[
  {
    "path": "README.md",
    "content": "# SecuritySite\n收集了一些安全公司的博客，用于安全情报\n\nhttp://contagiodump.blogspot.com \n\nhttps://mmd.sougaoqing.com/mmd/index.htm\n\nhttp://researchcenter.paloaltonetworks.com\n\nhttps://www.fireeye.com/blog.html\n\nhttp://www.symantec.com/connect/blogs\n\nhttps://blog.kaspersky.com  \n\nhttps://labs.bitdefender.com/  \n\nhttp://cybersecurityminute.com/security-blogs/source/Trend+Micro+Blog/\n\nhttps://securingtomorrow.mcafee.com\n\nhttp://resources.infosecinstitute.com\n\nhttps://blog.fortinet.com\n\nhttps://blog.trustlook.com/  \n\nhttp://www.hackingarticles.in \n\nhttps://www.offensive-security.com/blog/\n\nhttp://thehackernews.com/ \n\nhttps://community.rapid7.com/community/metasploit/blog/ \n\nhttps://blog.malwarebytes.com/ \n\nhttps://www.nowsecure.com/blog/ \n\nhttps://security.berkeley.edu/resources/phishing/phishing-examples-archive \n\nhttp://malware-traffic-analysis.net/ \n\nhttp://www.vantagepoint.sg/blog \n\nhttps://www.endgame.com/blog  \n\nhttps://www.incapsula.com/blog/ \n\nhttps://crackinglandia.wordpress.com  \n\nhttps://www.pentestpartners.com/\n\nhttps://www.binarydefense.com/  \n\nhttps://blogs.technet.microsoft.com/  \n\nhttps://astr0baby.wordpress.com/2017/07/  \n\nhttp://blog.sec-consult.com/  \n\nhttps://www.besttechie.com/  \n\nhttps://vallejo.cc  \n\nhttp://nullcon.net/website/  \n\nhttps://r3mrum.wordpress.com/  \n\nhttps://www.bonkersabouttech.com/security  \n\nhttps://n0tty.github.io/  \n\nhttps://www.christophertruncer.com/  \n\nhttps://cybersyndicates.com/  \n\nhttps://www.offensive-security.com/blog/  \n\nhttps://www.scriptjunkie.us/  \n\nhttps://www.rebootuser.com/  \n\nhttps://www.darknet.org.uk/  \n\nhttps://webstersprodigy.net/  \n\nhttps://www.hackingloops.com/  \n\nhttps://pentestlab.wordpress.com  \n\nhttps://parsiya.net/archive/  \n\nhttp://www.ws-attacks.org/Welcome_to_WS-Attacks  \n\nhttp://www.harmj0y.net/blog/  \n\nhttps://enigma0x3.net/  \n\nhttps://bluescreenofjeff.com/   \n\nhttps://leonjza.github.io/  \n\nhttps://chousensha.github.io/  \n\nhttps://stealthsploit.com/  \n\nhttp://rastamouse.me/  \n\nhttps://blog.zsec.uk/  \n\nhttp://www.rvrsh3ll.net/blog/  \n\nhttps://cybersyndicates.com/  \n\nhttps://blog.joelj.org/  \n\nhttp://threat.tevora.com/  \n\nhttp://www.netmux.com/  \n\nhttp://www.floyd.ch/  \n\nhttp://buffered.io/  \n\nhttps://jivoi.github.io/  \n\nhttp://amanda.secured.org/  \n\nhttps://ramblingcookiemonster.github.io/  \n\nhttp://bencane.com/  \n\nhttp://www.sixdub.net/  \n\nhttps://www.darknet.org.uk/  \n\nhttps://labs.mwrinfosecurity.com/  \n\nhttps://blog.kenaro.com/  \n\nhttp://bughunting.guide/  \n\nhttp://michaeldaw.org/  \n\nhttps://pentestlab.blog/  \n\nhttps://enigma0x3.net/  \n\nhttps://www.pentesterlab.com/  \n\nhttp://www.invoke-ir.com/  \n\nhttp://www.labofapenetrationtester.com/  \n\nhttp://subt0x10.blogspot.co.uk/  \n\nhttp://www.kitploit.com/  \n\nhttp://tk-blog.blogspot.com/  \n\nhttps://www.trustedsec.com/  \n\nhttps://room362.com/  \n\nhttps://www.corelan.be/  \n\nhttps://www.us-cert.gov/  \n\nhttps://holidayhackchallenge.com/    \n\nhttps://www.anthonys.io/  \n\nhttps://www.arbornetworks.com/blog/asert/  \n\nhttps://0x00sec.org/  \n\nhttp://blog.malwaremustdie.org  \n\nhttps://www.anquanke.com/  \n\nhttps://www.malware-traffic-analysis.net/  \n\nhttps://sec-wiki.com/  \n\nhttps://pastebin.com/  \n\nhttps://landave.io/  \n\nhttps://threatpost.com/  \n\nhttps://www.peppermalware.com/  \n\n\n\n\n\n# 工具官网\nhttps://portswigger.net/  \n\nhttps://wiki.wireshark.org/  \n\nhttp://w3af.org/  \n\nhttps://hashcat.net/  \n\nhttp://www.powershellempire.com/?page_id=561  \n\nhttps://blog.cobaltstrike.com/  \n\nhttps://www.metasploit.com/  \n\nhttps://www.netsparker.com/  \n\nhttps://www.bleepingcomputer.com/  \n\n\n\n# IDA插件  \nhttps://n0where.net/best-ida-plugins/  \n\n\n# IoT  \nhttps://arstechnica.com/security/  \nhttp://www.devttys0.com  \nhttps://github.com/nebgnahz/awesome-iot-hacks  \nhttps://www.exploitee.rs/index.php/Main_Page  \nhttps://iot.sec-wiki.com/  \n\n\n\n\n# hack   \nhttps://github.com/Hack-with-Github/Awesome-Hacking  \n\n# PPT\nhttps://www.slideshare.net/  \n\n# Chart\nhttps://github.com/SecWiki/sec-chart\n\n# Penetration Testing\nhttps://github.com/enaqx/awesome-pentest\nhttps://highon.coffee/blog/penetration-testing-tools-cheat-sheet/  \n\n\n# Wooyun\nhttps://superkieran.github.io/WooyunDrops/#!/  \nhttp://cb.drops.wiki/  \n\n\n# Kali\nhttps://github.com/tiancode/learn-hacking  \nhttp://www.hackfun.org/kali-tools/kali-tools-zh.html  \n\n# dictionary\nhttps://pan.baidu.com/s/1clxaCA  \n\n# OWASP\nhttps://www.owasp.org/index.php/Main_Page  \nhttps://www.owasp.org/index.php/OWASP_Internet_of_Things_Project  \n\n# Python for penetration testers\nhttps://vulnerablelife.wordpress.com/2017/05/13/python-for-penetration-testers/  \n\n# Honeypot\nhttps://github.com/SecWiki/ipot  \nhttps://ipot.sec-wiki.com/  \nhttps://sosly.me/index.php/2017/09/05/jymiguan2/  \n\n\n# WiFi Cracker\nhttps://github.com/brannondorsey/wifi-cracking    \nhttp://www.freebuf.com/articles/wireless/137641.html  \nhttps://klionsec.github.io/2015/04/14/aircrack-hascat/  \n\n# Radio\nhttp://www.hackrf.net/  \n\n# Vuln Linux渗透测试\nhttps://www.vulnhub.com/  \n\n# Metasploit \nhttp://uknowsec.cn/posts/skill/Meatsploit-Framework-%E5%88%A9%E7%94%A8%E6%80%BB%E7%BB%93.html  \n\n# DDOS\nhttp://uknowsec.cn/posts/skill/%E6%B5%85%E8%B0%88ddos%E7%9A%84%E6%B5%8B%E8%AF%95%E6%96%B9%E6%B3%95.html  \nhttp://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/  \nhttp://www.hackingarticles.in/dos-attack-packet-crafting-using-colasoft/  \nhttp://www.hackingarticles.in/dos-attack-penetration-testing-part-2/  \n\n\n# Sandbox\nhttps://www.hybrid-analysis.com/  \n\n# Shodan\nhttp://www.freebuf.com/sectool/121339.html  \n\n# 傻蛋联网搜索\nhttps://www.oshadan.com  \n\n# ZoomEye\nhttps://www.zoomeye.org/  \n\n# XMind 思维导图工具\nhttp://www.xmindchina.net/  \n\n# Exploit\nhttps://www.peerlyst.com/posts/the-best-resources-for-learning-exploit-development?trk=search_page_search_result  \n\n# PWNDBG\nhttps://github.com/pwndbg/pwndbg  \n\n# OFFICE MALWARE\nhttps://remnux.org/  \nhttps://r3mrum.wordpress.com/2017/06/29/analyzing-malicious-password-protected-office-documents/  \nhttps://dfir.it/blog/2015/06/17/analysts-handbook-analyzing-weaponized-documents/  \n\n# Software-Security-Learning\nhttps://github.com/CHYbeta/Software-Security-Learning  \n\n# Web-Security-Learning\nhttps://github.com/CHYbeta/Web-Security-Learning  \n\n# Python爬虫\nhttps://segmentfault.com/p/1210000009117809/read  \n\n\n# 黑客大会\nhttps://www.defcon.org/  \n\nhttp://www.blackhat.com/  \n\nhttp://www.securitybsides.com/  \n\nhttps://events.ccc.de/congress/  \n\nhttps://www.derbycon.com  \n\nhttp://phreaknic.info  \n\nhttp://shmoocon.org/  \n\nhttp://www.carolinacon.org/  \n\nhttps://chcon.nz  \n\nhttp://www.summercon.org/  \n\nhttps://2016.hack.lu/  \n\nhttps://conference.hitb.org  \n\nhttps://www.troopers.de  \n\nhttp://hack3rcon.org  \n\nhttp://thotcon.org/  \n\nhttp://www.layerone.org/  \n\nhttps://deepsec.net/  \n\nhttp://www.skydogcon.com/  \n\nhttp://secuinside.com  \n\nhttp://def.camp/  \n\nhttps://appsecusa.org/  \n\nhttp://brucon.org  \n\nhttp://www.infosecurityeurope.com/  \n\nhttp://nullcon.net/website/  \n\nhttps://www.rsaconference.com/  \n\nhttps://www.swisscyberstorm.com/  \n\nhttps://www.virusbulletin.com/conference/index  \n\nhttp://www.ekoparty.org  \n\nhttps://44con.com/  \n\nhttps://www.balccon.org  \n\nhttp://fsec.foi.hr  \n\nhttps://www.syscan360.org/  \n\nhttp://kcon.knownsec.com/  \n\n# 在线工具\nhttps://haveibeenpwned.com/  \n\nhttps://www.tineye.com/  \n\nhttp://ddecode.com/phpdecoder/?home  \n\nhttp://www.fuzzysecurity.com/links.html  \n\nhttps://crackstation.net/  \n\nhttp://www.objectif-securite.ch/  \n\n# Radare2\nhttps://www.megabeets.net/a-journey-into-radare-2-part-1/  \nhttps://www.megabeets.net/a-journey-into-radare-2-part-2/  \n\n# REMnux\nREMnux: A Linux Toolkit for Reverse-Engineering and Analyzing Malware\nhttps://remnux.org/  \n\n# Gnuradio\nhttp://eu2-dist.gnuradio.org/  \n\n# Malware Source\nhttps://github.com/mwsrc  \n\n# Cheat Sheet for Analyzing Malicious Software\nhttps://zeltser.com/malware-analysis-cheat-sheet/  \n\n# 知道工具之硬件路由相关\nhttps://mp.weixin.qq.com/s/QdiI66ZDsHj7MaMB6c88Ug  \n\n# Analyzing Malicious Documents Cheat Sheet\nhttps://zeltser.com/analyzing-malicious-documents/  \nhttps://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator  \n\n\n# Iot Exploit Tools\nhttps://www.attify-store.com/collections/frontpage/products/iot-security-exploitation-training-learning-kit  \n\n# Objective-C Reveser\nhttps://blog.fortinet.com/2017/09/19/rewriting-idapython-script-objc2-xrefs-helper-py-for-hopper\n\n# Metasploitbale2  \nhttps://sourceforge.net/projects/metasploitable/files/Metasploitable2/  \n\n# Shodan\nhttp://www.jianshu.com/p/ee22367303d5  \n\n# 蓝牙攻击基础篇  \nhttp://www.whitecell-club.org/?p=1524  \n\n# Kali Docker\nhttp://blog.csdn.net/u013814153/article/details/53925790  \n\n# DDoS\nhttp://www.freebuf.com/column/132782.html  \n\n"
  }
]