Similar items by topic, tags, and provider (metadata-only).
resourceBuildOWASP
OWASP
High-signal practical guidance for secure coding, auth, APIs, sessions, and more.
resourceBuildOWASP
OWASP
Practical structure for ethical security assessment and learning-by-checklist.
datasetBuildattack.mitre.org
attack.mitre.org
Best structured adversary behavior knowledge base.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsBuildNIST
NIST
API docs for programmatic CVE retrieval and integration into security pipelines.
courseContributorMITRE
MITRE
Official training options for applying ATT&CK in threat intel, hunting, purple teaming, and SOC work.
docsBuildMITRE
MITRE
Navigator and related tooling for mapping detections, coverage, and adversary behavior.
resourceFoundationCrypto 101
Crypto 101
Accessible cryptography foundation before deeper standards or protocol work.
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
docsFoundationWireshark
Wireshark
Documentation hub for protocol analysis, capture filters, display filters, and packet inspection.
docsAdvancedOWASP
OWASP
Security risk framework focused on prompt injection, data poisoning, output handling, and other LLM-specific risks.
docsFoundationNmap
Nmap
Reference manual for network discovery and security auditing via Nmap.