2SecurLee

2SecurLee2SecurLee2SecurLee
  • Home
  • Cybersecurity Challenges
  • Read Think Learn
  • About Us
  • More
    • Home
    • Cybersecurity Challenges
    • Read Think Learn
    • About Us

2SecurLee

2SecurLee2SecurLee2SecurLee
  • Home
  • Cybersecurity Challenges
  • Read Think Learn
  • About Us

Positivity Grows

Mental development and expanding our knowledge by reading, exploring and becoming familiar with a topic allows us to grow. As our knowledge grows, we become better at analyzing additional information we take in, as well as enhancing our critical thinking skills when encountering a challenge.


Since learning is a lifelong journey, it is part of our every day. To learn is to grow, and the taller our knowledge gets, the closer we get to the sun. Basking in the luminous sunshine our minds will remain vivid and bright. We would be dim to assume that we know enough, because knowledge is the fuel that lights our minds. And just as our torch of growth was passed to us by others, we too should strive to give back by effecting positive change and promoting awareness to all those around us and beyond. 

Smart Tools for Your CTF Toolbox

Cryptography Tools

Network & Packet Data Detector

Log Parser & Analyzer

Crack, decode and solve all kinds of different encrypted passwords, messages and more using this easy-tp-use site.

dCode's Tools List

Log Parser & Analyzer

Network & Packet Data Detector

Log Parser & Analyzer

When it comes to parsing logs to find information and analyze the findings, this web-based log analysis tool can make this simple yet give you the answers that you've been looking for. 

CloudVyzer

Network & Packet Data Detector

Network & Packet Data Detector

Network & Packet Data Detector

Network packet captures can often be mindboggling and an intense game of trying to find a needle in a haystack, but NetworkMiner is the go-to for locating network activity info and packet data.

NetworkMiner

Online Decompiler / Decoder

Encoding and Encryption Converter

Network & Packet Data Detector

Check out this light web too by DevToolZone's code decompiler and base decoder. This neat online framework can be used to solve more than just base-number jibberish.

DevToolZone

Regex Extractor & Sorter

Encoding and Encryption Converter

Encoding and Encryption Converter

 Regular expressions are extremely useful in extracting information from text such as log files, spreadsheets, or mass amounts of data. Explore the more practical uses of regular expressions so that you are able to use them when needed.

RegexOne

Encoding and Encryption Converter

Encoding and Encryption Converter

Encoding and Encryption Converter

 Be sure to explore this Open Source online app that allows you to quickly encode and decode number-base encryption and more. There is no server interaction and all conversions are done straight from within the browser.

Cryptii

More Useful Links & Tips

Wireshark Cheat Sheet

Read More

Penetration Testing with Kali

Airodump-ng

Boxentriq - Cipher Identifier

Show Me

Hash Encrypt & Decrypt Tool

Hash Out

Steganographic Decoder

Steg-GO

Online Binary File Reader

Try it now

Online Java Decompiler

JDEC

Morse Code & Audio Decoder

Use Decoder

Dakota's Online Safety Smarts

Find Out More

Pi Tutorials & Guides

Raspberry Pi & Touchscreen Assembly

This tutorial covers the complete assembly of a Raspberry Pi and touchscreen display from start to finish. Kali Pi Project Guide is now available. 


Featured videos and project contents courtesy of L. Ramirez. All rights reserved.

Kali Pi Project Guide

Download your Kali Linux Image

The Kali Linux image file can be downloaded by clicking on the Kali Linux OS Download button shown below.


Featured videos and project contents courtesy of L. Ramirez. All rights reserved.

Kali Linux OS Download

Installing Kali Linux on your MicroSD

This video provides a quick overview on how to use the balenaEtcher software to install Kali onto your MicroSD. Click on the balenaEtcher action button to navigate to get to the software downloads pages.

 

Featured videos and project contents courtesy of L. Ramirez. All rights reserved.

balenaEtcher

For Women

Girl Power

Women in CyberSecurity

Women in CyberSecurity

We Are Cisco

Women in CyberSecurity

Women in CyberSecurity

Women in CyberSecurity

WiCyS

Empowered

Women in CyberSecurity

CyberSmart Women

Mentor / Mentee

CyberSmart Women

Women of Cyberjutsu

CyberSmart Women

Women in Security

Women of Cyberjutsu

Women of Cyberjutsu

Women of Cyberjutsu

Cyber Women

Bridging the Gap

Women of Cyberjutsu

Women of Cyberjutsu

Cyber Workforce

For Kids

DHS Student Resources

FCC Smartphone Security

FCC Smartphone Security

Stop Think Connect

FCC Smartphone Security

FCC Smartphone Security

FCC Smartphone Security

Smartphone Safety

Norton Internet Safety

FCC Smartphone Security

Norton Internet Safety

Net Security Tips

For Parents

CISA Parent Resources

Protecting Kids Online

CISA Parent Resources

Parents & Educators

(ISC)2 Parent Tips

Protecting Kids Online

CISA Parent Resources

iamcybersafe

Protecting Kids Online

Protecting Kids Online

Protecting Kids Online

Online Smarts

For Seniors

DHS Online Safety for Seniors

DHS Online Safety for Seniors

DHS Online Safety for Seniors

Security on the Internet

(ISC)2 Senior Tips

DHS Online Safety for Seniors

DHS Online Safety for Seniors

Internet Safety

CONNECT SAFELY

DHS Online Safety for Seniors

CONNECT SAFELY

Secure Connections

Copyright © 2019 2SecurLee - All Rights Reserved.

Powered by

  • Home
  • Cybersecurity Challenges
  • Read Think Learn