santosomar / cyberopsLinks
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
☆25Updated 5 years ago
Alternatives and similar repositories for cyberops
Users that are interested in cyberops are comparing it to the libraries listed below
Sorting:
- Personal repository with handy cheatsheets.☆15Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆31Updated 7 years ago
- Pentest ToolKit☆28Updated 5 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Penetration Testing/Security Cheatsheets☆60Updated 9 years ago
- ☆30Updated 6 years ago
- ☆21Updated 2 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆34Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Automated Enumeration Script for Pentesting☆34Updated 4 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 9 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- SSH brute-force script created for HackTheBox☆16Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 9 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 2 months ago
- ☆33Updated 4 months ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆25Updated 8 years ago