### Online / OSR
[DNSDumpster](https://dnsdumpster.com/)
[Any Run](https://app.any.run/)
[Spamhaus](https://www.spamhaus.org/)
[who is](https://www.whois.com/whois/)
[Hybrid Analysis](https://www.hybrid-analysis.com/)
[Joe Sandbox](https://www.joesandbox.com/#windows)
[CrackStation](https://crackstation.net/)
[Malware Hash Registry](https://hash.cymru.com/)
[VirusTotal](https://www.virustotal.com/gui/home/upload)
[AlienVault](https://otx.alienvault.com/)
[wappalyzer](https://www.wappalyzer.com/)
[virus exchange](https://virus.exchange/)
[cmd obfuscation](https://argfuscator.net/about.html)
### Forensics / malware analysis
[Kroll Artifact Parser And Extractor - Kape](https://www.sans.org/tools/kape/)
[x64dbg](https://x64dbg.com/#start)
[Ghidra](https://ghidra-sre.org/)
[Binary Ninja](https://binary.ninja/)
[IDA Pro](https://hex-rays.com/ida-pro)
[Detect it Easy](https://github.com/horsicq/Detect-It-Easy)
[EZ Tools](https://www.sans.org/tools/ez-tools/)
[PE Bear](https://github.com/hasherezade/pe-bear)
[Process Hacker](https://processhacker.sourceforge.io/)
[Autopsy](https://www.autopsy.com/)
[Hxd](https://mh-nexus.de/en/hxd/)
[Cheatengine](https://www.cheatengine.org/)
[vx-underground](https://vx-underground.org/)
[binwalk](https://www.kali.org/tools/binwalk/)
[the zoo](https://github.com/ytisf/theZoo)
### training
[Maldev Academy](https://maldevacademy.com/)
[Immersive labs](https://www.immersivelabs.com/)
[picoCTF](https://picoctf.org/)
[GuidedHacking](https://guidedhacking.com/)
[Crack me one](https://crackmes.one/)
[cracking software legally](https://google.com)
[leet code](https://leetcode.com/)
[mastering Malware Analysis](https://www.amazon.com/Mastering-Malware-Analysis-practical-cybercrime/dp/1803240245)
[red team guide](https://redteam.guide/)
[microcorruption](https://microcorruption.com/)
### GIS
[White Box Tools](https://www.whiteboxgeo.com/manual/wbt_book/preface.html)
[qgis](https://www.qgis.org/)
### development
[Windows system error codes](https://learn.microsoft.com/en-us/windows/win32/debug/system-error-codes--0-499-)
[EntropyReducer](https://github.com/Maldev-Academy/EntropyReducer)
[Cubic](https://github.com/PJ-Singh-001/Cubic)
[windows script](https://christitus.com/windows-tool/)
[Win API cheatsheet](https://github.com/7etsuo/windows-api-function-cheatsheets)
### reporting
[The Hive](https://github.com/TheHive-Project/TheHive)
[Iris](https://github.com/dfir-iris/iris-web)
### web vuln testing
[whatweb](https://morningstarsecurity.com/research/whatweb)
[recon-ng](https://github.com/lanmaster53/recon-ng)
[spyhunt](https://github.com/gotr00t0day/spyhunt)
[GRPCurl](https://github.com/fullstorydev/grpcurl)
### social OSR
[sherlock](https://www.kali.org/tools/sherlock/)
### sailing the seas
[Yt dl](https://github.com/yt-dlp/yt-dlp?tab=readme-ov-file)