Comprehensive collection of tools, guides, templates, and code resources for cybersecurity professionals. Everything you need for SOC analysis, penetration testing, and threat hunting.
Industry-leading network protocol analyzer for real-time packet capture and analysis.
Globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
Open source threat detection engine providing intrusion detection and prevention capabilities.
Daily, weekly, and monthly SOC analyst operational and monitoring checklists.
Structured approach to handling security incidents with templates and procedures.
Powerful open-source network analysis framework for security monitoring and threat detection.
Tool for identifying and classifying malware with custom detection rules.
Comprehensive guide to writing effective SPL queries for log analysis and threat hunting.
Open-source incident response and digital forensics platform with automation.
Generic and publicly available Sigma rules for detection engineering.
SQL-powered operating system instrumentation for threat hunting and incident response.
Advanced memory forensics framework for analyzing RAM dumps from systems.
Most resources listed are free and open-source. Some premium tools may have paid versions with advanced features.
Yes, most open-source tools can be used commercially. Please check individual licenses for specific terms.
We regularly update our resource list with new tools and guides. Check back often for the latest additions.
Please report broken links to us so we can update them. Contact our support team for assistance.
Know a great tool or resource that should be listed here? Submit it to our community and help other cybersecurity professionals.
Get the most out of these resources by enrolling in our comprehensive training programs.