SANS
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
Find helpful guides and articles in our comprehensive knowledge base resources.
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.
A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.
A deliberately insecure web application for teaching web application security lessons maintained by OWASP.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
Hacker wargames site with forums and tutorials, fostering a learning community.
Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
Enhance the security and privacy of Apple silicon Mac computers with incremental changes and user capability.
Guidance on mitigating side-channel attacks, firmware vulnerabilities, and UEFI hardening.
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.
Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.