Resources for all, for a job that needs doing
From free software, to guides and recommendations, we can almost guarantee we've got something helpful here for you. Take a look!
Ever heard of a hacker referred to as an "x-hat"?
There are alot of roles, specialties, and talents in CyberSecurity. Here's the rundown.
"Builder" class researchers are security researchers, analysts, and other roles that are mainly present in a corporate setting. You as a simple person yourself probably don't have a selection of these researchers hired, but the company you work for probably does. These are the roles that watch over your accounts, photos, and data while you're at work and at rest. These are the "hackers" that are "friendly" or destined to be.
Blue-hatsBlue hats are defense-oriented ethical security researchers
Red hats are offense-oriented ethical security researchers
Green hats are ethical security researchers who are still learning and maturing their tradecraft
Purple hats are ethical security researchers that practice both offense and defense
"Breaker" class hackers are security researchers and penetration testers, but otherwise individuals or unofficial groups, that may lack regard for lawful operations and instead have one of three nominal bends to them: white, grey, or black, with the darker the shade indicating much more egregious will, want, and way. Make no mistake, while you may find these hackers doing acts you may wish to applaud, these are not always "friendly" hackers and should not be assumed as such. Regardless of permissiveness or authority, these hats fall under the "Breakers" category due to inevitable violations of the law, even during "ethical" or "morally appropriate" operations. Note that there is an observable separation of Law and Social Policy in CyberSecurity; some things that you might think are illegal aren't, and some things you might not think are illegal, actually are, but only if you don't do certain things connected.
White hats are "hackers" who place a high regard on laws, morals, and ethics during operations, and will typically proactively work with respect-in-mind to the law during their research
Grey hats are "hackers" who will do what they align morally with, regardless of legality, to achieve operative success or result
Black hats are "hackers" who intentfully seek to commit eCrime acts in their operations, or as part of fulfilling their operations
Their tools? Their knowledge?
Here, have it.
LEARN SOMETHING NEW
Our knowledgebase includes court case reviews and write-ups, documentation on a selection of offensive and defensive CyberTools, and much more!
Got something to add to it? Submit it in a Pull Request, and we'll accept it if it's high quality.
Tooling is half the trade
Whether you're reverse engineering a nasty piece of malware, performing network recon, hunting humans and property, or simply looking to expand your selection of useful tools, here's pieces of software and services we think you'll find useful.
Autopsy is the premier open source forensics platform which is fast, easy-to-use, and capable of analyzing all types of mobile devices and digital media. Its plug-in architecture enables extensibility from community-developed or custom-built modules. Autopsy evolves to meet the needs of hundreds of thousands of professionals in law enforcement, national security, litigation support, and corporate investigation. Mac/Linux Version
OSIRT is your investigation, simplified; it provides a comprehensive, all-in-one platform from artefact capture to report to court, all without the need to be an expert user. OSIRT is designed for Windows and includes a browser, ensuring the full and transparent capture of online artefacts, such as screenshots, source code and embedded videos. Requires you install included pre-reqs first.
Get news, alerts, and more!
We send a weekly summary newsletter, plus exclusive offers, coupons, tips, tricks, guides, and more