Various resources (not sorted)

This is how you install C/C++ on VS Code PROPERLY for Visual Studio Code
Data Breaches ebook (31 pgs) - interesting article
Insecurity Magazine - A news site for cyber attacks and threat intelligence
History of the Internet - just an interesting read
OPTE - an internet endpoint map that shows an visual representation of the internet, super cool
What is the end to end principle? - internet architecture yt video
History of OSI (and TCP/IP) - interesting read about how the internet was formed
Reverse shell command templates
Advent of Code - coding challenges
libgen.is - FREE textbooks and PDFs
netresec - PCAPS
MAWILab - anomalous PCAPS
Router Passwords - lookup default router passwords
Using fdisk and parted for drive partitioning
Primary partition explained
Extended and Logical partitions explained
Swap space in Linux
x86 Assembly in 10 mins
An intro to x86-64 reverse engineering
Assembly Instruction Reference
Intro to Hexadecimals
Video about breaking rsa
Regex 101
Fortran
Wikibooks
Considered Harmful?
Data Encapsulation between Layer 2-4
TCP Protocol Articles
Differences between TLS1.2 and TLS1.3
All TLS versions
Wireshark docs
tshark/wireshark Filter Documentation
Weird trick to install a Win10 iso
Huge directory of protocol standards
Build SIEM with suricata and elastic stack on Ubuntu
Documentation of protocol fields inside zeek logs
Open source malware framework
Malware blog posts
Malicious malware registry
Stupid cyber chef
Javascript obfuscation blog1
Javascript obfuscation remover
2 mins on JavaScript Deobfuscation
Website scanner for malicious URLs
Heaven’s Gate blog1
Heaven’s Gate blog2
B64 explained
tcpdump tl:dr
Informational comics about cybersec COOL
Stacktrace visualisers
Linux weekly news
Really good WebAPI directory
CSS styler
tshark -G howto
Tab space in markdown
pcap-filter’s ip.proto names to numbers registry
http status code registry
Protocol Registries
tshark beginners pt1
tshark beginners pt2
tshark beginners pt3
tshark docs rabbit hole
wireshark docs tcp comments explanation
tcp.completeness blog1
tcp.completeness blog2
pcaps are literally just xml pages
Cool website about cargo ships
arp blog1
IP Encapsulation
LITERALLY a pcap registry
tcp PSH blog1
tcpdump dns1
scapy online terminal
scapy intro blog
List ls with full path name in linux
scapy http injector blog
scapy arp spoofe blog
File uploader, no limits
zeek scripting start
gzip video1
OSINT blog1
Wifi network maps and database
Image detail remover for reverse image search
OSINT links
Fox-it cybersec blogs
Exabeam kill chain
Unified kill chain
MITRE kill chain
Lockheed Martin kill chain
Chosen Plaintext Attack wiki
Incidents of Compromise blog1
Weird CISA software for ransomware assessment
IC3 PSAs
Korean Virustotal
Russian Cyberthreat Live Map
MITRE attack tactics
Temp mail with inbox
SSL Digital Certificate lookup
Linux bash command list
KrebsonSecurity top security blogs
Floating point numbers in base8
Differences between bash and zsh
URL/malware analysis
EU Vulnerability Database
Flame malware source code
arwin tool
Shellcoding 101
Metasploit
Snort web rule creator
Colorless green ideas sleep furiously
Shellcoding for Linux and windows tutorial
C code to get address of command in kernel.dll
lcc-win
CAPEC.Mitre IOC/attack technique lookup
Analysing the simplest C++ program
Hackaday, engineering newsletter
YT networking for hackers
IPinfo regsitry
AWS Best Practices for DDOS resiliancy
Free online Linux remote vms for almost every distro
AWK tutorial
CVE lookup for vulnerability scanners
Online OpenVAS/Greenbone client
labex.io labs
Network+ Practice Test Questions
Subnetting game
Crypto Challenges
OSI Model
Wikipedia Get My IP
Google DNS lookup
Wireshark Tutorial: Display Filter Expressions
Wireshark Tutorial: Identifying Hosts and Users
Wireshark Tutorial: Exporting Objects From a Pcap
IMF Wireshark blog
Threatfox IOC database
Cyber Kill Chain vid
picoCTF
VulnHub
Overthewire Linux CTFs
Underthewire Powershell
Online CTFs