The-Taggart-Institute / python-for-defendersLinks
Python for Defenders Course Resources
☆20Updated 6 months ago
Alternatives and similar repositories for python-for-defenders
Users that are interested in python-for-defenders are comparing it to the libraries listed below
Sorting:
- SIEM Cheat Sheet☆80Updated 2 years ago
- ☆13Updated 3 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- ☆33Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- ☆24Updated 4 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- Penetration Testing Lab☆28Updated 11 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- list of useful commands, shells and notes related to OSCP☆79Updated 7 years ago
- ☆66Updated 4 years ago
- ☆16Updated 4 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- ☆34Updated 2 years ago
- A curated list of awesome OSCP resources☆18Updated 5 years ago
- Useful resources about phishing email analysis☆86Updated last year
- Jupyter Notebooks for the Blue Team☆39Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 3 years ago
- ☆39Updated 2 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- ☆65Updated 5 years ago
- ☆15Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆152Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- ☆45Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆25Updated 2 years ago