Skip to content

CS Workshop Hub

Please Read This Before Use:

The CyberSecurity Workshop Hub is intended for personal and educational use only.
Unauthorized use, reproduction, or distribution of this framework is prohibited. If you wish to utilize this resource for any purposes beyond personal use, please obtain prior written permission from me.

Thank you for respecting these terms.

Welcome! Begin your cybersecurity exploration with these essential tools and guides.
📚 Learn More (Advanced Cybersecurity Tools & Resources)
🔍 Information Gathering

Advanced Information Gathering

  • Shodan
    Search engine for discovering internet-connected devices and services worldwide.
  • Google Dorking 
    Advanced search techniques to uncover hidden information on websites.
  • Have I Been Pwned
    Check if your email or passwords have been exposed in data breaches.
  • Hunter.io
    Find and verify professional email addresses linked to websites.
🛡️ Threat Detection

Threat Detection

  • VirusTotal Advanced search techniques to uncover hidden information on websites.
  • SpiderFoot Automated OSINT tool for detecting vulnerabilities and gathering threat intelligence.
  • theHarvester (Online) Email and domain harvesting tool for gathering intelligence on targets.
🔗 Network & Relationship Mapping

Network & Relationship Mapping

  • Maltego Graph-based tool for visualizing relationships between online entities.
  • Google Gruyere Web security sandbox for learning and testing web application vulnerabilities.
🔍 Challenge Yourself
  1. Start Here
  2. Google Gruyere
🔍 Advanced Information Gathering
  • Recon-ng
    A powerful web reconnaissance tool with a modular framework for automation.

  • Censys
    Search engine for discovering internet-connected devices and vulnerabilities.

  • Datasploit
    Comprehensive tool for gathering intelligence on domains, IPs, and emails.

  • FOCA
    Metadata analyzer for extracting information from documents and servers.

🛡️ Advanced Threat Detection
  • AlienVault OTX
    Open threat intelligence platform for detecting cyber threats in real-time.

  • Cuckoo Sandbox
    Automated malware analysis system for dynamic behavior analysis.

  • YARA
    Pattern-matching tool for identifying and classifying malware.

🔗 Advanced Network & Relationship Mapping
  • ReconDog
    All-in-one reconnaissance tool for gathering target information.

  • SpiderFoot HX
    Enterprise version of SpiderFoot with cloud-based OSINT automation.

  • SecurityTrails
    Domain and IP intelligence tool for analyzing online assets.

🛠️ Exploitation & Vulnerability Analysis
  • Searchsploit
    Offline access to Exploit Database for searching public exploits.

  • ExploitDB
    Archive of publicly available exploits and proof-of-concept code.

  • Metasploit Framework
    Penetration testing framework for developing and executing exploit code.

📖 Educational Resources
  • Hack The Box
    Interactive cybersecurity training platform with real-world labs.

  • TryHackMe
    Beginner-friendly cybersecurity learning platform with guided tutorials.

  • OWASP Top Ten
    Industry-standard resource for identifying the most critical web app security risks.

Next Update
Play Video