kaiiyer / Cyber-ChristmasLinks
A curated list of resources for Cyber Professionals
☆16Updated 4 years ago
Alternatives and similar repositories for Cyber-Christmas
Users that are interested in Cyber-Christmas are comparing it to the libraries listed below
Sorting:
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆47Updated 9 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- This project is no longer maintained☆12Updated 5 years ago
- ☆22Updated 7 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Malware Analysis Tools☆31Updated 6 years ago
- ☆19Updated 4 years ago
- ☆44Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆96Updated 3 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- A semi-curated list of Security Feeds☆142Updated 3 years ago
- Cybersecurity Notes☆166Updated last year
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- ☆45Updated 4 years ago
- ☆66Updated 5 years ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆134Updated last month
- Pentest stuff☆49Updated last year
- ☆48Updated 7 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago