richard-hart / cyber-security
Useful cyber security and digital forensics resources
☆10Updated 4 years ago
Alternatives and similar repositories for cyber-security:
Users that are interested in cyber-security are comparing it to the libraries listed below
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- ☆12Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆14Updated 3 months ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 7 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- ☆33Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- ☆14Updated 5 years ago
- Scripts and One-Liners☆21Updated 3 months ago
- ☆21Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated last year
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- ☆16Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Admin for☆16Updated 6 years ago