Go to Dymo
Dymo | Documentation

Dymo Explorer

Public file on Dymo CDN.

Documentation Tools

In the link of the previous title you have access to the internal tools/resources of the course.

List of External Resources Links

The following is a list of links with a brief description of what each does:

Stay Secure


  1. Have I Been Pwned (Leak Finder)

    • Description: Check if your email address is in a data breach.
  2. GrapheneOS (Mobile OS)

    • Description: The private and secure mobile operating system with Android app compatibility. Developed as a non-profit open source project.


Secure emails

  1. Proton

    • Description: Secure personal suite, such as email, cloud storage, etc.
  2. Tutanota

    • Description: Secure and encrypted personal email.

Temporary emails

  1. Temp Mail (Plus)

    • Description: Generate temporary emails for websites.
  2. Temp Mail - Disposable Temporary Email (Generally detected)

    • Description: Generate temporary emails for websites.


Online Malware Analysis

  1. ANY.RUN (Plus)

    • Description: Malware hunting with live access to the heart of an incident.
  2. VirusTotal

    • Description: Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
  3. Hybrid Analysis

    • Description: This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.

Local Antivirus

  1. Malwarebytes
    • Description: Secure your devices with the #1 malware removal and protection software.

Password Managers

  1. KeePass (Password Manager Plus)

    • Description: KeePass, the free, open source, light-weight and easy-to-use password manager.
  2. ExifTool (Password Manager)

    • Description: ExifTool is a free and open-source software program for reading, writing, and manipulating image, audio, video, and PDF metadata. It is platform independent, available as both a Perl library and command-line application.


  1. Tor Project (Browser Plus)

    • Description: Defend yourself against tracking and surveillance. Circumvent censorship.
  2. Brave (Browser)

    • Description: Browse privately. Search privately. And ditch Big Tech.

Browser extensions

  1. SquareX

    • Description: SquareX keeps you safe, anonymous, and private online! Unlike existing products that block access to files and websites, SquareX allows you to open even suspicious or malicious resources fearlessly!
  2. Malwarebytes Browser Guard

    • Description: Secure your devices with the #1 malware removal and protection software.
  3. Temp Mail (Plus)

    • Description: Generate temporary emails for websites.
  4. Temp Mail - Disposable Temporary Email (Generally detected)

    • Description: Generate temporary emails for websites.


No requirements

  1. PhoneBook

    • Description: List of emails/data/search routes.
  2. Shodan

    • Description: Vulnerability search engine for Internet of Everything.
  3. Web-check.xyz (Vulnerability Browser Domain)

    • Description: Perform a search for a domain to see its possible vulnerabilities.
  4. Offensive Security’s Exploit Database Archive of Google

    • Description: Documentation for performing OSINT searches with Google Dorks.
  5. ICANN (DNS Server Scanner)

    • Description: Registration data lookup tool.

Victim interaction required

  1. IP Logger
    • Description: With IPLogger online services, you can find your own IP address, find location of IP address, and track the exact location of any mobile device or PC, check URL for hidden redirects for safety reasons.



  1. VulNyx
    • Description: VulNyx is a free platform for hackers where you can learn and practice cybersecurity with our vulnerable virtual machines.

Operating Systems

  1. Parrot Sec (Plus)

    • Description: Parrot Security Edition is a special purpose operating system designed for Penetration Test and Red Team operations. It contains a full arsenal of ready to use pentesting tools.
  2. Kali (Plus)

    • Description: Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.
  3. BlackArch

    • Description: BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2890 tools. You can install tools individually or in groups.

Remote Machine Access (Servers)

  1. Burp Suite
    • Description: Burp Suite is a software security application used for penetration testing of web applications. Both a free and a paid version of the software are available.

Remote Machine Access (PCs)

  1. Remcos
    • Description: Remcos is a lightweight, fast and highly customizable Remote Administration Tool with a wide range of functionalities.


  1. Hack The Box (English)

    • Description: The #1 cybersecurity upskilling platform.
  2. Hack4u (Spanish)

    • Description: Hack4u is a cybersecurity academy aimed at learning from experts in the field. In it, we train you to acquire the necessary skills to face any offensive security certification.
  3. Mastermind (Spanish)

    • Description: Learn something new every day. General technology training platform.

Base URL



Was this section helpful?