da667 / Training_Materials_Bookmarks
Learn you a book for some infosec good
☆63Updated 5 years ago
Alternatives and similar repositories for Training_Materials_Bookmarks:
Users that are interested in Training_Materials_Bookmarks are comparing it to the libraries listed below
- automate your MISP installs☆68Updated 4 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Files vetted, and approved for public release☆53Updated last year
- A toolkit for Security Researchers☆127Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- ☆54Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- USA based Information Security & I.T. Conferences☆33Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- ☆30Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated last year
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- ☆39Updated 4 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆54Updated 7 years ago
- Tools to automate and/or expedite response.☆114Updated 10 months ago
- Kill Chain Matrix -->>☆38Updated 5 years ago
- ☆49Updated 4 years ago