cloudsecurelab / security-acronymsLinks
Curated list of Cyber Security acronyms & abbreviations
β42Updated 2 weeks ago
Alternatives and similar repositories for security-acronyms
Users that are interested in security-acronyms are comparing it to the libraries listed below
Sorting:
- a curated, categorised collection of useful projects π¨βπ©βπ§ββ127Updated last month
- Tools & Resources for Cyber Security Operationsβ269Updated 8 months ago
- A compiled list of tools for reconnaissance and footprintingβ160Updated last year
- β18Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.β47Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-β¦β103Updated last year
- β60Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β57Updated last year
- Curated list of awesome, open source data exfiltration toolsβ62Updated 4 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. β¦β86Updated 5 years ago
- A curated list of resources related to Industrial Control System (ICS) security.β32Updated 9 years ago
- Packet captures of malicious traffic for analysis using Wiresharkβ64Updated 2 years ago
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnuxβ¦β50Updated last week
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.β58Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abouβ¦β61Updated 3 years ago
- β31Updated 2 years ago
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.β94Updated 3 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing variβ¦β95Updated 4 years ago
- β21Updated 8 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.β34Updated 8 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.β101Updated last year
- β110Updated 4 years ago
- Jupyter Notebooks for the Blue Teamβ39Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websitesβ¦β97Updated 3 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, techniqueβ¦β111Updated last year
- Red Team tools, infrastructure, and hardware weaponizedβ109Updated last month
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.β63Updated 5 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.β44Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-β¦β106Updated 3 years ago
- WordPress version identification and vulnerability finder.β31Updated 3 years ago