HTB CDSA Notes I made to reference for the exam.
☆34Nov 9, 2024Updated last year
Alternatives and similar repositories for CDSA_NOTES
Users that are interested in CDSA_NOTES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check reputation of IP/url/hash/file in bulk with mutiple OSINT☆19Dec 8, 2022Updated 3 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 5 months ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- In this projects are custom-decoders and custom-rules for Wazuh by me. Feel free to use it, you can redistribute it and/or modify it unde…☆61Mar 7, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆10Nov 4, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 11 years ago
- Hunt the windows Registry automatically using VQL☆15Jan 6, 2026Updated 3 months ago
- Most of the notes, resources and scripts I used to prepare for the HTB CPTS and "pass it the 2 time."☆71Jun 15, 2023Updated 2 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated last month
- Repo to hold mcp server for velociraptor☆35Jul 27, 2025Updated 8 months ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆118Mar 20, 2024Updated 2 years ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 11 months ago
- Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.☆20Oct 30, 2024Updated last year
- Random scripts that I used in the CARTP course lab & final exam.☆16Feb 28, 2024Updated 2 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆158Mar 23, 2026Updated 3 weeks ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 11 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Terraform reproducer for IngressNightmare☆26Mar 26, 2025Updated last year
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆23Dec 26, 2024Updated last year
- Hack The Box CPTS command☆43Jun 25, 2025Updated 9 months ago
- Write-Ups for TryHackMe☆24May 15, 2021Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆36Feb 9, 2024Updated 2 years ago
- ☆25Feb 18, 2025Updated last year
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆55Sep 19, 2025Updated 6 months ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last month
- 目前通过自学 已经取得 OSCP(Offensive Security Certified Professional)证书,本项目用于记录、分享、交流。☆11Aug 16, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated last week
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- My external brain for cyber defense (WIP). A practical collection of field notes on hunting strategies and system principles. Documentin…☆95Updated this week
- ☆24Jan 24, 2025Updated last year
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 3 months ago
- Advanced Threat Hunting: Ransomware Group☆28Jul 9, 2025Updated 9 months ago