Curated collection of essential cybersecurity resources, tools, and documentation. Navigate the digital security landscape with these carefully selected links.
Loading links...
- ToolWar - DumpIt Memory Dump Tools
- Volatility Foundation - Memory Forensics Framework
- Autopsy - Digital Forensics Platform
- XpdfReader - pdfinfo Manual
- ExifTool - Metadata Extraction and Editing
- Bing Maps - Online Mapping and Directions
- Google Maps - Online Maps and Navigation
- Exterro - FTK Imager Digital Forensics Software
- Microsoft Docs - Appendix L: Events to Monitor
- Microsoft Docs - Monitoring Active Directory for Signs of Compromise
- Ultimate Windows Security - Security Log Encyclopedia
- Graylog - Critical Windows Event IDs to Monitor
- Microsoft Docs - Regular Expressions in .NET
- Microsoft Docs - PowerShell Scripting Overview
- Microsoft Docs - Understand Security Groups in Active Directory
- Microsoft Support - Advanced Search Options
- DuckDuckGo - Search Syntax Help
- GitHub - Advanced Search Operators List
- Shodan - Search Engine for Internet-Connected Devices
- Shodan - Search Examples
- Shodan Trends - Insights on Internet Trends
- Censys - Search for Internet Assets
- Censys Support - Search Use Cases
- Have I Been Pwned? - Check if Your Email is Compromised
- Google - Advanced Search
- CVE - Common Vulnerabilities and Exposures
- Exploit Database - Exploits and Vulnerabilities
- GitHub - Repository Hosting
- Linux Man Pages - ip Command
- Microsoft Docs - Technical Documentation
- Snort - Documentation
- Apache HTTP Server - Documentation
- PHP - Official Documentation
- Node.js - API Documentation
- VirusTotal - File Upload and Analysis
- NVD - National Vulnerability Database
- OSINT Framework - Collection of OSINT tools and resources for investigations
- VirusTotal - Service for analyzing files and URLs for viruses and malware
- MetaDefender - Advanced Threat Prevention Platform
- OWASP - Open Web Application Security Project
- NIST Cybersecurity Framework - Framework for improving critical infrastructure cybersecurity
- MITRE ATT&CK - Knowledge base of adversary tactics and techniques
- SANS Institute - Cybersecurity training and certification
- CIS Controls - Center for Internet Security best practices
- ISO 27001 - Information security management standard
- Krebs on Security - In-depth security news and investigation
- Schneier on Security - Bruce Schneier's security blog
- Threatpost - The first stop for security news
- Darknet - Security tools and hacking resources
- Pentest Partners - Security blog and services
- Rapid7 Blog - Security research and insights
- FireEye Blog - Threat intelligence and research
- CrowdStrike Blog - Threat hunting and incident response
- Malwarebytes Blog - Malware analysis and security news
- Unit 42 - Palo Alto Networks threat research
- Secureworks Blog - Threat intelligence and research
- Recorded Future Blog - Threat intelligence insights
- Mandiant Blog - Advanced threat research
- Proofpoint Blog - Email security and threat protection
- Check Point Cyber Hub - Cybersecurity research and analysis
- Trend Micro Research - Security research and threat analysis
- K7 Labs - Malware research and analysis
- SentinelOne Blog - Endpoint security research
- Cybereason Blog - Threat hunting and defense