Filing Tray

Resources for all, for a job that needs doing

From free software, to guides and recommendations, we can almost guarantee we've got something helpful here for you.

Did you know there are different kinds of hackers?

Well, they're all people at the end of the day, but there are different color "hats" depending on the hacker's talent and profession.

Learn what those colors are here.

Blue hat

Good guys

Blue hats are defense-oriented ethical security researchers

Red hat

Good guys

Red hats are offense-oriented ethical security researchers

Green hat

Good guys

Green hats are ethical security researchers who are still learning and maturing their tradecraft

Purple hat

Good guys

Purple hats are ethical security researchers that practice both offensive and defensive security tradecrafts

White hat

Rarely a bad guy

White hats are "hackers" who place a high regard on laws, morals, and/or ethics during their operations. White hat hackers typically work with proactive respect to the law during their research efforts

Grey hat

Sometimes a bad guy

Grey hats are "hackers" who perform technically illicit actions during their operations to achieve success regardless of their means or motive, but infrequently target without cause. Think "Robin Hood Complex"

Black hat

Always a bad guy

Black hats are "hackers" who intentfully seek to commit eCrime acts in part of, or as a whole of their operations. Ransomware actors are black hats, as an example

Blue hats

Red hats

Green hats

Purple hats

White hats

Grey hats

Black hats

Their tools?

Their knowledge?

Here, have it.


Our knowledgebase includes court case reviews and write-ups, documentation on a selection of offensive and defensive CyberTools, and much more!

Got something to add to it? Submit it in a Pull Request, and we'll accept it if it's high quality.


Looking for cloud hosting? virtual servers? object storage?

Unlock the full potential of your development projects with Linode's robust cloud hosting solutions. From deploying applications to managing databases and scaling infrastructure, Linode empowers developers with the flexibility and performance they need to bring their visions to life. With their intuitive control panel and comprehensive, class-leading API alongside developer-friendly documentation, managing your cloud infrastructure has never been easier. Whether you're building the next big app, running a high-traffic website, or experimenting with new technologies, Linode offers the reliability and scalability to support your endeavors.

Join the thousands of developers who have trusted Linode since 2003 for their hosting needs by using the link below to start with $100 free credit1 as a welcome bonus.

Note: GPUs are excluded from this promotion. A valid payment method is required. Credits expire 60 days from activation.
Once charged for the first time, 7-day money back guarantee applies.



Tooling is half the trade

Whether you're reverse engineering a nasty piece of malware, performing network recon, hunting humans and property, or simply looking to expand your selection of useful tools, here's pieces of software and services we think you'll find useful.


Cursor IDE

AI-first Code Editor that lets you build software faster in an editor designed for pair-programming with AI. Supports both Cursor account creation, but also OpenAI API Keys if you have a billing method already linked to your OpenAI account.


Atom Editor

A free and open-source, but since killed, text and source code editor for macOS, Linux, and Windows with support for plug-ins written in JavaScript, and embedded Git Control.


Google Earth Pro

Google Earth Pro on desktop is free for users with advanced feature needs. Import and export GIS data, and go back in time with historical imagery. Available on PC, Mac, or Linux.



Maltego is the all-in-one tool for link analysis, offering real-time data mining and information gathering, as well as the representation of this information on a node-based graph, making patterns and multiple order connections between said information easily identifiable.



Autopsy is the premier open source forensics platform which is fast, easy-to-use, and capable of analyzing all types of mobile devices and digital media. Its plug-in architecture enables extensibility from community-developed or custom-built modules. Autopsy evolves to meet the needs of hundreds of thousands of professionals in law enforcement, national security, litigation support, and corporate investigation. Mac/Linux Version



OSIRT is your investigation, simplified; it provides a comprehensive, all-in-one platform from artefact capture to report to court, all without the need to be an expert user. OSIRT is designed for Windows and includes a browser, ensuring the full and transparent capture of online artefacts, such as screenshots, source code and embedded videos. Requires you install included pre-reqs first.



Malcore is the fastest commercial sandbox on the market, leveraging a powerful reverse engineering platform at its core. Seamlessly integrating into browser, desktop, and email environments, Malcore accelerates threat identification through its automated analysis function, saving your team valuable time compared to manual code review or traditional VM setup.