Resources for Security
Cybersecurity training materials, courses, and educational resources for skill development. Task: SecurityExplore 11 curated tools and resources
RELATED TASKS
PINNED
Promoted • 4 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
A cheatsheet for understanding privilege escalation with examples, not for enumeration using Linux Commands.
A comprehensive guide for hardening GNU/Linux systems with practical step-by-step instructions.
A game packed with real-life examples of how not to store secrets in software, with 46 challenges to solve.
A game packed with real-life examples of how not to store secrets in software, with 46 challenges to solve.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
Security cheatsheets to aid penetration testers and security enthusiasts in remembering useful but not frequently used commands.
Interactive challenges demonstrating attacks on real-world cryptography.
Interactive challenges demonstrating attacks on real-world cryptography.
Comprehensive documentation for ThreatConnect's REST API and SDKs.
Comprehensive documentation for ThreatConnect's REST API and SDKs.
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
A collection of write-ups from Capture The Flag hacking competitions
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
An evolving how-to guide for securing a Linux server with detailed steps and explanations.