### Online / OSR [DNSDumpster](https://dnsdumpster.com/) [Any Run](https://app.any.run/) [Spamhaus](https://www.spamhaus.org/) [who is](https://www.whois.com/whois/) [Hybrid Analysis](https://www.hybrid-analysis.com/) [Joe Sandbox](https://www.joesandbox.com/#windows) [CrackStation](https://crackstation.net/) [Malware Hash Registry](https://hash.cymru.com/) [VirusTotal](https://www.virustotal.com/gui/home/upload) [AlienVault](https://otx.alienvault.com/) [wappalyzer](https://www.wappalyzer.com/) [virus exchange](https://virus.exchange/) [cmd obfuscation](https://argfuscator.net/about.html) ### Forensics / malware analysis [Kroll Artifact Parser And Extractor - Kape](https://www.sans.org/tools/kape/) [x64dbg](https://x64dbg.com/#start) [Ghidra](https://ghidra-sre.org/) [Binary Ninja](https://binary.ninja/) [IDA Pro](https://hex-rays.com/ida-pro) [Detect it Easy](https://github.com/horsicq/Detect-It-Easy) [EZ Tools](https://www.sans.org/tools/ez-tools/) [PE Bear](https://github.com/hasherezade/pe-bear) [Process Hacker](https://processhacker.sourceforge.io/) [Autopsy](https://www.autopsy.com/) [Hxd](https://mh-nexus.de/en/hxd/) [Cheatengine](https://www.cheatengine.org/) [vx-underground](https://vx-underground.org/) [binwalk](https://www.kali.org/tools/binwalk/) [the zoo](https://github.com/ytisf/theZoo) ### training [Maldev Academy](https://maldevacademy.com/) [Immersive labs](https://www.immersivelabs.com/) [picoCTF](https://picoctf.org/) [GuidedHacking](https://guidedhacking.com/) [Crack me one](https://crackmes.one/) [cracking software legally](https://google.com) [leet code](https://leetcode.com/) [mastering Malware Analysis](https://www.amazon.com/Mastering-Malware-Analysis-practical-cybercrime/dp/1803240245) [red team guide](https://redteam.guide/) [microcorruption](https://microcorruption.com/) ### GIS [White Box Tools](https://www.whiteboxgeo.com/manual/wbt_book/preface.html) [qgis](https://www.qgis.org/) ### development [Windows system error codes](https://learn.microsoft.com/en-us/windows/win32/debug/system-error-codes--0-499-) [EntropyReducer](https://github.com/Maldev-Academy/EntropyReducer) [Cubic](https://github.com/PJ-Singh-001/Cubic) [windows script](https://christitus.com/windows-tool/) [Win API cheatsheet](https://github.com/7etsuo/windows-api-function-cheatsheets) ### reporting [The Hive](https://github.com/TheHive-Project/TheHive) [Iris](https://github.com/dfir-iris/iris-web) ### web vuln testing [whatweb](https://morningstarsecurity.com/research/whatweb) [recon-ng](https://github.com/lanmaster53/recon-ng) [spyhunt](https://github.com/gotr00t0day/spyhunt) [GRPCurl](https://github.com/fullstorydev/grpcurl) ### social OSR [sherlock](https://www.kali.org/tools/sherlock/) ### sailing the seas [Yt dl](https://github.com/yt-dlp/yt-dlp?tab=readme-ov-file)