s0cm0nkey / Security-Reference-GuideLinks
All of the Best Links and Resources on Cyber Security
☆68Updated 3 months ago
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below
Sorting:
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆104Updated 10 months ago
- Completely Risky Active-Directory Simulation Hub☆101Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- List of some cybersecurity conferences☆57Updated 2 weeks ago
- ☆40Updated 6 months ago
- SIEM Cheat Sheet☆74Updated last year
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- List of Command&Control (C2) software☆41Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆188Updated 4 months ago
- ☆99Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 5 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆74Updated 3 weeks ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆81Updated last year
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆33Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆175Updated 7 months ago
- ☆242Updated 5 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆119Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆55Updated last year
- ☆13Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆193Updated 2 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆94Updated 6 months ago
- Some important DFIR Resources☆83Updated 2 years ago