|
| 1 | +<!-- Author : Rahul Indra --> |
| 2 | + |
1 | 3 | <!DOCTYPE html>
|
2 | 4 | <html>
|
3 | 5 | <head>
|
| 6 | +<!-- glitch CSS --> |
| 7 | +<linkhref="assets/css/core/glitch.css"rel="stylesheet"> |
| 8 | +<linkhref="https://fonts.googleapis.com/css?family=Niramit"rel="stylesheet"> |
4 | 9 | <title>d4rks0c1ety</title>
|
| 10 | +<linkrel="stylesheet"type="text/css"href="assets/css/core/dark.css"> |
5 | 11 | </head>
|
6 | 12 | <body>
|
7 |
| - |
8 |
| -<h1>Page Under Construction</h1> |
| 13 | +<scriptsrc="assets/js/animate.js"></script> |
| 14 | +<header> |
| 15 | +<divclass="glitch"> |
| 16 | +<h1>d4rks0c1ety</h1> |
| 17 | +<h1>d4rks0c1ety</h1> |
| 18 | +<h1>d4rks0c1ety</h1> |
| 19 | +</div> |
| 20 | +<br><br><br> |
| 21 | +<p>CTF Team of IIEST Shibpur</p> |
| 22 | +</header> |
| 23 | + |
| 24 | +<h2>Binary Exploitation</h2> |
| 25 | +<ul> |
| 26 | +<li><atarget="_blank"href="https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN">LiveOverflow Binary Hacking</a></li> |
| 27 | +<li><atarget="_blank"href="https://github.com/hsfareed/Resources-for-learning-ethical-hacking">Resources for Ethical Hacking</a></li> |
| 28 | +<li><atarget="_blank"href="http://security.cs.rpi.edu/courses/binexp-spring2015/">Modern Binary Exploitation</a></li> |
| 29 | +<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL038BE01D3BAEFDB0">Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li> |
| 30 | +<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PL8F8D45D6C1FFD177">Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li> |
| 31 | +<li><atarget="_blank"href="http://www.opensecuritytraining.info/Training.html">Advance Intel x86: Architecture, Assembly, Applications, & Alliteration</a></li> |
| 32 | +<li><atarget="_blank"href="https://www.youtube.com/playlist?list=PLUFkSN0XLZ-nXcDG89jS9iqKBnNHmz7Qw">Introduction to Reverse Engineering Software</a></li> |
| 33 | + |
| 34 | + |
| 35 | +</ul> |
| 36 | + |
| 37 | +<h2>Web Hacking</h2> |
| 38 | +<ul> |
| 39 | +<li><atarget="_blank"href="https://www.hacker101.com/"rel="nofollow">Hacker101-Web Hacking</a></li> |
| 40 | +<li><atarget="_blank"href="https://leaksource.files.wordpress.com/2014/08/the-web-application-hackers-handbook.pdf"rel="nofollow">The Web Application Hacker's Handbook</a></li> |
| 41 | +<li><atarget="_blank"href="https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents"rel="nofollow">OWASP Guide</a></li> |
| 42 | +</ul> |
| 43 | + |
| 44 | +<h2>War Games</h2> |
| 45 | +<ul> |
| 46 | +<li><atarget="_blank"href="https://io.netgarage.org/"rel="nofollow">IO Wargame</a></li> |
| 47 | +<li><atarget="_blank"href="http://pwnable.kr/"rel="nofollow">Pwnable KR</a></li> |
| 48 | +<li><atarget="_blank"href="https://pwnable.tw/"rel="nofollow">Pwnable TW</a></li> |
| 49 | +<li><atarget="_blank"href="http://overthewire.org/wargames/"rel="nofollow">OverTheWire</a></li> |
| 50 | +<li><atarget="_blank"href="http://reversing.kr/"rel="nofollow">Reversing KR</a></li> |
| 51 | +<li><atarget="_blank"href="http://w3challs.com/"rel="nofollow">W3Challs</a></li> |
| 52 | +<li><atarget="_blank"href="https://www.hackthebox.eu/"rel="nofollow">Hack the Box</a></li> |
| 53 | +<li><atarget="_blank"href="http://webhacking.kr/"rel="nofollow">WebHacking KR</a></li> |
| 54 | +</ul> |
| 55 | + |
9 | 56 | </body>
|
10 | 57 | </html>
|