Similar items by topic, tags, and provider (metadata-only).
docsBuildMITRE
MITRE
Navigator and related tooling for mapping detections, coverage, and adversary behavior.
datasetnannvd.nist.gov
nvd.nist.gov
Canonical vulnerability metadata for cyber assistants.
courseContributorMITRE
MITRE
Official training options for applying ATT&CK in threat intel, hunting, purple teaming, and SOC work.
resourceBuildOWASP
OWASP
Practical structure for ethical security assessment and learning-by-checklist.
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
resourceFoundationCrypto 101
Crypto 101
Accessible cryptography foundation before deeper standards or protocol work.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsBuildNmap / Wireshark
Nmap / Wireshark
Must-have tools for network discovery, traffic inspection, and protocol analysis.
docsAdvancedNIST
NIST
Use once you need to align theory with real cryptographic standards and validation.
docsAdvancedangr / radare2
angr / radare2
Moves you toward symbolic execution, deeper reversing, and tooling fluency.
videonanComputerphile
Computerphile
Conceptual security, CS, and systems explanations.
resourceZeroOverTheWire
OverTheWire
Hands-on wargames for Linux, networking, exploitation fundamentals, and secure thinking.