Skip to content

Essential Security Resources

Frameworks, standards, catalogs, and references every team should know

Frameworks & Standards

MITRE ATT&CK

Adversary tactics and techniques knowledge base

Frameworks & Standards

ATT&CK Navigator

Plan, annotate, and share ATT&CK matrices

Frameworks & Standards

MITRE D3FEND

Countermeasures mapped to attack behaviors

Frameworks & Standards

MITRE CAPEC

Common attack pattern enumeration and classification

Frameworks & Standards

OWASP Top 10

Most critical web application security risks

Frameworks & Standards

OWASP API Security Top 10

Top API security risks and guidance

Frameworks & Standards

OWASP ASVS

Security requirements for designing and testing apps

Frameworks & Standards

OWASP Cheat Sheet Series

Concise best practices across common security topics

Frameworks & Standards

OWASP SAMM

Software Assurance Maturity Model for AppSec

Frameworks & Standards

CIS Controls v8

Prioritized safeguards to defend against attacks

Frameworks & Standards

CIS Benchmarks

Hardening guidance for operating systems and platforms

Frameworks & Standards

NIST Cybersecurity Framework

Identify, Protect, Detect, Respond, Recover

Frameworks & Standards

NIST SP 800-53

Security and privacy controls for information systems

Frameworks & Standards

NIST SP 800-61

Computer security incident handling guide

Frameworks & Standards

NIST SP 800-171

Protecting CUI in nonfederal systems

Frameworks & Standards

ISO/IEC 27001

Information security management system standard

Frameworks & Standards

PCI DSS

Payment Card Industry Data Security Standard

Frameworks & Standards

SOC 2

Service Organization Control 2 overview (AICPA)

Vulnerabilities & Exploits

CVE Program

Common vulnerabilities and exposures registry

Vulnerabilities & Exploits

NVD

National Vulnerability Database with CVSS scoring

Vulnerabilities & Exploits

Exploit Database

Public exploits and proof-of-concepts

Vulnerabilities & Exploits

Vulners

Unified vulnerability database and search

Vulnerabilities & Exploits

CERT/CC Vulnerability Notes

Coordinator vulnerability notes database

Vulnerabilities & Exploits

FIRST CVSS Calculator

Calculate CVSS severity scores

Vulnerabilities & Exploits

CWE

Common software weaknesses catalog

Threat Intelligence

MISP

Open-source threat intelligence platform

Threat Intelligence

AlienVault OTX

Community threat intelligence pulses and IOCs

Threat Intelligence

AbuseIPDB

Report and check malicious IP addresses

Threat Intelligence

PhishTank

Community-curated phishing URL database

Threat Intelligence

URLHaus

Malicious URLs database by abuse.ch

Threat Intelligence

MalwareBazaar

Malware sample sharing by abuse.ch

Threat Intelligence

ThreatFox

Indicators of compromise feed

Threat Intelligence

GreyNoise

Context on Internet scanning and noise

Threat Intelligence

Spamhaus

Blocklists and threat intelligence

Threat Intelligence

Team Cymru MHR

Malware Hash Registry lookup

Threat Intelligence

ANY.RUN

Interactive malware analysis sandbox

Threat Intelligence

VirusTotal

Analyze files and URLs for malware and indicators

Threat Intelligence

Have I Been Pwned

Email breach and password exposure checks

DFIR & IR

SANS DFIR Resources

Incident response and forensics tools and posters

DFIR & IR

The Sleuth Kit

Open-source digital forensics toolkit

DFIR & IR

Autopsy

GUI for The Sleuth Kit forensic analysis

DFIR & IR

Velociraptor

Endpoint visibility and DFIR collection

DFIR & IR

KAPE

Rapid triage and artifact collection

DFIR & IR

Timesketch

Collaborative forensic timeline analysis

DFIR & IR

OSQuery

Query your endpoints like a database

DFIR & IR

GRR Rapid Response

Incident response framework focused on remote live forensics

DFIR & IR

Volatility

Advanced memory forensics framework

DFIR & IR

YARA

Pattern matching for malware research and hunting

DFIR & IR

CAPA

Identify capabilities in suspicious binaries

DFIR & IR

CyberChef

The Cyber Swiss Army Knife

Malware & RE

Ghidra

Open-source reverse engineering suite

Malware & RE

IDA Free

Free version of the IDA disassembler

Malware & RE

radare2

Open-source reverse engineering framework

Malware & RE

Cutter

Qt GUI for radare2

Malware & RE

Binary Ninja Blog

Reverse engineering techniques and articles

Malware & RE

Malpedia

Knowledge base of malware families

Malware & RE

PEStudio

Static investigation of Windows executables

Malware & RE

Hybrid Analysis

Automated malware analysis reports

Malware & RE

UnpacMe

Automated unpacking of obfuscated binaries

Cloud & IaC

AWS Well-Architected (Security)

AWS Security Pillar best practices

Cloud & IaC

AWS Security Hub

AWS security findings aggregation

Cloud & IaC

Azure Security Benchmark

Security guidance for Azure services

Cloud & IaC

Microsoft Defender for Cloud

Cloud-native application protection

Cloud & IaC

GCP Security Foundations

Google Cloud security best practices

Cloud & IaC

Checkov Docs

Static analysis for IaC (Terraform/K8s/Cloud)

Cloud & IaC

tfsec Docs

Static analysis for Terraform

Cloud & IaC

Semgrep Registry

Curated rules for code and IaC scanning

Cloud & IaC

Prowler

AWS/Azure/GCP security best practices auditing

Cloud & IaC

ScoutSuite

Multi-cloud security auditing

Cloud & IaC

Terrascan

Detect compliance and security violations across IaC

AppSec & Testing

OWASP WSTG

Web Security Testing Guide

AppSec & Testing

Burp Suite Academy

PortSwigger Web Security Academy

AppSec & Testing

OWASP ZAP Docs

ZAP documentation and guides

AppSec & Testing

Nuclei Templates

Community templates for fast scanning

AppSec & Testing

FFUF Wordlists

SecLists: wordlists for discovery and fuzzing

AppSec & Testing

CodeQL Docs

Semantic code analysis by GitHub

AppSec & Testing

OWASP Dependency-Check

Dependency vulnerability scanning

AppSec & Testing

OWASP Mobile Top 10

Top mobile application security risks

AppSec & Testing

OWASP MASVS

Mobile AppSec Verification Standard

Red Team

Atomic Red Team

ATT&CK-mapped tests for adversary behaviors

Red Team

MITRE CTID Adversary Emulation

Adversary emulation plans and resources

Red Team

LOLBAS

Living off the land binaries and scripts

Red Team

GTFOBins

Unix binaries that help bypass security controls

Red Team

PayloadsAllTheThings

Payloads and bypasses for various attack scenarios

Red Team

Red Team Operator Handbook

Tactics and techniques compendium

Blue Team

Sigma HQ

Generic signature format for SIEM detections

Blue Team

Elastic Detection Rules

Community rules mapped to ATT&CK

Blue Team

ThreatHunting Book

Playbooks and analytics for hunting

Blue Team

DetectionLab

Automated lab for detection engineering

Blue Team

Elastic Common Schema

Unified field names for event data

Blue Team

OSSEM

Open Source Security Events Metadata

Blue Team

Sigma Tools

Backends and tools for Sigma rules

Windows & AD

BloodHound Docs

Graph-based Active Directory analysis

Windows & AD

SpecterOps Blog

Advanced AD/Windows security research

Windows & AD

ADSecurity.org

Active Directory security guidance

Windows & AD

Windows Event Logging Cheat Sheets

Event ID references for defenders

OSINT

OSINT Framework

Directory of OSINT resources and tools

OSINT

Shodan Docs

Documentation for the Shodan search engine

OSINT

Censys Docs

Guides for Internet-wide search and assets

OSINT

SpiderFoot Docs

Automated OSINT collection and analysis

OSINT

theHarvester

E-mail, subdomain and names harvesting

ICS / OT

ATT&CK for ICS

Adversary behaviors in industrial control systems

ICS / OT

SANS ICS Resources

Industrial control systems security resources

Supply Chain

SLSA

Supply-chain Levels for Software Artifacts

Supply Chain

Sigstore

Signing and verifying software artifacts

Supply Chain

SPDX

Software Package Data Exchange (SBOM)

Supply Chain

CycloneDX

Lightweight SBOM standard

Supply Chain

OpenSSF Scorecard

Automated security checks for projects

Supply Chain

Dependency-Track

SBOM analysis and risk management

Bug Bounty & Training

HackerOne Resources

Guides and reports for bug bounty hunters

Bug Bounty & Training

Bugcrowd University

Educational content for bug bounty

Bug Bounty & Training

TryHackMe

Hands-on cybersecurity training

Bug Bounty & Training

Hack The Box Academy

Interactive cybersecurity courses

Bug Bounty & Training

OWASP Juice Shop

Deliberately insecure app for training

Bug Bounty & Training

PortSwigger Academy Labs

Free hands-on web security labs

Logging & Telemetry

Sigma Rules Wiki

How to write and use Sigma rules

Logging & Telemetry

Sysmon

Windows system monitoring driver

Logging & Telemetry

Elastic Security

SIEM and endpoint security with Elastic

Logging & Telemetry

OSSEC

Host-based intrusion detection system

Crypto & PKI

Let’s Encrypt Docs

ACME certificates and guidance

Crypto & PKI

OWASP Cryptographic Storage Cheat Sheet

Best practices for crypto storage

News & Reports

CISA Alerts

Current security alerts and advisories

News & Reports

US-CERT Vulnerability Notes

Vulnerability notes from CERT/CC

News & Reports

Microsoft Security Blog

Security research and incident analysis

News & Reports

Google TAG

Threat Analysis Group research

News & Reports

Mandiant Blog

Threat intelligence and incident reports

Frameworks & Standards

NIST NICE

Cybersecurity workforce framework

Frameworks & Standards

OWASP SAMM Toolbox

Resources for SAMM implementation

Frameworks & Standards

FIRST Traffic Light Protocol

Data sharing and classification standard

Blue Team

MITRE Shield

Active defense knowledge base

Frameworks & Standards

ATT&CK Workbench

Curate and share ATT&CK content

Threat Intelligence

OpenCTI

Open cyber threat intelligence platform

Threat Intelligence

Criminal IP

Attack surface and threat intel platform

Threat Intelligence

CIRCL Passive DNS

Historical DNS records lookup

Threat Intelligence

RiskIQ Community

Passive DNS, WHOIS, and threat intel

Vulnerabilities & Exploits

Shodan Exploits

Exploit search mapped to services

Vulnerabilities & Exploits

Rapid7 AttackerKB

Exploitability and impact discussions

Red Team

Metasploit Docs

Exploit development and usage docs

Red Team

MITRE CALDERA

Automated adversary emulation platform

Blue Team

Huntress Library

Tradecraft, guides, and IR content

Blue Team

RITA

Beacon analysis of network traffic

Blue Team

Suricata Rules

IDS/IPS rule language reference

Blue Team

Zeek Docs

Network security monitoring platform docs

Blue Team

Sigma Rules Repository

Community detection rules

Blue Team

MITRE CAR

Cyber analytics repository mapped to ATT&CK

Blue Team

MITRE Engage (Shield)

Adversary engagement and active defense

Blue Team

Microsoft D3FEND Mapping

Mitigations mapped to D3FEND

Frameworks & Standards

Google BeyondCorp

Zero trust access model

Frameworks & Standards

NCSC Cyber Essentials

UK baseline security standard

News & Reports

NCSC Guidance

UK National Cyber Security Centre guidance

Vulnerabilities & Exploits

CISA Known Exploited Vulnerabilities

Catalog of actively exploited CVEs

Frameworks & Standards

ATT&CK Navigator Layers

Shareable ATT&CK layer files

Blue Team

Sigma to Splunk Converter

Convert Sigma rules to SIEM backends

Blue Team

Sysmon Config (SwiftOnSecurity)

Community Sysmon configuration

DFIR & IR

Procmon

Advanced Windows monitoring tool

DFIR & IR

RegRipper

Windows Registry forensic analysis

Malware & RE

Floss

Extract obfuscated strings from malware

Malware & RE

CAPE Sandbox

Config and payload extraction sandbox

Malware & RE

Remnux

Linux toolkit for malware analysis

Threat Intelligence

X-Force Exchange

Threat intelligence sharing platform

Threat Intelligence

AlienVault Open Threat Exchange Docs

Using and integrating OTX

Threat Intelligence

Abuse.ch Feeds

Project index for abuse.ch (malware feeds)

Vulnerabilities & Exploits

Exploit-DB Papers

Whitepapers and tutorials on exploitation

Vulnerabilities & Exploits

Rapid7 DB

Modules and vulnerability content

AppSec & Testing

OWASP CRS

ModSecurity Core Rule Set

Cloud & IaC

Container Security (NIST SP 800-190)

Application container security guide

Cloud & IaC

Kubernetes Hardening (NSA/CISA)

Kubernetes hardening guidance

Frameworks & Standards

OWASP Top 10 for LLMs

Risks for LLM applications

AppSec & Testing

OpenAI Security Eval Resources

Eval harness for model behaviors

Frameworks & Standards

Safeguarding AI (NIST AI RMF)

AI Risk Management Framework

Threat Intelligence

MITRE ATLAS

Adversarial threats to machine learning

AppSec & Testing

Okta Security Best Practices

Identity and access best practices

AppSec & Testing

Auth0 Attack Protection

Protect against automated attacks

Threat Intelligence

Cloudflare Security Center

Threat data and security insights

AppSec & Testing

Mozilla Observatory

Site security scanning and guidance

AppSec & Testing

Security Headers

Analyze HTTP security headers

Crypto & PKI

TLS Observatory

TLS configuration scanner

Crypto & PKI

Qualys SSL Labs

SSL/TLS server test and reports

AppSec & Testing

OWASP Threat Dragon

Open-source threat modeling

AppSec & Testing

Microsoft Threat Modeling Tool

Model and analyze threats

News & Reports

Attack Surface Management (ASM) Guide

CISA guidance on ASM

Blue Team

NCSC Logging Made Easy

Logging patterns and deployment

Vulnerabilities & Exploits

MITRE CVE Services

CVE program and partners

Supply Chain

OpenSSF Best Practices Badge

Best practices for open source projects

Cloud & IaC

Docker Bench for Security

Script to check for common Docker best-practices

Cloud & IaC

Kube-bench

CIS Benchmark tests for Kubernetes

Cloud & IaC

kube-hunter

Kubernetes security assessment

Cloud & IaC

Trivy

Comprehensive container and artifact scanner

Cloud & IaC

Grype

Container image vulnerability scanner

Blue Team

Suricata

High-performance IDS/IPS and NSM

Blue Team

Zeek

Network security monitoring framework

Blue Team

Sigma HQ Examples

Testing and validating Sigma rules

DFIR & IR

Awesome Incident Response

Curated list of IR resources

Threat Intelligence

Awesome Threat Intelligence

Curated list of threat intel resources

Malware & RE

Awesome Malware Analysis

Curated malware analysis tools and resources

Red Team

Awesome Red Teaming

Curated red team resources

Blue Team

Awesome Blue Team

Curated blue team resources