Home / Knowledge Base / Resources

Resources

Find helpful guides and articles in our comprehensive knowledge base resources.

Try these 151 AI Resources Tools

SANS
Free

SANS View SANS

A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.

Security Driven .NET
Free

Security Driven .NET View Security Driven .NET

A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.

Security Cheatsheets
Free

Security Cheatsheets View Security Cheatsheets

Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

Security Trainings
Free

Security Trainings View Security Trainings

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Shell-Storm Repository
Free

Shell-Storm Repository View Shell-Storm Repository

An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.

SIREN Setup Instructions
Free

SIREN Setup Instructions View SIREN Setup Instructions

A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.

Slavehack 2
Free

Slavehack 2 View Slavehack 2

A deliberately insecure web application for teaching web application security lessons maintained by OWASP.

Snap7 Homepage
Free

Snap7 Homepage View Snap7 Homepage

A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

Splunk Boss of the SOC
Free

Splunk Boss of the SOC View Splunk Boss of the SOC

Comprehensive documentation for ThreatConnect's REST API and SDKs.

SQL Injection Cheat Sheet
Free

SQL Injection Cheat Sheet View SQL Injection Cheat Sheet

Hacker wargames site with forums and tutorials, fostering a learning community.

SQL Injection Labs
Free

SQL Injection Labs View SQL Injection Labs

Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

SQLite SQL Injection Cheat Sheet
Free

SQLite SQL Injection Cheat Sheet View SQLite SQL Injection Cheat Sheet

Collection of industry and community cybersecurity courses and materials by M. E. Kabay.

SSL/TLS Vulnerability Cheat Sheet
Free

SSL/TLS Vulnerability Cheat Sheet View SSL/TLS Vulnerability Cheat Sheet

A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.

Strong Node.js
Free

Strong Node.js View Strong Node.js

Free Labs to Train Your Pentest / CTF Skills

Summercon
Free

Summercon View Summercon

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

Teaching Security
Free

Teaching Security View Teaching Security

A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.

The Cyberclopaedia
Free

The Cyberclopaedia View The Cyberclopaedia

Enhance the security and privacy of Apple silicon Mac computers with incremental changes and user capability.

The Practice of Network Security Monitoring
Free

The Practice of Network Security Monitoring View The Practice of Network Security Monitoring

Guidance on mitigating side-channel attacks, firmware vulnerabilities, and UEFI hardening.

The Practical Linux Hardening Guide
Free

The Practical Linux Hardening Guide View The Practical Linux Hardening Guide

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

The SOC Academy (VirusTotal)
Free

The SOC Academy (VirusTotal) View The SOC Academy (VirusTotal)

Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

ThisisLegal.com
Free

ThisisLegal.com View ThisisLegal.com

Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.

ThreatConnect Developer Documentation
Free

ThreatConnect Developer Documentation View ThreatConnect Developer Documentation

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Universal Book Links
Free

Universal Book Links View Universal Book Links

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

Web Application Exploits and Defenses
Free

Web Application Exploits and Defenses View Web Application Exploits and Defenses

A project developed for pentesters to practice SQL Injection concepts in a controlled environment.