Nessus Cheat Sheet
A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.
Find helpful guides and articles in our comprehensive knowledge base resources.
A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.
A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
Practical security handbook for .NET developers.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Validate baseline cybersecurity skills with CompTIA Security+ certification.
Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.
A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.
A platform offering hacking missions to test and enhance skills.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
A university course focused on vulnerability research, reverse engineering, and binary exploitation to teach practical offensive security skills.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
An evolving how-to guide for securing a Linux server with detailed steps and explanations.
Cheat sheet with common enumeration and attack methods for Windows Active Directory.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
Find books at your favorite store and stay updated on new features with Universal Book Links.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.