- Kali Linux VM with some nice tools on it ;)
- ctftime (Upcoming ctfs being held, links to writeups for old ctfs)
- overthewire (Wargames, basically ctfs that you can play anytime)
- How to get started with CTFs (General reference guide)
- Pwntools utilities for exploit development
- root-me challenges in all CTF categories
- ctf.tf CTF Binary challenges
- reversing.ctf Reversing challenges
- natas (a wargame on overthewire all about web security)
- sqlmap (very powerful tool that can automate many sql injections)
- SQL injection cheat sheet
- arachni excellent web scanner utility and library
- REFE (Materials for the IAP 2017 Reverse Engineering for Exploitation course)
- microcorruption (series of challenges teaching basics of binary exploits)
- RPI Course (course at RPI about binary exploitation)
- Exploit exercises (a set of wargames)
-
radare2: (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together or independently from the command line.
- Forensics Wiki
- Wireshark is the de-facto tool for analyzing packet captures (pcap files).
- binwalk is a tool for searching a given binary image for embedded files and executable code. Specifically, it is designed for identifying files and code embedded inside of firmware images.
- Sleuth Kit is a collection of command line tools and a C library that allows you to analyze disk images and recover files from them. It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.
- 6.004 - Computation Structures (Covers Assembly)
- 6.857 - Computer and Network Security (Covers Cryptography)
- 6.858 - Computer Systems Security (Covers Binary Exploitation, Web Security)
- 6.875 - Cryptography and Cryptanalysis (Very theoretical, mostly useless for ctfs)