Hacking-Notes / BlueTeam
This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, log, malware, memory forensics, and packet analysis.
☆43Updated last month
Alternatives and similar repositories for BlueTeam:
Users that are interested in BlueTeam are comparing it to the libraries listed below
- Enhance your hacking toolkit with my Chrome Extension. Designed for ethical hacking and red team activities, it offers tailored features …☆32Updated last month
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆35Updated last month
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆180Updated last month
- CompTIA Security+ SY0-601 notes (passed 788 points)☆45Updated 5 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆61Updated 4 months ago
- Minimalist notes for CEH-practical Cert.☆32Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆44Updated 4 years ago
- ☆51Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆28Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆92Updated 4 months ago
- Automated solution for nmap'ing☆27Updated last year
- This repo contains only quality verified training material/courses/labs that helps you establish and advance cyber career☆30Updated last year
- The Complete Mobile Ethical Hacking, by EC-Council☆34Updated 4 years ago
- ☆69Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆71Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆159Updated 11 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆60Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆81Updated 6 months ago
- ☆78Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆64Updated 2 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆140Updated 2 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆22Updated last year
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆51Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- Notes only☆18Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- ☆133Updated 2 years ago
- ☆16Updated 9 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆49Updated last week