Resources
This site is a collection of resources we have gathered and found interesting and worth checking out.
We did our best to organize the resources based on topics and in the order we recommend to view them.
We are open to be contacted to include other resources here also if we think they would be a good fit for our current listing. Also contact us about dead links so we can remove or replace them.
Hope you enjoy this collection and find something valuable for you!
Hacker Music:>
Hacker Music: #
- https://youtu.be/tFr08DnPBDE
- https://www.youtube.com/watch?v=27LZr9dDWRs
- https://youtu.be/outm3S8trH4
- https://www.youtube.com/watch?v=o1k9enoCSPU
- https://www.youtube.com/watch?v=xDyBIpqZcNI
- https://www.youtube.com/watch?v=4LGbhbW6FIk
- https://youtu.be/Sr8ILq1a_yw
- https://m.youtube.com/watch?v=t-bgRQfeW64
- https://www.youtube.com/watch?v=zeIjmvZZ_SQ
- https://youtu.be/qrTjdpF_5pk
- https://youtube.com/playlist?list=PL1L8rlkHTH2Iur9IHim-Je7-VA-H6OpwJ
- https://youtu.be/c6tQzMhqhLc?list=RDMMwqUjmupcAGI
- https://www.youtube.com/watch?v=H4YRPdRXKFs
- https://youtu.be/33WuGp6fs3s
Hackertainment:>
Hackertainment: #
- https://www.youtube.com/c/GuidedHacking/videos
- https://www.youtube.com/channel/UCBaWwFw7KmCN8YlfX4ERYKg
- https://www.youtube.com/c/sansinstitute/videos
- https://www.youtube.com/c/ippsec/videos
- https://www.youtube.com/c/LiveOverflow/videos
- https://www.youtube.com/user/Computerphile/videos
- https://www.youtube.com/user/OpenSecurityTraining/videos
- https://youtube.com/playlist?list=PLhQjrBD2T382_R182iC2gNZI9HzWFMC_8
- https://www.youtube.com/c/nang88/videos
- https://www.youtube.com/c/MollyRocket
- https://www.youtube.com/channel/UCA_Ct-5zDEOEnlxpjtitWXQ
- https://www.imdb.com/title/tt3042408/?ref_=adv_li_tt
- https://youtu.be/lkhDR91TH9M
- https://www.twitch.tv/gamozo
- https://youtu.be/gx_qorHxBpI
- https://www.youtube.com/watch?v=q96yvaOaORM
- https://youtu.be/g2U0MiZSV9A
- https://www.youtube.com/watch?v=Lfi-UjZwPd0
- https://www.youtube.com/watch?v=gPsYkV7-yJk
- https://youtube.com/c/LowLevelLearning
- https://www.youtube.com/watch?v=Zt0JfmV7CyI
- https://www.youtube.com/channel/UCB0KsBKlEcEUaNfd5ylQvCQ/
- https://youtu.be/8tiQl6T-inE
- https://youtu.be/PlvMGpQnqOM
- https://www.youtube.com/playlist?list=PLoJSah60cTP5Hulr9HxLyv-JVXFZycdmw
- https://youtu.be/_h49ilnTmW4
- https://youtu.be/T647CGsuOVU
- https://youtu.be/f079K1f2WQk
- https://youtu.be/B9DouAlkZlc
- https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking/
- https://youtu.be/FufYSx2_6Bg
- https://youtu.be/2Ra1CCG8Guo
- https://youtu.be/OVyzeZA5p7Q
- https://youtu.be/LOulCAz4S0M
- https://www.youtube.com/watch?v=6u0V1svtj3A
- https://www.youtube.com/watch?v=eTHRv2uSc_Y
- https://youtu.be/Uo4fGnld4zk
- https://www.youtube.com/watch?v=uUfV41HE_Dg
- https://classicreload.com/
- https://www.youtube.com/playlist?list=PLCZfGAvgXhFEP-VB97dY2OQxsLLN7U8e6
- https://archive.org/details/emfcamp_2012_demoscene
- https://www.youtube.com/watch?v=lvxwFpk27-Y
- https://youtu.be/hYMZsMMlubg
- https://archive.org/details/ComputerHackingDocumentriesMegaCollection/Hack+-+Creation+of+the+Computer+(History).avi
- https://teslapyramids.com/
- https://www.youtube.com/c/GynvaelEN/
Game Hacking:>
Game Hacking: #
- https://www.theverge.com/2022/1/22/22896785/dark-souls-3-remote-execution-exploit-rce-exploit-online-hack
- https://media.ccc.de/v/31c3_-_5956_-_en_-_saal_2_-_201412281400_-_cyber_necromancy_-_joseph_tartaro_-_matthew_halchyshak#t=3
- https://www.youtube.com/playlist?list=PLTjUlazALHSCEWbhcdoU8XyaWNGzoRB0G
- https://back.engineering/17/05/2021/
- https://billdemirkapi.me/insecure-by-design-epic-games-p2p-multiplayer-services/
- https://www.youtube.com/watch?v=i-2UgCDdhpM
- https://youtu.be/N44nk9URoG8
- https://github.com/gmh5225/awesome-game-security
- https://foxmaccloud.com/posts/2020/06/i-wanna-learn-c-computers-and-reverse-engineering/
- https://www.youtube.com/watch?v=XyfLSocd9ec&ab_channel=CiaranMcCormack
- https://blog.ntoskr.nl/hooking-threads-without-detours-or-patches/
- https://www.youtube.com/watch?v=mMUad_pdJIw
- http://en.ciholas.fr/how-to-get-started-in-video-game-hacking/
- https://blog.bricked.tech/posts/tmnf/part1/
- https://twitter.com/GuidedHacking/status/1592936947366137857?s=20&t=4pKhEMmshvIMNRdUOKzeyg
Pentesting:>
Pentesting: #
- https://youtube.com/c/ippsec
- https://pentestmonkey.net/category/cheat-sheet
- https://dorksearch.com/
- https://github.com/avast/PurpleDome
- https://youtube.com/playlist?list=PLziMzyAZFGMf8rGjtpV6gYbx5hozUNeSZ
- https://infosec.house/
- https://0x0ff537.github.io/post/dllproxying/
- https://youtu.be/OcYEFExDsNs
- https://github.com/Idov31/Venom
- https://taggartinstitute.org/p/responsible-red-teaming
- https://offsec.tools/
- https://exploit-notes.hdks.org/
- http://strongcourage.github.io/2020/03/01/oscp.html
- https://1modm.github.io/documentation/oscp.html
- https://connormcgarr.github.io/Zero-To-Hero/
- https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
- https://butter0verflow.github.io/oscp/OSCP-Review/
- https://h0mbre.github.io/OSCP/#
- https://attack.mitre.org/
- https://www.infosecmatter.com/pure-powershell-infosec-cheatsheet/
- https://ironhackers.es/en/
- https://threatexpress.com/redteaming/cheatsheets/
- https://github.com/coreb1t/awesome-pentest-cheat-sheets
- https://m0chan.github.io/
- https://0xsp.com/offensive/red-team-cheatsheet
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://book.hacktricks.xyz/
- https://github.com/freddiebarrsmith/Buffer-Overflow-Exploit-Development-Practice
- https://github.com/justinsteven/dostackbufferoverflowgood
- https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/
- http://www.pentest.guru/index.php/2016/01/28/best-books-tutorials-and-courses-to-learn-about-exploit-development/
- https://emaragkos.gr/recommended-machines/
- https://blog.g0tmi1k.com/2011/03/sickfuzz-v02/
- https://guide.offsecnewbie.com/port-forwarding-ssh-tunneling
- http://web.archive.org/
- http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/
Binary Exploitation>
Binary Exploitation #
- https://ir0nstone.gitbook.io/notes/
- https://www.legacyy.xyz/
- http://exploit.education/
- https://youtube.com/playlist?list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN
- https://dayzerosec.com/posts/getting-started/
- https://yajin.org/seclab2019summer/ppt/03.01_ret2libc_with_ASLR.pdf
- https://stacklikemind.io/ret2libc-aslr
- https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
- http://phrack.org/issues/1/1.html
- https://pwnable.tw/challenge/
- https://youtube.com/c/pwncollege
- https://adworld.xctf.org.cn/
- https://youtu.be/CJjApTvqGLc?list=PLqYcgq6D4C6hNotFkjRHY-1LUfSFkV8TK
- https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
- https://github.com/FabioBaroni/awesome-exploit-development
- https://deusx64.ai/
- https://youtu.be/gxU3e7GbC-M
- https://www.fuzzysecurity.com/tutorials/expDev/7.html
- https://docs.microsoft.com/en-us/windows/win32/api/shellapi/nf-shellapi-shellexecutea
- https://www.ryanpickren.com/safari-uxss
- https://nyancat0131.moe/source-engine/vpk-upload/
- https://rootkits.xyz/blog/
- https://www.youtube.com/watch?v=iBj_a_en26Y
- https://0x434b.dev/dabbling-with-linux-kernel-exploitation-ctf-challenges-to-learn-the-ropes/
- https://linux-kernel-labs.github.io/refs/heads/master/so2/
- https://github.com/nu11secur1ty/Kernel-and-Types-of-kernels
- https://docs.google.com/presentation/d/1E3uE-4mYpenw0s40rtMbIdxj3fJgC79aHCeiIlJSY5Y/mobilepresent
- https://www.exploit-db.com/docs/english/21013-shellcoding-in-linux.pdf http://phrack.org/issues/57/15.html
- https://connormcgarr.github.io/type-confusion-part-1/
- https://securitylab.github.com/ctf/
- https://github.com/xiecat/wsm
- https://maxwelldulin.com/BlogPost/House-of-Husk-In-Depth-Explanation
- https://redcanary.com/blog/fuzzing/
- https://insecure.org/stf/smashstack.html
- https://connormcgarr.github.io/
- https://j00ru.vexillium.org/
- https://github.com/leesh3288/WinPwn
- https://vulndev.io/
- https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel/
- https://connormcgarr.github.io/eko2019-exe/
- https://ir0nstone.gitbook.io/notes/
- https://www.youtube.com/watch?v=aC37UE7edP0
- https://pvs-studio.com/en/blog/posts/cpp/0360/
Heap>
Heap #
- http://phrack.org/issues/57/9.html#article
- https://github.com/shellphish/how2heap
- https://youtu.be/qpAnzC_pDjI
- https://ir0nstone.gitbook.io/notes/types/heap/introduction-to-the-heap
- https://youtu.be/HPDBOhiKaD8
- https://www.0x0ff.info/2014/heap-based-buffer-overflow/
- https://youtu.be/woKGxIrKFBc
- https://devel0pment.de/?p=688
- https://sensepost.com/blog/2018/linux-heap-exploitation-intro-series-set-you-free-part-1/
- https://courseupload.com/linux-heap-exploitation-200321/
- https://heap-exploitation.dhavalkapil.com/
- http://blog.fxiao.me/how-to-heap/
- https://youtu.be/nnF4Avttbns
- https://youtu.be/A-Qf_Q_AeFw
- https://www.youtube.com/watch?v=PFqEKkj7wWs
Buffer Overlow>
Buffer Overlow #
Kernel exploitation>
Kernel exploitation #
- https://github.com/xairy/linux-kernel-exploitation/blob/master/README.md
- https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html
- https://github.com/pr0cf5/kernel-exploit-practice/tree/master/bypass-smep
- https://arjunsreedharan.org/post/82710718100/kernel-101-lets-write-a-kernel
- https://web.archive.org/web/20171029060939/http://www.blackbunny.io/linux-kernel-x86-64-bypass-smep-kaslr-kptr_restric/
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-1/
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/linux-kernel-rop-ropping-your-way-to-part-2/
Browser exploit>
Browser exploit #
- https://youtube.com/playlist?list=PLhixgUqwRTjwufDsT1ntgOY9yjZgg5H_t
- https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/
- https://github.com/Escapingbug/awesome-browser-exploit
- https://youtu.be/3szZpS58Dqg
- https://github.com/Geluchat/chrome_v8_exploit
Windows>
Windows #
- https://github.com/alphaSeclab/windows-security/blob/master/Readme_en.md
- https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
Active Directory>
Active Directory #
- https://book.hacktricks.xyz/windows/active-directory-methodology
- https://zer1t0.gitlab.io/posts/attacking_ad/
- https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
- https://www.tarlogic.com/en/blog/how-kerberos-works/
- https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
- https://book.hacktricks.xyz/windows/active-directory-methodology
- https://zer1t0.gitlab.io/posts/attacking_ad/ + https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
- https://www.silicon.fr/zerologon-faille-critique-active-directory-346780.html
- https://github.com/GhostPack/Certify
- https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
- https://github.com/tiyeuse/Active-Directory-Cheatsheet/
- https://hideandsec.sh/books/cheatsheets-82c/page/active-directory
- https://github.com/fuzz-security/Active-Directory-Exploitation-Cheat-Sheet
- https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
- https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/
- https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
- http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
- http://theredwindows.net/index.php/2021/02/12/exploitation-dacl-en-active-directory/
- https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/
- https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
- https://www.youtube.com/channel/UCpoyhjwNIWZmsiKNKpsMAQQ
OSINT>
OSINT #
- https://youtube.com/c/TheOSINTCuriousProject
- https://osintframework.com/
- https://shodan.io/
- https://www.maltego.com/
- https://www.blockchain.com/explorer
Reverse Engineering>
Reverse Engineering #
- https://www.begin.re/
- https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05c-Reverse-Engineering-and-Tampering.md
- https://youtu.be/4bM3Gut1hIk?list=PLqgMhN0yOMUDlWhW42VQwpwdiMXsFxLhi
- https://github.com/Battelle/cantordust
- https://youtu.be/4bM3Gut1hIk?list=PLqgMhN0yOMUDlWhW42VQwpwdiMXsFxLhi
- https://reverseengineering.stackexchange.com/a/24609/30254
- https://www.youtube.com/playlist?list=PLg_QXA4bGHpvsW-qeoi3_yhiZg8zBzNwQ
- https://azeria-labs.com/downloads/cheatsheetv1.3-1920x1080.png
- https://mal.re/
- https://scoding.de/uploads/r2_cs.pdf
- https://book.rada.re/index.html
- https://blog.ret2.io/
- https://beginners.re/
- (Has everything you need) reverse-engineering-resources-beginners-to-intermediate-guide-links( https://bbinfosec.medium.com/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed)
- begin.re( https://www.begin.re/)
- where-to-find-free-training-in-reverse-engineering( https://reverseengineering.stackexchange.com/questions/265/where-to-find-free-training-in-reverse-engineering/267#267)
- (Must for beginners) https://p.ost2.fyi/courses - start with Arch1001( https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about) –> Arch2001 ( https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch2001_x86-64_OS_Internals+2021_v1/about)
- Z0FCourse_ReverseEngineering ( https://github.com/0xZ0F/Z0FCourse_ReverseEngineering)
- https://crackmes.one/
- https://asmtutor.com/
- GHB2 - Beginners Guide To Reverse Engineering ( https://guidedhacking.com/threads/ghb2-beginners-guide-to-reverse-engineering.13446/)
- malwareunicorn.org Workshop ( https://malwareunicorn.org/workshops/re101.html#0)
- awesome reverse engineering ( https://github.com/wtsxDev/reverse-engineering)
- pwn.college ( https://pwn.college/)
- https://www.youtube.com/watch?v=pkUw4oX96Fw&list=PLs4JgChXKIaO6JP1rI84kl-RztUvYDpmk
- https://legend.octopuslabs.io/sample-page.html
- https://ben.the-collective.net/my-notes/radare2-cheatsheet/#Project_Managment
- https://www.unpac.me/#/
- https://github.com/corkami/pics/tree/master/binary/pe102
- https://raw.githubusercontent.com/corkami/pics/master/binary/pe102/pe102.svg
- https://dogbolt.org/
- https://secret.club/
- https://back.engineering/
- https://blog.impalabs.com/2103_reversing-samsung-npu.html
- http://www.righto.com/
- https://securelist.com/how-to-train-your-ghidra
- https://mijailovic.net/2022/12/25/hkpropel/
- https://forum.tuts4you.com/
Hardware>
Hardware #
- https://www.collabora.com/news-and-blog/blog/2022/01/27/writing-an-open-source-gpu-driver-without-the-hardware/
- https://pine64.com/product/128mb-ox64-sbc-available-on-december-2-2022/
- https://a.aliexpress.com/_mNlRSvG
Malware>
Malware #
- https://www.vx-underground.org/
- https://www.unpac.me/#/
- http://fumalwareanalysis.blogspot.com/2011/12/malware-analysis-tutorial-8-pe-header.html
- https://www.ntcore.com/files/dotnetformat.htm
- https://gist.github.com/Te-k/2a5a1885249cfd07f417b47d291c4b98
- https://twitter.com/c5pider/status/1555256779553906694
- https://blog.sekoia.io/traffers-a-deep-dive-into-the-information-stealer-ecosystem/
- https://blog.group-ib.com/godfather-trojan
- https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints
- https://blog.securitybreak.io/10-underestimated-resources-about-malware-techniques-98f6750c7609
- https://github.com/struppigel/PortexAnalyzerGUI
- https://github.com/h3xduck/TripleCross
- https://t.co/wu45EKWsKP
- https://trikkss.github.io/posts/hiding_windows_api_calls_part1/
- https://attack.mitre.org/matrices/enterprise/windows/
- https://malpedia.caad.fkie.fraunhofer.de/library
- https://www.guitmz.com/
- https://tmpout.sh/2/7.html
- https://web.archive.org/web/20210420163849/https://ivanlef0u.fr/repo/madchat/vxdevl/vdat/tuunix01.htm
Math>
Math #
- https://youtu.be/ZRNO-ewsNcQ
- https://youtube.com/playlist?list=PLW3Zl3wyJwWOpdhYedlD-yCB7WQoHf-My
- https://youtube.com/playlist?list=PLZHQObOWTQDPD3MizzM2xVFitgF8hE_ab
- https://www.youtube.com/watch?v=-6g1tD66QBA
- https://youtu.be/p8u_k2LIZyo
- https://cryptopals.com/
- https://youtu.be/VofMMbD2QtQ?list=PL3WoIG-PLjSv9vFx2dg0BqzDZH_6qzF8-
- https://www.cis.upenn.edu/~jean/math-deep.pdf
- https://www.people.vcu.edu/~rhammack/BookOfProof/BookOfProof.pdf
Web Hacking>
Web Hacking #
- https://www.hacker101.com/
- https://owasp.org/www-project-web-security-testing-guide/stable/
- https://websec.readthedocs.io/zh/latest/basic/index.html
- https://portswigger.net/research/top-10-web-hacking-techniques-of-2021
ASM>
ASM #
- https://youtube.com/playlist?list=PLetF-YjXm-sCH6FrTz4AQhfH6INDQvQSn
- https://software.intel.com/content/www/us/en/develop/download/intel-64-and-ia-32-architectures-software-developers-manual-documentation-changes.html
- http://www.faqs.org/faqs/assembly-language/
- https://www.csee.umbc.edu/portal/help/architecture/24536301.pdf
- https://riptutorial.com/assembly
- https://www.intel.com/content/dam/develop/external/us/en/documents/introduction-to-x64-assembly-181178.pdf
- https://wiki.cdot.senecacollege.ca/wiki/X86_64_Register_and_Instruction_Quick_Start
- https://wiki.osdev.org/CPU_Registers_x86-64
- https://www.tutorialspoint.com/assembly_programming/assembly_registers.htm
- https://omu.rce.so/
- https://www.youtube.com/watch?v=vcfQVwtoyHY
- https://cpulator.01xz.net/
- https://cs.brown.edu/courses/cs033/docs/guides/x64_cheatsheet.pdf
- https://d3v1lal.gitbook.io/assembly-language/
- https://filippo.io/linux-syscall-table/
- https://dojo.pwn.college/cse466/challenges/asm
- https://asmtutor.com/
- https://github.com/pkivolowitz/asm_book
C>
C #
- https://github.com/PDrifting/CBookDraft/blob/main/book.markdown
- http://www.crasseux.com/books/ctut.pdf
- https://kremlin.cc/k&r.pdf
- http://www.catb.org/esr/structure-packing/
- https://www.learn-c.org/
- https://github.com/mackron/miniaudio
- https://docs.google.com/document/d/1zdJlFogCDhKt2Qz_1LDhJ1r0UAuSUKzoMnbyaKc4or4/mobilebasic
- https://github.com/ORCx41/Syscallslib
- https://www.gnu.org/software/gnu-c-manual/gnu-c-manual.html
C++>
C++ #
- https://learncpp.com/
- https://youtube.com/playlist?list=PLlrATfBNZ98dudnM48yfGUldqGD0S4FFb
- https://codeforces.com/
- https://cses.fi/book/book.pdf
- https://youtu.be/LFv7XwgsdLY
- https://cppcast.com/
- https://youtube.com/playlist?list=PLgnQpQtFTOGRM59sr3nSL8BmeMZR9GCIA
- https://youtu.be/_bYFu9mBnr4
- https://youtu.be/15QF2q66NhU
- http://www.coranac.com/tonc/text/intro.htm
- https://youtu.be/bFSnXNIsK4A
- http://www.cplusplus.com/reference/algorithm/
- https://youtu.be/xnqTKD8uD64
- https://guidedhacking.com/threads/talk-c-to-me-baby-a-brain-dump.18890/#post-116269
- https://raytracing.github.io/books/RayTracingInOneWeekend.html
- https://isocpp.github.io/CppCoreGuidelines/CppCoreGuidelines#main
- https://raw.githubusercontent.com/Overv/VulkanTutorial/master/ebook/Vulkan%20Tutorial%20en.pdf
- https://youtu.be/TeduHyHdH3A
- https://www.linuxlinks.com/excellent-free-books-learn-c-plus-plus/
- https://samypesse.gitbook.io/how-to-create-an-operating-system/
- https://gameprogrammingpatterns.com/contents.html
- http://www.bordoon.com/cplusplus/book_wrapper.html
- https://buildyourownlisp.com/chapter1_introduction#about
- https://github.com/mit-nlp/MITIE
- https://youtu.be/lkgszkPnV8g
- http://www.jagpdf.org/
- https://google.github.io/styleguide/cppguide.html
- https://developers.redhat.com/blog/2018/03/21/compiler-and-linker-flags-gcc
- https://stackoverflow.com/questions/14492436/g-optimization-beyond-o3-ofast
- https://raytracing.github.io/books/RayTracingInOneWeekend.html
- https://hackaday.io/course/171240-learn-c-real-time-audio-programming-with-bela
- https://cpp.libhunt.com/
- https://github.com/Microsoft/GSL
- http://chaiscript.com/
- https://github.com/fffaraz/awesome-cpp
- https://podcasts.google.com/feed/aHR0cDovL2NwcGNhc3QubGlic3luLmNvbS9yc3M?sa=X&ved=0CAMQ4aUDahgKEwjQrPGz0YD5AhUAAAAAHQAAAAAQ0QU
- https://www.youtube.com/playlist?list=PLs3KjaCtOwSYdpfm74DYyd1kOXEhCd1Rv
- https://www.youtube.com/playlist?list=PLX95UiIkuXfxEFmstoaLFRzHjK3GwbExM
- https://www.youtube.com/playlist?list=PLNIYjlFqDLTyCQJytWeLMszT5LsWW2-52
- https://www.youtube.com/playlist?list=PLIXt8mu2KcUJOwdLMp-Z-cDIZA1aZfVTN
- https://www.youtube.com/playlist?list=PL5qoVlA-tv08NSGEGqClP-5D6c01235ha
- https://www.youtube.com/playlist?list=PL2EnPlznFzmhKDBfE0lqMAWyr74LZsFVY
- https://www.youtube.com/playlist?list=PLE28375D4AC946CC3
- https://www.youtube.com/playlist?list=PL58qjcU5nk8uH9mmlASm4SFy1yuPzDAH0
- https://www.youtube.com/playlist?list=PLN5UjAOusZAPlvsj4QoeCdKMyoV5XjnBO
- https://www.youtube.com/playlist?list=PLWxziGKTUvQFIsbbFcTZz7jOT4TMGnZBh
- https://www.youtube.com/playlist?list=PLlrATfBNZ98edc5GshdBtREv5asFW3yXl
- https://google.github.io/styleguide/cppguide.html
- https://eecs.oregonstate.edu/ecampus-video/CS161/template/chapter_7/files.html
- https://www.youtube.com/playlist?list=PLWxziGKTUvQFIsbbFcTZz7jOT4TMGnZBh
- https://github.com/libcpr/cpr
- https://devblogs.microsoft.com/oldnewthing/20230104-00/?p=107668
- https://youtube.com/@masteringmoderncppfeatures6302
- https://www.youtube.com/watch?v=BxO6G4RgmAM&list=PLqCJpWy5FohdH8bbqclZrV8CG14UEAZ2c
- https://en.cppreference.com/w/cpp/named_req/ConstexprIterator