40 lines
1.5 KiB
Markdown
40 lines
1.5 KiB
Markdown
# ghost ⚡ by CodexScrolls × NoirStack
|
||
|
||
> A deliberately organized mess of hacking, pentesting, and security resources.
|
||
> Built for people who read manuals *and* void warranties.
|
||
|
||
This archive curates books, labs, tools, and learning paths. Entries note format (📖 free / 📕 paid) and source links. We keep it current; you keep it sharp.
|
||
|
||
## What’s inside
|
||
- Learning the Skills
|
||
- YouTube / Conference archives
|
||
- Reverse Engineering & Exploit Dev
|
||
- Privilege Escalation
|
||
- Recon/Scanning
|
||
- Malware Analysis
|
||
- Vulnerable Apps & OS
|
||
- Exploit Databases
|
||
- Communities & News
|
||
- Tooling (see `tools.md`)
|
||
|
||
## How to use this repo
|
||
- **Browse**: start with “Learning the Skills,” then pick a lane.
|
||
- **Search**: use your browser’s search over this README and `tools.md`.
|
||
- **Contribute**: add resources in alphabetical order; keep descriptions tight.
|
||
|
||
## House rules (a.k.a. the “don’t make it weird” section)
|
||
- Use only with permission and good sense.
|
||
- Test on systems you own or where you have written authorization.
|
||
- If your weekend project becomes a headline, that’s… not on us.
|
||
|
||
## Contributing
|
||
Read `contributing.md`, then open a PR. Dry humor welcome; link rot not.
|
||
|
||
—
|
||
*Produced by NoirStack for the CodexScrolls community. We map the labyrinth so you can run it faster.*
|
||
|
||
## Use with intent
|
||
This archive exists for research, professional practice, and the joy of pulling threads.
|
||
Operate with consent and competence. If your experiments wake up incident response, that’s a lesson — not a liability transfer.
|
||
|