https://academy.tcm-sec.com/
☆176Jun 9, 2025Updated 9 months ago
Alternatives and similar repositories for SOC101
Users that are interested in SOC101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆44Oct 10, 2024Updated last year
- ☆16Dec 17, 2022Updated 3 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,402Jun 30, 2025Updated 8 months ago
- Incursore came from nmapAutomator to be your personal raider while you enumerate a target.☆52Jul 12, 2024Updated last year
- ☆29May 30, 2024Updated last year
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- This repo has the comprehensive Cheatsheet that I made during my eJPT exam prep...☆33Jan 12, 2026Updated 2 months ago
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- Labs for Practical Malware Analysis & Triage☆1,091Feb 23, 2026Updated last month
- ☆39Apr 9, 2024Updated last year
- A collection of payloads for different vulnerabilities, best payload lists in one repository☆17Jul 28, 2021Updated 4 years ago
- Developing an open source Windows EDR written in C & C++ & C#☆28Updated this week
- A comprehensive, step-by-step guide for hardening your X (formerly Twitter) account security. Includes detailed instructions for 2FA, pas…☆12Mar 8, 2025Updated last year
- purplestorm writeup collection☆30Mar 16, 2026Updated last week
- Compilation of Resources for TCM's Linux Privilege Escalation course☆582Oct 23, 2020Updated 5 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Pass you eJPT Study Guide, here you have all tools and content you need!☆150Jan 14, 2023Updated 3 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆61Apr 30, 2023Updated 2 years ago
- ☆14Nov 16, 2024Updated last year
- Resources for TCM Security Linux 101 course☆311Jul 4, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆20May 30, 2023Updated 2 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Three complete IT / Cybersecurity resume for the following job roles: Systems Administration, SOC Analyst, & Penetration Tester.☆28Apr 2, 2025Updated 11 months ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- ☆60Feb 27, 2026Updated 3 weeks ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆263Jul 2, 2025Updated 8 months ago
- ☆23Apr 23, 2024Updated last year
- eJPTv2 Cheatsheet for the exam, with commands and tools shown in the course.☆59Feb 7, 2023Updated 3 years ago
- Detect SSRF within Caido☆49Feb 20, 2026Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 11 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆530Mar 10, 2026Updated last week
- A curated awesome list of lists of interview questions. Feel free to contribute!☆22Jul 24, 2024Updated last year
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆58Feb 15, 2026Updated last month