-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathtraining_materials.json
1 lines (1 loc) · 17.2 KB
/
training_materials.json
1
{"guid":"root________","title":"","index":0,"dateAdded":1471027249072000,"lastModified":1537560090223000,"id":1,"typeCode":2,"type":"text/x-moz-place-container","root":"placesRoot","children":[{"guid":"menu________","title":"Bookmarks Menu","index":0,"dateAdded":1471027249072000,"lastModified":1537560090223000,"id":2,"typeCode":2,"type":"text/x-moz-place-container","root":"bookmarksMenuFolder","children":[{"guid":"PUvnc3FSB7cT","title":"Free and/or Cheap Classes and Training","index":0,"dateAdded":1537373697152000,"lastModified":1537558782964000,"id":81,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"4LuS90UYd2Hp","title":"Cybrary","index":0,"dateAdded":1537373733091000,"lastModified":1537373944601000,"id":82,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.cybrary.it/"},{"guid":"ekjy8cFmM81L","title":"SANS Cyber Aces","index":1,"dateAdded":1537373745123000,"lastModified":1537373936720000,"id":83,"typeCode":1,"charset":"UTF-8","iconuri":"http://www.cyberaces.org/images/icon.png","type":"text/x-moz-place","uri":"http://www.cyberaces.org/"},{"guid":"gsEj75Oqdwhv","title":"The Cuckoo’s Egg Decompiled Course – Chris Sanders","index":2,"dateAdded":1537373754681000,"lastModified":1537373762630000,"id":84,"typeCode":1,"charset":"UTF-8","iconuri":"https://chrissanders.org/wp-content/uploads/2014/12/cs_favicon-240x240.png","type":"text/x-moz-place","uri":"https://chrissanders.org/training/cuckoosegg/"},{"guid":"Y-82UtKxi0mi","title":"Codecademy","index":3,"dateAdded":1537373770784000,"lastModified":1537373953035000,"id":85,"typeCode":1,"charset":"UTF-8","iconuri":"https://cdn-production.codecademy.com/favicon.ico","type":"text/x-moz-place","uri":"https://www.codecademy.com/"},{"guid":"9hCk6aZsZnDu","title":"Khan Academy","index":4,"dateAdded":1537373776777000,"lastModified":1537373959008000,"id":86,"typeCode":1,"charset":"UTF-8","iconuri":"https://cdn.kastatic.org/images/apple-touch-icon-144x144-precomposed.new.png","type":"text/x-moz-place","uri":"https://www.khanacademy.org/"},{"guid":"nU1R09MzLpFT","title":"Udemy - Learn Anything, On Your Schedule","index":5,"dateAdded":1537557803036000,"lastModified":1537557851621000,"id":97,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.udemy.com/staticx/udemy/images/v6/favicon-196x196.png","type":"text/x-moz-place","uri":"https://www.udemy.com/"},{"guid":"oM94ESz4GVGp","title":"Open Security Training","index":6,"dateAdded":1537373801713000,"lastModified":1537373969682000,"id":87,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"http://opensecuritytraining.info/"},{"guid":"TDUebXGqF90u","title":"RE101 & 102 - malwareunicorn.org","index":7,"dateAdded":1537373806899000,"lastModified":1537373993378000,"id":88,"typeCode":1,"charset":"UTF-8","iconuri":"https://lh5.googleusercontent.com/qwqK_o_H6HpmAuKWtg59AQNWbkDowyopqTSNmFaWP9krDBMzt3z1LZz3V2Tlw0xjyeSBTxJxkI2Tb6kUlxwtmnYJS9IOaw","type":"text/x-moz-place","uri":"https://sites.google.com/secured.org/malwareunicorn/reverse-engineering"},{"guid":"1_ct5Hkzhl8K","title":"RE for Beginners | Reverse Engineering","index":8,"dateAdded":1537373811708000,"lastModified":1537373814425000,"id":89,"typeCode":1,"charset":"UTF-8","iconuri":"https://static.wixstatic.com/media/c52569_e3dea1738d1f4887bd2617e9dd01bdef%7Emv2.png/v1/fill/w_32%2Ch_32%2Clg_1%2Cusm_0.66_1.00_0.01/c52569_e3dea1738d1f4887bd2617e9dd01bdef%7Emv2.png","type":"text/x-moz-place","uri":"https://www.begin.re/"},{"guid":"RvkdQxZkXzrz","title":"Samurai - Browse /SamuraiWTF VM","index":9,"dateAdded":1537373817416000,"lastModified":1537374089311000,"id":90,"typeCode":1,"charset":"UTF-8","iconuri":"https://a.fsdn.com/con/img/sandiego/svg/originals/sf-icon-orange-no_sf.svg","type":"text/x-moz-place","uri":"https://sourceforge.net/projects/samurai/files/SamuraiWTF%203.0%20Branch/"},{"guid":"_0vbnGrVguBo","title":"Samurai - Browse /SamuraiWTF Slides","index":10,"dateAdded":1537373835988000,"lastModified":1537374096013000,"id":91,"typeCode":1,"charset":"UTF-8","iconuri":"https://a.fsdn.com/con/img/sandiego/svg/originals/sf-icon-orange-no_sf.svg","type":"text/x-moz-place","uri":"https://sourceforge.net/projects/samurai/files/SamuraiWTF%20Course/"},{"guid":"_ZO6njmJDGFl","title":"OWASP Juice Shop Project - OWASP","index":11,"dateAdded":1537374152024000,"lastModified":1537374156489000,"id":92,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.owasp.org/index.php/OWASP_Juice_Shop_Project"},{"guid":"BLzI5s1FATWS","title":"Metasploit Unleashed - Free Online Ethical Hacking Course","index":12,"dateAdded":1537375980458000,"lastModified":1537375985245000,"id":93,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.offensive-security.com/metasploit-unleashed/"},{"guid":"xi5XLFl4NyWK","title":"Metasploitable 2 Exploitability Guide","index":13,"dateAdded":1537558767817000,"lastModified":1537558782964000,"id":108,"typeCode":1,"charset":"UTF-8","iconuri":"https://files.readme.io/2888b30-favicon3.ico","type":"text/x-moz-place","uri":"https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide"},{"guid":"2COR0apaOQZk","title":"Sam Bowne Class Information","index":14,"dateAdded":1537376435565000,"lastModified":1537376447675000,"id":94,"typeCode":1,"charset":"windows-1252","type":"text/x-moz-place","uri":"https://samsclass.info/"},{"guid":"v1LXhn72hwCP","title":"RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC","index":15,"dateAdded":1537376499986000,"lastModified":1537376529170000,"id":95,"typeCode":1,"charset":"UTF-8","iconuri":"https://github.com/fluidicon.png","type":"text/x-moz-place","uri":"https://github.com/RPISEC/MBE"},{"guid":"aeMIbvroUaaq","title":"Learning Embedded Systems with Arduino","index":16,"dateAdded":1537376551075000,"lastModified":1537376575158000,"id":96,"typeCode":1,"charset":"UTF-8","iconuri":"https://static.wixstatic.com/media/5a2d36_3a0b6ec36dcc401ba8d591f55bd7b636%7Emv2.png/v1/fill/w_32%2Ch_32%2Clg_1%2Cusm_0.66_1.00_0.01/5a2d36_3a0b6ec36dcc401ba8d591f55bd7b636%7Emv2.png","type":"text/x-moz-place","uri":"https://www.iot-workshop.online/"},{"guid":"nfhHR3obYke2","title":"Splunk Fundamentals 1","index":17,"dateAdded":1537558046209000,"lastModified":1537558055012000,"id":98,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.splunk.com/content/dam/splunk2/images/icons/favicons/favicon-196x196.png","type":"text/x-moz-place","uri":"https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html"},{"guid":"t3ES9u08qvZ3","title":"MISP Training Materials","index":18,"dateAdded":1537558065451000,"lastModified":1537558079533000,"id":99,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.circl.lu/services/misp-training-materials/"}]},{"guid":"rUBYMF7xPUea","title":"Books","index":1,"dateAdded":1537558105689000,"lastModified":1537558711136000,"id":100,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"0jHC6TEHPJbj","title":"\"Reverse Engineering for Beginners\" free book","index":0,"dateAdded":1537558276540000,"lastModified":1537558295749000,"id":102,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://beginners.re/"},{"guid":"QtOwzGyWDhVr","title":"Packt Ebooks","index":1,"dateAdded":1537558500253000,"lastModified":1537558525470000,"id":103,"typeCode":1,"charset":"UTF-8","iconuri":"https://d1ldz4te4covpm.cloudfront.net/misc/favicon.ico","type":"text/x-moz-place","uri":"https://www.packtpub.com/packt/offers/free-learning"},{"guid":"0Y7WEx0G1DgL","title":"Humble Book Bundle:","index":2,"dateAdded":1537558532331000,"lastModified":1537558575693000,"id":104,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.humblebundle.com/books"},{"guid":"fy3uKUj2wr8M","title":"Leanpub","index":3,"dateAdded":1537558608095000,"lastModified":1537558614914000,"id":105,"typeCode":1,"charset":"UTF-8","iconuri":"https://leanpub.com/assets/favicons/favicon-196x196-a41b0bed58171deb55110d2ad055fc1c.png","type":"text/x-moz-place","uri":"https://leanpub.com/"},{"guid":"2Vv1maXvc_IL","title":"Minemeld Unofficial User Guide [PDF]","index":4,"dateAdded":1537558632623000,"lastModified":1537558722617000,"id":106,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hurricanelabs.com/images/minemeld_user_guide.pdf"},{"guid":"VtSsM4bgSxzQ","title":"NSM and Intrusion Detection [PDF]","index":5,"dateAdded":1537558176012000,"lastModified":1537558711136000,"id":101,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.hurricanelabs.com/images/idsguide.pdf"},{"guid":"p75VUURa2QvQ","title":"Safari Books","index":6,"dateAdded":1537558656092000,"lastModified":1537558673987000,"id":107,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.safaribooksonline.com/static/corp/img/apple-touch-icon.png","type":"text/x-moz-place","uri":"https://www.safaribooksonline.com/"}]},{"guid":"6KQIdz13uEBf","title":"Wargames, CTFs, Boot2Root, DFIR Challenges, etc.","index":2,"dateAdded":1537558791303000,"lastModified":1537559702680000,"id":109,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"CPgHdmXG8f41","title":"Metasploitable 2","index":0,"dateAdded":1537558901192000,"lastModified":1537558921122000,"id":110,"typeCode":1,"charset":"UTF-8","iconuri":"https://a.fsdn.com/con/img/sandiego/svg/originals/sf-icon-orange-no_sf.svg","type":"text/x-moz-place","uri":"https://sourceforge.net/projects/metasploitable/files/Metasploitable2/"},{"guid":"hlW-jmQRon-g","title":"Metasploitable 3","index":1,"dateAdded":1537558925977000,"lastModified":1537558938352000,"id":111,"typeCode":1,"charset":"UTF-8","iconuri":"https://github.com/fluidicon.png","type":"text/x-moz-place","uri":"https://github.com/rapid7/metasploitable3"},{"guid":"Oep2uKUhhX5v","title":"OWASP BWA","index":2,"dateAdded":1537558954528000,"lastModified":1537558970767000,"id":112,"typeCode":1,"charset":"UTF-8","iconuri":"https://a.fsdn.com/con/img/sandiego/svg/originals/sf-icon-orange-no_sf.svg","type":"text/x-moz-place","uri":"https://sourceforge.net/projects/owaspbwa/files/1.2/"},{"guid":"KZVfwwBJL1Z6","title":"Google Gruyere","index":3,"dateAdded":1537558974428000,"lastModified":1537558990603000,"id":113,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://google-gruyere.appspot.com/"},{"guid":"2lJhmtYEoRcx","title":"OverTheWire: Wargames","index":4,"dateAdded":1537558995056000,"lastModified":1537558999316000,"id":114,"typeCode":1,"charset":"UTF-8","iconuri":"http://overthewire.org/img/favicon.ico","type":"text/x-moz-place","uri":"http://overthewire.org/wargames/"},{"guid":"SPf2eykdCg25","title":"The SANS Holiday Hack Challenge: Past Challenges","index":5,"dateAdded":1537559088807000,"lastModified":1537559094029000,"id":115,"typeCode":1,"charset":"windows-1252","type":"text/x-moz-place","uri":"https://holidayhackchallenge.com/past-challenges/"},{"guid":"dyP4ft-XK4Zc","title":"Vulnerable By Design ~ VulnHub","index":6,"dateAdded":1537559098796000,"lastModified":1537559102268000,"id":116,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.vulnhub.com/touch-icon-ipad-retina.png","type":"text/x-moz-place","uri":"https://www.vulnhub.com/"},{"guid":"nFCj6eyvDXgg","title":"Hack The Box :: Penetration Testing Labs","index":7,"dateAdded":1537559105090000,"lastModified":1537559108300000,"id":117,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.hackthebox.eu/images/favicon.png","type":"text/x-moz-place","uri":"https://www.hackthebox.eu/"},{"guid":"bPBJ6I_l3e3Q","title":" Traffic Analysis Exercises - Malware-Traffic-Analysis.net","index":8,"dateAdded":1537559123494000,"lastModified":1537559138632000,"id":118,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.malware-traffic-analysis.net/training-exercises.html"},{"guid":"VvSNtGLArCBC","title":"Honeynet Project Challenges | The Honeynet Project","index":9,"dateAdded":1537559142809000,"lastModified":1537559146247000,"id":119,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.honeynet.org/challenges"},{"guid":"pfmkwJ3G3nJs","title":"Splunk Boss of the SOC Dataset","index":10,"dateAdded":1537559149613000,"lastModified":1537559186826000,"id":120,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.splunk.com/content/dam/splunk2/images/icons/favicons/favicon-196x196.png","type":"text/x-moz-place","uri":"https://www.splunk.com/blog/2018/05/10/boss-of-the-soc-scoring-server-questions-and-answers-and-dataset-open-sourced-and-ready-for-download.html"},{"guid":"-9JZXF4UsxR5","title":"NIST Digital Forensics Dataset","index":11,"dateAdded":1537559318320000,"lastModified":1537559339851000,"id":121,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.cfreds.nist.gov/"},{"guid":"Xegj1v9nDyp1","title":"Between Two DFIRns","index":12,"dateAdded":1537559345022000,"lastModified":1537559352079000,"id":122,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://betweentwodfirns.blogspot.com/"},{"guid":"5hHBJnQD1d7e","title":"Blue Team Training Toolkit (BT3) - Defensive Security Training Software","index":13,"dateAdded":1537559365263000,"lastModified":1537559371927000,"id":123,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.bt3.no/wp-content/uploads/2016/08/favicon.png","type":"text/x-moz-place","uri":"https://www.bt3.no/"},{"guid":"nT7gmgDmvTgb","title":"Hacking Challenge Site Links","index":14,"dateAdded":1537559375687000,"lastModified":1537559384744000,"id":124,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.blackroomsec.com/wp-content/uploads/2017/05/cropped-Logo-192x192.png","type":"text/x-moz-place","uri":"https://www.blackroomsec.com/updated-hacking-challenge-site-links/"},{"guid":"4l_j0HCY41h6","title":"OWASP Vulnerable Web Applications Directory Project - OWASP","index":15,"dateAdded":1537559388671000,"lastModified":1537559395734000,"id":125,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project"},{"guid":"0BhS3AfBea4t","title":"DFIR.Training CTF and Challenges List","index":16,"dateAdded":1537559455686000,"lastModified":1537559469871000,"id":126,"typeCode":1,"charset":"UTF-8","iconuri":"https://www.dfir.training/templates/haven/favicon.ico","type":"text/x-moz-place","uri":"https://www.dfir.training/tools/test-images-and-challenges/ctf"}]},{"guid":"gV7wL7lkos2n","title":"Other Resources - White Papers, Research Papers, Security Trends, etc.","index":3,"dateAdded":1537559591343000,"lastModified":1537560090223000,"id":127,"typeCode":2,"type":"text/x-moz-place-container","children":[{"guid":"8dX70GjUsfPG","title":"Learning Resources - NetsecFocus Google Sheets","index":0,"dateAdded":1537559695679000,"lastModified":1537559721000000,"id":128,"typeCode":1,"charset":"UTF-8","iconuri":"https://ssl.gstatic.com/docs/spreadsheets/favicon_jfk2.png","type":"text/x-moz-place","uri":"https://docs.google.com/spreadsheets/d/12bT8APhWsL-P8mBtWCYu4MLftwG1cPmIL25AEBtXDno/edit#gid=937533738"},{"guid":"_ZgKVlf1-Met","title":"The OWASP Foundation","index":1,"dateAdded":1537559748385000,"lastModified":1537559764812000,"id":129,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.owasp.org/index.php/Main_Page"},{"guid":"KwiEfwS-AYMr","title":"SANS Institute: Reading Room","index":2,"dateAdded":1537559774943000,"lastModified":1537559778474000,"id":130,"typeCode":1,"charset":"windows-1252","type":"text/x-moz-place","uri":"https://www.sans.org/reading-room"},{"guid":"S5Es_0GKJ0LR","title":"Incident Handler's Handbook [PDF]","index":3,"dateAdded":1537559784784000,"lastModified":1537559854618000,"id":131,"typeCode":1,"type":"text/x-moz-place","uri":"https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901"},{"guid":"nss0YOiXoGPT","title":"The Penetration Testing Execution Standard","index":4,"dateAdded":1537560039898000,"lastModified":1537560044226000,"id":132,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"http://www.pentest-standard.org/index.php/Main_Page"},{"guid":"hGxSDwfrIr_K","title":"Cyber Kill Chain® | Lockheed Martin","index":5,"dateAdded":1537560049326000,"lastModified":1537560054712000,"id":133,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html"},{"guid":"U5E7PCW6Qmdg","title":"MITRE ATT&CK","index":6,"dateAdded":1537560070552000,"lastModified":1537560073561000,"id":134,"typeCode":1,"charset":"UTF-8","type":"text/x-moz-place","uri":"https://attack.mitre.org/wiki/Main_Page"},{"guid":"WHc3MYklkp3u","title":"RedCanary - Atomic Red Team","index":7,"dateAdded":1537560076786000,"lastModified":1537560090223000,"id":135,"typeCode":1,"charset":"UTF-8","iconuri":"https://github.com/fluidicon.png","type":"text/x-moz-place","uri":"https://github.com/redcanaryco/atomic-red-team"}]}]},{"guid":"toolbar_____","title":"Bookmarks Toolbar","index":1,"dateAdded":1471027249072000,"lastModified":1471027594705000,"id":3,"typeCode":2,"annos":[{"name":"bookmarkProperties/description","value":"Add bookmarks to this folder to see them displayed on the Bookmarks Toolbar","expires":4,"flags":0}],"type":"text/x-moz-place-container","root":"toolbarFolder"},{"guid":"unfiled_____","title":"Other Bookmarks","index":3,"dateAdded":1471027249072000,"lastModified":1537560090223000,"id":5,"typeCode":2,"type":"text/x-moz-place-container","root":"unfiledBookmarksFolder"},{"guid":"mobile______","title":"mobile","index":4,"dateAdded":1537373244265000,"lastModified":1537373244265000,"id":80,"typeCode":2,"type":"text/x-moz-place-container","root":"mobileFolder"}]}