Similar items by topic, tags, and provider (metadata-only).
datasetBuildattack.mitre.org
attack.mitre.org
Best structured adversary behavior knowledge base.
courseContributorMITRE
MITRE
Official training options for applying ATT&CK in threat intel, hunting, purple teaming, and SOC work.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsBuildNmap / Wireshark
Nmap / Wireshark
Must-have tools for network discovery, traffic inspection, and protocol analysis.
docsAdvancedOWASP
OWASP
Security risk framework focused on prompt injection, data poisoning, output handling, and other LLM-specific risks.
docsBuildNIST
NIST
API docs for programmatic CVE retrieval and integration into security pipelines.
docsAdvancedangr / radare2
angr / radare2
Moves you toward symbolic execution, deeper reversing, and tooling fluency.
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
resourceBuildOWASP
OWASP
Practical structure for ethical security assessment and learning-by-checklist.
docsFoundationWireshark
Wireshark
Documentation hub for protocol analysis, capture filters, display filters, and packet inspection.
docsFoundationNmap
Nmap
Reference manual for network discovery and security auditing via Nmap.
docsAdvancedNIST
NIST
Use once you need to align theory with real cryptographic standards and validation.