RESOURCE LIBRARY
The Vault
481 curated cybersecurity resources โ reports, frameworks, cheat sheets, and field guides. Free and open knowledge for the security community.
These resources are shared for educational and informational purposes only. All documents remain the intellectual property of their original authors and organizations. Credits are included within each document. If you are a rights holder and would like a resource removed, please contact us โ we'll act within 48 hours.
481
๐
Threat Intelligence
62CTI Frameworks
MITRE ATT&CK
5 Common Ransomware ATT CK Techniques pdf
AiTM Attacks
applied MITRE Cybercube
Checkpoint Attack Trends 2022
Cloud Security with MITRE ATT CK
Decider open source MITRE ATT CK mapping
Framework Evaluating Emerging Cyberattack Capabilities AI (1)
GETTING STARTED WITH ATT CK
Malwares used in cyber attacks impacting Ukraine
MITRE ATTACK
Russia Ukraine Conflict Related Cyberattacks
Stopping Attacks with Cookies
Top 10 Blockchain Attacks Vulnerabilities Weaknesses
Using MITRE ATT CK in Threat Hunting and Detection
Threat Actors & Campaigns
BeaverTail Infostealer DPRK
CISA LockBit 3 0
Information Stealers
Information-Stealer-Malware-Advisory
Lithuania National Threat Assessment 2022
Lumma Stealer Advanced Information Stealer Report
MICROSOFTMAR22-CERT-IL-W-1433
MICROSOFTOCT21-CERT-IL-W-1388
Mitigating Russian Threats to U S Critical Infrastructure
NATION STATE RANSOMWARE pdf
Operation Winter Shield Ten Actions to Improve Cyber Resilience
OPISRAEL 2023-3
Rookie Of The Year Lapsus Group
Russia s Strategy in Cyberspace
SMISHING-CERT-IL-W-998
Special report Ukraine RB
ืืืืฆืืช ืืื ื ืืืจืืื ืื ืืืืจืืื OPISRAEL
ืืืืฆืืช ืืืืจืืื - OpIsrael 2021 (1)
ืกืืืื OpIsrael ืืจื ืืกื
Threat Hunting
Threat Reports
5 Key Cyber Threat Trends 2022 Open to discussing this
Adversarial Threat Report Meta
ATA-2025-Unclassified-Report
ATA-2026-Unclassified-Report 260318 182641
cloud threat horizons report h12026 260310 211244
cloud threat horizons report h22025 250731 123846
Cyber Threat Trends 2022
Cybersecurity mitigation measures against critical threats
ENISA Threat Landscape for Ransomware Victoria Beckman
Global Threat Report 2022
impact-ai-cyber-threat-now-2027
Intel471 Cyber Threats 2022
INTERNET ORGANISED CRIME THREAT ASSESSMENT 2021
Masscan Ransomware Threat Analysis Report RB
Modern Cloud Threat Horizon
Ransomware Threat Report 2022
RSecurity 2024 Global Cyber Threat Landscape Report
Threat Landscape
wp-threat-prediction-2023
๐จ
Incident Response
36Digital Forensics
Log Analysis
Malware Analysis
Playbooks & Guides
2-IR01 - Incidents Response Intro (1)
Anatomy of an Incident
AWS Security Incident Response Guide
Cyber IR playbook
Cyber Security Incident Vulnerability Response Playbooks
CYBER SECURITY INCIDENTS MANAGEMENT
Cybersecurity Incident Response Plan
Cybersecurity Incident Vulnerability Response Playbooks
Cybersecurity Incident Vulnerability Response Playbooks
Incident Response Play Books Unauthorized Access
Incident Response Playbook MS
Incident response playbook Phishing investigation
Incident Response Playbooks and Workflows
Log4J SOC Incident Response
Public Power Grid cyber incident response playbook
Top Incident Response Exercises for Common Cyber Attacks
What To Do If Your Company Has Been Hacked
โ๏ธ
Penetration Testing
41Active Directory Attacks
Offensive Security
Active Directory Pentesting Mind Map
AD Exploitation
AI Pentesting Superhuman Performance Now
Bug Bounty Career
Bug Bounty Hunting
Cloud Pentesting Cheatsheet
Drozer
File Transfer Cheatsheet
Final Purple Team Exercise Framework PTEFv2 pdf
Hacking with Golang
Infrastructure Penetration Testing Course Online
Infrastructure Penetration Testing Course Online
Jumping the air gap
Master Infrastructure Penetration Testing
Network Penetration Testing Course Online
Offensive Active Directory 101 pdf
OFFENSIVE SECURITY EVASION TECHNIQUES PT 1
OSCP Notes Active Directory
OSCP-Certificate-notes-
RDP
Red Team Field Manual
Red Team Field Manual
SHODAN for Penetration Testers
The State of Pentesting 2022 pdf
Ultimate Guide To Penetration Testing
Windows Active Directory Exploitation
wordpress Pentest
๐ก๏ธ
Blue Team & SOC
27Cheat Sheets
Endpoint Detection
SOC Operations
Azure Sentinel Deployment best Practices
Blue Team Cheat Sheet
Blue Team Cheat Sheets
brochure-soc-powered-by-kl-eng
Build A SOC on a budget
cyber security blueteam strategies
Designing and Building A Security Operations Center
How to Build a Security Operation Center on Budget
Install a SIEM on a Linux Server
Investigation the Spring4Shell Incident in SOC
Microsoft Sentinel
Modernizing Your SOC - David Swift
Qradar
Security operation center Opene Source
Sentinel Best Practice Microsoft BlueVoyant
Sentinel Use Case for BEC
SIEM Detection Risk
SOC MS
SOC Powered by KL EN
SOCTOM whitepaper
V0.6 ืขืืชืง ืฉื ืืจืืฉืืช ืฉืืจืืช SOC ืื ืืื
๐ฆ
Ransomware & Malware
16Phishing & Social Engineering
Ransomware
๐ต๏ธ
OSINT & Intelligence
29OSINT Tools & Techniques
Platform Attack Surfaces
Discord OSINT Attack Surface
DWM OSINT Attack Surface
EMAIL OSINT Attack Surface
Gab OSINT Attack Surface
Gettr OSINT Attack Surface
Github OSINT Attack Surface
IMAGE OSINT Attack Surface
Instagram OSINT Attack Surface
IP Address OSINT Attack Surface
LinkedIn OSINT Attack Surface
Mastodon OSINT Attack Surface
OpenSea OSINT Attack Surface
Person OSINT Attack Surface
Pinterest OSINT Attack Surface
PokemonGo OSINT Attack Surface
Reddit OSINT Attack Surface
Skype OSINT Attack Surface
Snapchat OSINT Attack Surface
Telephone Number OSINT Attack Surface
TikTok OSINT Attack Surface
Tumblr OSINT Attack Surface
Twitter OSINT Attack Surface
USERNAME OSINT Attack Surface
Website OSINT Attack Surface
Youtube OSINT Attack Surface
โ๏ธ
Cloud Security
17AWS
Azure
Cloud Security
๐
Network & Infrastructure
21Active Directory
Microsoft Security
Network Security
๐
Application Security
10Authentication
Secure Development
๐ค
AI & Emerging Tech
15AI & Cybersecurity
AICM Bundle - Presentation 20251020
ChatGPT for Offsec
ChatGPT SecurityImplications pdf
Cybersecurity Implications of ChatGPT
DeepSeek Ai assessment report
DeepSeek Final 250420 061224
Generative AI and ChatGPT Enterprise Risk
Gmail - CyberInsight Weekly Brief - 9 27 2025
Hallucinated Intelligence
Jailbreaking LLMs with Information Overload
Response for AI Loss of Control Incidents
๐ญ
Critical Infrastructure
13Financial Sector
Healthcare
OT & ICS
05f655843 CyberInsightMagazineIssue06-Nov25SE-ManufacturingSector
BRIDGING THE GAPS IN OT CYBERSECURITY PROGRAMS RB
Civil nuclear cyber security strategy 2022
Cybersecurity Basics
Fortinet OT Security Workshop and Hands on Lab
Manufacturing Execution Systems (MES)
mfg-recovery-project-description-final
OT-Security-Incidents-ebook FINAL
Predicts 2022 CyberPhysical Systems Security
Securing Critical Infrastructure
Statistics on Small Business Cyber Crime
๐
Compliance & Standards
71CIS Benchmarks
CIS Distribution Independent Linux Benchmark v2.0.0
CIS GitHub Benchmark v1.0.0 PDF
CIS Microsoft 365 Foundations Benchmark v1.5.0
CIS Microsoft 365 Foundations Benchmark v1.5.0 2
CIS Microsoft Edge Benchmark v1.1.0
CIS Microsoft Exchange Server 2016 Benchmark v1.0.0
CIS Microsoft IIS 10 Benchmark v1.2.0
CIS Microsoft Intune for Windows 11 Benchmark v1.0.0
CIS Microsoft Office Enterprise Benchmark v1.0.0
CIS Microsoft Windows 10 Enterprise Release 2004 Benchmark v1.9.1
CIS Microsoft Windows 11 Stand-alone Benchmark v1.0.0
CIS Microsoft Windows Server 2012 R2 Benchmark v2.6.0
CIS Microsoft Windows Server 2016 Benchmark v1.4.0
CIS Microsoft Windows Server 2019 Benchmark v1.3.0
CIS Microsoft Windows Server 2022 Benchmark v1.0.0
CIS Multi-Function Device Benchmark v1.0.0
CIS Software Supply Chain Security Guide RB
CIS Zoom Benchmark v1.0.0 PDF
GRC
Cyber Security Governance Principles Oct 2022
DFARS FCA Settlement - December 2025
GRC Ecosystem
ITGC Martix
LLM AI Cybersecurity Governance Checklist
Modular Security Requirements
Organizational Cyber Readiness to the Post Quantum Age
Security Obligations โ Cyber Security Exercise 241203 182938
The SOC 2 Compliance Handbook
HIPAA
ISO 27001
27001 ISO
ISMS Implementation Guideline 27001
ISO 22301 Business Continuity business case
ISO 27001 Advantages and Disadvantages
ISO 27001 controls 2022, 230313
ISO 27001 Mandatory Document
ISO 27001 Mind Map
ISO 27011 Information Security Checklist
ISO IEC 27001-2022
ISO27k ISMS 6.1 SoA 2022
NIST CSF 2 0 Vs ISO 27001 2022 Mapping
NIST
C2M2 v2 1
CSF 2 0
Microsoft 365 the NIST cybersecurity framework
NIST Access Control Guidance For Cloud Systems
NIST Cybersecurity for Small Businesses The Fundamentals
NIST Cybersecurity Framework Policy
NIST Cybersecurity Supply Chain Risk Management Practices
NIST Risk Management Framework
NIST Risk Management Framework
NIST.SP.800-161r1
PDS NIST Cybersecurity Framework RACI
PCI DSS
Privacy & Regulations
Security Assessments
โ๏ธ
Risk Management
25Cyber Insurance
Risk Frameworks
AI Risk Management Framework
Allianz Risk Barometer 2026
allianz-risk-barometer-2026 260309 222204
Business Impact Analysis
Cyber Compliance Is Fraud Risk
Cyber-Risk-Oversight-Handbook WEB
Effective Enterprise Risk Management
Healthcare Supply Chain Cybersecurity Risk Management
Next Generation Cyber Risk Management
potential risk indicators foreign considerations
risk
Risk Assessment and Treatment process
Risk Management Framework
Risk Management Framework
risk management user
RISK RiskLens Annual Report
The Global Risks Report 2022
The Vulnerability Assessment Mitigation Methodology
TheNecessityofCyberRiskQuantification-1 230511 060352
Supply Chain
Vulnerability Management
๐
Industry Reports
62Annual & Special Reports
Breach Reports
CISO Resources
Cyber Insight Magazine
86c00b46f CyberInsightMagazineIssue08-Dec25
98fd178ce CyberInsightMagazineIssue09-Dec25
c99a5f15e CyberInsightMagazineIssue05-Oct25SE-HealthSector
Cyber Insight Magazine Issue 01 - September 2025
Cyber Insight Magazine Issue 02 - September 2025
Cyber Insight Magazine Issue 07 - Nov 25
CyberInsight Magazine Issue 03 - Special Edition
CyberInsight Magazine Issue 04 - October 2025
Research Papers
Surveys & Research
Trends & Forecasts
Vendor Reports
2022-06-24-csiac-dod-cybersecurity-policy-chart
6 Cybersecurity Trends you can expect in 2023
Building a Cybersecurity and Privacy Learning Prog
Cybersecurity Acronyms
Cybersecurity as a Matter of Competitive Advantage
Cybersecurity for Industry 4 0
Cybersecurity for SMB
Cybersecurity for startups
Cybersecurity Infographic
Cybersecurity Resource and Reference Guide
CyberSecurity skills in the UK 2022 RB
Cybersecurity Terms
cybersecurity-forecast-2026-en
Executive Guide to Cybersecurity for SMBs-1
Global Cybersecurity Outlook 2022
Global Cybersecurity Outlook 2025
kaspersky-threat-data-feeds-datasheet
M Trends 2022
M Trends Report 2025
m-trends-2025-en
Mandiant M Trends 2023
Microsoft-Digital-Defense-Report-2025
National CyberSecurity Guide RB
SPECIAL REPORT MANDIANT M TRENDS 2022
Star Wars Cybersecurity
State of Cybersecurity 2022
Top 50 Cybersecurity Questions
update ms-isac-cybersecurity-resources guide 51822
WEF Global Cybersecurity Outlook 2025 250113 213446
๐ฐ
Defense Strategies
7General Defense
2022 CYBER DEFENDERS PLAYBOOK
A Guide to Activating Cyber Defense
CERT EU Security Guidance 22 001
Strategic Decision Making Process Guide Crisis Man 250703 190236
Strategies to Mitigate Cyber Security Incidents
Sub Optimal Strategies in Cyberspace
The Defensers Advantage
๐
Career & Certifications
13Certifications & Career
ceh notes
CEH v11 Practical Test
Certified Ethical Hacker CEH Summarized by Mohammad Alkhudari
CISSP Exam Study Guide
CISSP Guide
CISSP ืชืืืช ืืืฆืจ
CISSP-Study-Guide-2021
Security Plus 200 Questions and Answers Test Prep
Slides How to Burn Out in Infosec
ืฉืืืืช ืืชืฉืืืืช ืืจืืืื ืืช ืขืืืื ืืชืืื ืืกืืืืจ ืืืืืืช ืืืืืข
Quick References
๐งฐ
Tools & Resources
9Guides & Tools
A Practical Guide for a Successful SOC
Conceptual Guide to Enterprise Cyber Security 2023-1
FREE Open Source Security Tools
FREE Open Source Security Tools
Information Security Handbook
Prioritized-Approach-Tool-v3 2 1
RedTeam Tools
SOC Tools
Wireshark User Guide
๐ฎ๐ฑ
Hebrew Resources (ืขืืจืืช)
7General
10 ืืืื ืืืื ืืฉืืืจื ืขื ืืืืื ืืืืืืืืืื ืืืื ืืืืื!
ืืื ื ืืืืืืชืืช- ืกืงืืืจ ืคืื ื ืกื ืืื ืืฆืืืช ืืืื ืืฉืจืื 12.25
ืืื ืืืืืช ืืชืงืคืช ืกืืืืจ ืฆืคืื ืงืืจืืื ืืช
ืืืื ืืืช ืืืฉืื ืกืืืืจ 2021
ืืืจืื ืืฉืืืืฉ ืืืจืื ืืืื ื ืืืืืืชืืช ืืืืืจ ืืฆืืืืจื - 250604 130228
ืชืงืื ื ืืกืืืืจ
ืชืงื ืืช ืืืืืช ืืืืข