Performing Research

A Key part of online research relates to targeting the correct sources for the information you are looking for, This includes building a list of reputable sites and services that you can easily reference or have an inherent trust of because it is supported, maintained, and moderated by the industry and community at large.

General Search Support

Google Hacking Database (Exploit DB)

An index of search queries (we call them dorks) used to find publicly available information, intended for pen testers and security researchers.

General Forums

Stack Exchange

They make Stack Overflow and 170+ other community-powered Q&A sites.

Super User

A question and answer site for computer enthusiasts and power users

Stack Overflow

A community-based space to find and contribute answers to technical challenges, and one of the most popular websites in the world.

Server Vault

A question and answer site for system and network administrators.

General Forums

This would relate to code repositories for projects, applications, and products hosted on sites similar to examples seen here on: GitLab, GitHub, launchpad,

Threat Intel

Alien Vault OTX

Open Threat Exchange is the neighborhood watch of the global intelligence community. It enables private companies, independent security researchers, and government agencies to openly collaborate and share the latest information about emerging threats, attack methods, and malicious actors, promoting greater security across the entire community.

Threat Connect

Makes it easier to share information across organizations and industries. This in turn allows these groups to use threat intelligence for a more proactive defense. ThreatConnect’s powerful capabilities create a complete solution for all businesses and communities whether your organization is an information sharing analysis center (ISAC), a single enterprise sharing across departments, or in a private community with your partners.

Vendor Public Threat Data

(additional sites for vendor threat intel, i.e. Trellix, Bitdefender, Kaspersky, FireEye, cisco, Fortinet, etc...)