her3ticAVI / Exploiting-A.I.-Class
This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.
☆2Updated 3 weeks ago
Alternatives and similar repositories for Exploiting-A.I.-Class:
Users that are interested in Exploiting-A.I.-Class are comparing it to the libraries listed below
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆265Updated this week
- Intro Labs Remastered☆31Updated 3 weeks ago
- ☆57Updated 3 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆59Updated 2 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆94Updated 6 months ago
- ☆172Updated last year
- ☆76Updated 3 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆115Updated this week
- Open Source Security Operations Center Documentation☆168Updated this week
- Indexes for SANS Courses and GIAC Certifications☆244Updated 10 months ago
- A curated list of awesome infosec courses and training resources.☆202Updated last year
- Tools for simulating threats☆183Updated last year
- ☆43Updated last year
- ☆47Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 8 months ago
- Windows Malware Investigation Scripts & Docs☆75Updated 4 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆138Updated last year
- /dev/tty☆27Updated this week
- A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found her…☆68Updated 9 months ago
- My notes while studying for the PNPT from TCM Security.☆68Updated 11 months ago
- Tools to automatically create a SANS index based off the course pdf files.☆95Updated 4 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆217Updated last week
- Certification Cheatsheets☆182Updated last year
- ☆47Updated last month
- Create lab environment for Linux Command Line course☆45Updated 6 months ago
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆118Updated 9 months ago
- Here are all the notes I personally took while studying for the OSCP which helped me pass.☆85Updated 3 years ago
- ☆30Updated last week
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆390Updated 3 months ago
- Some important DFIR Resources☆83Updated 2 years ago