Trove contains cybersecurity resources for our community. Explore our guided paths or jump into a single-topic deep dive!
Want more hands-on cyber practice to help you learn? Check out the National Cyber League.
Collections
Computer Fundamentals for CybersecurityPractice Gym GuidesCan You Unlock a Career in Cyber Security by Becoming a Red Teamer?
Can You Unlock a Career in Cyber Security by Becoming a Red Teamer?
Blog Post
Do You Have What It Takes to Hold the Line on the Blue Team?
Do You Have What It Takes to Hold the Line on the Blue Team?
Blog Post
Google-Fu: A Tour of Google Dorking
Google-Fu: A Tour of Google Dorking
Blog Post
Intro to Scanning For the National Cyber League Games
Intro to Scanning For the National Cyber League Games
Blog Post
Spotting Anomalies In PCAPS
Spotting Anomalies In PCAPS
Blog Post
Breaking Web Applications for Beginners
Breaking Web Applications for Beginners
Blog Post
How to Command Line When You Know Nothing
How to Command Line When You Know Nothing
Blog Post
National Cyber League Players Committee…Who, What, How
National Cyber League Players Committee…Who, What, How
Blog Post
Leaping into Log Analysis
Leaping into Log Analysis
Blog Post
CyberChef - Cooking some recipes with a swiss army knife
CyberChef - Cooking some recipes with a swiss army knife
Blog PostTopic: CryptographyTool: CyberChef
Man in the Middle with Burp Suite
Man in the Middle with Burp Suite
Topic: Web Application ExploitationBlog Post
Hacking with Chrome Dev Tools
Hacking with Chrome Dev Tools
Topic: Web Application ExploitationBlog Post
101 on Code Execution Basics
101 on Code Execution Basics
Topic: Enumeration & ExploitationBlog Post
Windows CLI - Installing WSL
Windows CLI - Installing WSL
Blog Post
Pinging All Devices - Please Echo Back
Pinging All Devices - Please Echo Back
Topic: Scanning & ReconnaissanceTopic: Network Traffic AnalysisBlog Post
Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
Ghidra: The NSA Reverse Engineering Tool That Will Help You Crush Enumeration and Exploitation
Topic: Enumeration & Exploitation
Tool: GhidraBlog Post
Password Cracking with Hashcat
Password Cracking with Hashcat
Topic: Password Cracking
Tool: HashcatBlog Post
‣