To add to the list: Submit a pull request To remove from the list: Open an issue List items should be sorted alphabetically. Each item should be limited to one link The link should be the name of the package or project Direct installation commands should follow on the next line, indented by 2 spaces and enclosed in `` Descriptions should be clear, concise, and non-promotional Descriptions should follow the link, on the same line Run npm install and then npm test to verify everything is correct according to guidelines Quality standard: To stay on the list, package repositories should adhere to these quality standards: Generally useful to the community, Functional, Stable Reporting issues: Please open an issue if you find anything that could be improved or have suggestions for making the list a more valuable resource. Thanks!
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Live and on-demand cybersecurity training programs for all levels.
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
Leading provider of free cybersecurity training resources
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.