Guides

Comprehensive cybersecurity guides, best practices documentation, and implementation tutorials for security professionals.

Explore 101 curated cybersecurity tools, with 14,802+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Metasploit Unleashed Logo

Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

0
Reverse Engineering for Beginners Logo

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

0
NSA Cybersecurity Logo

NSA's cybersecurity advisories and guidance on evolving threats and mitigations.

0
Security Driven .NET Logo

A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

1
DistroWatch.com Logo

A website for information on Linux and BSD distributions.

0
Hardwear.io Conference 2018 Logo

Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

0
Penetration Testing Execution Standard (PTES) Logo

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

0
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives Logo

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

0
Android-Security-Reference Logo

A comprehensive guide to Android Security

0
The Penetration Testing Execution Standard Logo

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

0
Security Tips - Apache HTTP Server Version 2.4 Logo

Security tips for setting up an Apache HTTP Server to prevent security issues.

0
Enigma Logo

A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

0
IPython Notebook Logo

Interactive computational environment for code execution, text, and media combination.

0
Example Domain Logo

A public domain for use in illustrative examples in documents.

0
Applied Incident Response Logo

A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.

0
Incident Response & Computer Forensics, Third Edition Logo

A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.

0
Cryptopals Crypto Challenges Logo

Interactive challenges demonstrating attacks on real-world cryptography.

0
Universal Book Links Logo

Find books at your favorite store and stay updated on new features with Universal Book Links.

0
The Practice of Network Security Monitoring Logo

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

0
YouTube Logo

A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

0
ENISA Training Resources Logo

ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.

0
Hacker101 Logo

Free online class for web security and hacking

0
Blackhat Conference Presentation Slides Logo

A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.

0
FARA Logo

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

0