Hunters Methodology.
- DEF CON Safe Mode Red Team Village - Jason Haddix - The Bug Hunters Methodology
- Bugbounty en Español, todo lo que debes saber (Spanish)
- CEHV9 - PRACTICE EXAM QUESTIONS WITH ANSWERS
- CEHv10 official course
- Ethical Hacking Labs: This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the materials of CEH v10 content.
- Notes for CEH v10 exam (source code)
- Exam simulator
- skillset: Practice questions for different certifications.
- An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities
- Antivirus-Artifacts: Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
- Axial - Community Papers: Papers about malwares and reverse engineering.
- Basics of Windows shellcode writing
- 'CRYPTERS': PRACTICANDO LA TÉCNICA DSPLIT/AVFUCKER (Spanish)
- Todo lo que quisiste saber sobre las DLL y no te atreviste a preguntar (Spanish)
- vx-underground papers
- windows-syscalls: Windows System Call Tables (NT/2000/XP/2003/Vista/2008/7/2012/8/10).
- Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
- Malware Data Science: Attack, Detection, and Attribution
- Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
- Practical Malware Analysis. The Hands-On Guide to Dissecting
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory (Wile05)
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular
- Intel 80x86 Assembler Code Table (Spanish)
- malware_training_vol1: Materials for Windows Malware Analysis training (volume 1)
- Reverse Engineering tutorials by Ricardo Narvaja (Spanish)
- CursoReversing (Spanish): YouTube channel about reverse engineering.
- Reverse Engineering desde 0 (Spanish)
- Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
- index-of.es
- What Actually is Threat Hunting?
- Clean Code
- Design Patterns: Elements of Reusable Object-Oriented Software
- Head First Design Patterns (A Brain Friendly Guide)
- Introduction to Algorithms
- JavaScript - The Definitive Guide: Master the World's Most-Used
- Mythical Man-Month, The: Essays on Software Engineering
- Patterns of Enterprise Application Architecture
- Pragmatic Programmer, The: From Journeyman to Master
- Refactoring: Improving the Design of Existing Code
- Refactoring JavaScript: Turning Bad Code Into Good Code
- The Linux Programming Interface: A Linux and UNIX System
- Threat Modeling: Designing for Security
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Become a Salesforce security Superman! with Alba Azcona Rivas
- Lightning Web Components - Episode 4 : Security and Testing
- AppExchange Security Review
- Checkmarx: Setting Up the Visual Studio Code Extension Plugin
- Salesforce Security Basics
- Salesforce Security Guide
- Ingeniería social. El arte del hacking personal (Spanish)
- Social Engineering: The Science of Human Hacking
© 2021 javierizquierdovera.com
Licensed under the Apache License, Version 2.0 (LICENSE-APACHE) or the MIT license (LICENSE-MIT), at your option.
SPDX-License-Identifier: (Apache-2.0 OR MIT)