CS Workshop Hub
Please Read This Before Use:
The CyberSecurity Workshop Hub is intended for personal and educational use only.
Unauthorized use, reproduction, or distribution of this framework is prohibited. If you wish to utilize this resource for any purposes beyond personal use, please obtain prior written permission from me.
Thank you for respecting these terms.
Unauthorized use, reproduction, or distribution of this framework is prohibited. If you wish to utilize this resource for any purposes beyond personal use, please obtain prior written permission from me.
Welcome! Begin your cybersecurity exploration with these essential tools and guides.
📚 Learn More (Advanced Cybersecurity Tools & Resources)
Advanced Information Gathering
- Shodan
Search engine for discovering internet-connected devices and services worldwide. - Google Dorking
Advanced search techniques to uncover hidden information on websites. - Have I Been Pwned
Check if your email or passwords have been exposed in data breaches. - Hunter.io
Find and verify professional email addresses linked to websites.
Threat Detection
- VirusTotal Advanced search techniques to uncover hidden information on websites.
- SpiderFoot Automated OSINT tool for detecting vulnerabilities and gathering threat intelligence.
- theHarvester (Online) Email and domain harvesting tool for gathering intelligence on targets.
Network & Relationship Mapping
- Maltego Graph-based tool for visualizing relationships between online entities.
- Google Gruyere Web security sandbox for learning and testing web application vulnerabilities.
- Start Here
- Google Gruyere
Recon-ng
A powerful web reconnaissance tool with a modular framework for automation.Censys
Search engine for discovering internet-connected devices and vulnerabilities.Datasploit
Comprehensive tool for gathering intelligence on domains, IPs, and emails.FOCA
Metadata analyzer for extracting information from documents and servers.
AlienVault OTX
Open threat intelligence platform for detecting cyber threats in real-time.Cuckoo Sandbox
Automated malware analysis system for dynamic behavior analysis.YARA
Pattern-matching tool for identifying and classifying malware.
ReconDog
All-in-one reconnaissance tool for gathering target information.SpiderFoot HX
Enterprise version of SpiderFoot with cloud-based OSINT automation.SecurityTrails
Domain and IP intelligence tool for analyzing online assets.
Searchsploit
Offline access to Exploit Database for searching public exploits.ExploitDB
Archive of publicly available exploits and proof-of-concept code.Metasploit Framework
Penetration testing framework for developing and executing exploit code.
Hack The Box
Interactive cybersecurity training platform with real-world labs.TryHackMe
Beginner-friendly cybersecurity learning platform with guided tutorials.OWASP Top Ten
Industry-standard resource for identifying the most critical web app security risks.