Hackademic: Hacker Educational Resources
06 Dec 2021 • Written by ovabor
Hackademy: Hacker Educational Content
If you’re interested in learning about cybersecurity, computer science, privacy engineering, product design, product management, blockchain security and ethics then you’ve come to the right place.
This collection of resources is packed full of useful information that can help guide you on your journey into tech. So whatever your level of experience may be, there’s something here for everyone.
So what are you waiting for? Start exploring today!
Fundamentals of Cybersecurity and Computer Science
- Intro to Cybersecurity Click on Class
- Intro to Computer Science Click on Lecture Notes
- Computer Science: An Overview, 13th edition Texbook
- List of Free Python Resources
- Python Guide
- Python for Cybersecurity
- Python Basics
- Python Tutorials
- Introduction to the Command Line
- Linux Basics
- Intro to Git and GitHub
- Intro to JavaScript
- The Modern JavaScript Tutorial
- How to Read Research Papers
- How to Read a Scientific Paper
- A Framework for Writing Better Documentation
- Advanced Computer Science Resources
- Kansas State University Free Computer Science Textbooks
Computer Network and Security
- Networking Terminologies
- Intro to Computer Networks
- Computer & Network Security
- Advanced Topics in Computer Networking
- Theoretical Computer & Network Security
- Computer and Network Security
Web Application Development; Web Security; Secure Coding
- What Distinguishes Great Software Engineers?
- Visual Overview of Useful Skills for Web Developers
- Free Tools for Developers
- How to Build Good Software
- Principles of Secure Development
- Mozzila Web Development 101
- Working with Web APIs
- Intro to HTTP
- Intro to Web Development with MERN STACK
- Advanced Web Application Development
- Intro to Backend Engineering
- Frontend Developer Handbook
- Intro to Web Security
- Applied Web Security
- OWASP Web Top Ten
- OWASP API Top 10
- OWASP Code Review Guide
- OWASP Web Security Testing Guide
- OWASP Cheat Sheet Series
- Security Guide for Developers
- Google’s Code Review Developer Guide
- SonarSource Code Analyzers Rules Explorer
- LinkedIn School of Site Reliability Engineering
- A Distributed Systems Reading List
Ethics, Privacy Engineering and The Law of Computer Technology
- ACM Code of Ethics and Professional Conduct
- Ethical OS Risk Mitigation Checklist
- Letters to a Young Technologist
- Feynman’s Error: On Ethical Thinking and Drifting
- With Great Tech Comes Great Responsibility by Mozilla Foundation (2020)
- A Contextual Approach to Privacy Online
- Privacy Overview by Judith DeCew
- Privacy as Contextual Integrity
- Privacy Harms
- A Shortage of Privacy Engineers
- Privacy Engineering 101
- The Privacy Engineer’s Manifesto
- Privacy Engineering: Proactively Embedding Privacy, by Design
- A Video Course in Differential Privacy
- Differential Privacy: A Primer for a Non-Technical Audience
- The Promise of Differential Privacy A Tutorial on Algorithmic Techniques
- Differential Privacy Whitepaper by Cynthia Dwork
- No Free Lunch in Data Privacy
- A Taxonomy of Privacy
- XRay: Enhancing the Web’s Transparency with Differential Correlation
- A Methodology for Information Flow Experiments
- Privacy and Contextual Integrity: Framework and Applications
- Robust De-anonymization of Large Sparse Datasets
- The End of Trust from McSweeney’s and Electronic Frontier Foundation
- The Age of Surveillance Capitalism by Shoshana Zuboff
- A Design for Public Trustee and Privacy Protection Regulation
- Glossary of Privacy Terms
- Comparing Privacy Laws: GDPR v. CCPA by Data Guidance and Future of Privacy Forum
- General Data Protection Regulation (EU GDPR)
- Global Privacy Law and Data Protection Directory
- Global Comprehensive Privacy Law Mapping Chart
- A Researcher’s Guide to Some Legal Risks of Security Research
- Law of Computer Technology
- Law for Computer Scientists
- Computational Law
Mathematics, Data Structures, and Algorithims
- Why Do We Study Calculus? by Professor Eric Schechter
- Elementary Calculus: An Infinitesimal Approach
- Intro to Logic
- A Guide to Writing Mathematics by Dr. Kevin P. Lee
- Mathematical Foundations of Computing
- THE Most Common Errors in Undergraduate Mathematics
- How to Read and Do Proofs by Daniel Solow
- Introduction to the Theory of Computation by Anil Maheshwari and Michiel Smid
- Understanding Pure Mathematics
- Mathematical Proofs
- Discrete Math
- Data Structures
- Algorithms by Jeff Erickson Lecture Notes
- Algorithms by Jeff Erickson Free Textbook
- Tim Roughgarden Illuminated Lectures on Algrithims (Videos)
- Design & Analysis of Algorithims Lecture Notes
- Algorithms for Modern Hardware
- Logic Programming
- Physics and Mathematics Textbooks
- The Feynman Lectures on Physics Audio Collection
- Learn Quantum Computation using Qiskit
Programming Languages and Operating Systems
- Software Engineering at Google Textbook
- A Philosophy of Software Design by John Ousterhout
- Foundations of Software Engineering
- Software Design Studio
- IEEE Computer Society Software Engineering Body of Knowledge
- The Rust Programming Language
- Programming Languages
- Python to C++ Guide
- C++ Programming
- Programming Abstractions in C++ Textbook
- C++ Reference
- Brief Intro to C
- http://web.stanford.edu/class/cs107/, http://cs107e.github.io/, http://cs107e.github.io/guides/bom/ (Advanced C)
- Intro to Operating Systems
- Advanced Operating Systems
- Operating Systems: Principles and Practice (2nd Edition), by Thomas Anderson and Michael Dahlin (Operating Systems Textbook)
- Compilers
- Intro to Computer System Engineering
Database & Data Management
- SQL Basics
- Intro to SQL
- Introduction to SQL Textbook
- Data Management and Systems
- Advanced Database Systems
- A Deep Dive into Privacy-Protecting Databases
Cryptography, Smart Contract, DeFi and Blockchain Hacking
- Intro to Crytography
- Intermediate Cryptography
- Advanced Cryptography
- Intro to Cryptography Textbook
- Applied Cryptography Textbook
- A Mathematical Theory of Cryptography by Claude E. Shannon
- A Mathematical Theory of Communication by C. E. Shannon
- Communication Theory of Secrecy Systems by C. E Shannon
- Intro to Blockchain & Blockchain Security
- Blockchain Learning Path
- Decentralized Finance Developer Roadmap
- Blockchain Security Roadmap
- Smart Contract Security Resources
- Smart Contract Security Verification Standard
- Blockchain Ecosystem Reading List)
Mobile Development and Mobile Deveopment Security
- Applied iOS Development
- Applied Android Development
- Intro to i0s Development
- Intro to Android Development
- OWASP Mobile Top 10
- OWASP Mobile Security Testing Guide
Design, Ethics, Law, and Product Management
- Intro to Product Design
- Intermediate Product Design
- Human Computer Interaction
- Product Manager Nanodegree
- Agile Planning: From Ideas to Story Cards
- Agile Software Development Nanodegree
- Practical Security Stories and Security Tasks for Agile Development Environments
- Technology Ethics
- Law, Order & Algorithims
- Letters to a Young Technologist
Hands-on Hacking Resources
Below are lists of supplementary materials that are also useful:
- http://opengarages.org/handbook/ (Car Hackers Handbook by OpenGarages)
- https://github.com/florinpop17/app-ideas (Project Ideas for Developers)
- https://austinhenley.com/blog/morechallengingprojects.html (Advanced Project Ideas for Developers)
- https://github.com/The-Art-of-Hacking/h4cker (Art of Hacking)
- https://guidesmiths.github.io/cybersecurity-handbook/ (Guidesmiths Cybersecurity Handbook)
- https://drive.google.com/drive/folders/1YmHNVFCskkYXGILSdBQcFH2LBl26uENT (Security Engineering Free Textbooks)
- https://www.cl.cam.ac.uk/~rja14/book.html (Security Engineering Textbook)
- https://www.mandiant.com/resources/apt-groups (Advanced Persistent Groups)
- https://trailofbits.github.io/ctf/ (CTF Field Guide)
- https://www.hacker101.com/resources (Hacking Tools & Resources)
- https://pwn.college/ (Hands-on Hacking Resources)
- https://academy.hackthebox.com/ (Hands-on Hacking Resources)
- https://picoctf.org/ (Hands-on Hacking Resources)
- https://ctf101.org/ (Hands-on Hacking Resources)
- https://courses.openmined.org/ (Privacy Engineering 101)
- https://hubs.la/H0wTv9_0 (Rangeforce Cybersecurity Training)
- https://www.fireeye.com/blog/threat-research/2016/08/embedded_hardwareha.html (Hardware Hacking 101)
- https://users.umiacs.umd.edu/~tdumitra/courses/ENEE757/Fall15/misc/gdb_tutorial.html (Reverse engineering using GDB)
- https://crackmes.one/ and http://reversing.kr/ (Hands-on Reverse Engineering Resources)
- https://github.com/onethawt/reverseengineering-reading-list/blob/master/README.md (Reverse Engineeering Reading List)
- https://github.com/RPISEC/MBE (Binary Exploitation Resources)
- https://github.com/shellphish/how2heap (Heap Exploitation Resources)
- https://beginners.re/ (Reverse Engineering for Beginners)
- https://www.fuzzysecurity.com/tutorials.html (Exploit Developmenet Tutorials)
- https://portswigger.net/daily-swig/adversarial-attacks-against-machine-learning-systems-everything-you-need-to-know (Intro to Adversarial Machine Learning)
- https://personal.utdallas.edu/~muratk/courses/adv-ml-19f.html (Adversarial Machine Learning 101)
- https://www.comp.nus.edu.sg/~reza/courses/cs6231/ (Adversarial Machine Learning 101)
- http://adversarial-ml-tutorial.org/introduction/ (Adversarial Machine Learning Tutorial)
- https://github.com/yenchenlin/awesome-adversarial-machine-learning (Adversarial Machine Learning Resources)
- https://nicholas.carlini.com/writing/2018/adversarial-machine-learning-reading-list.html (Adversarial Machine Learning Resources)
- https://users.ece.cmu.edu/~lbauer/proj/advml.php (Introduction to adversarial robustness)
- https://evademl.org/ (Evade ML)
- https://aaai18adversarial.github.io/index.html (Adversarial Machine Learning Tutorials)
- https://openai.com/blog/adversarial-example-research/ (OpenAI Adversarial Machine Learning Research)
- https://deepai.org/machine-learning-glossary-and-terms/adversarial-machine-learning (DeepAI Adversarial Machine Learning 101)
- http://ai.googleblog.com/2018/09/introducing-unrestricted-adversarial.html (Adversarial Machine Learning)
- https://machinelearningmastery.com/what-are-generative-adversarial-networks-gans/ (Adversarial AI)
- https://www.accenture.com/us-en/insights/artificial-intelligence/adversarial-ai (Adversarial AI)
- https://iq.opengenus.org/adversarial-machine-learning/ (Adversarial AI)
- https://gangw.cs.illinois.edu/class/cs463/463.3.2-Adversarial-Machine-Learning.pdf (Adversarial AI)
- http://adversarial-learning.princeton.edu/ (Adversarial AI)
- https://www.turing.ac.uk/research/research-projects/adversarial-machine-learning (Adversarial AI)
- https://www.cybered.io/webinars/adversarial-machine-learning-for-fraud-detection-how-organizations-w-480 (Adversarial AI)
- https://securityboulevard.com/2020/08/live-from-black-hat-practical-defenses-against-adversarial-machine-learning-with-ariel-herbert-voss/ (Adversarial AI)
- https://cyber.harvard.edu/story/2020-07/legal-risks-adversarial-machine-learning-research (Adversarial AI)
- https://www.hacksplaining.com/ (Learn to Hack)
- https://www.hackerone.com/blog/100-hacking-tools-and-resources (100 Hacking Tools)
- https://www.whiteoaksecurity.com/2020-3-19-apple-ios-13-device-setup-for-penetration-testing/ (iOS Hacking Setup)
- https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/blob/master/assets/tools.md (Bug Bounty 101)
- https://github.com/tadwhitaker/Security_Engineer_Interview_Questions/blob/master/security-interview-questions (Interview Prep- InfoSec)
- https://github.com/gracenolan/Notes/blob/master/interview-study-notes-for-security-engineering.md (Interview Prep InfoSec)
- https://github.com/trimstray/the-book-of-secret-knowledge (Hacking Toolsets)
- http://timroughgarden.org/f18/f18.html (Game Theory)
- https://github.com/saeidshirazi/awesome-android-security
- AI EXpert Roadmap
- Technical Debt as a Lack of Understanding
- Introduction to Embedded Linux Security - Part 1
- https://github.com/shellphish/how2heap
- https://thatcomputerscientist.com/big-o-notation-explained-as-easily-as-possible
- https://github.com/jwasham/coding-interview-university
- https://mtlynch.io/code-review-love/
- https://arxiv.org/abs/1205.5935
- https://wiki.mozilla.org/Fingerprinting
- https://phiresky.github.io/blog/2021/hosting-sqlite-databases-on-github-pages/
- https://www.unibw.de/patch/papers/usenixsecurity20-wasm.pdf
- https://github.com/google/fully-homomorphic-encryption
- https://t.co/DJa7VEV4oH
- https://arxiv.org/abs/2105.04026
- https://github.com/Zeyad-Azima/Offensive-Resources
- https://github.com/CyberSecurityUP/Awesome-Cloud-PenTest
- https://gamehacking.academy/GameHackingAcademy.pdf (Game Hacking Guide)
- https://github.com/riramar/Web-Attack-Cheat-Sheet
- https://github.com/shieldfy/API-Security-Checklist
- https://www.kitploit.com/2021/11/gotanda-browser-web-extension-for-osint.html
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://www.codereversing.com/blog/archives/420
- https://github.com/evanRubinsteinIT/BugBounty-Oneliners
- https://bishopfox.com/blog/pen-testing-tools-2021?utm_source=twitter&utm_medium=ownedsocial&utm_campaign=2021IndustryBlogs (Pentesting Tools)
- https://github.com/hoodoer/endgame
- https://bishopfox.com/blog/set-up-your-hardware-security-lab?utm_source=twitter&utm_medium=social&utm_campaign=owned_2021_socialmisc
- J.C. Cannon. Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. IAPP: 2014.
- Axel van Lamsweerde (2009). Requirements Engineering: From System Goals to UML Models to Software Specifications, New Jersey: John Wiley & Sons, Inc.
- Research Methods in Human-Computer Interaction, 2nd edition. (Links to an external site.) Jonathan Lazar, Jinjuan Heidi Feng, Harry Hochheiser, 2017.
Code
$ Through efforts you can be
$ L33T.
Link
Blockquote
“Knowing is not enough; we must apply. Willing is not enough; we must do.” - Johann Wolfgang von Goethe