Cybersecurity Resources

Comprehensive collection of tools, guides, templates, and code resources for cybersecurity professionals. Everything you need for SOC analysis, penetration testing, and threat hunting.

Wireshark Network Analyzer

Industry-leading network protocol analyzer for real-time packet capture and analysis.

Toolpacket-analysisnetwork
Network Analysis

MITRE ATT&CK Framework

Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Guideframeworkthreat-modeling
Threat Intelligence

Suricata IDS/IPS

Open source threat detection engine providing intrusion detection and prevention capabilities.

Toolidsips
Detection

SOC Analyst Checklist

Daily, weekly, and monthly SOC analyst operational and monitoring checklists.

Checklistsocoperations
Operations

Incident Response Playbook

Structured approach to handling security incidents with templates and procedures.

Templateirprocedures
Incident Response

Zeek Network Monitor

Powerful open-source network analysis framework for security monitoring and threat detection.

Toolnetworklogging
Network Analysis

YARA Malware Rules

Tool for identifying and classifying malware with custom detection rules.

Toolmalwaredetection
Malware Analysis

Splunk Query Guide

Comprehensive guide to writing effective SPL queries for log analysis and threat hunting.

Guidesiemsplunk
SIEM

TheHive Incident Management

Open-source incident response and digital forensics platform with automation.

Toolircase-management
Incident Management

Sigma Detection Rules

Generic and publicly available Sigma rules for detection engineering.

Codedetectionrules
Detection

osquery Threat Hunting

SQL-powered operating system instrumentation for threat hunting and incident response.

Toolhuntingendpoint
Threat Hunting

Volatility Memory Forensics

Advanced memory forensics framework for analyzing RAM dumps from systems.

Toolforensicsmemory
Forensics

Frequently Asked Questions

Are all these resources free?

Most resources listed are free and open-source. Some premium tools may have paid versions with advanced features.

Can I use these resources commercially?

Yes, most open-source tools can be used commercially. Please check individual licenses for specific terms.

How often are resources updated?

We regularly update our resource list with new tools and guides. Check back often for the latest additions.

What if a resource link is broken?

Please report broken links to us so we can update them. Contact our support team for assistance.

Missing a Resource?

Know a great tool or resource that should be listed here? Submit it to our community and help other cybersecurity professionals.

Combine Resources with Training

Get the most out of these resources by enrolling in our comprehensive training programs.