> A deliberately organized mess of hacking, pentesting, and security resources.
> Built for people who read manuals *and* void warranties.
This archive curates books, labs, tools, and learning paths. Entries note format (📖 free / 📕 paid) and source links. We keep it current; you keep it sharp.
## What’s inside
- Learning the Skills
- YouTube / Conference archives
- Reverse Engineering & Exploit Dev
- Privilege Escalation
- Recon/Scanning
- Malware Analysis
- Vulnerable Apps & OS
- Exploit Databases
- Communities & News
- Tooling (see `tools.md`)
## How to use this repo
- **Browse**: start with “Learning the Skills,” then pick a lane.
- **Search**: use your browser’s search over this README and `tools.md`.
- **Contribute**: add resources in alphabetical order; keep descriptions tight.
## House rules (a.k.a. the “don’t make it weird” section)
- Use only with permission and good sense.
- Test on systems you own or where you have written authorization.
- If your weekend project becomes a headline, that’s… not on us.
## Contributing
Read `contributing.md`, then open a PR. Dry humor welcome; link rot not.
—
*Produced by NoirStack for the CodexScrolls community. We map the labyrinth so you can run it faster.*