hocchudong / ghichep-SOCLinks
Các ghi chép về SOC
☆16Updated 6 years ago
Alternatives and similar repositories for ghichep-SOC
Users that are interested in ghichep-SOC are comparing it to the libraries listed below
Sorting:
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆20Updated 8 months ago
- Ghi chép của nhóm thực tập tại Nhân Hòa☆42Updated 5 years ago
- Các ghi chép về Python☆10Updated 5 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Updated 6 years ago
- Website defacement attack detection with deep learning☆61Updated 7 months ago
- My CTF writeups☆17Updated 5 years ago
- Learning Assembly☆14Updated 2 years ago
- NGINX reverse proxy using ModSecurity WAF to protect a web application☆17Updated 5 years ago
- Lists of most common passwords in Vietnam☆72Updated 7 years ago
- Compiling a list of Vietnamese WiFi passwords for use with aircrack-ng☆55Updated 8 months ago
- Red Team Operator - Resource☆31Updated last year
- ☆29Updated last year
- Cyber Security Awareness Framework (CSAF)☆100Updated 5 months ago
- Những ghi chép trong quá trình nghiên cứu về Kubernetes (K8s)☆98Updated 3 years ago
- ☆13Updated 2 years ago
- ☆31Updated last year
- This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach i…☆88Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆77Updated 2 years ago
- ☆17Updated 3 years ago
- Solutions and notes for the Damn Vulnerable Web App pentesting tool, intended to be accurate as of 2Q 2019.☆94Updated 5 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆18Updated 10 months ago
- The First Open Source Bug Bounty Platform☆86Updated 2 months ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment…☆286Updated this week
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- ☆10Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆51Updated last year
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- Using GitHub Action to automatically fetch and analyze results of the Vietnam lottery daily.☆45Updated this week
- OSCP Privilege Escalation MindMap/Guide☆195Updated 3 years ago
- Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487☆240Updated last year