Overview
![Preview of three Trickest Workflow Cards from the Library](https://res.cloudinary.com/db14crach/image/upload/v1705577703/docs/overview-hub/knowledge_hub_templates_card.png)
WORKFLOW TEMPLATES
Learn step-by-step how any of Trickest's pre-built workflows, powered by the most popular community tools, work and how to put it into practice.
![Preview of three tool cards from the library](https://res.cloudinary.com/db14crach/image/upload/v1700236908/docs/overview-hub/knowledge_hub_tools_card.png)
TOOLS
Learn step-by-step how to use some of the most popular community tools in Trickest Platform.
![Screenshot of the shodan threat intelligence workflow](https://res.cloudinary.com/db14crach/image/upload/v1705577703/docs/overview-hub/shodan-threat-intelligence.png)
SCRIPT
Learn step-by-step how to support tools with pre-built Trickest scripts, or to use scripts independently as a part of your workflows.
![Screenshot of the Shodan threat intelligence workflow](https://res.cloudinary.com/db14crach/image/upload/v1705577703/docs/overview-hub/shodan-threat-intelligence.png)
HOW-TO'S AND BEST PRACTICES
Learn step-by-step how to improve the performance of your tool/workflow.