s0cm0nkey / Security-Reference-GuideLinks
All of the Best Links and Resources on Cyber Security
☆73Updated 3 months ago
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below
Sorting:
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- SIEM Cheat Sheet☆77Updated 2 years ago
- ☆106Updated 4 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆318Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 6 months ago
- All the deals for InfoSec related software/tools this Black Friday☆226Updated this week
- List of tools and resources for pentesting Microsoft Active Directory☆108Updated 4 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆107Updated 2 years ago
- Useful resources about phishing email analysis☆87Updated 10 months ago
- Completely Risky Active-Directory Simulation Hub☆103Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- ☆243Updated 10 months ago
- List of red team resources☆99Updated 8 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- My public notes about offensive security☆163Updated 2 months ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated last year
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆357Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- #cheat sheet for OSWP☆98Updated 4 years ago
- Tools & Resources for Cyber Security Operations☆266Updated 6 months ago
- PNPT Exam Preparation - TCM Security☆171Updated 4 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆135Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆149Updated 10 months ago
- ☆224Updated 4 years ago
- ☆188Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- ☆212Updated 3 years ago
- ☆348Updated 2 years ago