Similar items by topic, tags, and provider (metadata-only).
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsAdvancedangr / radare2
angr / radare2
Moves you toward symbolic execution, deeper reversing, and tooling fluency.
docsBuildNmap / Wireshark
Nmap / Wireshark
Must-have tools for network discovery, traffic inspection, and protocol analysis.
datasetBuildattack.mitre.org
attack.mitre.org
Best structured adversary behavior knowledge base.
resourceBuildOWASP
OWASP
Practical structure for ethical security assessment and learning-by-checklist.
resourceFoundationCrypto 101
Crypto 101
Accessible cryptography foundation before deeper standards or protocol work.
datasetnannvd.nist.gov
nvd.nist.gov
Canonical vulnerability metadata for cyber assistants.
docsAdvancedOWASP
OWASP
Security risk framework focused on prompt injection, data poisoning, output handling, and other LLM-specific risks.
docsBuildMITRE
MITRE
Navigator and related tooling for mapping detections, coverage, and adversary behavior.
docsBuildNIST
NIST
API docs for programmatic CVE retrieval and integration into security pipelines.
videonanComputerphile
Computerphile
Conceptual security, CS, and systems explanations.