Martian Defense NoteBook
CtrlK
  • Martian Defense Notebook
  • Training and Career
    • Keeping it Real for Beginners
    • Cybersecurity Domains
    • Reading and Repos
    • Media
    • Guides
      • Cybersecurity Roadmaps
      • Cybersecurity Training Topics
      • AppSec Training Pathway
      • Resume and Interview Guide
      • Systems Exploitation & Malware Development
    • Platforms
      • General
      • Offensive Security
      • Defensive Security
      • CTF Sites
      • Live Vulnerable Sites
  • Technical Resources
    • Application Security
    • Recon + OSINT
      • Internal Active Recon
    • Offensive-Cybersecurity
      • General
      • Infrastructure Pentesting
      • Cloud Pentesting
      • Wordlists
      • Social Engineering
      • Mobile Pentesting
      • Container Security
      • Blockchain
    • Defensive-Cybersecurity
    • General Cybersecurity
      • Cybersecurity Operating Systems
    • Coding/Programming
    • Reverse Engineering
    • AI for cybersecurity
  • Notes
    • Product Security Engineering
      • DevSecOps
        • Docker
          • How to Dockerize Applications with Docker Compose (Using SQLite and Flask)
      • SAST/SCA
        • How to setup a GitHub Action for Code Security analysis
        • JavaScript Security Analysis
        • Java Security 101
        • Tools
        • CodeQL for Beginners
      • Product Security Hardening
      • Threat Modeling
      • PHP Security
      • Product Security Governance
        • Controversial Subjects
          • Redis License Compliance in 2025
    • AppSec Testing
      • Checklists
        • WEB APP PENTESTING CHECKLIST
        • API Testing Checklist
        • Android Pentesting Checklist
        • IoS Pentesting Checklist
        • Thick Client Pentesting Checklist
        • Secure Code Review Checklist
      • Targeted Test Cases
        • Part 1
        • Part 2
      • Common Web Attack and Prevention List
      • Ports and associated Vectors
      • DNS
      • Web Tools
      • Command Injection Testing
      • JWTs and JSON
    • Security Research
      • Publishing CVEs
      • Shodan Dork Cheatsheet
      • Github Dorks
      • Bug Bounty
        • Bug Bounty Programs
      • CVE Hunting Python Repos with VulnHunter
    • Coding/Programming
      • Secure Coding Practices Checklist
      • JavaScript
      • Python
        • Quick Notes
        • Python Basics for Pentesters
        • Python Snippets
        • XML Basics with Python
      • Golang
        • Theory
        • Security
        • Modules
        • Entry Points
        • File Forensics
        • Cryptography and Encoding
        • Golang Snippets
      • PHP
        • Setup
        • Syntax
        • Variables and Data Types
        • Control Structures
        • Arrays
        • Functions
        • OOP Concepts
        • Database Integration
        • Handling HTTP Methods
        • Session Management
        • File Uploads
        • Email Function
        • Error Handling
        • Advanced Topics and Best Practices
      • Packaging and Automation of Docker Linux Apps
    • Network Security
      • Domain Trust Enumeration
      • Bleeding Edge Vulnerabilities
      • Post-Exploitation
      • Access Control Lists and Entries (ACL & ACE)
      • Credentialed Enumeration
      • Password Attacks
        • Internal Password Spraying
        • Remote Password Attacks
        • Linux Local Password Attacks
        • Windows Local Password Attacks
        • Windows Lateral Movement
      • PowerView
      • Pivoting, Tunneling and Forwarding
        • Advanced Tunneling Methods
        • Dynamic Port Forwarding (SSH + Socks)
        • Port Forwarding Tools
        • SoCat
      • Linux Privilege Escalation
      • Windows Privesc
        • OS Attacks
        • Windows User Privileges
        • Windows Group Privileges
        • Manual Enumeration
        • Credential Theft
      • Kerberos Attacks
        • Kerberos Quick Reference Sheet
      • Pentesting JumpCloud vs Active Directory (AD) vs Azure ADDS
    • Cloud Security Testing
    • Offensive Security
      • Red Team Infrastructure
      • Red Team OPSEC Playbook
    • Defensive Security
      • Splunk
        • Basic Queries
        • Dashboards
      • Forensics
        • Volatility
      • WireShark filters
    • Governance, Risk, Compliance
      • Vulnerability Management Lifecycle
    • Capture-the-Flag Training
      • Vulnerable Machine Checklist
      • Reverse Engineering Checklist
      • Mobile Checklist
      • Forensics Checklist
      • Binary Exploitation
      • Cryptography Checklist
    • Reporting
    • Common System Task Info
      • IT Tasks
      • Linux Basics
      • PowerShell
  • Digital Privacy
    • Personal Information Removal Services
    • Privacy-Focused DNS Configuration Guides
      • Private and Secure DNS with Pi-hole and Unbound
        • DNS Leak Prevention and Firewall Configuration
      • Configuring DoT with Unbound and Pi-hole on OPNsense
      • Forwarding Mode Explained: Forward Queries to Upstream DNS Server (Optionally with DNS-over-TLS)
    • Public DNS Services
    • Privacy and Opsec Resources
      • Martian's Stack
      • De-Googling Android
    • Self-Hosting
      • Proxmox VE
        • Proxmox Update Setup Guide
        • Enable and test Wake-on-LAN (WOL)
        • Remotely Unlocking LUKS-Encrypted Proxmox with Dropbear SSH at Boot
        • Idle Proxmox Auto-Shutdown
      • Secure Remote Access with TailScale + Hardened SSH
        • Expose the Web UI over Tailnet
      • Remote Unlock of LUKS-Encrypted Root Disk via SSH
      • Git
        • Hosting Gitea & Forgejo with Docker, Nginx, and Cloudflare Proxy
      • Two-VPS Private Proxy Architecture: Nginx Reverse Proxy Over Wireguard VPN
    • Monero Mining Guide
    • Android OSes
  • Cyber Entreprenuership
    • Entrepreneurship Roadmaps
      • Consulting
      • Starting a Business
    • Open Source Business & SaaS Tools
Powered by GitBook
On this page
  1. Training and Career

Media

Absolute AppSec

Adventures of Alice and Bob by BeyondTrust

Cyber Security Sauna

Darknet Diaries

Hacking Humans

Malicious Life by Cybereason

Naked Security Podcast by SOPHOS

OWASP Podcast

Security Weekly

Smashing Security

Social-Engineer Podcast

The 443 Security Simplified

The Cyber Queens Podcast

The Cyber Tap (Purdue cyberTAP)

The Hacker Chronicles Podcast by Tenable

The Hacker Mind

The H4unt3d Hacker

The Shared Security Show

What The Shell

Modem Mischief

Click here by RecordedFuture

Hacked

DFIRScience

HackerOne videos

InsiderPhD

Series for new bug hunters

Jhaddix

IppSec Channel - Hack The Box Writeups

LiveOverflow - Explore weird machines...

GynvaelEN - Podcasts about CTFs, computer security, programing and more

John Hammond - Wargames and CTF writeups

Murmus CTF - Weekly live streamings

PwnFunction

OJ Reeves

Hacksplained - A Beginner Friendly Guide to Hacking

STÖK

Defcon

Hackersploit

The Cyber Mentor

Nahamsec

Hackerone

The Hated one

stacksmashing / Ghidra Ninja

Hak5

Professor Messer

BlackPerl

Hack eXPlorer

Peter Yaworski

Security Weekly

MalwareTechBlog

DFIRScience

PreviousReading and ReposNextGuides

Last updated 10 months ago