
Guides
Best Windows Commands Abused by Attackers alternatives and competitors
34 active tools in the same primary category, including gvfs, Hacker101, GreHack 2018 Conference Videos, and 31 more. Open any row for the full SecurityListing profile, pricing context, and reviews.
All 34 alternatives
chevron_rightgvfs
gvfs on SecurityListing: GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.
Guides4.7 / 5(2 reviews)
chevron_rightHacker101
Hacker101 on SecurityListing: Free online class for web security and hacking
Guides4.7 / 5(2 reviews)
chevron_rightGreHack 2018 Conference Videos
GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Guides4.5 / 5(3 reviews)
chevron_rightIncident Response Techniques for Ransomware Attacks
Incident Response Techniques for Ransomware Attacks on SecurityListing: A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
Guides4.5 / 5(1 reviews)
chevron_rightIncident Response Flowchart
Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.
Guides4.5 / 5(1 reviews)
chevron_rightPyCon.DE 2018
PyCon.DE 2018 on SecurityListing: A conference featuring talks and workshops on various Python-related topics.
Guides4.5 / 5(1 reviews)
chevron_rightBasic Linux Privilege Escalation - g0tmi1k RSS BlogArchives
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives on SecurityListing: A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Guides4.5 / 5(1 reviews)
chevron_rightOperator Handbook: Red Team + OSINT + Blue Team Reference
Operator Handbook: Red Team + OSINT + Blue Team Reference on SecurityListing: A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
Guides4.5 / 5(1 reviews)
chevron_rightDr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.
Guides4.5 / 5(1 reviews)
chevron_rightIncident Response & Computer Forensics, Third Edition
Incident Response & Computer Forensics, Third Edition on SecurityListing: A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.
Guides4.5 / 5(1 reviews)
chevron_rightHarden the World
Harden the World on SecurityListing: Community project for developing common guidelines and best practices for secure configurations.
Guides4.5 / 5(1 reviews)
chevron_rightHardwear.io Conference 2018
Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
Guides4.3 / 5(2 reviews)
chevron_rightHardening OpenLDAP on Linux with AppArmor and systemd
Hardening OpenLDAP on Linux with AppArmor and systemd on SecurityListing: A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
Guides4.3 / 5(2 reviews)
chevron_rightARM Assembly Tutorial Series
ARM Assembly Tutorial Series on SecurityListing: Comprehensive tutorial series on ARM Assembly covering various topics.
Guides4.2 / 5(3 reviews)
chevron_rightPHP: The Right Way
PHP: The Right Way on SecurityListing: Comprehensive guide on best practices for PHP development.
Guides4.2 / 5(3 reviews)
chevron_rightDistroWatch.com
DistroWatch.com on SecurityListing: A website for information on Linux and BSD distributions.
Guides4.2 / 5(3 reviews)
chevron_rightENISA Training Resources
ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.
Guides3.8 / 5(1 reviews)
chevron_rightOpenBSD Manual Page Server
OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name
Guides3.8 / 5(1 reviews)
chevron_rightEnigma
Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
Guides3.8 / 5(1 reviews)
chevron_rightEmulate Raspberry Pi with QEMU
Emulate Raspberry Pi with QEMU on SecurityListing: Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
Guides3.8 / 5(1 reviews)
chevron_rightSecurity Driven .NET
Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
Guides
chevron_rightThe Anatomy of a Malicious Package
The Anatomy of a Malicious Package on SecurityListing: Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.
Guides
chevron_rightSP 800-82, Guide to Industrial Control Systems (ICS) Security
SP 800-82, Guide to Industrial Control Systems (ICS) Security on SecurityListing: A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
Guides
chevron_rightYouTube
YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.
Guides
chevron_rightReversing With Lena (Tutorials)
Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.
Guides
chevron_rightTeaching Security
Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.
Guides
chevron_rightSecurity Trainings
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.
Guides
chevron_rightSecuring NFS Red Hat Enterprise Linux 7
Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7
Guides
chevron_rightSecurity Tips - Apache HTTP Server Version 2.4
Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.
Guides
chevron_rightUniversal Book Links
Universal Book Links on SecurityListing: Find books at your favorite store and stay updated on new features with Universal Book Links.
Guides
chevron_rightSecurity Guide Red Hat Enterprise Linux 7
Security Guide Red Hat Enterprise Linux 7 on SecurityListing: The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.
Guides
chevron_rightReverse Engineering for Beginners
Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.
Guides
chevron_rightWeb Application Exploits and Defenses
Web Application Exploits and Defenses on SecurityListing: An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.
Guides
chevron_rightMandos Cyber Strategy OS
Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs
Guides
FAQ
- Are these “official” vendor pairings?
- No. Alternatives are category peers for discovery, not paid placements. Vendors can still claim profiles and respond to reviews on their product pages.
- Why is my favorite tool missing?
- Only active listings in the same primary category appear. Multi-category products may move when their primary category is updated.