Skip to main content
Tools
18 Tools

Hashes, subnets, timestamps, JWT, certs, regex, packet decode — plus a push-token identifier. All local. Several have a single-file Python version you can download.

HashSubnetJWTEmail HeadersRegexCert
Code Playground
5 Languages

Live Python, JavaScript, Go, Ruby, and Bash execution. Pre-loaded with cyber-relevant snippets.

PythonJavaScriptGoRubyBash
OSINT Reference
10 Sections

Search operators, username and email enum, image / social / infra workflows — plus a sock-puppet OPSEC playbook and 5 investigation workflows that tie tools together.

Search OpsPeople SearchSock PuppetInfraDark Web
Pentesting
10 Sections

Recon → AD → reporting. Metasploit, web-app testing, password attacks, post-exploit, AD attack chains.

MetasploitBloodHoundSQLiPrivEscAD
Malware Analysis
8 Sections

PE structure, static analysis workflow, packer signatures, YARA, C2 beacon patterns, evasion techniques, family reference.

PE StructureYARAPackersC2Evasion
Network Utilities
5 Sections

Ports with security notes, Wireshark display filters, Nmap reference, protocol quick-ref (DNS, HTTP, TLS, ICMP, ARP, SMB), attack signatures.

PortsWiresharkNmapProtocolsAttack Sigs
Digital Forensics
5 Sections

Windows · Linux · macOS artifact paths, registry hives, execution evidence, memory workflow, tool cheat sheets.

WindowsLinuxmacOSMemoryX-Ways
Cloud Security
8 Sections

AWS · Azure · GCP services, audit-log events, IAM attack paths, K8s chains, storage misconfigs. The cloud-IR runbook is the part I actually reach for.

AWSAzureGCPIAMK8sIR
Mobile Forensics
17 Sections

iOS + Android paths, acquisition, SQLite, ADB. Plus the artifacts AXIOM / Cellebrite extract but don't identify — push tokens, app groups, install attribution, notification cache.

AndroidiOSADBSQLite
RF / TSCM
14 Sections

Frequency reference, path-loss math, sweep methodology — written around the TSCM workflow I use, not generic SDR tutorial stuff.

Freq RefSweepBug FreqSDRCounter-Surv