Links
External resources curated by the community.
StatusGator
Aggregate the status of more than 5,000 SaaS services (such as AWS, Slack, or GitHub) in a single dashboard, sending early alerts for outages in the digital supply chain.
Techmeme
News aggregator that works as the front page of the tech industry, summarizing the most important launches and strategic changes of the day.
PacketLife Network Cheat Sheets
Legendary collection of technical cheat sheets for network protocols like BGP, OSPF, and STP, crucial for network engineers in high-pressure situations.
Crontab Guru
A visual editor that translates the cryptic syntax of scheduled tasks (cron) into clear human language, helping prevent errors in process automation.
ExplainShell
Breaks down complex UNIX/Linux terminal commands, mapping each flag and argument to its corresponding definition in the manual pages (man pages).
Regex101
An interactive tool for testing and debugging regular expressions in real time, providing detailed explanations for each character and group within the pattern.
DevDocs
A fast documentation browser with offline capability that aggregates hundreds of languages, libraries, and frameworks in a single search interface.
Roadmap.sh
Offers interactive flowcharts and detailed learning paths for specific IT roles, such as Backend, Frontend, DevSecOps developer, or AI Engineer.
Wazuh
An open-source platform for SIEM and XDR that offers log analysis, intrusion detection, and compliance monitoring without the high costs of proprietary licenses.
SANS Internet Storm Center (ISC)
Provides daily technical reports on threats, malware outbreaks, and global vulnerability monitoring, ideal for network defenders who need immediate tactical intelligence.
OWASP Top 10
The global standard for web application security. It provides a list of the most critical risks and serves as a fundamental curriculum for secure software development.
Cybersecurity and Threat Intelligence
An essential resource that filters theoretical vulnerabilities to list only those being actively exploited in the real world, allowing security teams to prioritize their patches empirically.