Knowledge Base

Cybersecurity
Resources

A curated library of frameworks, open-source tools, training platforms, templates, threat intelligence feeds, and professional communities — vetted by our security team for practitioners at every level.

48
Curated Resources
6 Categories
Filter: Showing all 48 resources
🏛️
Frameworks & Standards
8 resources
NIST Cybersecurity Framework 2.0
Gov / Free
The gold standard for enterprise cyber risk management. CSF 2.0 adds a "Govern" function covering organizational context, roles, and supply chain risk. Essential for incident response and compliance alignment.
GovernanceRiskIR
nist.gov/cyberframework
NIST SP 800-61r3 — Incident Response
Gov / Free
Updated incident response guide covering preparation, detection, containment, eradication, and post-incident activity. Revised to align with CSF 2.0 and cloud environments. The definitive federal IR standard.
Incident ResponseNIST
csrc.nist.gov/pubs/sp/800/61/r3
MITRE ATT&CK Framework
Free
Globally recognized adversary tactics, techniques, and procedures (TTPs) knowledge base. Used for threat modeling, detection engineering, red/blue team exercises, and SOC playbook development.
Threat IntelDetectionRed Team
attack.mitre.org
CIS Controls v8
Free
18 prioritized security controls mapped to common attack patterns. Provides a practical implementation roadmap for organizations of any size, with Implementation Groups (IG1–IG3) for maturity tiering.
ControlsComplianceHardening
cisecurity.org/controls
CISA CIRCIA Reporting Guidance
Gov / Free
Official guidance on the Cyber Incident Reporting for Critical Infrastructure Act. Outlines 72-hour incident reporting and 24-hour ransomware payment reporting obligations for covered entities.
ComplianceReportingCIRCIA
cisa.gov/CIRCIA
OWASP Top 10
Free
The most critical web application security risks, maintained by OWASP. Covers injection, broken access control, cryptographic failures, and more. Essential for AppSec reviews and developer security training.
AppSecWebDev
owasp.org/www-project-top-ten
ISO/IEC 27001 Overview
Free Overview
International standard for Information Security Management Systems (ISMS). Key for enterprise clients seeking formal certification. Free overview and Annex A control summary available; full standard is paid.
ISMSCertificationGovernance
iso.org/isoiec-27001
MITRE D3FEND
Free
Complements ATT&CK by mapping defensive techniques to adversary techniques. Ideal for building detection and response playbooks aligned to specific attacker TTPs used in the wild.
DefenseDetectionBlue Team
d3fend.mitre.org
🛠️
Open Source & Free Tools
10 resources
Wazuh
Open Source
Open-source SIEM, XDR, and CSPM platform. Provides log analysis, intrusion detection, vulnerability detection, file integrity monitoring, and compliance reporting (PCI DSS, HIPAA, GDPR).
SIEMXDRFIM
wazuh.com
TheHive
Open Source
Scalable, open-source Security Incident Response Platform (SIRP). Enables SOC teams to manage cases, tasks, observables, and TTPs. Integrates with MISP, Cortex, and major SIEM tools.
SOARCase MgmtIR
thehive-project.org
MISP — Threat Intelligence Platform
Open Source
Open-source threat intelligence platform for sharing, storing, and correlating IoCs. Used by national CERTs, ISACs, and enterprises. Supports STIX, TAXII, and integrates with TheHive and Elastic SIEM.
Threat IntelIoCSTIX
misp-project.org
OpenCTI
Open Source
Open-source cyber threat intelligence platform built on STIX2. Allows organizations to manage, visualize, and operationalize threat intelligence. Developed by ANSSI and Luatix.
Threat IntelCTISTIX2
opencti.io
Elastic Security (SIEM)
Free Tier
Free-tier SIEM built on the Elastic Stack. Provides detection rules, ML-based anomaly detection, and MITRE ATT&CK-mapped alerts. Excellent KQL query support. Self-hosted is free; cloud managed adds cost.
SIEMKQLDetection
elastic.co/security
Nmap
Open Source
Industry-standard network scanner for host discovery, port scanning, OS fingerprinting, and vulnerability detection via NSE scripts. Essential for asset inventory, pentest reconnaissance, and perimeter audits.
NetworkReconPentest
nmap.org
Wireshark
Open Source
The most widely used network protocol analyzer. Captures and inspects packets in real time. Critical for network forensics, malware traffic analysis, and protocol debugging during incident response.
Network ForensicsPackets
wireshark.org
CISA KEV Catalog
Gov / Free
CISA's Known Exploited Vulnerabilities catalog — the authoritative list of CVEs actively exploited in the wild. Required patching reference for federal agencies; critical prioritization tool for all security teams.
VulnerabilitiesPatchingCISA
cisa.gov/known-exploited-vulnerabilities
Metasploit Framework
Open Source
The world's most widely used penetration testing framework. Contains hundreds of exploits, payloads, and auxiliary modules. Used for vulnerability validation, red team operations, and security assessments.
PentestRed TeamExploit
metasploit.com
OpenVAS / Greenbone Community
Open Source
Full-featured open-source vulnerability scanner covering 50,000+ CVEs using the Greenbone Community Feed. Ideal for internal vulnerability management programs without Tenable/Qualys licensing costs.
Vuln ScanningCVEVM
greenbone.net/community-edition
💼
Enterprise & Paid Platforms
6 resources
Microsoft Sentinel
Paid
Cloud-native SIEM and SOAR from Microsoft. Tight integration with Microsoft 365, Defender, and Entra ID. Pay-per-GB ingestion model. Includes built-in UEBA, MITRE mapping, and KQL-based detection rules.
SIEMSOARAzureKQL
azure.microsoft.com/sentinel
Splunk Enterprise Security
Paid
Industry-leading SIEM with powerful SPL query language, extensive integrations, and a massive app ecosystem. Widely used in large MSSPs and enterprises. Notable for threat hunting and risk-based alerting.
SIEMSPLEnterprise
splunk.com/enterprise-security
Tenable Nessus / Tenable.io
Paid
Leading vulnerability management platform. Nessus Professional for individual assessors; Tenable.io for enterprise VM programs. Nessus Essentials is free for up to 16 IPs — a good entry point.
Vuln MgmtScanningCVE
tenable.com
Recorded Future
Freemium
AI-powered threat intelligence platform aggregating data from open, dark, and technical web sources. Provides real-time alerts, actor tracking, and vulnerability intelligence. Free community edition available.
Threat IntelDark WebCTI
recordedfuture.com
Palo Alto Cortex XSOAR
Paid
Enterprise SOAR platform with 900+ integrations, automated playbooks, and case management. Enables MSSPs to standardize and automate multi-client IR workflows with role-based access and multi-tenancy support.
SOARAutomationPlaybooks
paloaltonetworks.com/cortex/cortex-xsoar
VirusTotal
Freemium
Aggregates results from 70+ antivirus engines and URL/domain scanners. Free for manual lookups; paid API for automated enrichment in SOAR playbooks. Invaluable for IoC triage and malware analysis.
MalwareIoCTriage
virustotal.com
🎓
Training & Certifications
8 resources
SANS Institute
Paid
Premier cybersecurity training organization offering 60+ courses and GIAC certifications (GSEC, GCIH, GCIA, etc.). Covers incident response, forensics, cloud security, and red team ops. Industry gold standard for practitioners.
GIACIRForensicsCloud
sans.org
TryHackMe
Freemium
Browser-based, gamified cybersecurity learning with guided paths for SOC analysts, pentesters, and cloud security. Free tier available; premium unlocks all rooms. Great for onboarding junior analysts.
SOCPentestLabs
tryhackme.com
Hack The Box
Freemium
Advanced hands-on hacking labs and CTF challenges. Includes blue team labs (Sherlocks) and enterprise training tracks. Preferred by experienced security professionals for sharpening offensive and defensive skills.
Red TeamBlue TeamCTF
hackthebox.com
CISA Free Training Catalog
Gov / Free
CISA offers dozens of free online and ILT courses covering ICS/SCADA security, cybersecurity essentials, incident management, and workforce development — open to public and private sector employees.
ICS/SCADAAwarenessFree
cisa.gov/resources-tools/training
(ISC)² — CISSP / CCSP
Paid
Home of the CISSP — the most recognized cybersecurity management certification globally. CCSP focuses on cloud security. Also offers Certified in Cybersecurity (CC) for free as a career entry credential.
CISSPCCSPManagement
isc2.org
Cybrary
Freemium
On-demand cybersecurity learning mapped to the NICE framework, MITRE ATT&CK, and major cert paths (CompTIA, CEH, OSCP). Free tier covers foundational content; Insider Pro unlocks advanced labs.
CompTIACEHSOC
cybrary.it
Offensive Security (OffSec)
Paid
Creators of Kali Linux and the OSCP certification. Offers hands-on penetration testing courses including PEN-200 (OSCP), WEB-300, and EXP-301. OSCP remains the most respected practical pentesting credential.
OSCPPentestKali
offsec.com
Microsoft Learn — Security
Free
Free learning paths covering Sentinel, Defender, Entra ID, Purview, and SC-200/SC-300 cert prep. Directly applicable for organizations on the Microsoft security stack. Sandbox labs included at no cost.
MicrosoftSentinelDefender
learn.microsoft.com/security
📄
Templates & Documentation
6 resources
CISA Incident Response Playbooks
Gov / Free
Official IR playbooks for ransomware and phishing — including detection checklists, containment procedures, and evidence preservation steps. Designed for federal agencies but applicable to all organizations.
PlaybooksRansomwarePhishing
cisa.gov — IR Playbooks PDF
Incident Response Consortium — Templates
Free
Community-maintained IR plan templates, communication templates, and runbooks. Covers initial triage, stakeholder notifications, chain of custody, and lessons-learned formats.
IR PlanTemplatesRunbooks
incidentresponse.com/playbooks
SANS Policy Templates
Free
Library of 27+ free, downloadable security policy templates from SANS — covering acceptable use, password policy, email security, remote access, disaster recovery, and more. Ready to adapt for client deployments.
PoliciesAUPGovernance
sans.org/information-security-policy
NIST SP 800-53 Controls Spreadsheet
Gov / Free
The full SP 800-53 Rev 5 control catalog as a downloadable spreadsheet. Useful for gap assessments, compliance mapping, and building control implementation matrices. Covers 20 control families.
ControlsComplianceFedRAMP
csrc.nist.gov/sp/800-53/rev-5
MITRE ATT&CK Navigator
Free
Web-based tool for annotating and visualizing ATT&CK matrices. Useful for building coverage heat maps, presenting detection gaps to clients, and documenting threat actor TTPs during incident response.
VisualizationTTPsDetection
mitre-attack.github.io/attack-navigator
Awesome Incident Response (GitHub)
Open Source
Curated GitHub repository of IR tools, frameworks, checklists, disk imaging tools, memory forensics utilities, and artifact collection scripts. Community-maintained and frequently updated.
DFIRForensicsChecklists
github.com/meirwah/awesome-incident-response
🔍
Threat Intelligence & News
10 resources
CISA Cybersecurity Advisories
Gov / Free
Official CISA alerts, advisories, and ICS-CERT notices covering active vulnerabilities, nation-state activity, and critical infrastructure threats. Subscribe for real-time threat notifications from the federal government.
AdvisoriesNation StateICS
cisa.gov/cybersecurity-advisories
Shodan
Freemium
Search engine for internet-connected devices. Used for external attack surface discovery, identifying exposed services, and asset exposure tracking. Free searches available; paid API for bulk queries and alerting.
OSINTAttack SurfaceRecon
shodan.io
Have I Been Pwned (HIBP)
Freemium
Breach notification service indexing billions of compromised credentials. Free for individual lookups; paid API for organizational domain monitoring. Useful for breach exposure checks and credential hygiene assessments.
BreachesCredentialsOSINT
haveibeenpwned.com
NVD — National Vulnerability Database
Gov / Free
NIST's authoritative repository of CVE vulnerability data enriched with CVSS scores, CPE data, and CWE mappings. Free JSON/API access for automated ingestion into vulnerability management and detection systems.
CVECVSSAPI
nvd.nist.gov
Mandiant Threat Intelligence (Free Tier)
Freemium
Google/Mandiant provides free access to threat actor profiles, malware family reports, and select intelligence reports. The Advantage free tier includes limited IoC lookups and actor tracking.
CTIActorsMalware
mandiant.com/advantage/threat-intelligence
The Hacker News
Free
One of the most widely read cybersecurity news sites. Covers vulnerability disclosures, breach news, threat actor activity, and security research. Daily newsletter available for keeping teams current on threats.
NewsBreachesResearch
thehackernews.com
Krebs on Security
Free
Brian Krebs's independent investigative security journalism covering cybercrime, data breaches, and the underground economy. One of the most trusted sources for in-depth analysis of major security incidents.
NewsCybercrimeJournalism
krebsonsecurity.com
SANS Internet Storm Center
Free
Daily threat diaries, handler-written analysis, and a free threat level dashboard. Ideal for SOC morning briefs. Covers emerging attack patterns, suspicious IPs, and vulnerability exploitation trends.
Threat FeedsSOCDaily Brief
isc.sans.edu
FIRST.org — Forum of IR Teams
Free
Global forum connecting CSIRTs and PSIRTs across 100+ countries. Provides CVSSv4 calculator, TLPWHITE shared resources, and coordination frameworks for national and organizational incident response teams.
CSIRTCVSSCoordination
first.org
Reddit — r/netsec & r/cybersecurity
Free
Active security communities on Reddit. r/netsec is strictly moderated for high-quality technical content; r/cybersecurity covers broader industry topics and career discussion. Good for staying current and Q&A.
CommunityDiscussion
reddit.com/r/netsec
No resources match that filter.
Home Services Resources Contact Us