Purple Academy by Picus offers courses for Red, Blue, and Purple Teamers, providing practical skills and knowledge for security professionals to defend organizations effectively. The platform includes a variety of courses on topics such as MITRE ATT&CK, Cyber Threats, Ransomware Attacks, and Proactive Security Operations Center (SOC).
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.
A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.