search
Join or Log In

Guides

Browse 42 cybersecurity tools tagged with "Guides"

Crafting the InfoSec Playbook

Crafting the InfoSec

language

Threat Intelligence Platforms

Crafting the InfoSec Playbook on SecurityListing: A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

4.8(3)
Hacker101

Hacker101

language

Guides

Hacker101 on SecurityListing: Free online class for web security and hacking

4.7(2)
gvfs

gvfs

language

Guides

gvfs on SecurityListing: GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.

4.7(2)
GreHack 2018 Conference Videos

GreHack 2018 Conference

language

Guides

GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

4.5(3)
Incident Response Techniques for Ransomware Attacks

Incident Response Techniques

language

Guides

Incident Response Techniques for Ransomware Attacks on SecurityListing: A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.

4.5(1)
Harden the World

Harden the World

language

Guides

Harden the World on SecurityListing: Community project for developing common guidelines and best practices for secure configurations.

4.5(1)
Incident Response Flowchart

Incident Response Flowchart

language

Guides

Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.

4.5(1)
Operator Handbook: Red Team + OSINT + Blue Team Reference

Operator Handbook: Red

language

Guides

Operator Handbook: Red Team + OSINT + Blue Team Reference on SecurityListing: A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.

4.5(1)
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach

Dr. Fu's Security

language

Guides

Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.

4.5(1)
Incident Response & Computer Forensics, Third Edition

Incident Response &

language

Guides

Incident Response & Computer Forensics, Third Edition on SecurityListing: A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.

4.5(1)
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives

Basic Linux Privilege

language

Guides

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives on SecurityListing: A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

4.5(1)
Incident Response with Threat Intelligence

Incident Response with

language

Threat Hunting

Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

4.5(1)
PyCon.DE 2018

PyCon.DE 2018

language

Guides

PyCon.DE 2018 on SecurityListing: A conference featuring talks and workshops on various Python-related topics.

4.5(1)
Guide to Ethical Hacking

Guide to Ethical

language

Offensive Security

Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

4.5(1)
Hardening OpenLDAP on Linux with AppArmor and systemd

Hardening OpenLDAP on

language

Guides

Hardening OpenLDAP on Linux with AppArmor and systemd on SecurityListing: A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.

4.3(2)
Hardwear.io Conference 2018

Hardwear.io Conference 2018

language

Guides

Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

4.3(2)
Metasploit Unleashed

Metasploit Unleashed

language

Penetration Testing

Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

4.3(2)
DistroWatch.com

DistroWatch.com

language

Guides

DistroWatch.com on SecurityListing: A website for information on Linux and BSD distributions.

4.2(3)
ARM Assembly Tutorial Series

ARM Assembly Tutorial

language

Guides

ARM Assembly Tutorial Series on SecurityListing: Comprehensive tutorial series on ARM Assembly covering various topics.

4.2(3)
PHP: The Right Way

PHP: The Right

language

Guides

PHP: The Right Way on SecurityListing: Comprehensive guide on best practices for PHP development.

4.2(3)
OpenBSD Manual Page Server

OpenBSD Manual Page

language

Guides

OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name

3.8(1)
ENISA Training Resources

ENISA Training Resources

language

Guides

ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.

3.8(1)
Enigma

Enigma

language

Guides

Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

3.8(1)
Linux Detection Engineering -  A primer on persistence mechanisms

Linux Detection Engineering

language

Threat Hunting

Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

3.8(1)
Emulate Raspberry Pi with QEMU

Emulate Raspberry Pi

language

Guides

Emulate Raspberry Pi with QEMU on SecurityListing: Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.

3.8(1)
The Practice of Network Security Monitoring

The Practice of

language

Threat Intelligence Platforms

The Practice of Network Security Monitoring on SecurityListing: A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

SP 800-82, Guide to Industrial Control Systems (ICS) Security

SP 800-82, Guide

language

Guides

SP 800-82, Guide to Industrial Control Systems (ICS) Security on SecurityListing: A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

Reverse Engineering for Beginners

Reverse Engineering for

language

Guides

Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

Reversing With Lena (Tutorials)

Reversing With Lena

language

Guides

Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.

Teaching Security

Teaching Security

language

Guides

Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

The Anatomy of a Malicious Package

The Anatomy of

language

Guides

The Anatomy of a Malicious Package on SecurityListing: Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.

Web Application Exploits and Defenses

Web Application Exploits

language

Guides

Web Application Exploits and Defenses on SecurityListing: An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.

Mandos Cyber Strategy OS

Mandos Cyber Strategy

language

Guides

Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs

Security Trainings

Security Trainings

language

Guides

Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.

Security Driven .NET

Security Driven .NET

language

Guides

Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

Securing NFS Red Hat Enterprise Linux 7

Securing NFS Red

language

Guides

Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7

Security Tips - Apache HTTP Server Version 2.4

Security Tips -

language

Guides

Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.

Security Guide Red Hat Enterprise Linux 7

Security Guide Red

language

Guides

Security Guide Red Hat Enterprise Linux 7 on SecurityListing: The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.

Universal Book Links

Universal Book Links

language

Guides

Universal Book Links on SecurityListing: Find books at your favorite store and stay updated on new features with Universal Book Links.

Windows Commands Abused by Attackers

Windows Commands Abused

language

Guides

Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment

Infosec4TC Cyber Security Specialist

Infosec4TC Cyber Security

language

Penetration Testing

Infosec4TC Cyber Security Specialist on SecurityListing: Cybersecurity educational book covering network, web app, cloud, and mobile security

YouTube

YouTube

language

Guides

YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.