Resources
Find helpful guides and articles in our comprehensive knowledge base resources.
Try these 151 AI Resources Tools
DistroWatch.com
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
Docker Cheat Sheet
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
Enigma
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
ENISA Training Resources
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Falco Ruleset Bypass Techniques Research Project
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
FreeBuf
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
Ghost in the Shellcode
A collection of write-ups from Capture The Flag hacking competitions
Google Cloud Incident Response Cheat Sheet
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
GreHack 2018 Conference Videos
A collection of security vulnerabilities in regular expressions used in WAFs with a focus on bypass examples and high severity issues.
Hack Night by NYU Tandon's OSIRIS Lab
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
Haaukins
A university course focused on vulnerability research, reverse engineering, and binary exploitation to teach practical offensive security skills.
hackxor
A docker container with multiple vulnerable applications for cybersecurity training.
Hacksplaining
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Hardware and Firmware Security Guidance
Hacker wargames site with forums and tutorials, fostering a learning community.
Hashcat Cheat Sheet
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
How To Secure A Linux Server
Best practices for corporate network segmentation to protect against basic targeted attacks
I-ISMS (Industrial Information Security Management System)
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Incident Response with Threat Intelligence
Java MODBUS simulator with scriptable functions and dynamic resource creation.