- Kali Linux
- Kali
- How to Install Kali Linux on VirtualBox
- Beginner Tutorials
- Kali Tools
- findmyhash
- Linux Command Line
- Grep - by Ryan Dorrity
-       Grep Intro Tutorial
- Enumeration and Exploitation Guide - by Debbie Yang
-       Installing Uncompyle6
- Open Source Intelligence
- Shodan Search
- Google Hacking Database
- DNS Record Types
- Code
- Code Checker
- Online Code Compilers
- Code Board
- Linux Commands
- C++ Shell
- Coding Ground
- jdoodle
- json viewer
- Web Application Exploitation
- Pentest-Tools
- SQL code injection demo
- Color-hex names
- User Agent String
- SQL Injections
- Dirbuster to find Hidden Directories
- Nmap to view ports
-
Web Application Hacker's HandbookThe Web Application Hacker's Handbook 2nd Edition - This book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.
- Cryptography
- Compute MD5 Hash
- Substitution Cipher
- Rumkin Cipher Tools
- CrackStation
- Yellowpipe Encrypter/Decrypter
- Hash & Encryption
- AES Encryption
- Hash Calculators
- rot13
- cryptii
- string function converters
- Keyboard Shift Cipher
- Password Dictionaries
- Rainbow Tables
- Passwords Directory
- Base Number Converter
- Another Base Number Converter
- Substitution Ciphers - How To
- NTLM Decrypter
- Phonetic Alphabet
- Check your hash type
- Octal to Text Converter (and More)
- Hex to ASCII Converter
- Base64 Converter
- Epoch Converter
- Digital Invisible Ink for Stego
- IrfanView for Stego
- Wireless Exploitation
- Wireshark
- Sans Guide to Wireshark
- PCAP Analysis
- All the networks
- Default password list
- How to find passwords using WireShark
- Image and File Editing
- Resize Images
- Compress Images
- File Converter
- Games
- National Cyber League
- How to win the NCL
- picoCTF
- pico2017 Writeup
- Code Chef
- Bandit
- Conferences
- DefCon
- BlackHat