dreilly369 / AppliedMathForSecurityBook
☆16Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for AppliedMathForSecurityBook
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆55Updated 10 months ago
- Understanding and analyzing carrier files workshop repo☆48Updated 4 years ago
- A lab environment for learning about MSTICPy☆36Updated last year
- Tools and blogs I use to perform GCP red teams☆97Updated 3 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆59Updated last year
- List of Red Team Resources☆17Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆43Updated 7 months ago
- A CALDERA plugin☆25Updated 3 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- ☆43Updated last month
- Identify Azure blobs using a wordlist of account name and container name strings☆32Updated 3 years ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated last week
- Automating Security Detection Engineering, published by Packt☆47Updated last month
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆32Updated 7 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆95Updated 11 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆37Updated last year
- LLM Testing Findings Templates☆65Updated 9 months ago
- Purple Team Strategies, Published by Packt☆11Updated last year
- ☆58Updated 2 years ago
- ☆31Updated last week
- ☆61Updated 3 years ago
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- Resources for DFIR. And more.☆11Updated 4 months ago
- ☆37Updated 7 months ago
- ☆14Updated 3 years ago
- Incident Response with Threat Intelligence, published by Packt☆49Updated 7 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year