A compilation of research links I've found. These links may be unrelated to their topic, but if they're in a section then they seemed either related or helpful to me! If the links are present, I've visited them, but that can't guarantee their security - Be careful!
##Software updating A collection of resources for learning about updating software or creating DSUs (Dynamic software updaters) -[Cambridge Univertsity - practical software updating for C] (https://www.cs.umd.edu/~mwh/papers/ginseng.pdf) -[Dynamic Programming] (https://www.educative.io/blog/python-dynamic-programming-tutorial) -[Dynamic Software Updating] (https://www.cs.umd.edu/~mwh/papers/dyn_update.pdf) -[Dynamic Software Updating - Wikipedia] (https://en.wikipedia.org/wiki/Dynamic_software_updating)
##Software virtualization
- [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications] (https://docs.microsoft.com/en-us/windows/application-management/app-v/appv-running-locally-installed-applications-inside-a-virtual-environment) -[What is a Linux Container] (https://www.redhat.com/en/topics/containers/whats-a-linux-container) -[Linux Containers - An umbrella project for linux containers] (https://linuxcontainers.org/)
##netoworking -[Creating a proxy server] (https://www.ibm.com/support/knowledgecenter/SS7K4U_9.0.5/com.ibm.websphere.zseries.doc/ae/tjpx_createps.html)
##Backdooring -[Bypassing firewalls with microsoft domains] (https://null-byte.wonderhowto.com/how-to/use-microsoft-com-domains-bypass-firewalls-execute-payloads-0196505/) -[Bypassing Firewalls: tools/techniques (made in 2000)] (https://www.semanticscholar.org/paper/Bypassing-Firewalls-%3A-Tools-and-Techniques-Hill/d84f53db616e5fb710c441c840544773c19d9b41) -[Firewall bypass tchniques] (https://www.terena.org/activities/tf-csirt/meeting9/gowdiak-bypassing-firewalls.pdf) -[Bypassing firewall] (https://www.researchgate.net/publication/228949007_Bypassing_firewalls_tools_and_techniques) -[Bypassing the firewall] (https://searchsecurity.techtarget.com/answer/Bypassing-the-firewall) -[Create hard to detect payload (NullByte)] (https://null-byte.wonderhowto.com/how-to/hacking-windows-10-create-undetectable-payload-part-1-bypassing-antivirus-software-0185055/) -[Backdooring] (https://resources.infosecinstitute.com/remote-access-tool/#gref)
##Reverse engineering -[Begginner to intermediate RE links] (https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed) -[Reverse engineering] (https://www.geeksforgeeks.org/software-engineering-reverse-engineering/) -[RE for beginners] (https://www.begin.re/)
#Computer Forensics/recovery -[Intro to computer Forensics] (https://resources.infosecinstitute.com/category/computerforensics/introduction/#gref) -[Forensics job requirements] (https://www.cyberdegrees.org/jobs/computer-forensics/) -[Windows system backup imaging] (https://www.howtogeek.com/howto/4241/how-to-create-a-system-image-in-windows-7/) -[Making a full windows backup] (https://www.windowscentral.com/how-make-full-backup-windows-10) -[Creating a backup ISO (windows)] (https://www.makeuseof.com/tag/create-iso-image-windows-system/)
##Computer Inner workings -Translation Lookaside Buffer -[Assembly tutorial] (https://www.tutorialspoint.com/assembly_programming/index.htm) -[Assembly guide] (https://www.cs.virginia.edu/~evans/cs216/guides/x86.html) -[Linux from scratch] (http://www.linuxfromscratch.org/) -[Build your own linux from scratch] (http://www.buildyourownlinux.com/)
##Priv esc -[Creating a new user/making user admin NORMAL METHOD] (https://appuals.com/make-user-account-administrator-windows-10/#:~:text=Click%20on%20Settings%20to%20open,want%20to%20make%20an%20Administrator.) -[]
##Device attacking (software) - logins, fake updates, etc; -[Gaining admin access to password secured computer Windows 8/10] (https://medium.com/@dahmane/gaining-administrator-access-to-a-password-secured-windows-8-8-1-10-system-4fcbb60130db) -[Building an exploit BUFFER OVERFLOW] (https://null-byte.wonderhowto.com/how-to/hack-like-pro-build-your-own-exploits-part-2-writing-simple-buffer-overflow-c-0159478/) -[Exploit Building] (https://null-byte.wonderhowto.com/how-to/exploit-building/) -[Exploiting EternalBlue on Windows] (https://null-byte.wonderhowto.com/how-to/exploit-eternalblue-windows-server-with-metasploit-0195413/)
##Device attacking (hardware) - hardware implants, physical exploitation, etc;
##General research - things that are good to know in general -[What is the Domain controller] (https://www.varonis.com/blog/domain-controller/#:~:text=A%20domain%20controller%20is%20a,together%20on%20the%20same%20network.&text=The%20domain%20controller%20(DC)%20is,%2D%20Active%20Directory%20(AD).)