A curated list of awesome infosec courses and training resources.
☆202Aug 24, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-infosec
Users that are interested in awesome-infosec are comparing it to the libraries listed below
Sorting:
- This repo is meant to be a list of companies that hire security people full remote.☆100Sep 2, 2025Updated 6 months ago
- ☆44Nov 27, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆16Mar 9, 2026Updated last week
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- Manual zsys garbage collection script.☆18Mar 4, 2021Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆198May 10, 2023Updated 2 years ago
- An IOC framework written in PowerShell☆19Jan 3, 2017Updated 9 years ago
- Kill Chain Matrix -->>☆38Jun 17, 2019Updated 6 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆153Nov 15, 2023Updated 2 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 5 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- ☆261Mar 15, 2024Updated 2 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Android Usagestats XML + Protobuf Parser☆28Oct 11, 2020Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Apr 20, 2020Updated 5 years ago
- Great List of Resources to Build an Enterprise Grade Home Lab☆917Dec 1, 2023Updated 2 years ago
- UIAN - the Unified Industrial Automation Namespace Project☆14Nov 13, 2024Updated last year
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- Repo for Concierge AI dev work☆197Mar 11, 2026Updated last week
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- Koth - a repository with cheat-sheet Koth in THM (Try Hack Me)☆12Aug 7, 2023Updated 2 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago