Learn how to find and report security vulnerabilities in web apps before deploying them to production.
Understand AI security risks and defenses when building machine learning features into your product.
Study ethical hacking techniques and tools to prepare for a career in cybersecurity or bug bounty hunting.
Reference quick security cheat sheets and best practices while building or auditing your application.
This is a massive curated library of cybersecurity learning resources, tools, and reference material maintained by Omar Santos, a well-known cybersecurity educator who has written books and created courses on ethical hacking and security. Think of it as a personally curated encyclopedia for anyone learning cybersecurity, from beginners to working professionals. The collection covers an unusually broad range of topics: ethical hacking (legally testing systems for weaknesses), bug bounty hunting (getting paid to find security flaws in companies' products), digital forensics (investigating security incidents after they happen), AI security (protecting and attacking AI systems), reverse engineering (analyzing software to understand how it works), and much more. For a founder or vibe coder, the most directly relevant sections are likely the application security resources (how to build apps that aren't vulnerable to common attacks), the AI security materials (increasingly important as everyone builds AI-powered products), and the cheat sheets in the training reference section which provide quick, practical security knowledge. The repository links out to thousands of external tools, tutorials, labs, and writeups, it's a starting point and navigation system rather than containing all the content itself. It also supplements Omar's paid books and video courses, so some sections serve as companion material to those products. Built as a GitHub repository with Jupyter notebooks for some interactive content, this is freely accessible to anyone. It's a solid first stop for a non-security-specialist who wants to understand what cybersecurity practitioners actually do and learn.
Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.