Skip to main content

Defensive Resources

Defensive Platforms
#

Security Blue Team

  • HTB of blue team training
  • BTL1 and BTL2 certification

LetsDefend

  • Blue team simulations and practice

CyberDefenders

  • Blue team training
  • CCD certification

Malware
#

Malware Unicorn

  • Malware workshops and resources

Crackmes

  • Reverse engineering puzzles

vx-underground

  • Malware samples archive

ANY.RUN

  • Interactive malware sandbox

Malpedia (Fraunhofer FKIE)

  • Malware encyclopedia and intel

0ffset Training Solutions

1vx.ug - Directory

  • Dead link, malware leak archive

Forensics
#

BlueCapeSecurity

  • Forensic courses, labs, and certifications

DFIR Madness

  • DFIR blog and tutorials

Forensic Evidence Files

  • Forensic files for testing / training

CFReDS Portal

  • Forensic datasets for testing / training

Autopsy - Training

  • Autopsy tool training

Memory Forensics

  • Malware / memory forensics training

Other
#

T-Pot - The All In One Honeypot Platform 🐝

  • Honeypot platform tool

DFIR Diva

  • DFIR resource site

Cyberwox Academy

  • Cybersecurity courses

Sleuth Kit Labs

  • Digital forensics software solutions

Metasploitable Hardening Guide

  • Metasploitable defensive guide

Defensive Security

  • Defense security training and PurpleLabs

aceresponder.com

  • Defensive labs + cert (EDS)

Leveleffect

  • Defensive training

The DFIR Report - Real Intrusions by Real Attackers, The Truth Behind the Intrusion

  • DFIR Report reference / collection

APT

  • APT list with info

https://start.me/p/wMrA5z/cyber-threat-intelligence

  • Threat intel stuff

Lists
#

WTFBins

  • List of binaries that aren’t suspicious

LOTS Project - Living Off Trusted Sites

  • Trusted site exploitation research

MalAPI.io

  • List of Windows APIs that map to malware techniques

Filesec.io

  • List of file extensions used by attackers