Cybersecurity training materials, courses, and educational resources for skill development.Explore 151 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.
A collection of security vulnerabilities in regular expressions used in WAFs with a focus on bypass examples and high severity issues.
Collection of recent infosec/hacking videos from conferences.
Collection of recent infosec/hacking videos from conferences.
Leading provider of free cybersecurity training resources
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
Comprehensive documentation for ThreatConnect's REST API and SDKs.
Comprehensive documentation for ThreatConnect's REST API and SDKs.
Cybersecurity industry portal offering articles, tools, and resources.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A curated list documenting open-source projects that incorporate political protests in their software, ranging from messages to conditional malware.
A curated list documenting open-source projects that incorporate political protests in their software, ranging from messages to conditional malware.
A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.
A collection of write-ups from Capture The Flag hacking competitions
A workshop offering resources for local privilege escalation on Windows and Linux systems.
A workshop offering resources for local privilege escalation on Windows and Linux systems.
A docker container with multiple vulnerable applications for cybersecurity training.
A docker container with multiple vulnerable applications for cybersecurity training.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
A comprehensive guide to mobile application penetration testing, covering various topics and techniques
A comprehensive guide to mobile application penetration testing, covering various topics and techniques