bsdrip / CEHv11-notesLinks
☆27Updated 2 years ago
Alternatives and similar repositories for CEHv11-notes
Users that are interested in CEHv11-notes are comparing it to the libraries listed below
Sorting:
- ☆59Updated 4 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- ☆77Updated 4 years ago
- A list of Splunk queries that I've collected and used over time.☆83Updated 4 years ago
- undergroundwires CEH-in-bullet-points in pdf format☆115Updated last year
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆58Updated 4 years ago
- ☆46Updated last year
- Tools for simulating threats☆185Updated last year
- Tools to automatically create a SANS index based off the course pdf files.☆102Updated 4 years ago
- Indexes for SANS Courses and GIAC Certifications☆251Updated last year
- A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found her…☆68Updated 11 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 8 months ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆22Updated this week
- Some important DFIR Resources☆83Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 7 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆122Updated 3 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆78Updated 3 years ago
- ☆177Updated last year
- SIEM Cheat Sheet☆73Updated last year
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆14Updated 2 months ago
- SPL cheatsheet for Splunk.☆24Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 5 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated last week
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆138Updated 11 months ago
- The latest pyWars client for the SEC573 class☆44Updated 2 months ago
- Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis☆27Updated 11 months ago
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆183Updated last year
- ☆31Updated 3 years ago