study material used for the 2018 CISSP exam
☆11May 20, 2019Updated 6 years ago
Alternatives and similar repositories for CISSP-Study-Guide
Users that are interested in CISSP-Study-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- ☆22Oct 3, 2019Updated 6 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- ☆16Oct 18, 2025Updated 5 months ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Oct 10, 2016Updated 9 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- CyLR - Live Response Collection Tool☆10Jul 14, 2020Updated 5 years ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago
- 💰 Member dues and Donations platform☆12Mar 16, 2023Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- Extract common Windows artifacts from source images and VSCs☆65May 10, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- ☆16Jan 27, 2023Updated 3 years ago
- Tries to Get You Internet☆11Aug 25, 2017Updated 8 years ago
- AlienVault Open Threat Exchange App For Splunk☆10May 6, 2014Updated 11 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- ☆16Mar 17, 2017Updated 9 years ago