search

Pipl
Search for public records, social media for individuals
User Level: All

OSINT Techniques
One stop shop for tools to find people / places / things
User Level: All

Have I Been Pwned
Use to determine if an email you use has been leaked.
User Level: Beginner

Shodan
Search for open ports and vulnerable servers, machines, IPs.
User Level: Advanced

browser

Tor Browser
Browser for pseudo-anonymous browsing
User Level: All

Brave
Privacy conscious Browser, with ad-trackers blocked by default
User Level: All

Duck Duck Go
Privacy conscious Search Engine. Stop using Google.
User Level: All

Ghostery
Browser extension
Tracks what ad-trackers are gleaning your info on websites
User Level: Beginner

NoScript
Browser extension
Blocks all scripts on a page
User Level: Advanced

news

The Daily Dot | Layer 8
InfoSec, Cyber Rights
User Level: Beginner

Security Week - Eduard Kovacs
Cybersecurity,
User Level: Beginner-Intermediate

Krebs on Security
Fraud, Skimmers, Threat Groups
User Level: Intermediate

Politico - Morning Cybersecurity
Politics + Cybersecurity
User Level: Beginner

The Hill - Cybersecurity
Politics + Cybersecurity
User Level: Beginner

protect

ProtonMail
Encrypted Email
Stop using Gmail
User Level: All

Burner Phone App
iOS, Android app
Provides burner phone numbers. Subscription based.
User Level: All

Sudo
iOS app that provides credit card numbers, phone numbers, etc you can use for protecting your privacy.
User Level: All

Privacy Rights Clearinghouse
Source for protecting your online data.
User Level: All


OSINT

Intel Techniques
OSINT/ Offensive + Defensive Privacy, both on and offline

Bellingcat
"Home of Online Investigations"

Social Engineering
"The official social engineering website"

gender

Tinny Nibbles
"Open Source Sex" [NSFW], Sex + Tech

Without My Consent
Tools and resources to fight online harassment, specifically around revenge porn

Stalking Resource Center
To identify and prevent yourself from stalking

cyber

tisiphone.net
a la Hacks4Pancakes

Mac4n6
Mac / iOS Forensics

Reverse Engineering Malware 101
a la Malware Unicorn

Malware Don't Need Coffee
a la Kafeine

fashion

VanitySec
InfoSec + Fashion

Look Always Lovely
Miss Malware's fashion blog