CompassSecurity / security_resourcesLinks
Collection of online security resources
☆280Updated last month
Alternatives and similar repositories for security_resources
Users that are interested in security_resources are comparing it to the libraries listed below
Sorting:
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆573Updated 2 weeks ago
- Labtainers: A Docker-based cyber lab framework☆302Updated this week
- Awesome note-taking apps for hackers & pentesters !☆378Updated 4 years ago
- Writeups for the machines on ethical hacking site Hack the Box☆248Updated 3 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆273Updated this week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆159Updated 2 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆456Updated 6 months ago
- Blue Team Cheat Sheats☆165Updated 9 years ago
- A semi-curated list of Security Feeds☆142Updated 3 years ago
- A living document for penetration testing and offensive security.☆310Updated last year
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Updated 2 years ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆327Updated 4 years ago
- Our OSCP repo: from popping shells to mental health.☆354Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆482Updated 7 months ago
- OSCP cheatsheet☆107Updated last year
- My OSCP notes☆225Updated last year
- Pwnspoof repository☆265Updated 2 years ago
- ☆354Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- Collection of Pentest Notes and Cheatsheets☆389Updated 5 months ago
- ☆114Updated last year
- Everything related to Linux Forensics☆710Updated 2 years ago
- This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for Th…☆559Updated 5 years ago
- Summary of Cyber Security interview questions I have been through, hope this helps☆64Updated 5 years ago
- ☆253Updated last year
- Commands, snippets, exploits, tools, lists, collections and techniques I used on my journey to becoming an OSCP.☆299Updated 4 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆194Updated 2 years ago
- List of red team resources☆99Updated 8 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago