mildlytested / Wild-West---SOC-Core-Skills---NotesView external linksLinks
links collected from SOC Core Skills class
☆85Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for Wild-West---SOC-Core-Skills---Notes
Users that are interested in Wild-West---SOC-Core-Skills---Notes are comparing it to the libraries listed below
Sorting:
- ☆30Nov 15, 2018Updated 7 years ago
- These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.☆1,743Jan 28, 2026Updated 2 weeks ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- Sharing my BITS☆13Feb 23, 2018Updated 7 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Oct 17, 2024Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 4 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆59May 2, 2020Updated 5 years ago
- ☆56Jun 12, 2021Updated 4 years ago
- Pwnage☆17Jul 1, 2025Updated 7 months ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆40Mar 25, 2024Updated last year
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- ☆19Feb 3, 2026Updated last week
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Oct 22, 2020Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Contains my writeups for CTF challenges and vulnerable web server hacking (e.g. HackTheBox)☆19May 23, 2024Updated last year
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Updated this week
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- ☆42Dec 13, 2020Updated 5 years ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection☆21Sep 1, 2021Updated 4 years ago
- ☆54Oct 9, 2023Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 6 months ago
- ☆22Apr 12, 2023Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- Windows Thingies in Python for live use.☆24Apr 22, 2019Updated 6 years ago
- ☆2,383Oct 14, 2023Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Apr 10, 2025Updated 10 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆109Apr 22, 2025Updated 9 months ago
- ☆24Apr 16, 2019Updated 6 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Run zeek with zeekctl in docker☆62Sep 12, 2024Updated last year
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago