Cybersecurity training materials, courses, and educational resources for skill development.
Explore 151 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Cheat sheet with common enumeration and attack methods for Windows Active Directory.
Live and on-demand cybersecurity training programs for all levels.
A repository of cybersecurity conference presentation slides from Black Hat, Offensivecon, and REcon.
A collection of reports and resources highlighting Android security vulnerabilities and best practices.
Linux-based operating system intentionally vulnerable for cybersecurity practice.
A comprehensive guide to SSL/TLS vulnerabilities and vulnerable cipher suites.
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
A collection of security vulnerabilities in regular expressions used in WAFs with a focus on bypass examples and high severity issues.
Collection of recent infosec/hacking videos from conferences.
Leading provider of free cybersecurity training resources
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
Comprehensive documentation for ThreatConnect's REST API and SDKs.