VetSec / A-Good-Cyber-Security-List
☆39Updated 9 months ago
Related projects: ⓘ
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆88Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- https://github.com/rshipp/awesome-malware-analysis☆33Updated 3 years ago
- ☆69Updated last week
- ☆103Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆33Updated 4 years ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆75Updated last year
- ☆94Updated 3 years ago
- Collection of created MindMaps☆151Updated 10 months ago
- Commands used in Windows penetration tests☆48Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆137Updated last year
- IOC Collection 2022☆55Updated last year
- Default Detections for EDR☆94Updated 7 months ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- ☆62Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- ☆19Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆67Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- ☆41Updated 2 years ago
- Windows for Red Teamers☆123Updated 2 years ago
- This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security☆54Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆76Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- A repo to support the book☆103Updated 3 years ago
- Open Threat Hunting Framework☆100Updated last year
- Easy to configure Honeypot for Blue Team☆39Updated 3 months ago
- Linux Evidence Acquisition Framework☆114Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆43Updated 5 years ago