00
DOCUMENTED TECHNIQUES
00
TOOLS ANALYZED
00
ACTIVE CATEGORIES
00
% THREAT COVERAGE
Offensive and defensive security knowledge base. Techniques, tools and resources for Blue Team, Red Team and beyond.
Detection, log analysis, incident response and threat monitoring. Defensive frameworks and SOC playbooks.
Offensive techniques, vulnerability exploitation, post-exploitation and defense evasion. Professional pentest methodologies.
Curated tools, cheatsheets, scripts and resources. Everything needed to operate on both sides of the digital battlefield.