PacktPublishing / Adversarial-Tradecraft-in-CybersecurityLinks
A repo to support the book
☆46Updated 3 years ago
Alternatives and similar repositories for Adversarial-Tradecraft-in-Cybersecurity
Users that are interested in Adversarial-Tradecraft-in-Cybersecurity are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 years ago
- Mastering Malware Analysis, published by Packt☆41Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆78Updated 3 years ago
- Advanced Malware Analysis [video], published by Packt☆22Updated 2 years ago
- AWS Penetration Testing, published by Packt☆33Updated 3 years ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆112Updated last year
- Penetration Testing with Shellcode, published by Packt☆36Updated 3 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆13Updated 3 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆26Updated 3 years ago
- Python for Offensive PenTest, published by Packt☆149Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- Python Digital Forensics [video], published by Packt☆21Updated 2 years ago
- Advanced Infrastructure Penetration Testing, published by Packt☆29Updated 2 years ago
- ☆89Updated last month
- GitHub repository for the API Security for White Hat Hackers book☆14Updated last year
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆68Updated 2 months ago
- A repo to support the book☆112Updated 4 years ago
- ☆83Updated 4 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Linux Incident Response☆90Updated 6 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- ☆22Updated 7 years ago
- ☆70Updated 2 years ago
- Scripts featured in the book How to Hack Like a Legend☆150Updated 2 years ago
- ☆23Updated 5 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆89Updated 6 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago