BushidoUK / Operational-Security-101
A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the security of their devices.
☆97Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for Operational-Security-101
- Regular Expressions List used in Digital Forensic Tasks☆74Updated 9 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆131Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated 11 months ago
- God Mode Detection Rules☆130Updated 3 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆79Updated 2 weeks ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- A collection of CVEs weaponized by ransomware operators☆51Updated this week
- ☆70Updated 2 weeks ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆171Updated 9 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- ☆157Updated 7 months ago
- Free training course offered at Hack Space Con 2023☆132Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆239Updated 6 months ago
- ☆23Updated last year
- Living Off Security Tools☆37Updated 2 weeks ago
- Powershell tools used for Red Team / Pentesting.☆73Updated 10 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆44Updated last week
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆166Updated 2 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆138Updated 7 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆183Updated 4 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆243Updated 3 weeks ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆86Updated 5 months ago
- Windows Malware Investigation Scripts & Docs☆75Updated 7 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated 3 weeks ago