s0cm0nkey / Security-Reference-GuideLinks
All of the Best Links and Resources on Cyber Security
☆74Updated 3 weeks ago
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below
Sorting:
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- SIEM Cheat Sheet☆77Updated 2 years ago
- ☆107Updated 4 years ago
- ☆242Updated 11 months ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 7 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- List of red team resources☆100Updated 8 years ago
- A RedTeam Toolkit☆409Updated 5 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Free training course offered at Hack Space Con 2023☆137Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- All the deals for InfoSec related software/tools this Black Friday☆87Updated 2 years ago
- ☆191Updated last year
- ☆237Updated 4 years ago
- List of tools and resources for pentesting Microsoft Active Directory☆111Updated 6 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- Red Team Guides☆144Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆252Updated this week
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆138Updated 3 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆163Updated 3 years ago