Similar items by topic, tags, and provider (metadata-only).
docsZeroOWASP
OWASP
Best broad first map of common web application security failures.
resourceBuildOWASP
OWASP
High-signal practical guidance for secure coding, auth, APIs, sessions, and more.
docsAdvancedOWASP
OWASP
Security risk framework focused on prompt injection, data poisoning, output handling, and other LLM-specific risks.
resourceFoundationCrypto 101
Crypto 101
Accessible cryptography foundation before deeper standards or protocol work.
datasetBuildattack.mitre.org
attack.mitre.org
Best structured adversary behavior knowledge base.
docsFoundationNmap
Nmap
Reference manual for network discovery and security auditing via Nmap.
docsBuildNSA
NSA
Serious open reverse-engineering toolchain for binaries and firmware.
docsBuildNmap / Wireshark
Nmap / Wireshark
Must-have tools for network discovery, traffic inspection, and protocol analysis.
docsAdvancedNIST
NIST
Use once you need to align theory with real cryptographic standards and validation.
docsAdvancedangr / radare2
angr / radare2
Moves you toward symbolic execution, deeper reversing, and tooling fluency.
docsBuildMITRE
MITRE
Navigator and related tooling for mapping detections, coverage, and adversary behavior.
resourceZeroOverTheWire
OverTheWire
Hands-on wargames for Linux, networking, exploitation fundamentals, and secure thinking.