Primeros pasos

Trailofbits

Guía de herramientas de STIC, Fundación Sadosky.
CTF101
Kitctfd

Ingeniería Inversa e Informática Forense

Guías

Solución detallada del desafío LCG crackme del PRE CTF.
Análisis de binarios de STIC, Fundación Sadosky.
Guía introductoria a la escritura de exploits de STIC, Fundación Sadosky.
CTF Forensics de Trailofbits.

Libros

Reversing: Secrets of Reverse Engineering de Eldad Eilam.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes de The Shellcoder's Handbook: Discovering and Exploiting Security Holes* de Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools and Obfuscation de Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse.
The Art Of Memory Forensics: Detecting Malware And Threats In Windows, Linux, And Mac Memory de Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Challenges

Abos de Gera
Microcorruption

Criptografía

Guías

PicoCTFs
CTF junior 2017

Challenges

Cryptopals

WEB

Guías

Guía básica de vulnerabilidades web de STIC, Fundación Sadosky.
Top 10 OWASP

Libros

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws de Dafydd Stuttard, Marcus Pinto.
Penetration testing: a hands-on introduction to hacking de Georgia Weidman.

Challenges

Natas

Recursos para CTFs

CTF time
Write-ups