This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to this. Gerald is hosting this for others to access. If anybody knows where the original is linked, please provide to me and I'll link to it and remove this.
☆25May 31, 2020Updated 5 years ago
Alternatives and similar repositories for BlueTeamCheatSheet_ChrisDavis
Users that are interested in BlueTeamCheatSheet_ChrisDavis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jun 27, 2025Updated 9 months ago
- Machine Learning and Datasets for Malwares Static Analysis.☆19Jul 29, 2022Updated 3 years ago
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆29Apr 6, 2020Updated 5 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Trying to apply deep learning to music analysis☆12May 26, 2017Updated 8 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Personal lists containing additional filters to adblock domains.☆14Jan 25, 2021Updated 5 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19…☆2,080Feb 11, 2026Updated last month
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 2 weeks ago
- ☆16Jan 23, 2022Updated 4 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Use deep neural networks to synthesize the Neuroscore for evaluating Generative Adversarial Networks☆10Jun 1, 2020Updated 5 years ago
- ☆28Jul 5, 2023Updated 2 years ago
- GSSOC-20 Extended- Based on Topic Modeling, Classification, Natural Language Processing☆12Nov 22, 2020Updated 5 years ago
- CSI Linux Powerup utility☆13Feb 17, 2025Updated last year
- Experimental tagging schema for analysis of intersectionality, bias, and reception theories.☆11Feb 21, 2024Updated 2 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- ☆19Nov 2, 2025Updated 4 months ago
- Wrapper for DeviantArt API with typings☆10Mar 15, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tablero de Control #SGSI #ISO27001☆11Sep 22, 2021Updated 4 years ago
- CISSP Certification Exam Prep☆20Dec 14, 2025Updated 3 months ago
- Easy to use WiFi tools for the ESP32. Graphical interface provided via IMGUI☆14Mar 2, 2023Updated 3 years ago
- PowerShell script to generate daily audit report, like Logwatch for Windows☆25Dec 1, 2025Updated 3 months ago
- a api friendly mongoose pagination tool☆12Nov 9, 2020Updated 5 years ago
- A UEFI Application that hooks SetVariable to allow a user-space program to access kernel memory.☆20Jun 15, 2020Updated 5 years ago
- ☆14Sep 1, 2017Updated 8 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- ☆26Sep 20, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Sobel is first order or gradient based edge operator for images and it is implemented using verilog.☆13Dec 16, 2020Updated 5 years ago
- PoC exploit code for CVE-2021-26855☆17Mar 9, 2021Updated 5 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- artwork, logos, stickers, related to peoplesopen and sudomesh☆17Dec 18, 2019Updated 6 years ago
- A massive curated list of curated lists of various info sec/pen testing tools, resources, and tricks covering multiple verticals.☆16Nov 6, 2017Updated 8 years ago
- ☆20Jan 12, 2022Updated 4 years ago