lawfareblog / hacking-cybersecurityLinks
Hacking & Cybersecurity class materials - Scott J. Shapiro & Sean O'Brien
☆85Updated 2 years ago
Alternatives and similar repositories for hacking-cybersecurity
Users that are interested in hacking-cybersecurity are comparing it to the libraries listed below
Sorting:
- Code that goes along with the Hacks, Leaks, and Revelations book☆172Updated last month
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated 2 years ago
- A very opinionated list of security tools☆128Updated 6 months ago
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆36Updated last month
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆41Updated 2 weeks ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆132Updated last year
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- This repository brings together tool builders, bloggers, speakers, book authors, and other interesting Mastodon accounts☆132Updated 2 years ago
- ☆36Updated 4 years ago
- Information for accessing The Cyber Plumber's Handbook Lab☆31Updated 2 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- ☆35Updated 2 years ago
- List of past and future infosec related events.☆163Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆51Updated 2 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- Tool to build and export timelines☆36Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- Ransomware groups posts☆42Updated this week
- Hacker calendar 2024 in high resolution + template + some editing tips☆22Updated last year
- URL fingerprinting made easy☆89Updated last year
- ☆31Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Repository of cybersecurity mindmaps☆33Updated 2 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆18Updated 3 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year