dreilly369 / AppliedMathForSecurityBookLinks
☆23Updated 2 months ago
Alternatives and similar repositories for AppliedMathForSecurityBook
Users that are interested in AppliedMathForSecurityBook are comparing it to the libraries listed below
Sorting:
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆68Updated 2 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- A repo to support the book☆46Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆71Updated 3 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆112Updated last year
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆74Updated last month
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Bash Shell Scripting for Pentesters, published by Packt☆43Updated last month
- Python for Security and Networking, Published by Packt☆98Updated 8 months ago
- Malware Analysis Techniques, published by Packt☆77Updated 2 years ago
- SIEM Cheat Sheet☆77Updated 2 years ago
- Purple Team Strategies, Published by Packt☆12Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- Offensive Security Using Python, published by Packt☆26Updated last year
- ☆236Updated 3 weeks ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- Python for Offensive PenTest, published by Packt☆149Updated 2 years ago
- Scripts featured in the book How to Hack Like a Legend☆150Updated 2 years ago
- ☆65Updated 5 years ago
- Tools and blogs I use to perform GCP red teams☆134Updated last year
- The latest pyWars client for the SEC573 class☆48Updated 10 months ago
- Practical Threat Detection Engineering, Published by Packt☆80Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- Adam Raffe and Tom Wilde's Azure Security Lab☆67Updated 7 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- A repo to support the book☆112Updated 4 years ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- Collection of all previous 1337UP CTF challenges.☆78Updated last year