RESOURCE CENTER

Resources for all, for a job that needs doing

From free software, to guides and recommendations, we can almost guarantee we've got something helpful here for you. Take a look!

stack
HACKERS OF MANY HATS

Ever heard of a hacker referred to as an "x-hat"?

There are alot of roles, specialties, and talents in CyberSecurity. Here's the rundown.

Builders

"Builder" class researchers are security researchers, analysts, and other roles that are mainly present in a corporate setting. You as a simple person yourself probably don't have a selection of these researchers hired, but the company you work for probably does. These are the roles that watch over your accounts, photos, and data while you're at work and at rest. These are the "hackers" that are "friendly" or destined to be.

Blue-hats

Blue hats are defense-oriented ethical security researchers

Red-hats

Red hats are offense-oriented ethical security researchers

Green-hats

Green hats are ethical security researchers who are still learning and maturing their tradecraft

Purple-hats

Purple hats are ethical security researchers that practice both offense and defense

Breakers

"Breaker" class hackers are security researchers and penetration testers, but otherwise individuals or unofficial groups, that may lack regard for lawful operations and instead have one of three nominal bends to them: white, grey, or black, with the darker the shade indicating much more egregious will, want, and way. Make no mistake, while you may find these hackers doing acts you may wish to applaud, these are not always "friendly" hackers and should not be assumed as such. Regardless of permissiveness or authority, these hats fall under the "Breakers" category due to inevitable violations of the law, even during "ethical" or "morally appropriate" operations. Note that there is an observable separation of Law and Social Policy in CyberSecurity; some things that you might think are illegal aren't, and some things you might not think are illegal, actually are, but only if you don't do certain things connected.

GENERALLY FRIENDLY

White-hats

White hats are "hackers" who place a high regard on laws, morals, and ethics during operations, and will typically proactively work with respect-in-mind to the law during their research

INCREASINGLY UNPREDICTABLE

Grey-hats

Grey hats are "hackers" who will do what they align morally with, regardless of legality, to achieve operative success or result

BAD TO THE BONE

Black-hats

Black hats are "hackers" who intentfully seek to commit eCrime acts in their operations, or as part of fulfilling their operations

Their tools? Their knowledge?

Here, have it.

LEARN SOMETHING NEW

Our knowledgebase includes court case reviews and write-ups, documentation on a selection of offensive and defensive CyberTools, and much more!

Got something to add to it? Submit it in a Pull Request, and we'll accept it if it's high quality.

Tooling is half the trade

Whether you're reverse engineering a nasty piece of malware, performing network recon, hunting humans and property, or simply looking to expand your selection of useful tools, here's pieces of software and services we think you'll find useful.

DEVELOPMENT

Cursor IDE

AI-first Code Editor that lets you build software faster in an editor designed for pair-programming with AI. Supports both Cursor account creation, but also OpenAI API Keys if you have a billing method already linked to your OpenAI account.

 
TEXT EDITING

Atom Editor

A free and open-source, but since killed, text and source code editor for macOS, Linux, and Windows with support for plug-ins written in JavaScript, and embedded Git Control.

GEO-INT

Google Earth Pro

Google Earth Pro on desktop is free for users with advanced feature needs. Import and export GIS data, and go back in time with historical imagery. Available on PC, Mac, or Linux.

INVESTIGATION

Maltego

Maltego is the all-in-one tool for link analysis, offering real-time data mining and information gathering, as well as the representation of this information on a node-based graph, making patterns and multiple order connections between said information easily identifiable.

INVESTIGATION

Autopsy

Autopsy is the premier open source forensics platform which is fast, easy-to-use, and capable of analyzing all types of mobile devices and digital media. Its plug-in architecture enables extensibility from community-developed or custom-built modules. Autopsy evolves to meet the needs of hundreds of thousands of professionals in law enforcement, national security, litigation support, and corporate investigation. Mac/Linux Version

OSINT

OSIRT

OSIRT is your investigation, simplified; it provides a comprehensive, all-in-one platform from artefact capture to report to court, all without the need to be an expert user. OSIRT is designed for Windows and includes a browser, ensuring the full and transparent capture of online artefacts, such as screenshots, source code and embedded videos. Requires you install included pre-reqs first.

REVERSE ENGINEERING AND ANALYSIS

Malcore

Malcore is the fastest commercial sandbox on the market, leveraging a powerful reverse engineering platform at its core. Seamlessly integrating into browser, desktop, and email environments, Malcore accelerates threat identification through its automated analysis function, saving your team valuable time compared to manual code review or traditional VM setup.
 

Get news, alerts, and more!

We send a weekly summary newsletter, plus exclusive offers, coupons, tips, tricks, guides, and more

Subscribe to our weekly summary