- https://www.sans.org/
- https://www.owasp.org
- https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
- https://www.pcisecuritystandards.org/pci_security/
- http://seclists.org/
- xss.cx - Exploit Search, Reverse Engineering Data, Bug Bounty Reports
- NIST Cybersecurity Framework (CSF)
- Build Security In Maturity Model (BSIMM)
- http://www.blackhat.com/
- https://www.defcon.org/
- https://www.rsaconference.com
- https://www.rmisc.org/
- http://www.hackerhalted.com
- http://www.thotcon.org
- http://grrcon.com/
- http://www.summercon.org
- https://www.derbycon.com/
- https://nmap.org/
- https://ssd.eff.org/
- https://decentsecurity.com/#/malware-web-and-phishing-investigation/
- RFC-7540 Hypertext Transfer Protocol Version (HTTP/2)
- RFC-7235 Hypertext Transfer Protocol (HTTP/1.1): Authentication
- RFC-5246 The Transport Layer security (TLS) Protocol Veresion 1.2
- [RFC-2818 HTTP Over TLS] (https://tools.ietf.org/html/rfc2818)
- https://en.wikipedia.org/wiki/Man-in-the-middle_attack
- https://en.wikipedia.org/wiki/POODLE
- https://en.wikipedia.org/wiki/DROWN_attack
- https://github.com/bonsaiviking?tab=repositories
- https://github.com/nccgroup
- https://github.com/TheOfficialFloW
- https://www.sslshopper.com/
- https://www.eff.org/https-everywhere
- https://panopticlick.eff.org/
- https://www.grc.com/passwords.htm
- https://defuse.ca/passgen.htm
- https://github.com/nccgroup/featherduster
- http://www.kapersky.com
- http://www.symantec.com
- http://www.McAfeecom
- https://www.coresecurity.com/
- http://seclists.org/fulldisclosure/
- http://www.talosintel.com/software/
- https://torguard.net/
- http://www.telerik.com/fiddler
- https://www.trailofbits.com/
- https://lgtm.com/
- https://www.gpg4win.org/
- https://www.virustotal.com
- http://www.herdprotect.com/