{"id":22816,"date":"2021-07-24T21:28:13","date_gmt":"2021-07-24T21:28:13","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=22816"},"modified":"2021-09-09T11:22:17","modified_gmt":"2021-09-09T11:22:17","slug":"list-of-step-by-step-manuals-howto-guide-tutorials-for-every-software-engineers","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/list-of-step-by-step-manuals-howto-guide-tutorials-for-every-software-engineers\/","title":{"rendered":"List of Step by Step Manuals, Howto Guide &#038; Tutorials for Every Software Engineers"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Shell\/Command line<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/dylanaraps\/pure-bash-bible\" target=\"_blank\" rel=\"noopener\"><strong>pure-bash-bible<\/strong><\/a>&nbsp;&#8211; is a collection of pure bash alternatives to external processes.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/dylanaraps\/pure-sh-bible\" target=\"_blank\" rel=\"noopener\"><strong>pure-sh-bible<\/strong><\/a>&nbsp;&#8211; is a collection of pure POSIX sh alternatives to external processes.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Idnan\/bash-guide\" target=\"_blank\" rel=\"noopener\"><strong>bash-guide<\/strong><\/a>&nbsp;&#8211; is a guide to learn bash.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/denysdovhan\/bash-handbook\" target=\"_blank\" rel=\"noopener\"><strong>bash-handbook<\/strong><\/a>&nbsp;&#8211; for those who wanna learn Bash.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/wiki.bash-hackers.org\/start\" target=\"_blank\" rel=\"noopener\"><strong>The Bash Hackers Wiki<\/strong><\/a>&nbsp;&#8211; hold documentation of any kind about GNU Bash.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/pubs.opengroup.org\/onlinepubs\/9699919799\/utilities\/contents.html\" target=\"_blank\" rel=\"noopener\"><strong>Shell &amp; Utilities<\/strong><\/a>&nbsp;&#8211; describes the commands offered to application programs by POSIX-conformant systems.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/jlevy\/the-art-of-command-line\" target=\"_blank\" rel=\"noopener\"><strong>the-art-of-command-line<\/strong><\/a>&nbsp;&#8211; master the command line, in one page.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/google.github.io\/styleguide\/shellguide.html\" target=\"_blank\" rel=\"noopener\"><strong>Shell Style Guide<\/strong><\/a>&nbsp;&#8211; a shell style guide for Google-originated open-source projects.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-text-editors-2\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Text Editors<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/vim.rtorr.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Vim Cheat Sheet<\/strong><\/a>&nbsp;&#8211; great multi language vim guide.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-python\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Python<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/awesome-python.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Python<\/strong><\/a>&nbsp;&#8211; a curated list of awesome Python frameworks, libraries, software and resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/gto76\/python-cheatsheet\" target=\"_blank\" rel=\"noopener\"><strong>python-cheatsheet<\/strong><\/a>&nbsp;&#8211; comprehensive Python cheatsheet.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.pythoncheatsheet.org\/\" target=\"_blank\" rel=\"noopener\"><strong>pythoncheatsheet.org<\/strong><\/a>&nbsp;&#8211; basic reference for beginner and advanced developers.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-sed--awk--other\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Sed &amp; Awk &amp; Other<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/posts.specterops.io\/fawk-yeah-advanced-sed-and-awk-usage-parsing-for-pentesters-3-e5727e11a8ad?gi=c8f9506b26b6\" target=\"_blank\" rel=\"noopener\"><strong>F\u2019Awk Yeah!<\/strong><\/a>&nbsp;&#8211; advanced sed and awk usage (Parsing for Pentesters 3).<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-nix--network\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;*nix &amp; Network<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.cyberciti.biz\/\" target=\"_blank\" rel=\"noopener\"><strong>nixCraft<\/strong><\/a>&nbsp;&#8211; linux and unix tutorials for new and seasoned sysadmin.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.tecmint.com\/\" target=\"_blank\" rel=\"noopener\"><strong>TecMint<\/strong><\/a>&nbsp;&#8211; the ideal Linux blog for Sysadmins &amp; Geeks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/www.omnisecu.com\/index.php\" target=\"_blank\" rel=\"noopener\"><strong>Omnisecu<\/strong><\/a>&nbsp;&#8211; free Networking, System Administration and Security tutorials.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/cirosantilli\/linux-cheat\" target=\"_blank\" rel=\"noopener\"><strong>linux-cheat<\/strong><\/a>&nbsp;&#8211; Linux tutorials and cheatsheets. Minimal examples. Mostly user-land CLI utilities.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/snori74\/linuxupskillchallenge\" target=\"_blank\" rel=\"noopener\"><strong>linuxupskillchallenge<\/strong><\/a>&nbsp;&#8211; learn the skills required to sysadmin.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/cb.vu\/unixtoolbox.xhtml\" target=\"_blank\" rel=\"noopener\"><strong>Unix Toolbox<\/strong><\/a>&nbsp;&#8211; Unix\/Linux\/BSD commands and tasks which are useful for IT work or for advanced users.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/linux-kernel-labs.github.io\/refs\/heads\/master\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>Linux Kernel Teaching<\/strong><\/a>&nbsp;&#8211; is a collection of lectures and labs Linux kernel topics.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/peteris.rocks\/blog\/htop\/\" target=\"_blank\" rel=\"noopener\"><strong>htop explained<\/strong><\/a>&nbsp;&#8211; explanation of everything you can see in htop\/top on Linux.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/linuxguideandhints.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Linux Guide and Hints<\/strong><\/a>&nbsp;&#8211; tutorials on system administration in Fedora and CentOS.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/NanXiao\/strace-little-book\" target=\"_blank\" rel=\"noopener\"><strong>strace-little-book<\/strong><\/a>&nbsp;&#8211; a little book which introduces strace.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/goldshtn\/linux-tracing-workshop\" target=\"_blank\" rel=\"noopener\"><strong>linux-tracing-workshop<\/strong><\/a>&nbsp;&#8211; examples and hands-on labs for Linux tracing tools workshops.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/bagder\/http2-explained\" target=\"_blank\" rel=\"noopener\"><strong>http2-explained<\/strong><\/a>&nbsp;&#8211; a detailed document explaining and documenting HTTP\/2.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/bagder\/http3-explained\" target=\"_blank\" rel=\"noopener\"><strong>http3-explained<\/strong><\/a>&nbsp;&#8211; a document describing the HTTP\/3 and QUIC protocols.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.manning.com\/books\/http2-in-action\" target=\"_blank\" rel=\"noopener\"><strong>HTTP\/2 in Action<\/strong><\/a>&nbsp;&#8211; an excellent introduction to the new HTTP\/2 standard.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.saminiir.com\/lets-code-tcp-ip-stack-1-ethernet-arp\/\" target=\"_blank\" rel=\"noopener\"><strong>Let&#8217;s code a TCP\/IP stack<\/strong><\/a>&nbsp;&#8211; great stuff to learn network and system programming at a deeper level.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/trimstray\/nginx-admins-handbook\" target=\"_blank\" rel=\"noopener\"><strong>Nginx Admin&#8217;s Handbook<\/strong><\/a>&nbsp;&#8211; how to improve NGINX performance, security and other important things.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/digitalocean\/nginxconfig.io\" target=\"_blank\" rel=\"noopener\"><strong>nginxconfig.io<\/strong><\/a>&nbsp;&#8211; NGINX config generator on steroids.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/infosec.mozilla.org\/guidelines\/openssh\" target=\"_blank\" rel=\"noopener\"><strong>openssh guideline<\/strong><\/a>&nbsp;&#8211; is to help operational teams with the configuration of OpenSSH server and client.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gravitational.com\/blog\/ssh-handshake-explained\/\" target=\"_blank\" rel=\"noopener\"><strong>SSH Handshake Explained<\/strong><\/a>&nbsp;&#8211; is a relatively brief description of the SSH handshake.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/kb.isc.org\/docs\/using-this-knowledgebase\" target=\"_blank\" rel=\"noopener\"><strong>ISC&#8217;s Knowledgebase<\/strong><\/a>&nbsp;&#8211; you&#8217;ll find some general information about BIND 9, ISC DHCP, and Kea DHCP.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/packetlife.net\/\" target=\"_blank\" rel=\"noopener\"><strong>PacketLife.net<\/strong><\/a>&nbsp;&#8211; a place to record notes while studying for Cisco&#8217;s CCNP certification.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-microsoft\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Microsoft<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/infosecn1nja\/AD-Attack-Defense\" target=\"_blank\" rel=\"noopener\"><strong>AD-Attack-Defense<\/strong><\/a>&nbsp;&#8211; attack and defend active directory using modern post exploitation activity.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-large-scale-systems\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Large-scale systems<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/donnemartin\/system-design-primer\" target=\"_blank\" rel=\"noopener\"><strong>The System Design Primer<\/strong><\/a>&nbsp;&#8211; learn how to design large-scale systems.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/binhnguyennus\/awesome-scalability\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Scalability<\/strong><\/a>&nbsp;&#8211; best practices in building High Scalability, High Availability, High Stability, and more.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/engineering.videoblocks.com\/web-architecture-101-a3224e126947?gi=a896808d22a\" target=\"_blank\" rel=\"noopener\"><strong>Web Architecture 101<\/strong><\/a>&nbsp;&#8211; the basic architecture concepts.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-system-hardening\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;System hardening<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.cisecurity.org\/cis-benchmarks\/\" target=\"_blank\" rel=\"noopener\"><strong>CIS Benchmarks<\/strong><\/a>&nbsp;&#8211; secure configuration settings for over 100 technologies, available as a free PDF.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/highon.coffee\/blog\/security-harden-centos-7\/\" target=\"_blank\" rel=\"noopener\"><strong>Security Harden CentOS 7<\/strong><\/a>&nbsp;&#8211; this walks you through the steps required to security harden CentOS.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.lisenet.com\/2017\/centos-7-server-hardening-guide\/\" target=\"_blank\" rel=\"noopener\"><strong>CentOS 7 Server Hardening Guide<\/strong><\/a>&nbsp;&#8211; great guide for hardening CentOS; familiar with OpenSCAP.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/decalage2\/awesome-security-hardening\" target=\"_blank\" rel=\"noopener\"><strong>awesome-security-hardening<\/strong><\/a>&nbsp;&#8211; is a collection of security hardening guides, tools and other resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/trimstray\/the-practical-linux-hardening-guide\" target=\"_blank\" rel=\"noopener\"><strong>The Practical Linux Hardening Guide<\/strong><\/a>&nbsp;&#8211; provides a high-level overview of hardening GNU\/Linux systems.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/madaidans-insecurities.github.io\/guides\/linux-hardening.html\" target=\"_blank\" rel=\"noopener\"><strong>Linux Hardening Guide<\/strong><\/a>&nbsp;&#8211; how to harden Linux as much as possible for security and privacy.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-security--privacy\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Security &amp; Privacy<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.hackingarticles.in\/\" target=\"_blank\" rel=\"noopener\"><strong>Hacking Articles<\/strong><\/a>&nbsp;&#8211; LRaj Chandel&#8217;s Security &amp; Hacking Blog.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/toniblyx\/my-arsenal-of-aws-security-tools\" target=\"_blank\" rel=\"noopener\"><strong>AWS security tools<\/strong><\/a>&nbsp;&#8211; make your AWS cloud environment more secure.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/inventory.rawsec.ml\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>Rawsec&#8217;s CyberSecurity Inventory<\/strong><\/a>&nbsp;&#8211; an inventory of tools and resources about CyberSecurity.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/tls.ulfheim.net\/\" target=\"_blank\" rel=\"noopener\"><strong>The Illustrated TLS Connection<\/strong><\/a>&nbsp;&#8211; every byte of a TLS connection explained and reproduced.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/ssllabs\/research\/wiki\/SSL-and-TLS-Deployment-Best-Practices\" target=\"_blank\" rel=\"noopener\"><strong>SSL Research<\/strong><\/a>&nbsp;&#8211; SSL and TLS Deployment Best Practices by SSL Labs.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/selinuxgame.org\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>SELinux Game<\/strong><\/a>&nbsp;&#8211; learn SELinux by doing. Solve Puzzles, show skillz.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/smallstep.com\/blog\/everything-pki.html\" target=\"_blank\" rel=\"noopener\"><strong>Certificates and PKI<\/strong><\/a>&nbsp;&#8211; everything you should know about certificates and PKI but are too afraid to ask.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/appsecco.com\/books\/subdomain-enumeration\/\" target=\"_blank\" rel=\"noopener\"><strong>The Art of Subdomain Enumeration<\/strong><\/a>&nbsp;&#8211; a reference for subdomain enumeration techniques.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/lifehacker.com\/the-comprehensive-guide-to-quitting-google-1830001964\" target=\"_blank\" rel=\"noopener\"><strong>Quitting Google<\/strong><\/a>&nbsp;&#8211; the comprehensive guide to quitting Google.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-web-apps\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Web Apps<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/Main_Page\" target=\"_blank\" rel=\"noopener\"><strong>OWASP<\/strong><\/a>&nbsp;&#8211; worldwide not-for-profit charitable organization focused on improving the security of software.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Application_Security_Verification_Standard_Project\" target=\"_blank\" rel=\"noopener\"><strong>OWASP ASVS 3.0.1<\/strong><\/a>&nbsp;&#8211; OWASP Application Security Verification Standard Project.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Santandersecurityresearch\/asvs\" target=\"_blank\" rel=\"noopener\"><strong>OWASP ASVS 3.0.1 Web App<\/strong><\/a>&nbsp;&#8211; simple web app that helps developers understand the ASVS requirements.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/OWASP\/ASVS\/tree\/master\/4.0\" target=\"_blank\" rel=\"noopener\"><strong>OWASP ASVS 4.0<\/strong><\/a>&nbsp;&#8211; is a list of application security requirements or tests.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Testing_Project\" target=\"_blank\" rel=\"noopener\"><strong>OWASP Testing Guide v4<\/strong><\/a>&nbsp;&#8211; includes a &#8220;best practice&#8221; penetration testing framework.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/OWASP\/DevGuide\" target=\"_blank\" rel=\"noopener\"><strong>OWASP Dev Guide<\/strong><\/a>&nbsp;&#8211; this is the development version of the OWASP Developer Guide.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/OWASP\/wstg\" target=\"_blank\" rel=\"noopener\"><strong>OWASP WSTG<\/strong><\/a>&nbsp;&#8211; is a comprehensive open source guide to testing the security of web apps.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_API_Security_Project\" target=\"_blank\" rel=\"noopener\"><strong>OWASP API Security Project<\/strong><\/a>&nbsp;&#8211; focuses specifically on the top ten vulnerabilities in API security.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/infosec.mozilla.org\/guidelines\/web_security.html\" target=\"_blank\" rel=\"noopener\"><strong>Mozilla Web Security<\/strong><\/a>&nbsp;&#8211; help operational teams with creating secure web applications.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Netflix\/security-bulletins\" target=\"_blank\" rel=\"noopener\"><strong>security-bulletins<\/strong><\/a>&nbsp;&#8211; security bulletins that relate to Netflix Open Source.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/shieldfy\/API-Security-Checklist\" target=\"_blank\" rel=\"noopener\"><strong>API-Security-Checklist<\/strong><\/a>&nbsp;&#8211; security countermeasures when designing, testing, and releasing your API.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/enable-cors.org\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>Enable CORS<\/strong><\/a>&nbsp;&#8211; enable cross-origin resource sharing.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/appsecwiki.com\/#\/\" target=\"_blank\" rel=\"noopener\"><strong>Application Security Wiki<\/strong><\/a>&nbsp;&#8211; is an initiative to provide all application security related resources at one place.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/GrrrDog\/weird_proxies\/wiki\" target=\"_blank\" rel=\"noopener\"><strong>Weird Proxies<\/strong><\/a>&nbsp;&#8211; reverse proxy related attacks; it is a result of analysis of various proxies.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/dfir.it\/blog\/2015\/08\/12\/webshell-every-time-the-same-purpose\/\" target=\"_blank\" rel=\"noopener\"><strong>Webshells<\/strong><\/a>&nbsp;&#8211; great series about malicious payloads.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/portswigger.net\/blog\/practical-web-cache-poisoning\" target=\"_blank\" rel=\"noopener\"><strong>Practical Web Cache Poisoning<\/strong><\/a>&nbsp;&#8211; show you how to compromise websites by using esoteric web features.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/bl4de\/research\/tree\/master\/hidden_directories_leaks\" target=\"_blank\" rel=\"noopener\"><strong>Hidden directories and files<\/strong><\/a>&nbsp;&#8211; as a source of sensitive information about web application.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/bo0om.ru\/en\/\" target=\"_blank\" rel=\"noopener\"><strong>Explosive blog<\/strong><\/a>&nbsp;&#8211; great blog about cybersec and pentests.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.netsparker.com\/security-cookies-whitepaper\/\" target=\"_blank\" rel=\"noopener\"><strong>Security Cookies<\/strong><\/a>&nbsp;&#8211; this paper will take a close look at cookie security.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/GitGuardian\/APISecurityBestPractices\" target=\"_blank\" rel=\"noopener\"><strong>APISecurityBestPractices<\/strong><\/a>&nbsp;&#8211; help you keep secrets (API keys, db credentials, certificates) out of source code.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-all-in-one\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;All-in-one<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/lzone.de\/cheat-sheet\/\" target=\"_blank\" rel=\"noopener\"><strong>LZone Cheat Sheets<\/strong><\/a>&nbsp;&#8211; all cheat sheets.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/rstacruz\/cheatsheets\" target=\"_blank\" rel=\"noopener\"><strong>Dan\u2019s Cheat Sheets\u2019s<\/strong><\/a>&nbsp;&#8211; massive cheat sheets documentation.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/devhints.io\/\" target=\"_blank\" rel=\"noopener\"><strong>Rico&#8217;s cheatsheets<\/strong><\/a>&nbsp;&#8211; this is a modest collection of cheatsheets.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/devdocs.io\/\" target=\"_blank\" rel=\"noopener\"><strong>DevDocs API<\/strong><\/a>&nbsp;&#8211; combines multiple API documentations in a fast, organized, and searchable interface.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/cheat.sh\/\" target=\"_blank\" rel=\"noopener\"><strong>cheat.sh<\/strong><\/a>&nbsp;&#8211; the only cheat sheet you need.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gnulinux.guru\/\" target=\"_blank\" rel=\"noopener\"><strong>gnulinux.guru<\/strong><\/a>&nbsp;&#8211; collection of cheat sheets about bash, vim and networking.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-ebooks\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Ebooks<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/EbookFoundation\/free-programming-books\" target=\"_blank\" rel=\"noopener\"><strong>free-programming-books<\/strong><\/a>&nbsp;&#8211; list of free learning resources in many languages.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-other-2\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Other<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/bitvijays.github.io\/LFC-VulnerableMachines.html\" target=\"_blank\" rel=\"noopener\"><strong>CTF Series : Vulnerable Machines<\/strong><\/a>&nbsp;&#8211; the steps below could be followed to find vulnerabilities and exploits.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/manoelt\/50M_CTF_Writeup\" target=\"_blank\" rel=\"noopener\"><strong>50M_CTF_Writeup<\/strong><\/a>&nbsp;&#8211; $50 million CTF from Hackerone &#8211; writeup.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/j00ru\/ctf-tasks\" target=\"_blank\" rel=\"noopener\"><strong>ctf-tasks<\/strong><\/a>&nbsp;&#8211; an archive of low-level CTF challenges developed over the years.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/hshrzd.wordpress.com\/how-to-start\/\" target=\"_blank\" rel=\"noopener\"><strong>How to start RE\/malware analysis?<\/strong><\/a>&nbsp;&#8211; collection of some hints and useful links for the beginners.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/www.kegel.com\/c10k.html\" target=\"_blank\" rel=\"noopener\"><strong>The C10K problem<\/strong><\/a>&nbsp;&#8211; it&#8217;s time for web servers to handle ten thousand clients simultaneously, don&#8217;t you think?<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/blog.benjojo.co.uk\/post\/why-is-ethernet-mtu-1500\" target=\"_blank\" rel=\"noopener\"><strong>How 1500 bytes became the MTU of the internet<\/strong><\/a>&nbsp;&#8211; great story about the Maximum Transmission Unit.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/poormansprofiler.org\/\" target=\"_blank\" rel=\"noopener\"><strong>poor man&#8217;s profiler<\/strong><\/a>&nbsp;&#8211; like dtrace&#8217;s don&#8217;t really provide methods to see what programs are blocking on.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/nickcraver.com\/blog\/2017\/05\/22\/https-on-stack-overflow\/\" target=\"_blank\" rel=\"noopener\"><strong>HTTPS on Stack Overflow<\/strong><\/a>&nbsp;&#8211; this is the story of a long journey regarding the implementation of SSL.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/drawings.jvns.ca\/\" target=\"_blank\" rel=\"noopener\"><strong>Julia&#8217;s Drawings<\/strong><\/a>&nbsp;&#8211; some drawings about programming and unix world, zines about systems &amp; debugging tools.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/corkami\/collisions\" target=\"_blank\" rel=\"noopener\"><strong>Hash collisions<\/strong><\/a>&nbsp;&#8211; this great repository is focused on hash collisions exploitation.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/in3rsha\/sha256-animation\" target=\"_blank\" rel=\"noopener\"><strong>sha256-animation<\/strong><\/a>&nbsp;&#8211; animation of the SHA-256 hash function in your terminal.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/labs.ripe.net\/Members\/cteusche\/bgp-meets-cat\" target=\"_blank\" rel=\"noopener\"><strong>BGP Meets Cat<\/strong><\/a>&nbsp;&#8211; after 3072 hours of manipulating BGP, Job Snijders has succeeded in drawing a Nyancat.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/benjojo\/bgp-battleships\" target=\"_blank\" rel=\"noopener\"><strong>bgp-battleships<\/strong><\/a>&nbsp;&#8211; playing battleships over BGP.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/alex\/what-happens-when\" target=\"_blank\" rel=\"noopener\"><strong>What happens when&#8230;<\/strong><\/a>&nbsp;&#8211; you type google.com into your browser and press enter?<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/vasanthk\/how-web-works\" target=\"_blank\" rel=\"noopener\"><strong>how-web-works<\/strong><\/a>&nbsp;&#8211; based on the &#8216;What happens when&#8230;&#8217; repository.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/robertheaton.com\/2018\/11\/28\/https-in-the-real-world\/\" target=\"_blank\" rel=\"noopener\"><strong>HTTPS in the real world<\/strong><\/a>&nbsp;&#8211; great tutorial explain how HTTPS works in the real world.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/about.gitlab.com\/2018\/11\/14\/how-we-spent-two-weeks-hunting-an-nfs-bug\/\" target=\"_blank\" rel=\"noopener\"><strong>Gitlab and NFS bug<\/strong><\/a>&nbsp;&#8211; how we spent two weeks hunting an NFS bug in the Linux kernel.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/about.gitlab.com\/2017\/02\/10\/postmortem-of-database-outage-of-january-31\/\" target=\"_blank\" rel=\"noopener\"><strong>Gitlab melts down<\/strong><\/a>&nbsp;&#8211; postmortem on the database outage of January 31 2017 with the lessons we learned.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/www.catb.org\/esr\/faqs\/hacker-howto.html\" target=\"_blank\" rel=\"noopener\"><strong>How To Become A Hacker<\/strong><\/a>&nbsp;&#8211; if you want to be a hacker, keep reading.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/ithare.com\/infographics-operation-costs-in-cpu-clock-cycles\/\" target=\"_blank\" rel=\"noopener\"><strong>Operation Costs in CPU<\/strong><\/a>&nbsp;&#8211; should help to estimate costs of certain operations in CPU clocks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/cstack.github.io\/db_tutorial\/\" target=\"_blank\" rel=\"noopener\"><strong>Let&#8217;s Build a Simple Database<\/strong><\/a>&nbsp;&#8211; writing a sqlite clone from scratch in C.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/djhworld.github.io\/post\/2019\/05\/21\/i-dont-know-how-cpus-work-so-i-simulated-one-in-code\/\" target=\"_blank\" rel=\"noopener\"><strong>simple-computer<\/strong><\/a>&nbsp;&#8211; great resource to understand how computers work under the hood.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.troyhunt.com\/working-with-154-million-records-on\/\" target=\"_blank\" rel=\"noopener\"><strong>The story of &#8220;Have I been pwned?&#8221;<\/strong><\/a>&nbsp;&#8211; working with 154 million records on Azure Table Storage.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.top500.org\/\" target=\"_blank\" rel=\"noopener\"><strong>TOP500 Supercomputers<\/strong><\/a>&nbsp;&#8211; shows the 500 most powerful commercially available computer systems known to us.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.shellntel.com\/blog\/2017\/2\/8\/how-to-build-a-8-gpu-password-cracker\" target=\"_blank\" rel=\"noopener\"><strong>How to build a 8 GPU password cracker<\/strong><\/a>&nbsp;&#8211; any &#8220;black magic&#8221; or hours of frustration like desktop components do.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/home.cern\/science\/computing\" target=\"_blank\" rel=\"noopener\"><strong>CERN Data Centre<\/strong><\/a>&nbsp;&#8211; 3D visualizations of the CERN computing environments (and more).<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/howfuckedismydatabase.com\/\" target=\"_blank\" rel=\"noopener\"><strong>How fucked is my database<\/strong><\/a>&nbsp;&#8211; evaluate how fucked your database is with this handy website.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/krisbuytaert.be\/blog\/linux-troubleshooting-101-2016-edition\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>Linux Troubleshooting 101 , 2016 Edition<\/strong><\/a>&nbsp;&#8211; everything is a DNS Problem&#8230;<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/open.buffer.com\/5-whys-process\/\" target=\"_blank\" rel=\"noopener\"><strong>Five Whys<\/strong><\/a>&nbsp;&#8211; you know what the problem is, but you cannot solve it?<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gvnshtn.com\/maersk-me-notpetya\/\" target=\"_blank\" rel=\"noopener\"><strong>Maersk, me &amp; notPetya<\/strong><\/a>&nbsp;&#8211; how did ransomware successfully hijack hundreds of domain controllers?<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/howhttps.works\/\" target=\"_blank\" rel=\"noopener\"><strong>howhttps.works<\/strong><\/a>&nbsp;&#8211; how HTTPS works &#8230;in a comic!<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/howdns.works\/\" target=\"_blank\" rel=\"noopener\"><strong>howdns.works<\/strong><\/a>&nbsp;&#8211; a fun and colorful explanation of how DNS works.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/postgresqlco.nf\/en\/doc\/param\/\" target=\"_blank\" rel=\"noopener\"><strong>POSTGRESQLCO.NF<\/strong><\/a>&nbsp;&#8211; your postgresql.conf documentation and recommendations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#inspiring-lists-toc\" target=\"_blank\" rel=\"noopener\"><\/a>Inspiring Lists &nbsp;<a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#anger-table-of-contents\" target=\"_blank\" rel=\"noopener\"><sup>[TOC]<\/sup><\/a><\/h4>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-sysopsdevops\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;SysOps\/DevOps<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/kahun\/awesome-sysadmin\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Sysadmin<\/strong><\/a>&nbsp;&#8211; amazingly awesome open source sysadmin resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/alebcay\/awesome-shell\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Shell<\/strong><\/a>&nbsp;&#8211; awesome command-line frameworks, toolkits, guides and gizmos.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/learnbyexample\/Command-line-text-processing\" target=\"_blank\" rel=\"noopener\"><strong>Command-line-text-processing<\/strong><\/a>&nbsp;&#8211; finding text to search and replace, sorting to beautifying, and more.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/caesar0301\/awesome-pcaptools\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Pcaptools<\/strong><\/a>&nbsp;&#8211; collection of tools developed by other researchers to process network traces.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/zoidbergwill\/awesome-ebpf\" target=\"_blank\" rel=\"noopener\"><strong>awesome-ebpf<\/strong><\/a>&nbsp;&#8211; a curated list of awesome projects related to eBPF.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/leandromoreira\/linux-network-performance-parameters\" target=\"_blank\" rel=\"noopener\"><strong>Linux Network Performance<\/strong><\/a>&nbsp;&#8211; where some of the network sysctl variables fit into the Linux\/Kernel network flow.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/dhamaniasad\/awesome-postgres\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Postgres<\/strong><\/a>&nbsp;&#8211; list of awesome PostgreSQL software, libraries, tools and resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/enochtangg\/quick-SQL-cheatsheet\" target=\"_blank\" rel=\"noopener\"><strong>quick-SQL-cheatsheet<\/strong><\/a>&nbsp;&#8211; a quick reminder of all SQL queries and examples on how to use them.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Kickball\/awesome-selfhosted\" target=\"_blank\" rel=\"noopener\"><strong>Awesome-Selfhosted<\/strong><\/a>&nbsp;&#8211; list of Free Software network services and web applications which can be hosted locally.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/wiki.archlinux.org\/index.php\/List_of_applications\" target=\"_blank\" rel=\"noopener\"><strong>List of applications<\/strong><\/a>&nbsp;&#8211; huge list of apps sorted by category, as a reference for those looking for packages.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/InterviewMap\/CS-Interview-Knowledge-Map\" target=\"_blank\" rel=\"noopener\"><strong>CS-Interview-Knowledge-Map<\/strong><\/a>&nbsp;&#8211; build the best interview map.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Tikam02\/DevOps-Guide\" target=\"_blank\" rel=\"noopener\"><strong>DevOps-Guide<\/strong><\/a>&nbsp;&#8211; DevOps Guide from basic to advanced with Interview Questions and Notes.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/issue.freebsdfoundation.org\/publication\/?m=33057&amp;l=1&amp;view=issuelistBrowser\" target=\"_blank\" rel=\"noopener\"><strong>FreeBSD Journal<\/strong><\/a>&nbsp;&#8211; it is a great list of periodical magazines about FreeBSD and other important things.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/bregman-arie\/devops-interview-questions\" target=\"_blank\" rel=\"noopener\"><strong>devops-interview-questions<\/strong><\/a>&nbsp;&#8211; contains interview questions on various DevOps and SRE related topics.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-developers\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Developers<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/kamranahmedse\/developer-roadmap\" target=\"_blank\" rel=\"noopener\"><strong>Web Developer Roadmap<\/strong><\/a>&nbsp;&#8211; roadmaps, articles and resources to help you choose your path, learn and improve.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/thedaviddias\/Front-End-Checklist\" target=\"_blank\" rel=\"noopener\"><strong>Front-End-Checklist<\/strong><\/a>&nbsp;&#8211; the perfect Front-End Checklist for modern websites and meticulous developers.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/thedaviddias\/Front-End-Performance-Checklist\" target=\"_blank\" rel=\"noopener\"><strong>Front-End-Performance-Checklist<\/strong><\/a>&nbsp;&#8211; Front-End Performance Checklist that runs faster than the others.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/rszalski.github.io\/magicmethods\/\" target=\"_blank\" rel=\"noopener\"><strong>Python&#8217;s Magic Methods<\/strong><\/a>&nbsp;&#8211; what are magic methods? They&#8217;re everything in object-oriented Python.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/satwikkansal\/wtfpython\" target=\"_blank\" rel=\"noopener\"><strong>wtfpython<\/strong><\/a>&nbsp;&#8211; a collection of surprising Python snippets and lesser-known features.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/twhite96\/js-dev-reads\" target=\"_blank\" rel=\"noopener\"><strong>js-dev-reads<\/strong><\/a>&nbsp;&#8211; a list of books and articles for the discerning web developer to read.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/RomuloOliveira\/commit-messages-guide\" target=\"_blank\" rel=\"noopener\"><strong>Commit messages guide<\/strong><\/a>&nbsp;&#8211; a guide to understand the importance of commit messages.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-securitypentesting\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Security\/Pentesting<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/qazbnm456\/awesome-web-security\" target=\"_blank\" rel=\"noopener\"><strong>Awesome Web Security<\/strong><\/a>&nbsp;&#8211; a curated list of Web Security materials and resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/joe-shenouda\/awesome-cyber-skills\" target=\"_blank\" rel=\"noopener\"><strong>awesome-cyber-skills<\/strong><\/a>&nbsp;&#8211; a curated list of hacking environments where you can train your cyber skills.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/devsecops\/awesome-devsecops\" target=\"_blank\" rel=\"noopener\"><strong>awesome-devsecops<\/strong><\/a>&nbsp;&#8211; an authoritative list of awesome devsecops tools.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/jivoi\/awesome-osint\" target=\"_blank\" rel=\"noopener\"><strong>awesome-osint<\/strong><\/a>&nbsp;&#8211; is a curated list of amazingly awesome OSINT.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/HolyBugx\/HolyTips\" target=\"_blank\" rel=\"noopener\"><strong>HolyTips<\/strong><\/a>&nbsp;&#8211; tips and tutorials on Bug Bounty Hunting and Web App Security.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/hslatman\/awesome-threat-intelligence\" target=\"_blank\" rel=\"noopener\"><strong>awesome-threat-intelligence<\/strong><\/a>&nbsp;&#8211; a curated list of Awesome Threat Intelligence resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/infosecn1nja\/Red-Teaming-Toolkit\" target=\"_blank\" rel=\"noopener\"><strong>Red-Teaming-Toolkit<\/strong><\/a>&nbsp;&#8211; a collection of open source and commercial tools that aid in red team operations.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/snoopysecurity\/awesome-burp-extensions\" target=\"_blank\" rel=\"noopener\"><strong>awesome-burp-extensions<\/strong><\/a>&nbsp;&#8211; a curated list of amazingly awesome Burp Extensions.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Hack-with-Github\/Free-Security-eBooks\" target=\"_blank\" rel=\"noopener\"><strong>Free Security eBooks<\/strong><\/a>&nbsp;&#8211; list of a Free Security and Hacking eBooks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/yeahhub\/Hacking-Security-Ebooks\" target=\"_blank\" rel=\"noopener\"><strong>Hacking-Security-Ebooks<\/strong><\/a>&nbsp;&#8211; top 100 Hacking &amp; Security E-Books.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/nikitavoloboev\/privacy-respecting\" target=\"_blank\" rel=\"noopener\"><strong>privacy-respecting<\/strong><\/a>&nbsp;&#8211; curated list of privacy respecting services and software.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/wtsxDev\/reverse-engineering\" target=\"_blank\" rel=\"noopener\"><strong>reverse-engineering<\/strong><\/a>&nbsp;&#8211; list of awesome reverse engineering resources.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/michalmalik\/linux-re-101\" target=\"_blank\" rel=\"noopener\"><strong>linux-re-101<\/strong><\/a>&nbsp;&#8211; a collection of resources for linux reverse engineering.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/onethawt\/reverseengineering-reading-list\" target=\"_blank\" rel=\"noopener\"><strong>reverseengineering-reading-list<\/strong><\/a>&nbsp;&#8211; a list of Reverse Engineering articles, books, and papers.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/0xInfection\/Awesome-WAF\" target=\"_blank\" rel=\"noopener\"><strong>Awesome-WAF<\/strong><\/a>&nbsp;&#8211; a curated list of awesome web-app firewall (WAF) stuff.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/jakejarvis\/awesome-shodan-queries\" target=\"_blank\" rel=\"noopener\"><strong>awesome-shodan-queries<\/strong><\/a>&nbsp;&#8211; interesting, funny, and depressing search queries to plug into shodan.io.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/danielmiessler\/RobotsDisallowed\" target=\"_blank\" rel=\"noopener\"><strong>RobotsDisallowed<\/strong><\/a>&nbsp;&#8211; a curated list of the most common and most interesting robots.txt disallowed directories.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Kayzaks\/HackingNeuralNetworks\" target=\"_blank\" rel=\"noopener\"><strong>HackingNeuralNetworks<\/strong><\/a>&nbsp;&#8211; is a small course on exploiting and defending neural networks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gist.github.com\/joepie91\/7e5cad8c0726fd6a5e90360a754fc568\" target=\"_blank\" rel=\"noopener\"><strong>wildcard-certificates<\/strong><\/a>&nbsp;&#8211; why you probably shouldn&#8217;t use a wildcard certificate.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gist.github.com\/joepie91\/5a9909939e6ce7d09e29\" target=\"_blank\" rel=\"noopener\"><strong>Don&#8217;t use VPN services<\/strong><\/a>&nbsp;&#8211; which is what every third-party &#8220;VPN provider&#8221; does.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/InQuest\/awesome-yara\" target=\"_blank\" rel=\"noopener\"><strong>awesome-yara<\/strong><\/a>&nbsp;&#8211; a curated list of awesome YARA rules, tools, and people.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/drduh\/macOS-Security-and-Privacy-Guide\" target=\"_blank\" rel=\"noopener\"><strong>macOS-Security-and-Privacy-Guide<\/strong><\/a>&nbsp;&#8211; guide to securing and improving privacy on macOS.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/usnistgov\/macos_security\" target=\"_blank\" rel=\"noopener\"><strong>macos_security<\/strong><\/a>&nbsp;&#8211; macOS Security Compliance Project.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/PaulSec\/awesome-sec-talks\" target=\"_blank\" rel=\"noopener\"><strong>awesome-sec-talks<\/strong><\/a>&nbsp;&#8211; is a collected list of awesome security talks.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/k4m4\/movies-for-hackers\" target=\"_blank\" rel=\"noopener\"><strong>Movies for Hackers<\/strong><\/a>&nbsp;&#8211; list of movies every hacker &amp; cyberpunk must watch.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/danieldizzy\/Cryptography_1\" target=\"_blank\" rel=\"noopener\"><strong>Cryptography_1<\/strong><\/a>&nbsp;&#8211; materials used whilst taking Prof. Dan Boneh Stanford Crypto course.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/ashutosh1206\/Crypton\" target=\"_blank\" rel=\"noopener\"><strong>Crypton<\/strong><\/a>&nbsp;&#8211; library to learn and practice Offensive and Defensive Cryptography.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-other-3\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Other<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.cheatography.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Cheatography<\/strong><\/a>&nbsp;&#8211; over 3,000 free cheat sheets, revision aids and quick references.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/mre\/awesome-static-analysis\" target=\"_blank\" rel=\"noopener\"><strong>awesome-static-analysis<\/strong><\/a>&nbsp;&#8211; static analysis tools for all programming languages.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/ossu\/computer-science\" target=\"_blank\" rel=\"noopener\"><strong>computer-science<\/strong><\/a>&nbsp;&#8211; path to a free self-taught education in Computer Science.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/danluu\/post-mortems\" target=\"_blank\" rel=\"noopener\"><strong>post-mortems<\/strong><\/a>&nbsp;&#8211; is a collection of postmortems (config errors, hardware failures, and more).<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/danistefanovic\/build-your-own-x\" target=\"_blank\" rel=\"noopener\"><strong>build-your-own-x<\/strong><\/a>&nbsp;&#8211; build your own (insert technology here).<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/rby90\/Project-Based-Tutorials-in-C\" target=\"_blank\" rel=\"noopener\"><strong>Project-Based-Tutorials-in-C<\/strong><\/a>&nbsp;&#8211; is a curated list of project-based tutorials in C.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/kylelobo\/The-Documentation-Compendium\" target=\"_blank\" rel=\"noopener\"><strong>The-Documentation-Compendium<\/strong><\/a>&nbsp;&#8211; various README templates &amp; tips on writing high-quality documentation.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/mahmoud\/awesome-python-applications\" target=\"_blank\" rel=\"noopener\"><strong>awesome-python-applications<\/strong><\/a>&nbsp;&#8211; free software that works great, and also happens to be open-source Python.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/awesomedata\/awesome-public-datasets\" target=\"_blank\" rel=\"noopener\"><strong>awesome-public-datasets<\/strong><\/a>&nbsp;&#8211; a topic-centric list of HQ open datasets.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/Sahith02\/machine-learning-algorithms\" target=\"_blank\" rel=\"noopener\"><strong>machine-learning-algorithms<\/strong><\/a>&nbsp;&#8211; a curated list of all machine learning algorithms and concepts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#blogspodcastsvideos-toc\" target=\"_blank\" rel=\"noopener\"><\/a>Blogs\/Podcasts\/Videos &nbsp;<a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#anger-table-of-contents\" target=\"_blank\" rel=\"noopener\"><sup>[TOC]<\/sup><\/a><\/h4>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-sysopsdevops-1\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;SysOps\/DevOps<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=nAFpkV5-vuI\" target=\"_blank\" rel=\"noopener\"><strong>Varnish for PHP developers<\/strong><\/a>&nbsp;&#8211; very interesting presentation of Varnish by Mattias Geniar.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=CZ3wIuvmHeM\" target=\"_blank\" rel=\"noopener\"><strong>A Netflix Guide to Microservices<\/strong><\/a>&nbsp;&#8211; talks about the chaotic and vibrant world of microservices at Netflix.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-developers-1\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Developers<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=yOyaJXpAYZQ\" target=\"_blank\" rel=\"noopener\"><strong>Comparing C to machine lang<\/strong><\/a>&nbsp;&#8211; compare a simple C app with the compiled machine code of that program.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-geeky-persons\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Geeky Persons<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/www.brendangregg.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Brendan Gregg&#8217;s Blog<\/strong><\/a>&nbsp;&#8211; is an industry expert in computing performance and cloud computing.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/gynvael.coldwind.pl\/\" target=\"_blank\" rel=\"noopener\"><strong>Gynvael &#8220;GynDream&#8221; Coldwind<\/strong><\/a>&nbsp;&#8211; is a IT security engineer at Google.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/lcamtuf.coredump.cx\/\" target=\"_blank\" rel=\"noopener\"><strong>Micha\u0142 &#8220;lcamtuf&#8221; Zalewski<\/strong><\/a>&nbsp;&#8211; white hat hacker, computer security expert.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/ma.ttias.be\/\" target=\"_blank\" rel=\"noopener\"><strong>Mattias Geniar<\/strong><\/a>&nbsp;&#8211; developer, sysadmin, blogger, podcaster and public speaker.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/nickcraver.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Nick Craver<\/strong><\/a>&nbsp;&#8211; software developer and systems administrator for Stack Exchange.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/scotthelme.co.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>Scott Helme<\/strong><\/a>&nbsp;&#8211; security researcher, speaker and founder of securityheaders.com and report-uri.com.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Brian Krebs<\/strong><\/a>&nbsp;&#8211; The Washington Post and now an Independent investigative journalist.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.schneier.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Bruce Schneier<\/strong><\/a>&nbsp;&#8211; is an internationally renowned security technologist, called a &#8220;security guru&#8221;.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/chrissymorgan.co.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>Chrissy Morgan<\/strong><\/a>&nbsp;&#8211; advocate of practical learning, Chrissy also takes part in bug bounty programs.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/blog.zsec.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>Andy Gill<\/strong><\/a>&nbsp;&#8211; is a hacker at heart who works as a senior penetration tester.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/danielmiessler.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Daniel Miessler<\/strong><\/a>&nbsp;&#8211; cybersecurity expert and writer.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/samy.pl\/\" target=\"_blank\" rel=\"noopener\"><strong>Samy Kamkar<\/strong><\/a>&nbsp;&#8211; is an American privacy and security researcher, computer hacker.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.j4vv4d.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Javvad Malik<\/strong><\/a>&nbsp;&#8211; is a security advocate at AlienVault, a blogger event speaker and industry commentator.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.grahamcluley.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Graham Cluley<\/strong><\/a>&nbsp;&#8211; public speaker and independent computer security analyst.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/security.szurek.pl\/\" target=\"_blank\" rel=\"noopener\"><strong>Kacper Szurek<\/strong><\/a>&nbsp;&#8211; detection engineer at ESET.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.troyhunt.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Troy Hunt<\/strong><\/a>&nbsp;&#8211; web security expert known for public education and outreach on security topics.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/raymii.org\/s\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>raymii.org<\/strong><\/a>&nbsp;&#8211; sysadmin specializing in building high availability cloud environments.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/robert.penz.name\/\" target=\"_blank\" rel=\"noopener\"><strong>Robert Penz<\/strong><\/a>&nbsp;&#8211; IT security expert.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-geeky-blogs\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Geeky Blogs<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/linux-audit.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Linux Audit<\/strong><\/a>&nbsp;&#8211; the Linux security blog about auditing, hardening and compliance by Michael Boelen.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/linuxsecurity.expert\/\" target=\"_blank\" rel=\"noopener\"><strong>Linux Security Expert<\/strong><\/a>&nbsp;&#8211; trainings, howtos, checklists, security tools, and more.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"http:\/\/www.grymoire.com\/\" target=\"_blank\" rel=\"noopener\"><strong>The Grymoire<\/strong><\/a>&nbsp;&#8211; collection of useful incantations for wizards, be you computer wizards, magicians, or whatever.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.secjuice.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Secjuice<\/strong><\/a>&nbsp;&#8211; is the only non-profit, independent and volunteer led publication in the information security space.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/duo.com\/decipher\" target=\"_blank\" rel=\"noopener\"><strong>Decipher<\/strong><\/a>&nbsp;&#8211; security news that informs and inspires.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-geeky-vendor-blogs\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Geeky Vendor Blogs<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.tenable.com\/podcast\" target=\"_blank\" rel=\"noopener\"><strong>Tenable Podcast<\/strong><\/a>&nbsp;&#8211; conversations and interviews related to Cyber Exposure, and more.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/nakedsecurity.sophos.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Sophos<\/strong><\/a>&nbsp;&#8211; threat news room, giving you news, opinion, advice and research on computer security issues.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.tripwire.com\/state-of-security\/\" target=\"_blank\" rel=\"noopener\"><strong>Tripwire State of Security<\/strong><\/a>&nbsp;&#8211; blog featuring the latest news, trends and insights on current security issues.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Malwarebytes Labs Blog<\/strong><\/a>&nbsp;&#8211; security blog aims to provide insider news about cybersecurity.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.trustedsec.com\/category\/articles\/\" target=\"_blank\" rel=\"noopener\"><strong>TrustedSec<\/strong><\/a>&nbsp;&#8211; latest news, and trends about cybersecurity.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/portswigger.net\/blog\" target=\"_blank\" rel=\"noopener\"><strong>PortSwigger Web Security Blog<\/strong><\/a>&nbsp;&#8211; about web app security vulns and top tips from our team of web security.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.alienvault.com\/blogs\" target=\"_blank\" rel=\"noopener\"><strong>AT&amp;T Cybersecurity blog<\/strong><\/a>&nbsp;&#8211; news on emerging threats and practical advice to simplify threat detection.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/thycotic.com\/company\/blog\/\" target=\"_blank\" rel=\"noopener\"><strong>Thycotic<\/strong><\/a>&nbsp;&#8211; where CISOs and IT Admins come to learn about industry trends, IT security, and more.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-geeky-cybersecurity-podcasts\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Geeky Cybersecurity Podcasts<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/risky.biz\/netcasts\/risky-business\/\" target=\"_blank\" rel=\"noopener\"><strong>Risky Business<\/strong><\/a>&nbsp;&#8211; is a weekly information security podcast featuring news and in-depth interviews.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.vice.com\/en_us\/topic\/cyber\" target=\"_blank\" rel=\"noopener\"><strong>Cyber, by Motherboard<\/strong><\/a>&nbsp;&#8211; stories, and focus on the ideas about cybersecurity.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.tenable.com\/podcast\" target=\"_blank\" rel=\"noopener\"><strong>Tenable Podcast<\/strong><\/a>&nbsp;&#8211; conversations and interviews related to Cyber Exposure, and more.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/podcasts.apple.com\/gb\/podcast\/cybercrime-investigations\/id1428801405\" target=\"_blank\" rel=\"noopener\"><strong>Cybercrime Investigations<\/strong><\/a>&nbsp;&#8211; podcast by Geoff White about cybercrimes.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/themanyhats.club\/tag\/episodes\/\" target=\"_blank\" rel=\"noopener\"><strong>The many hats club<\/strong><\/a>&nbsp;&#8211; featuring stories from a wide range of Infosec people (Whitehat, Greyhat and Blackhat).<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/darknetdiaries.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Darknet Diaries<\/strong><\/a>&nbsp;&#8211; true stories from the dark side of the Internet.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/playlist?list=PL423I_gHbWUXah3dmt_q_XNp0NlGAKjis\" target=\"_blank\" rel=\"noopener\"><strong>OSINTCurious Webcasts<\/strong><\/a>&nbsp;&#8211; is the investigative curiosity that helps people be successful in OSINT.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/user\/SecurityWeeklyTV\" target=\"_blank\" rel=\"noopener\"><strong>Security Weekly<\/strong><\/a>&nbsp;&#8211; the latest information security and hacking news.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#black_small_square-geeky-cybersecurity-video-blogs\" target=\"_blank\" rel=\"noopener\"><\/a>\u25aa\ufe0f&nbsp;Geeky Cybersecurity Video Blogs<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/channel\/UCzvJStjySZVvOBsPl-Vgj0g\" target=\"_blank\" rel=\"noopener\"><strong>rev3rse security<\/strong><\/a>&nbsp;&#8211; offensive, binary exploitation, web app security, hardening, red team, blue team.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/channel\/UClcE-kVhqyiHCcjYwcpfj9w\" target=\"_blank\" rel=\"noopener\"><strong>LiveOverflow<\/strong><\/a>&nbsp;&#8211; a lot more advanced topics than what is typically offered in paid online courses &#8211; but for free.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.youtube.com\/infoseccynic\" target=\"_blank\" rel=\"noopener\"><strong>J4vv4D<\/strong><\/a>&nbsp;&#8211; the important information regarding our internet security.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/cybertalks.co.uk\/\" target=\"_blank\" rel=\"noopener\"><strong>CyberTalks<\/strong><\/a>&nbsp;&#8211; talks, interviews, and article about cybersecurity.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Build your own DNS Servers<\/h6>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/calomel.org\/unbound_dns.html\" target=\"_blank\" rel=\"noopener\"><strong>Unbound DNS Tutorial<\/strong><\/a>&nbsp;&#8211; a validating, recursive, and caching DNS server.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.ctrl.blog\/entry\/knot-dns-resolver-tutorial.html\" target=\"_blank\" rel=\"noopener\"><strong>Knot Resolver on Fedora<\/strong><\/a>&nbsp;&#8211; how to get faster and more secure DNS resolution with Knot Resolver on Fedora.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.aaflalo.me\/2018\/10\/tutorial-setup-dns-over-https-server\/\" target=\"_blank\" rel=\"noopener\"><strong>DNS-over-HTTPS<\/strong><\/a>&nbsp;&#8211; tutorial to setup your own DNS-over-HTTPS (DoH) server.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/hacks.mozilla.org\/2018\/05\/a-cartoon-intro-to-dns-over-https\/\" target=\"_blank\" rel=\"noopener\"><strong>dns-over-https<\/strong><\/a>&nbsp;&#8211; a cartoon intro to DNS over HTTPS.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.aaflalo.me\/2019\/03\/dns-over-tls\/\" target=\"_blank\" rel=\"noopener\"><strong>DNS-over-TLS<\/strong><\/a>&nbsp;&#8211; following to your DoH server, setup your DNS-over-TLS (DoT) server.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/zwischenzugs.com\/2018\/01\/26\/how-and-why-i-run-my-own-dns-servers\/\" target=\"_blank\" rel=\"noopener\"><strong>DNS Servers<\/strong><\/a>&nbsp;&#8211; how (and why) i run my own DNS Servers.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#build-your-own-certificate-authority\" target=\"_blank\" rel=\"noopener\"><\/a>Build your own Certificate Authority<\/h6>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/jamielinux.com\/docs\/openssl-certificate-authority\/\" target=\"_blank\" rel=\"noopener\"><strong>OpenSSL Certificate Authority<\/strong><\/a>&nbsp;&#8211; build your own certificate authority (CA) using the OpenSSL tools.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/github.com\/smallstep\/certificates\" target=\"_blank\" rel=\"noopener\"><strong>step-ca Certificate Authority<\/strong><\/a>&nbsp;&#8211; build your own certificate authority (CA) using open source step-ca.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cloudcommunity\/the-book-of-secret-knowledge#build-your-own-systemvirtual-machine\" target=\"_blank\" rel=\"noopener\"><\/a>Build your own System\/Virtual Machine<\/h6>\n\n\n\n<p>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/github.com\/cfenollosa\/os-tutorial\" target=\"_blank\" rel=\"noopener\"><strong>os-tutorial<\/strong><\/a>\u00a0&#8211; how to create an OS from scratch.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/justinmeiners.github.io\/lc3-vm\/\" target=\"_blank\" rel=\"noopener\"><strong>Write your Own Virtual Machine<\/strong><\/a>\u00a0&#8211; how to write your own virtual machine (VM).<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/github.com\/cirosantilli\/x86-bare-metal-examples\" target=\"_blank\" rel=\"noopener\"><strong>x86 Bare Metal Examples<\/strong><\/a>\u00a0&#8211; dozens of minimal operating systems to learn x86 system programming.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/github.com\/djhworld\/simple-computer\" target=\"_blank\" rel=\"noopener\"><strong>simple-computer<\/strong><\/a>\u00a0&#8211; the scott CPU from &#8220;But How Do It Know?&#8221; by J. Clark Scott.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/littleosbook.github.io\/\" target=\"_blank\" rel=\"noopener\"><strong>littleosbook<\/strong><\/a>\u00a0&#8211; the little book about OS development.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\"  id=\"_ytid_19874\"  width=\"760\" height=\"427\"  data-origwidth=\"760\" data-origheight=\"427\" src=\"https:\/\/www.youtube.com\/embed\/?enablejsapi=1&#038;list=PLTCuRW0ikUdP5OrEUckFdQPHeE05ZeS5z&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;\" class=\"__youtube_prefs__  epyt-is-override  no-lazyload\" title=\"YouTube player\"  allow=\"fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen data-no-lazy=\"1\" data-skipgform_ajax_framebjll=\"\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Shell\/Command line &nbsp;&nbsp;\ud83d\udd38&nbsp;pure-bash-bible&nbsp;&#8211; is a collection of pure bash alternatives to external processes.&nbsp;&nbsp;\ud83d\udd38&nbsp;pure-sh-bible&nbsp;&#8211; is a collection of pure POSIX sh alternatives to external processes.&nbsp;&nbsp;\ud83d\udd38&nbsp;bash-guide&nbsp;&#8211; is a guide to learn bash.&nbsp;&nbsp;\ud83d\udd38&nbsp;bash-handbook&nbsp;&#8211;&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-22816","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=22816"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22816\/revisions"}],"predecessor-version":[{"id":23573,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22816\/revisions\/23573"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=22816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=22816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=22816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}