Home / Knowledge Base / Resources

Resources

Find helpful guides and articles in our comprehensive knowledge base resources.

Try these 151 AI Resources Tools

SANS
Free

SANS

A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.

Security Driven .NET
Free

Security Driven .NET

A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.

Security Cheatsheets
Free

Security Cheatsheets

Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

Security Trainings
Free

Security Trainings

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Shell-Storm Repository
Free

Shell-Storm Repository

An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.

SIREN Setup Instructions
Free

SIREN Setup Instructions

A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.

Slavehack 2
Free

Slavehack 2

A deliberately insecure web application for teaching web application security lessons maintained by OWASP.

Snap7 Homepage
Free

Snap7 Homepage

A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

Splunk Boss of the SOC
Free

Splunk Boss of the SOC

Comprehensive documentation for ThreatConnect's REST API and SDKs.

SQL Injection Cheat Sheet
Free

SQL Injection Cheat Sheet

Hacker wargames site with forums and tutorials, fostering a learning community.

SQL Injection Labs
Free

SQL Injection Labs

Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

SQLite SQL Injection Cheat Sheet
Free

SQLite SQL Injection Cheat Sheet

Collection of industry and community cybersecurity courses and materials by M. E. Kabay.

SSL/TLS Vulnerability Cheat Sheet
Free

SSL/TLS Vulnerability Cheat Sheet

A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.

Strong Node.js
Free

Strong Node.js

Free Labs to Train Your Pentest / CTF Skills

Summercon
Free

Summercon

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

Teaching Security
Free

Teaching Security

A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.

The Cyberclopaedia
Free

The Cyberclopaedia

Enhance the security and privacy of Apple silicon Mac computers with incremental changes and user capability.

The Practice of Network Security Monitoring
Free

The Practice of Network Security Monitoring

Guidance on mitigating side-channel attacks, firmware vulnerabilities, and UEFI hardening.

The Practical Linux Hardening Guide
Free

The Practical Linux Hardening Guide

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

The SOC Academy (VirusTotal)
Free

The SOC Academy (VirusTotal)

Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

ThisisLegal.com
Free

ThisisLegal.com

Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

ThreatConnect Developer Documentation
Free

ThreatConnect Developer Documentation

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Universal Book Links
Free

Universal Book Links

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

Web Application Exploits and Defenses
Free

Web Application Exploits and Defenses

A project developed for pentesters to practice SQL Injection concepts in a controlled environment.