LetsDefend / Cybersecurity-Black-FridayLinks
Cybersecurity Black Friday Deals repository! π‘οΈπ
β43Updated last year
Alternatives and similar repositories for Cybersecurity-Black-Friday
Users that are interested in Cybersecurity-Black-Friday are comparing it to the libraries listed below
Sorting:
- This is a repository for network security tools and technologies.β98Updated 2 years ago
- List of questions, answers and random notes for security interviewsβ69Updated 4 years ago
- β39Updated 2 years ago
- SIEM Cheat Sheetβ76Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.β89Updated 4 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniqueβ¦β109Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Councilβ32Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assetsβ132Updated last year
- β35Updated 10 months ago
- List of some cybersecurity conferencesβ57Updated 3 weeks ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Courseβ123Updated 3 years ago
- CSbyGB - Gabrielle B's new Blog!β23Updated last month
- β185Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incideβ¦β109Updated 7 months ago
- β135Updated last year
- β31Updated 2 years ago
- β241Updated 7 months ago
- β57Updated 3 months ago
- AI-Powered Dark Web OSINT Toolβ113Updated 2 weeks ago
- Strumenti di Acquisizione e Analisi di copie Forensiβ167Updated 3 weeks ago
- Useful resources about phishing email analysisβ85Updated 7 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β64Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS attaβ¦β217Updated last year
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.β98Updated 9 months ago
- β314Updated last year
- Sniffing out well-known threat groupsβ61Updated last year
- β138Updated 2 years ago
- β55Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.β69Updated 3 months ago
- Regular Expressions List used in Digital Forensic Tasksβ91Updated 7 months ago