SANS has a massive list of posters available for quick reference to aid you in your security learning.
☆80Oct 22, 2021Updated 4 years ago
Alternatives and similar repositories for SANS-Posters
Users that are interested in SANS-Posters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Splunking Tools, SPL Code and Resources☆15Jan 30, 2025Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆43Jun 27, 2021Updated 4 years ago
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Jun 28, 2021Updated 4 years ago
- This is an intensive 24-week long boot camp program. Skills learned consist of Wireshark, Kali Linux, Metasploit, Burp Suite, Elk Stack, …☆19Apr 5, 2023Updated 3 years ago
- Device Data Model☆20Mar 12, 2026Updated last month
- ☆12Feb 15, 2024Updated 2 years ago
- Cloud Related Projects☆11Oct 8, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- ☆14Sep 27, 2023Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A technical walkthrough for extracting authentication keys and either emulating or cloning MIFARE classic 1k cards.☆29Apr 29, 2025Updated 11 months ago
- Quick SOC L1 ticket structure☆40Jun 20, 2019Updated 6 years ago
- A repo for security analytics & threat hunting resources☆21Sep 25, 2018Updated 7 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆22Aug 9, 2022Updated 3 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Nov 22, 2022Updated 3 years ago
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆50Jul 17, 2025Updated 9 months ago
- Master-in-Devops-Engineering-MDE-Session-Notes☆13Jul 28, 2025Updated 8 months ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆11Jun 16, 2022Updated 3 years ago
- Open Source External Attack Surface Management☆49Apr 6, 2024Updated 2 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A list of resources for AI engineers☆23Aug 3, 2025Updated 8 months ago
- Command line tool to block websites that distract you and activate focus mode.☆17Jun 2, 2022Updated 3 years ago
- Command line interface for control iTunes☆19May 7, 2021Updated 4 years ago
- A set of pdf documents used during the fuzzing process☆22Apr 27, 2017Updated 8 years ago
- Cyber-Zero: Training Cybersecurity Agents Without Runtime☆83Feb 13, 2026Updated 2 months ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- Golang bindings for PE-sieve☆42Nov 11, 2023Updated 2 years ago