da667 / Training_Materials_BookmarksLinks
Learn you a book for some infosec good
☆62Updated 6 years ago
Alternatives and similar repositories for Training_Materials_Bookmarks
Users that are interested in Training_Materials_Bookmarks are comparing it to the libraries listed below
Sorting:
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- automate your MISP installs☆68Updated 5 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Python3 library and command line for GreyNoise☆176Updated 5 months ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆55Updated 7 years ago
- SEC599 supporting GitHub repository☆16Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Tools for the Computer Incident Response Team☆149Updated 8 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆73Updated 8 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Tools to automate and/or expedite response.☆116Updated last year
- ☆55Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- USA based Information Security & I.T. Conferences☆32Updated 3 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆92Updated 8 years ago
- 504 VSAgent☆25Updated 7 years ago