RESOURCE LIBRARY
The Vault
436 curated cybersecurity resources โ reports, frameworks, cheat sheets, and field guides. Free and open knowledge for the security community.
๐ These resources are shared for educational and informational purposes only. All documents remain the intellectual property of their original authors and organizations. Credits are included within each document. If you are a rights holder and would like a resource removed, please contact us โ we'll act within 48 hours.
436
๐
Threat Intelligence
62CTI Frameworks
MITRE ATT&CK
5 Common Ransomware MITRE ATT&CK Techniques
NEW
AiTM Attacks
NEW
Applied MITRE ATT&CK โ CyberCube
NEW
Checkpoint Attack Trends 2022
NEW
Cloud Security with MITRE ATT&CK
NEW
Decider: Open-Source MITRE ATT&CK Mapping Tool
NEW
Framework for Evaluating Emerging AI Cyberattack Capabilities
NEW
Getting Started with MITRE ATT&CK
NEW
Malwares used in cyber attacks impacting Ukraine
NEW
MITRE ATT&CK Overview
NEW
Russia Ukraine Conflict Related Cyberattacks
NEW
Stopping Attacks with Cookies
NEW
Top 10 Blockchain Attacks Vulnerabilities Weaknesses
NEW
Using MITRE ATT&CK in Threat Hunting & Detection
NEW
Threat Actors & Campaigns
BeaverTail Infostealer DPRK
NEW
CISA Advisory: LockBit 3.0 Ransomware
NEW
Information Stealers
NEW
Information-Stealer-Malware-Advisory
NEW
Lithuania National Threat Assessment 2022
NEW
Lumma Stealer Advanced Information Stealer Report
NEW
CERT-IL Advisory W-1433 โ Microsoft (March 2022)
NEW
CERT-IL Advisory W-1388 โ Microsoft (October 2021)
NEW
Mitigating Russian Threats to U S Critical Infrastructure
NEW
Nation-State Ransomware Analysis
NEW
Operation Winter Shield Ten Actions to Improve Cyber Resilience
NEW
OpIsrael 2023 Analysis
NEW
Rookie Of The Year Lapsus Group
NEW
Russia s Strategy in Cyberspace
NEW
CERT-IL Advisory W-998 โ Smishing Threats
NEW
Special report Ukraine RB
NEW
ืืืืฆืืช ืืื ื ืืืจืืื ืื ืืืืจืืื OPISRAEL
NEW
ืืืืฆืืช ืืืืจืืื - OpIsrael 2021 (1)
NEW
ืกืืืื OpIsrael ืืจื ืืกื
NEW
Threat Hunting
Threat Reports
5 Key Cyber Threat Trends (2022)
NEW
Adversarial Threat Report Meta
NEW
Annual Threat Assessment 2025 (Unclassified)
NEW
Annual Threat Assessment 2026 (Unclassified)
NEW
Google Cloud Threat Horizons Report H1 2026
NEW
Google Cloud Threat Horizons Report H2 2025
NEW
Cyber Threat Trends 2022
NEW
Cybersecurity mitigation measures against critical threats
NEW
ENISA Threat Landscape for Ransomware
NEW
Global Threat Report 2022
NEW
Impact of AI on Cyber Threats โ 2027 Outlook
NEW
Intel471 Cyber Threats 2022
NEW
Internet Organised Crime Threat Assessment (2021)
NEW
Masscan Ransomware Threat Analysis Report
NEW
Modern Cloud Threat Horizon
NEW
Ransomware Threat Report 2022
NEW
R-Security Global Cyber Threat Landscape 2024
NEW
Threat Landscape
NEW
Threat Predictions 2023
NEW
๐จ
Incident Response
33Digital Forensics
Log Analysis
Malware Analysis
Playbooks & Guides
Incident Response Introduction
NEW
Anatomy of an Incident
NEW
AWS Security Incident Response Guide
NEW
Cyber IR playbook
NEW
Cyber Security Incident Vulnerability Response Playbooks
NEW
CYBER SECURITY INCIDENTS MANAGEMENT
NEW
Cybersecurity Incident Response Plan
NEW
Incident Response Play Books Unauthorized Access
NEW
Incident Response Playbook MS
NEW
Incident response playbook Phishing investigation
NEW
Incident Response Playbooks and Workflows
NEW
Log4J SOC Incident Response
NEW
Public Power Grid cyber incident response playbook
NEW
Top Incident Response Exercises for Common Cyber Attacks
NEW
What To Do If Your Company Has Been Hacked
NEW
โ๏ธ
Penetration Testing
37Active Directory Attacks
Offensive Security
Active Directory Pentesting Mind Map
NEW
Active Directory Exploitation Techniques
NEW
AI Pentesting Superhuman Performance Now
NEW
Bug Bounty Career
NEW
Bug Bounty Hunting
NEW
Cloud Pentesting Cheat Sheet
NEW
Drozer Mobile Security Testing Guide
NEW
File Transfer Cheat Sheet
NEW
Purple Team Exercise Framework (PTEF) v2
NEW
Hacking with Golang
NEW
Jumping the air gap
NEW
Master Infrastructure Penetration Testing
NEW
Network Penetration Testing Course Online
NEW
Offensive Active Directory 101
NEW
Offensive Security Evasion Techniques โ Part 1
NEW
OSCP Notes: Active Directory Attack Paths
NEW
OSCP Certification Notes
NEW
Remote Desktop Protocol (RDP) Security
NEW
SHODAN for Penetration Testers
NEW
The State of Pentesting (2022)
NEW
Ultimate Guide To Penetration Testing
NEW
Windows Active Directory Exploitation
NEW
WordPress Penetration Testing Guide
NEW
Web Application Attacks
2022 in WAF bypasses
NEW
XSS Backdoor Techniques (DW103-5)
NEW
Microsoft SQL Server Security
NEW
MySQL Security Guide (8.0)
NEW
PortSwigger XSS Cheatsheet
NEW
Server Side Vulnerability
NEW
Top 10 Remote Code Execution RCE Parameter Attacks
NEW
XML External Entity Prevention Cheat Sheet
NEW
Cross-Site Scripting (XSS) Guide
NEW
๐ก๏ธ
Blue Team & SOC
27Cheat Sheets
Endpoint Detection
SOC Operations
Azure Sentinel Deployment best Practices
NEW
Blue Team Cheat Sheet
NEW
Blue Team Cheat Sheets
NEW
Kaspersky SOC Services Brochure
NEW
Build A SOC on a budget
NEW
cyber security blueteam strategies
NEW
Designing and Building A Security Operations Center
NEW
How to Build a Security Operation Center on Budget
NEW
Install a SIEM on a Linux Server
NEW
Investigation the Spring4Shell Incident in SOC
NEW
Microsoft Sentinel
NEW
Modernizing Your SOC โ David Swift
NEW
IBM QRadar SIEM Guide
NEW
Security operation center Opene Source
NEW
Microsoft Sentinel Best Practices โ BlueVoyant
NEW
Sentinel Use Case for BEC
NEW
SIEM Detection Risk Analysis
NEW
SOC with Microsoft Sentinel
NEW
SOC Powered by KL EN
NEW
SOC Technology Operations Model (SOCTOM)
NEW
Managed SOC Service Requirements v0.6 (ืขืืจืืช)
NEW
๐ฆ
Ransomware & Malware
16Phishing & Social Engineering
Ransomware
2022 CISO Circuit Ransomware Report
NEW
Common TTPs of Modern Ransomwares
NEW
Common TTPs of Modern Ransomware
NEW
Ransomware Facts
NEW
Ransomware Risk Management
NEW
The Ransomware Ecosystem
NEW
VirusTotal Ransomware Report (2021)
NEW
ืืืืจ ืืกืืืจืืช ืืืืจืืข ืืืคืจื V2
NEW
๐ต๏ธ
OSINT & Intelligence
29OSINT Tools & Techniques
Platform Attack Surfaces
Discord OSINT Attack Surface
NEW
DWM OSINT Attack Surface
NEW
EMAIL OSINT Attack Surface
NEW
Gab OSINT Attack Surface
NEW
Gettr OSINT Attack Surface
NEW
Github OSINT Attack Surface
NEW
IMAGE OSINT Attack Surface
NEW
Instagram OSINT Attack Surface
NEW
IP Address OSINT Attack Surface
NEW
LinkedIn OSINT Attack Surface
NEW
Mastodon OSINT Attack Surface
NEW
OpenSea OSINT Attack Surface
NEW
Person OSINT Attack Surface
NEW
Pinterest OSINT Attack Surface
NEW
PokemonGo OSINT Attack Surface
NEW
Reddit OSINT Attack Surface
NEW
Skype OSINT Attack Surface
NEW
Snapchat OSINT Attack Surface
NEW
Telephone Number OSINT Attack Surface
NEW
TikTok OSINT Attack Surface
NEW
Tumblr OSINT Attack Surface
NEW
Twitter OSINT Attack Surface
NEW
USERNAME OSINT Attack Surface
NEW
Website OSINT Attack Surface
NEW
Youtube OSINT Attack Surface
NEW
โ๏ธ
Cloud Security
15Azure
Cloud Security
๐
Network & Infrastructure
18Active Directory
Active Directory Enumeration with PowerShell
NEW
Active Directory Security Assessment
NEW
Active Directory Security Checklist
NEW
Advanced Browser Security Datasheet
NEW
Advanced Browser Security Datasheet
NEW
Integration of Ubuntu in Active Directory
NEW
Securing Active Directory
NEW
Microsoft Security
Network Security
๐
Application Security
10Authentication
Secure Development
๐ค
AI & Emerging Tech
15AI & Cybersecurity
AI & Cybersecurity Management Presentation
NEW
ChatGPT for Offsec
NEW
ChatGPT Security Implications
NEW
Cybersecurity Implications of ChatGPT
NEW
DeepSeek Ai assessment report
NEW
DeepSeek AI Security Assessment (Final)
NEW
Generative AI and ChatGPT Enterprise Risk
NEW
Cyber Insight Weekly Brief (Sep 27, 2025)
NEW
Hallucinated Intelligence: AI Security Risks
NEW
Jailbreaking LLMs with Information Overload
NEW
Response for AI Loss of Control Incidents
NEW
๐ญ
Critical Infrastructure
13Financial Sector
OT & ICS
Cyber Insight Magazine Issue 06 โ Manufacturing Sector (Nov 2025)
NEW
Bridging the Gaps in OT Cybersecurity Programs
NEW
Civil nuclear cyber security strategy 2022
NEW
Cybersecurity Basics
NEW
Fortinet OT Security Workshop and Hands on Lab
NEW
Manufacturing Execution Systems (MES) Security
NEW
Manufacturing Recovery Project Guide
NEW
OT-Security-Incidents-ebook FINAL
NEW
Predicts 2022 CyberPhysical Systems Security
NEW
Securing Critical Infrastructure
NEW
Statistics on Small Business Cyber Crime
NEW
๐
Compliance & Standards
47CIS Benchmarks
GRC
Cyber Security Governance Principles Oct 2022
NEW
DFARS FCA Settlement Analysis (Dec 2025)
NEW
GRC Ecosystem Overview
NEW
IT General Controls (ITGC) Matrix
NEW
LLM AI Cybersecurity Governance Checklist
NEW
Modular Security Requirements
NEW
Organizational Cyber Readiness to the Post Quantum Age
NEW
Security Obligations: Cyber Security Exercise
NEW
The SOC 2 Compliance Handbook
NEW
HIPAA
ISO 27001
ISMS Implementation Guideline (ISO 27001)
NEW
ISO 22301 Business Continuity โ Business Case
NEW
ISO 27001: Advantages & Disadvantages
NEW
ISO 27001 Controls (2022)
NEW
ISO 27001 Mandatory Documents Checklist
NEW
ISO 27001 Mind Map
NEW
NIST CSF 2.0 vs ISO 27001:2022 Mapping
NEW
NIST
Cybersecurity Capability Maturity Model (C2M2) v2.1
NEW
NIST Cybersecurity Framework (CSF) 2.0
NEW
Microsoft 365 the NIST cybersecurity framework
NEW
NIST Access Control Guidance For Cloud Systems
NEW
NIST Cybersecurity for Small Businesses The Fundamentals
NEW
NIST Cybersecurity Framework Policy
NEW
NIST Cybersecurity Supply Chain Risk Management Practices
NEW
NIST SP 800-161r1: Supply Chain Risk Management
NEW
NIST Cybersecurity Framework RACI Matrix
NEW
PCI DSS
Privacy & Regulations
Security Assessments
โ๏ธ
Risk Management
23Risk Frameworks
AI Risk Management Framework
NEW
Allianz Risk Barometer 2026
NEW
Allianz Risk Barometer 2026
NEW
Business Impact Analysis
NEW
Cyber Compliance Is Fraud Risk
NEW
Cyber Risk Oversight Handbook
NEW
Effective Enterprise Risk Management
NEW
Healthcare Supply Chain Cybersecurity Risk Management
NEW
Next Generation Cyber Risk Management
NEW
potential risk indicators foreign considerations
NEW
Risk Management Overview
NEW
Risk Assessment and Treatment process
NEW
risk management user
NEW
RiskLens Annual Cyber Risk Report
NEW
The Global Risks Report 2022
NEW
The Vulnerability Assessment Mitigation Methodology
NEW
The Necessity of Cyber Risk Quantification
NEW
Supply Chain
Vulnerability Management
๐
Industry Reports
60Annual & Special Reports
Breach Reports
2022 IC3Report
NEW
Cost of a Data Breach Analysis โ Sam Elkholy
NEW
Cost of a Data Breach Full Report 2022
NEW
Cost of a Data Breach Report 2021
NEW
FBI Flash March 7th
NEW
FBI Internet Crime Report 2021
NEW
FBI NSA and CISA Issue Warning
NEW
IBM Cost of Data Breach Report 2022
NEW
Verizon DBIR 2021
NEW
CISO Resources
Cyber Insight Magazine
Cyber Insight Magazine Issue 08 (Dec 2025)
NEW
Cyber Insight Magazine Issue 09 (Dec 2025)
NEW
Cyber Insight Magazine Issue 05 โ Health Sector (Oct 2025)
NEW
Cyber Insight Magazine Issue 01 (Sep 2025)
NEW
Cyber Insight Magazine Issue 02 (Sep 2025)
NEW
Cyber Insight Magazine Issue 07 (Nov 2025)
NEW
Cyber Insight Magazine Issue 03 โ Special Edition
NEW
Cyber Insight Magazine Issue 04 (Oct 2025)
NEW
Research Papers
Surveys & Research
Trends & Forecasts
Vendor Reports
DoD Cybersecurity Policy Chart (2022)
NEW
6 Cybersecurity Trends to Expect in 2023
NEW
Building a Cybersecurity & Privacy Learning Program
NEW
Cybersecurity Acronyms
NEW
Cybersecurity as a Matter of Competitive Advantage
NEW
Cybersecurity for Industry 4 0
NEW
Cybersecurity for SMB
NEW
Cybersecurity for startups
NEW
Cybersecurity Infographic
NEW
Cybersecurity Resource and Reference Guide
NEW
CyberSecurity skills in the UK 2022 RB
NEW
Cybersecurity Terms
NEW
Google Cybersecurity Forecast 2026
NEW
Executive Guide to Cybersecurity for SMBs-1
NEW
Global Cybersecurity Outlook 2022
NEW
Global Cybersecurity Outlook 2025
NEW
Kaspersky Threat Data Feeds Datasheet
NEW
Mandiant M-Trends 2022
NEW
Mandiant M-Trends 2025
NEW
Mandiant M-Trends 2025
NEW
Mandiant M-Trends 2023
NEW
Microsoft-Digital-Defense-Report-2025
NEW
National Cybersecurity Guide
NEW
Mandiant M-Trends 2022 Special Report
NEW
Star Wars & Cybersecurity (Infographic)
NEW
State of Cybersecurity 2022
NEW
Top 50 Cybersecurity Questions
NEW
MS-ISAC Cybersecurity Resources Guide
NEW
WEF Global Cybersecurity Outlook 2025
NEW
๐ฐ
Defense Strategies
7General Defense
2022 CYBER DEFENDERS PLAYBOOK
NEW
A Guide to Activating Cyber Defense
NEW
CERT EU Security Guidance 22 001
NEW
Strategic Decision Making for Crisis Management
NEW
Strategies to Mitigate Cyber Security Incidents
NEW
Sub-Optimal Strategies in Cyberspace
NEW
The Defensers Advantage
NEW
๐
Career & Certifications
11Certifications & Career
Certified Ethical Hacker (CEH) Notes
NEW
CEH v11 Practical Test
NEW
CEH Summary โ Mohammad Alkhudari
NEW
CISSP Study Guide
NEW
CISSP Treasure Box (ืขืืจืืช)
NEW
Security Plus 200 Questions and Answers Test Prep
NEW
How to Avoid Burnout in InfoSec
NEW
ืฉืืืืช ืืชืฉืืืืช ืืจืืืื ืืช ืขืืืื ืืชืืื ืืกืืืืจ ืืืืืืช ืืืืืข
NEW
Quick References
๐งฐ
Tools & Resources
7
๐ฎ๐ฑ
Hebrew Resources (ืขืืจืืช)
6General
10 ืืืืื ืืฉืืืจื ืขื ืืืืื ืืืืืืืืืื ืืืื ืืืืื
NEW
ืืื ืืืืืช ืืชืงืคืช ืกืืืืจ ืฆืคืื ืงืืจืืื ืืช
NEW
ืืืื ืืืช ืืืฉืื ืกืืืืจ 2021
NEW
ืืืจืื ืืฉืืืืฉ ืืืจืื ื-AI ืืืืืจ ืืฆืืืืจื
NEW
ืชืงืื ื ืืกืืืืจ
NEW
ืชืงื ืืช ืืืืืช ืืืืข (1)
NEW