dreilly369 / AppliedMathForSecurityBook
☆17Updated 11 months ago
Alternatives and similar repositories for AppliedMathForSecurityBook:
Users that are interested in AppliedMathForSecurityBook are comparing it to the libraries listed below
- A repo to support the book☆40Updated 2 years ago
- ☆15Updated 3 years ago
- Offensive Security Using Python, published by Packt☆18Updated 6 months ago
- The latest pyWars client for the SEC573 class☆44Updated 3 weeks ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆36Updated 8 months ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated 11 months ago
- A lab environment for learning about MSTICPy☆37Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆40Updated 3 weeks ago
- A repo to support the book☆107Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure☆19Updated 7 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆33Updated 7 years ago
- Practical Threat Detection Engineering, Published by Packt☆67Updated last year
- Purple Team Strategies, Published by Packt☆11Updated 2 years ago
- Collection of created MindMaps☆150Updated last year
- ☆44Updated 7 months ago
- This is a public template repository for the Open Detection Engineering Framework☆24Updated 2 months ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Python for Security and Networking, Published by Packt☆73Updated last year
- LLM Testing Findings Templates☆70Updated last year
- Creation of a laboratory for malware analysis in AWS☆96Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆27Updated last year
- Malware Analysis Exercise Samples and Resources☆41Updated 5 months ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 2 weeks ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- This repo contains all of the scripts used in Practical Vulnerability Management (No Starch Press, 2020)☆36Updated 3 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆59Updated 3 weeks ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago