rnbwkat / presentsLinks
Presentations and handouts
☆33Updated 3 weeks ago
Alternatives and similar repositories for presents
Users that are interested in presents are comparing it to the libraries listed below
Sorting:
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 9 months ago
- The latest pyWars client for the SEC573 class☆44Updated 4 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆99Updated 9 months ago
- Indexes for SANS Courses and GIAC Certifications☆253Updated last year
- List of past and future infosec related events.☆157Updated last week
- A cybersecurity game in Azure Data Explorer☆172Updated last year
- InsightVM helpful SQL queries☆66Updated 5 months ago
- Repo for Concierge AI dev work☆196Updated last week
- links collected from SOC Core Skills class☆85Updated 4 years ago
- A template for writing a condensed course index leveraging LaTeX indexing☆104Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- ☆119Updated last year
- ☆47Updated 2 years ago
- ☆77Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- ☆77Updated 2 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆63Updated 2 years ago
- List of resources for buiding a home lab☆277Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated 2 weeks ago
- Tools to automatically create a SANS index based off the course pdf files.☆103Updated 4 years ago
- Tools for simulating threats☆189Updated last year
- NIST CSF Maturity Toolkit☆44Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- ☆72Updated 2 years ago
- ☆60Updated 4 years ago
- Awesome Incident Response☆275Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆28Updated 11 months ago