Resources
Find helpful guides and articles in our comprehensive knowledge base resources.
Try these 151 AI Resources Tools
DistroWatch.com View DistroWatch.com
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
Docker Cheat Sheet View Docker Cheat Sheet
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
edb View edb
Deliberately vulnerable CI/CD environment with 11 challenges to practice security.
Enigma View Enigma
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
ENISA Training Resources View ENISA Training Resources
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Falco Ruleset Bypass Techniques Research Project View Falco Ruleset Bypass Techniques Research Project
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
FreeBuf View FreeBuf
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
Ghost in the Shellcode View Ghost in the Shellcode
A collection of write-ups from Capture The Flag hacking competitions
Google Cloud Incident Response Cheat Sheet View Google Cloud Incident Response Cheat Sheet
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
Hacker101 View Hacker101
Guidelines for contributing to a cybersecurity tools and resources list
GreHack 2018 Conference Videos View GreHack 2018 Conference Videos
A collection of security vulnerabilities in regular expressions used in WAFs with a focus on bypass examples and high severity issues.
Hack Night by NYU Tandon's OSIRIS Lab View Hack Night by NYU Tandon's OSIRIS Lab
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
Haaukins View Haaukins
A university course focused on vulnerability research, reverse engineering, and binary exploitation to teach practical offensive security skills.
hackxor View hackxor
A docker container with multiple vulnerable applications for cybersecurity training.
Hacksplaining View Hacksplaining
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Hardware and Firmware Security Guidance View Hardware and Firmware Security Guidance
Hacker wargames site with forums and tutorials, fostering a learning community.
Hashcat Cheat Sheet View Hashcat Cheat Sheet
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
HTB Academy View HTB Academy
A weekly newsletter covering computer security news and tutorials
How To Secure A Linux Server View How To Secure A Linux Server
Best practices for corporate network segmentation to protect against basic targeted attacks
I-ISMS (Industrial Information Security Management System) View I-ISMS (Industrial Information Security Management System)
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Incident Response with Threat Intelligence View Incident Response with Threat Intelligence
Java MODBUS simulator with scriptable functions and dynamic resource creation.