Cybersecurity training materials, courses, and educational resources for skill development.Explore 154 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.
Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.
Archive of information, tools, and references regarding CTF competitions.
Archive of information, tools, and references regarding CTF competitions.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Educational resource collection providing learning materials and online tools for understanding AT&T assembly language and x86 assembly programming.
Educational resource collection providing learning materials and online tools for understanding AT&T assembly language and x86 assembly programming.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
A repository aiming to archive all Android security presentations and whitepapers from conferences.
A repository aiming to archive all Android security presentations and whitepapers from conferences.
The best security training environment for Developers and AppSec Professionals.
The best security training environment for Developers and AppSec Professionals.
A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.
Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.
Exhaustive checklist for securing Node.js web services with a focus on error handling and custom error pages.
A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A repository of CTF challenges and resources from various cybersecurity competitions.
A repository of CTF challenges and resources from various cybersecurity competitions.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
A network of physical and online cyber warfare ranges for training and testing
A network of physical and online cyber warfare ranges for training and testing
A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.
A web-based tool that scrapes and organizes CTF writeups from ctftime.org with prioritization features and a local database for easy access.
Standardized contribution guidelines for maintaining quality cybersecurity tool repositories and community-curated lists.
Standardized contribution guidelines for maintaining quality cybersecurity tool repositories and community-curated lists.
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
A reference guide providing Docker commands and concepts for containerized application development and deployment.
A reference guide providing Docker commands and concepts for containerized application development and deployment.