magnua / practicalvm
This repo contains all of the scripts used in Practical Vulnerability Management (No Starch Press, 2020)
☆36Updated 3 years ago
Alternatives and similar repositories for practicalvm:
Users that are interested in practicalvm are comparing it to the libraries listed below
- A port of BHIS's Backdoors & Breaches for playingcards.io☆61Updated 2 years ago
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- ☆116Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 9 months ago
- InsightVM helpful SQL queries☆63Updated last month
- links collected from SOC Core Skills class☆85Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆123Updated 3 weeks ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆55Updated 3 years ago
- Automating Security Detection Engineering, published by Packt☆52Updated 3 months ago
- The latest pyWars client for the SEC573 class☆43Updated last year
- Tools for simulating threats☆181Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆70Updated 3 months ago
- Conference presentations☆47Updated last year
- Controls Assessment Specification☆69Updated 7 months ago
- ☆73Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆55Updated 3 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆34Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆249Updated last year
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆32Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- OWASP Foundation Web Respository☆23Updated last month
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- ☆54Updated 3 years ago