1d8 / ctfLinks
CTF Solution Writeups
☆23Updated 2 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- Jupyter Notebooks for the Blue Team☆36Updated 8 months ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆67Updated last week
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- Create a SOC lab with SIEM, AD, Workstation, Firewall, Sysmon, IPS. Step by Step☆30Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆62Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Some Threat Hunting queries useful for blue teamers☆128Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- ☆34Updated 2 years ago
- a curated, categorised collection of useful projects 👨👩👧☆121Updated last month
- A curated list of awesome OSCP resources☆18Updated 5 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- ☆35Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 10 months ago
- A very opinionated list of security tools☆128Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 5 months ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆54Updated 5 years ago
- MayorSec DNS Enumeration Tool☆88Updated 9 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A list of resources to build a information security team.☆13Updated 4 years ago