Guides
Browse 42 cybersecurity tools tagged with "Guides"
Crafting the InfoSec
Threat Intelligence Platforms
Crafting the InfoSec Playbook on SecurityListing: A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
Hacker101
Guides
Hacker101 on SecurityListing: Free online class for web security and hacking
gvfs
Guides
gvfs on SecurityListing: GVfs is a userspace virtual filesystem implementation for GIO with various backends and features.
GreHack 2018 Conference
Guides
GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Incident Response Techniques
Guides
Incident Response Techniques for Ransomware Attacks on SecurityListing: A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
Basic Linux Privilege
Guides
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives on SecurityListing: A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Harden the World
Guides
Harden the World on SecurityListing: Community project for developing common guidelines and best practices for secure configurations.
Operator Handbook: Red
Guides
Operator Handbook: Red Team + OSINT + Blue Team Reference on SecurityListing: A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.
Dr. Fu's Security
Guides
Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach on SecurityListing: A comprehensive guide to malware analysis and reverse engineering, covering topics such as lab setup, debugging, and anti-debugging.
PyCon.DE 2018
Guides
PyCon.DE 2018 on SecurityListing: A conference featuring talks and workshops on various Python-related topics.
Incident Response with
Threat Hunting
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Incident Response Flowchart
Guides
Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.
Incident Response &
Guides
Incident Response & Computer Forensics, Third Edition on SecurityListing: A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.
Guide to Ethical
Offensive Security
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Metasploit Unleashed
Penetration Testing
Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.
Hardwear.io Conference 2018
Guides
Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
Hardening OpenLDAP on
Guides
Hardening OpenLDAP on Linux with AppArmor and systemd on SecurityListing: A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
DistroWatch.com
Guides
DistroWatch.com on SecurityListing: A website for information on Linux and BSD distributions.
ARM Assembly Tutorial
Guides
ARM Assembly Tutorial Series on SecurityListing: Comprehensive tutorial series on ARM Assembly covering various topics.
PHP: The Right
Guides
PHP: The Right Way on SecurityListing: Comprehensive guide on best practices for PHP development.
Emulate Raspberry Pi
Guides
Emulate Raspberry Pi with QEMU on SecurityListing: Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.
ENISA Training Resources
Guides
ENISA Training Resources on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical and artefact analysis fundamentals.
Enigma
Guides
Enigma on SecurityListing: A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
OpenBSD Manual Page
Guides
OpenBSD Manual Page Server on SecurityListing: Search OpenBSD manual pages by keyword, section, or manual page name
Linux Detection Engineering
Threat Hunting
Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
SP 800-82, Guide
Guides
SP 800-82, Guide to Industrial Control Systems (ICS) Security on SecurityListing: A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.
Teaching Security
Guides
Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.
The Anatomy of
Guides
The Anatomy of a Malicious Package on SecurityListing: Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.
Infosec4TC Cyber Security
Penetration Testing
Infosec4TC Cyber Security Specialist on SecurityListing: Cybersecurity educational book covering network, web app, cloud, and mobile security
Universal Book Links
Guides
Universal Book Links on SecurityListing: Find books at your favorite store and stay updated on new features with Universal Book Links.
Reversing With Lena
Guides
Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.
Web Application Exploits
Guides
Web Application Exploits and Defenses on SecurityListing: An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.
Security Driven .NET
Guides
Security Driven .NET on SecurityListing: A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
Security Guide Red
Guides
Security Guide Red Hat Enterprise Linux 7 on SecurityListing: The official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system.
Mandos Cyber Strategy
Guides
Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs
Security Trainings
Guides
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.
Securing NFS Red
Guides
Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7
Security Tips -
Guides
Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.
Reverse Engineering for
Guides
Reverse Engineering for Beginners on SecurityListing: A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.
YouTube
Guides
YouTube on SecurityListing: A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.
Windows Commands Abused
Guides
Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment
The Practice of
Threat Intelligence Platforms
The Practice of Network Security Monitoring on SecurityListing: A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.