https://academy.tcm-sec.com/
☆184Jun 9, 2025Updated 10 months ago
Alternatives and similar repositories for SOC101
Users that are interested in SOC101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easily connect to a VPN in a country of your choice☆14Jan 22, 2017Updated 9 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,408Jun 30, 2025Updated 10 months ago
- ☆16Apr 25, 2026Updated last week
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆69Oct 15, 2019Updated 6 years ago
- ☆32Jan 11, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My mobile writeups repository☆30Nov 19, 2025Updated 5 months ago
- This repo has the comprehensive Cheatsheet that I made during my eJPT exam prep...☆35Jan 12, 2026Updated 3 months ago
- Labs for Practical Malware Analysis & Triage☆1,116Mar 29, 2026Updated last month
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆49Jun 27, 2021Updated 4 years ago
- Python command line tool used for generating GIAC Certification indexes.☆31Jul 17, 2023Updated 2 years ago
- purplestorm writeup collection☆31Apr 25, 2026Updated last week
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Pass you eJPT Study Guide, here you have all tools and content you need!☆151Jan 14, 2023Updated 3 years ago
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆64Apr 30, 2023Updated 3 years ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- BYOVD Technique Example using viragt64 driver☆82Jul 25, 2024Updated last year
- Resources for TCM Security Linux 101 course☆315Jul 4, 2023Updated 2 years ago
- A curated list of awesome resources related to enhancing your enterprise Email Security☆59Mar 10, 2026Updated last month
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Automating Security Detection Engineering, published by Packt☆68Oct 12, 2024Updated last year
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆19Nov 16, 2023Updated 2 years ago
- There are many cheat sheets out there, but this is mine.☆37Feb 27, 2025Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆22Oct 20, 2022Updated 3 years ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆32Apr 2, 2025Updated last year
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆21May 30, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Mar 26, 2026Updated last month
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆266Jul 2, 2025Updated 10 months ago
- ☆24Apr 23, 2024Updated 2 years ago
- eJPTv2 Cheatsheet for the exam, with commands and tools shown in the course.☆60Feb 7, 2023Updated 3 years ago
- Detect SSRF within Caido☆50Apr 17, 2026Updated 2 weeks ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Tools and Techniques for Blue Team / Incident Response☆23Mar 8, 2023Updated 3 years ago