Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
12 sources · matching filters · sorted by citation density
Sort
ACybersecurity1 source
01
Black Hat / DEF CON ArchivesBlack Hat / DEF CON

Conference presentations covering novel attack techniques and defensive research. Essential for cutting-edge offensive/defensive questions. AI Village talks particularly relevant for Pillars B and C.

Test your knowledge · A4
BApplied AI in Security11 sources
01

The most comprehensive open-source guide for web application security testing. Covers testing methodology, tools, and techniques.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
02

Evaluates model capabilities for autonomous cyber operations at each AI Safety Level (ASL). Defines thresholds where AI capability in offensive security requires additional safeguards. Key reference for responsible AI in offensive security.

Test your knowledge · B4
03

Research on using AI for penetration testing automation: reconnaissance, vulnerability discovery, exploit generation. Practitioner perspective on what's practical vs. theoretical.

GuideIntermediateB4 · AI in Offensive SecurityC5 · AI Red TeamingNEW · 22d ago
Test your knowledge · B4
04

Law enforcement perspective on how LLMs enable cybercrime (phishing, malware, social engineering) and how AI assists threat intelligence and investigation.

Test your knowledge · B5
05

MITRE's automated adversary emulation platform. Runs pre-defined or custom attack sequences to test defenses.

Test your knowledge · B4
06

Web-based tool for annotating and exploring the ATT&CK matrix. Useful for threat modeling, gap analysis, and red team planning.

Test your knowledge · B5
07

Detailed testing techniques for identifying web vulnerabilities. Practical, hands-on approach to security assessment.

GuideIntermediateB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
08

Comprehensive standard for penetration testing methodology. Covers intelligence gathering, threat modeling, vulnerability analysis, exploitation, and reporting.

FrameworkFoundationalB4 · AI in Offensive SecurityNEW · 1mo ago
Test your knowledge · B4
09
Atomic Red TeamRed Canary

Library of tests mapped to the MITRE ATT&CK framework. Small, portable detection tests for validating security controls.

Test your knowledge · B4
10

Demonstrated GPT-4 exploiting real-world web vulnerabilities autonomously. 73% success rate on day-one CVEs. Key reference for questions about AI-augmented offensive capabilities and the asymmetry debate.

Test your knowledge · B4
11

Analysis of how LLMs can be used for offensive security tasks and the implications for defensive guardrails. Covers the dual-use nature of security LLMs.

Test your knowledge · B4

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.