DVXTE is a docker container with several vulnerable applications, including Juiceshop, designed for cybersecurity training purposes. It allows for easy setup and reset to its initial state, making it a convenient tool for learning and practicing cybersecurity skills.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.
A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
Website providing information on Snap7 open-source communication library.
A repository of CTF challenges and resources from various cybersecurity competitions.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.