Cybersecurity training materials, courses, and educational resources for skill development.Explore 154 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A comprehensive reference guide providing practical examples and commands for using Hashcat to crack various types of password hashes.
A comprehensive reference guide providing practical examples and commands for using Hashcat to crack various types of password hashes.
A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
Hands-on cybersecurity training and testing platform with 1800+ labs
Hands-on cybersecurity training and testing platform with 1800+ labs
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
Innovative hub for cybersecurity events and initiatives.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Interactive challenges demonstrating attacks on real-world cryptography.
Interactive challenges demonstrating attacks on real-world cryptography.
A pre-indexed Splunk security dataset and CTF platform that provides realistic security data for training, research, and educational purposes for cybersecurity professionals and students.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
Find books at your favorite store and stay updated on new features with Universal Book Links.
Find books at your favorite store and stay updated on new features with Universal Book Links.
Level 400 training to become a Microsoft Sentinel Ninja.
Level 400 training to become a Microsoft Sentinel Ninja.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.
A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.
Online hacking game with realistic hacking experience and player interaction.
Online hacking game with realistic hacking experience and player interaction.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.
Cheat sheet with common enumeration and attack methods for Windows Active Directory.
Cheat sheet with common enumeration and attack methods for Windows Active Directory.
Live and on-demand cybersecurity training programs for all levels.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
HackTheArch is an open-source Ruby on Rails-based scoring server platform designed for hosting and managing Cyber Capture the Flag competitions with web-based problem management and hint systems.
A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.
A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.