Cyber Security

Tools and Resources

Computers were invented by a gay man to stop a war...

There are tons of resources online for Cyber-Security. The issue can be knowing which ones are legitimate and which ones are not. Thankfully, some of the best resources have been found for us. Some of the most used are below.

The Exploit Database

The Offensive Security Website

Kali Linux Home

The Exploit Database is a collection of exploits that have been found, tested, and reported to who it concerns before being posted. If you use a lot of different technologies (apps on phone, programs on PC, etc.) then you are open to attacks from hackers. In other words, the more you make a digital footprint (not encrypted) the more likely you are to get caught up in a hack.

Anyone who may be interested in learning more about Cyber Security, check out the Offensive Security website. They offer free Virtual Machines for you to practice with, as well as a free course in using Metasploit.

Kali Linux is a Linux distro that is made for Ethical Hackers and other Cyber-Security professionals. If you have never used Linux before I do not recommend starting off with Kali because it is a specialized, Debian-based, distro. There are countless Linux distros out there, but there are a few 'main' ones such as, Ubuntu, Fedora, Arch Linux, and more. I recommend trying out one of these, getting comfortable with using the command line and the rest of the operating system before installing Kali Linux.

That being said, if you are going to install Kali Linux you should ONLY download the images from

  • NVD

    • The National Vulnerability Database. Lists known vulnerabilities and explains how to fix them.

  • Mitre

    • Similar to the NVD, Mitre will present you with references about the vulnerability you searched

  • CVE Search

    • If you find a vulnerability that already has a CVE number, just search it with Google.

  • VirusTotal

    • A powerful website/application that allows you to search URLs, Files you have uploaded and more for any reports of malicious activity. For example, if you receive an email that seem legitimate and contains a hyperlink, you can search that URL on VirusTotal before clicking on it to see if it, or anything connected to it, has been reported as malicious