kramse / security-coursesLinks
various courses, presentation etc.
☆165Updated last month
Alternatives and similar repositories for security-courses
Users that are interested in security-courses are comparing it to the libraries listed below
Sorting:
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Slide Decks for the Majority of my Talks☆63Updated last year
- DEF CON Hacker Tracker☆108Updated 3 years ago
- Bash and Python Honeyport scripts☆46Updated 8 years ago
- USA based Information Security & I.T. Conferences☆32Updated 3 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Containerized version of my fork of Nahamsec's Lazyrecon.☆50Updated 3 months ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- list of passwords more likely to be used by sysadmins, general nerds, and folk with access☆258Updated 10 months ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 6 months ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.☆115Updated 8 months ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- ☆28Updated 8 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 5 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- My network monitoring solution and tools that go along with it.☆61Updated 3 years ago
- Helps with finding and registering categorized domains☆70Updated 4 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago