Resources for Ctf
Cybersecurity training materials, courses, and educational resources for skill development. Task: Ctf
Explore 15 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.
A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.
Archive of information, tools, and references regarding CTF competitions.
A repository of CTF challenges and resources from various cybersecurity competitions.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
Blue-team capture the flag competition for improving cybersecurity skills.
A comprehensive and immersive 13-week course by NYU Tandon's OSIRIS Lab introducing students to offensive security with practical applications and research projects.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
A collection of write-ups from Capture The Flag hacking competitions
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.