santosomar / cyber-defenderLinks
Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos
☆16Updated 3 years ago
Alternatives and similar repositories for cyber-defender
Users that are interested in cyber-defender are comparing it to the libraries listed below
Sorting:
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- ☆104Updated 5 years ago
- SIEM Cheat Sheet☆74Updated last year
- ☆46Updated 2 years ago
- Some important DFIR Resources☆83Updated 2 years ago
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆53Updated 2 years ago
- Useful resources about phishing email analysis☆84Updated 4 months ago
- ☆21Updated 5 years ago
- ☆50Updated this week
- ☆180Updated last year
- ☆87Updated 2 years ago
- Certification Cheatsheets☆188Updated last year
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆102Updated 4 months ago
- ☆59Updated last year
- Resources for Students in the Practical Webapp Security and Testing course☆168Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- List of tools and resources for pentesting Microsoft Active Directory☆74Updated 3 weeks ago
- ☆77Updated 4 years ago
- The latest pyWars client for the SEC573 class☆44Updated 3 months ago
- PNPT Exam Preparation - TCM Security☆169Updated 3 years ago
- ☆71Updated 5 months ago
- ☆22Updated 10 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆72Updated last year
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated last year
- ☆60Updated 4 years ago
- Hands-on projects on Static and Dynamic malware analysis with real-world tools.☆18Updated last year
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆237Updated last month