paulveillard / cybersecurity-networkingLinks
An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and important practical resources about networking in cybersecurity
☆21Updated 3 years ago
Alternatives and similar repositories for cybersecurity-networking
Users that are interested in cybersecurity-networking are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated last year
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆17Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 3 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆39Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆60Updated 3 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Updated 2 months ago
- List of some cybersecurity conferences☆58Updated 4 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Updated last year
- ☆27Updated last month
- Assorted scripts I made for Red Teaming / Pen Testing☆14Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆33Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆21Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆98Updated 2 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆38Updated 2 years ago
- ☆24Updated 2 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆29Updated 4 months ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆23Updated 2 years ago
- redteamrecipe.com☆24Updated last year
- This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)☆38Updated 10 months ago
- This repository contains steps on how i set up a basic home lab running Active Directory.☆32Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year