# ghost ⚡ by CodexScrolls × NoirStack > A deliberately organized mess of hacking, pentesting, and security resources. > Built for people who read manuals *and* void warranties. This archive curates books, labs, tools, and learning paths. Entries note format (📖 free / 📕 paid) and source links. We keep it current; you keep it sharp. ## What’s inside - Learning the Skills - YouTube / Conference archives - Reverse Engineering & Exploit Dev - Privilege Escalation - Recon/Scanning - Malware Analysis - Vulnerable Apps & OS - Exploit Databases - Communities & News - Tooling (see `tools.md`) ## How to use this repo - **Browse**: start with “Learning the Skills,” then pick a lane. - **Search**: use your browser’s search over this README and `tools.md`. - **Contribute**: add resources in alphabetical order; keep descriptions tight. ## House rules (a.k.a. the “don’t make it weird” section) - Use only with permission and good sense. - Test on systems you own or where you have written authorization. - If your weekend project becomes a headline, that’s… not on us. ## Contributing Read `contributing.md`, then open a PR. Dry humor welcome; link rot not. — *Produced by NoirStack for the CodexScrolls community. We map the labyrinth so you can run it faster.* ## Use with intent This archive exists for research, professional practice, and the joy of pulling threads. Operate with consent and competence. If your experiments wake up incident response, that’s a lesson — not a liability transfer.