Security card games help train your skills and enable discussions for various areas of security. Mastering Cybersecurity Through Play,’ your essential guide to the innovative world of security card games.
These games aren’t just entertaining; they’re powerful tools designed to sharpen your skills and foster critical discussions across various domains of security.
From application security to threat modeling, we’ve curated a list of engaging card games that will transform your approach to cybersecurity training and awareness.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…