A deliberately organized mess of hacking, pentesting, and security resources.
Go to file
Hira Barton 52329f41ca Add LICENSE 2025-08-08 08:59:02 +00:00
LICENSE Add LICENSE 2025-08-08 08:59:02 +00:00
README.md Update README.md 2025-08-08 08:49:22 +00:00
contributing.md Add contributing.md 2025-08-08 08:47:37 +00:00
tools.md Add tools 2025-08-08 08:45:12 +00:00

README.md

ghost by CodexScrolls × NoirStack

A deliberately organized mess of hacking, pentesting, and security resources.
Built for people who read manuals and void warranties.

This archive curates books, labs, tools, and learning paths. Entries note format (📖 free / 📕 paid) and source links. We keep it current; you keep it sharp.

Whats inside

  • Learning the Skills
  • YouTube / Conference archives
  • Reverse Engineering & Exploit Dev
  • Privilege Escalation
  • Recon/Scanning
  • Malware Analysis
  • Vulnerable Apps & OS
  • Exploit Databases
  • Communities & News
  • Tooling (see tools.md)

How to use this repo

  • Browse: start with “Learning the Skills,” then pick a lane.
  • Search: use your browsers search over this README and tools.md.
  • Contribute: add resources in alphabetical order; keep descriptions tight.

House rules (a.k.a. the “dont make it weird” section)

  • Use only with permission and good sense.
  • Test on systems you own or where you have written authorization.
  • If your weekend project becomes a headline, thats… not on us.

Contributing

Read contributing.md, then open a PR. Dry humor welcome; link rot not.

Produced by NoirStack for the CodexScrolls community. We map the labyrinth so you can run it faster.

Use with intent

This archive exists for research, professional practice, and the joy of pulling threads.
Operate with consent and competence. If your experiments wake up incident response, thats a lesson — not a liability transfer.