Similar items by topic, tags, and provider (metadata-only).
resourceBuildOWASP
OWASP
Practical structure for ethical security assessment and learning-by-checklist.
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
datasetBuildattack.mitre.org
attack.mitre.org
Best structured adversary behavior knowledge base.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsBuildNmap / Wireshark
Nmap / Wireshark
Must-have tools for network discovery, traffic inspection, and protocol analysis.
docsAdvancedNIST
NIST
Use once you need to align theory with real cryptographic standards and validation.
docsAdvancedangr / radare2
angr / radare2
Moves you toward symbolic execution, deeper reversing, and tooling fluency.
datasetnannvd.nist.gov
nvd.nist.gov
Canonical vulnerability metadata for cyber assistants.
videonanComputerphile
Computerphile
Conceptual security, CS, and systems explanations.
videonanJohn Hammond
John Hammond
Practical cybersecurity and reverse-engineering walkthroughs.
resourceZeroOverTheWire
OverTheWire
Hands-on wargames for Linux, networking, exploitation fundamentals, and secure thinking.
resourceBuildOWASP
OWASP
High-signal practical guidance for secure coding, auth, APIs, sessions, and more.