ensarseker1 / AI-Workshop
Mastering AI in Cybersecurity: From Theory to Practice.
☆12Updated 3 months ago
Alternatives and similar repositories for AI-Workshop:
Users that are interested in AI-Workshop are comparing it to the libraries listed below
- AppsecStudy - open-source elearning management system for information security☆9Updated last year
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆20Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆25Updated last year
- Script related in Active Directory Attacks Domain☆21Updated last year
- Security Operation Center Lab☆18Updated 5 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- My personal knowledge repository☆11Updated 2 weeks ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- Digital Forensics for Pentesters - Hands-on Learning, by EC-Council☆17Updated 3 years ago
- Resources and notes for Offensive Security's SOC-200 course and OffSec Defense Analyst (OSDA) exam☆11Updated last year
- ☆43Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆35Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆19Updated 3 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last week
- ☆55Updated 10 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- List of questions, answers and random notes for security interviews☆69Updated 3 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆50Updated last year
- ☆16Updated last year
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆38Updated 2 weeks ago
- CSbyGB - Gabrielle B's new Blog!☆22Updated last year
- Cybersecurity Black Friday Deals repository! 🛡️🎁☆43Updated last year
- ☆32Updated 4 months ago
- SIEM Cheat Sheet☆73Updated last year
- ☆30Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Updated 4 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated 11 months ago
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆16Updated 2 months ago