gerryguy311 / BlueTeamCheatSheet_ChrisDavisLinks
This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to this. Gerald is hosting this for others to access. If anybody knows where the original is linked, please provide to me and I'll link to it and remove this.
☆25Updated 5 years ago
Alternatives and similar repositories for BlueTeamCheatSheet_ChrisDavis
Users that are interested in BlueTeamCheatSheet_ChrisDavis are comparing it to the libraries listed below
Sorting:
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆54Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆62Updated 2 years ago
- ☆53Updated 2 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 3 months ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆21Updated 7 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- A curated list of awesome threat detection and hunting resources☆19Updated 6 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- ☆22Updated 7 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Useful resources about phishing email analysis☆85Updated 6 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Updated last month
- New Framework Red Team Operations☆18Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last month
- Pwnspoof repository☆264Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆137Updated 2 years ago
- ☆45Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆18Updated 6 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆190Updated last year
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago