VC Cyber Solutions
  • Home
  • News
  • IT & Cyber Resources
    • IT & Cyber Professionals
    • Cyber Security Links
    • IT and System Admin Links
    • Training Resources
    • Reading List
    • Second Brain (Notes)
  • Military & Prior Service
    • Currently Serving
    • Prior Service
    • Those Looking to Serve
    • LEO, DOD, & DOJ
  • Tools And Gadgets
    • Lock Picking
    • Hacking Gadgets
  • Entertainment
    • IT History
    • Movies & TV Shows
    • Games
    • Podcast
    • Books
  • Projects
    • Future Projects
    • Current Projects
    • Past Projects
  • More About us
    • Our Team
    • Christopher Cotton
    • Michael Peters
    • Kwamane Vaught
    • Nica Cotton
    • Social Media
VC Cyber Solutions
  • Home
  • News
  • IT & Cyber Resources
    • IT & Cyber Professionals
    • Cyber Security Links
    • IT and System Admin Links
    • Training Resources
    • Reading List
    • Second Brain (Notes)
  • Military & Prior Service
    • Currently Serving
    • Prior Service
    • Those Looking to Serve
    • LEO, DOD, & DOJ
  • Tools And Gadgets
    • Lock Picking
    • Hacking Gadgets
  • Entertainment
    • IT History
    • Movies & TV Shows
    • Games
    • Podcast
    • Books
  • Projects
    • Future Projects
    • Current Projects
    • Past Projects
  • More About us
    • Our Team
    • Christopher Cotton
    • Michael Peters
    • Kwamane Vaught
    • Nica Cotton
    • Social Media

Want to make training fun while bring your team to the table? Check out Black Hill's Table Top Game

Check It Out!

Menu / Price List

Blue Team Resources

Add a description about this category

SOPs and TTPs

MITRE ATT&CK


OWASP TOP 10


Cyber Kill Chain

Tools

Any Run


Virus Total


Hybrid Analysis


URL Scan


Browserling


CyberChef


WireShark


Nessus

Resources

Ultimate IT Security


CISA


NIST NVD


Red Team Resources

Add a description about this category

Distros and OSs

Kali


Patriot Security

Tools

BurpSuite


Aircrack-ng


Metasploit


Wireshark


Nessus


OpenVAS


John the Ripper


Nikto


OWASP ZAP



Resources

Exploit DB


Purple Team Resources

Add a description about this category

1st

12

Add a description about this item

Second Item

15

Add a description about this item

Third Item

22

GRC (Governance, Risk, and Compliance)

Add a description about this category

First Item

12

NIST

Second Item

15

Add a description about this item

Third Item

22

Add a description about this item

Add a footnote if this applies to your business

Copyright © 2025 VC Cyber Solutions - All Rights Reserved.


Powered by

Connect to Cyber

Sometimes it's hard to find the resources you need. Check out some of the ones we have listed.

Start Training Today!

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept