Explore tutorials, guides, and resources for reverse engineering, cybersecurity, and Ghidra server collaboration on this practical knowledge-sharing site.
Learn reverse engineering with hands-on guides
byte.how is a resourceful website focused on reverse engineering and cybersecurity topics. Here, you can find practical tutorials, insightful guides, and collaborative knowledge on using tools like Ghidra server for binary analysis and software security.
Whether you're a security enthusiast, researcher, or just curious about reverse engineering, the site offers approachable content to deepen your understanding. You'll discover posts that break down complex topics, share real-world experiences, and foster a collaborative learning environment.
From exploring Android vulnerabilities to hands-on walkthroughs with popular analysis tools, byte.how is designed to help you build your skills and connect with others interested in cybersecurity and reverse engineering.
Discover websites similar to Byte.how based on shared categories, topics, and features.
Detectify Labs shares ethical hacking writeups, security research, and expert tips to help you understand and improve your cybersecurity skills.
AskApache offers advanced web development guides, .htaccess code samples, and security tips for webmasters, developers, and tech enthusiasts.
CIRT.net offers tools like Nikto for security scanning, helpful resources, and guides for those interested in web application security and testing.
OWASP Mobile Application Security offers standards, guides, and resources to help you test and improve the security of mobile apps.
SysTutorials offers technical articles and guides on Linux, software, programming, and systems topics, plus a platform to share your own tutorials.
Learn about Meltdown and Spectre vulnerabilities, their impact on computer security, and access research papers and resources for deeper understanding.
Learn how to spot scams and protect yourself online with practical tips and guides focused on keeping Brits safe from phone, SMS, email, and web fraud.
Helps you identify, prevent, and report malicious software and websites to keep your devices and browsing safe from online threats.
OSDev Wiki is a collaborative resource for learning, sharing, and discussing operating system development topics, tutorials, and technical guides.
A blog exploring category theory, Haskell, concurrency, and C++ concepts, sharing insights and tutorials for programmers and math enthusiasts.
Stay updated with the latest Microsoft security news, researcher leaderboards, and resources for reporting vulnerabilities and improving cybersecurity.
Discover security vulnerabilities, CVEs, exploits, and tools with Vulners—an all-in-one platform for tracking and managing cybersecurity threats.
UC Berkeley's Information Security Office shares alerts, resources, and training to help the campus community stay safe from cybersecurity threats and scams.
Parrot Security offers a Linux-based operating system with 600+ tools for cybersecurity, digital forensics, and privacy protection.
Learn how to protect yourself from scams, identity theft, and online threats with expert guides, security tips, and the latest info on digital safety.
FortiGuard Labs offers threat intelligence, outbreak alerts, and security tools to help you detect, prevent, and respond to cyber threats worldwide.
Analyze malware samples in a secure online sandbox. Triage offers in-depth malware analysis, trends, and customizable tools for cybersecurity professionals.
Read X41 D-Sec's expert white paper comparing the security of Chrome, Edge, and Internet Explorer for enterprise browser protection insights.
OSSEC offers a free, open source host intrusion detection system with customizable security rules, machine learning, and multi-platform support.
Wireshark lets you capture and analyze network traffic to troubleshoot issues, learn about protocols, and improve network security. Free downloads available.
Learn how to build your own operating system from scratch with guides, resources, and a community for aspiring OS developers.
Learn about weak Diffie-Hellman key exchange and the Logjam attack, plus get practical guides to strengthen TLS security on your servers and websites.
Read stories and insights from engineers about software development, agile methods, and building better workplaces in tech. Explore new ideas and trends.
Read stories and insights from the engineers behind Instagram, sharing how they build, solve problems, and innovate with tech at scale.
Find detailed notes on software vulnerabilities, including technical info, remediation steps, and affected vendors, maintained by the CERT Coordination Center.
Discover articles, tutorials, and critiques by Thibaut Cuvelier (dourouc05) on Qt, web semantics, programming, and more. French-language developer space.
Sumo Logic offers cloud-based log management, monitoring, and SIEM tools to help you analyze data, detect threats, and keep your apps secure.
Find clear Unix and Linux tutorials on shell scripting, sed, awk, and security topics. Great resource for learning command-line skills and tips.
Openwall offers open-source security tools, software downloads, and resources to strengthen password security and protect Unix and Linux systems.
Stay updated on Apple’s latest security advancements, share your research, and collaborate with Apple to help protect users and earn recognition.
Canarytokens lets you set digital traps that alert you if attackers breach your network, helping you spot threats early. Free and easy to use.
DORA shares research and resources to help teams improve software delivery and operations, offering insights, guides, and metrics for better performance.
Protect your organization from phishing and data loss with Proofpoint's advanced AI-powered email security and adaptive data loss prevention solutions.
DomainTools offers domain and threat intelligence tools to help you investigate, prevent, and respond to cyber threats. Ideal for security teams.
Rambus offers advanced security IP solutions to help protect data across chips, devices, and the cloud in connected systems and infrastructure.
Find free network security tools and downloads, including the open-source Nmap security scanner, plus resources for Linux, Windows, and UNIX systems.
Japanese cybersecurity firm offering security monitoring, diagnostics, consulting, and internal control support to protect your business information.
Snort offers open-source software for detecting and preventing network threats, helping you safeguard your systems on Linux and Windows for free.
Trail of Bits offers expert security research and solutions to help organizations protect software, reduce risks, and strengthen code against cyber threats.
ITNEXT is a platform where IT developers and software engineers share articles, tips, and tutorials to learn, connect, and grow in tech together.