santosomar / cyberopsLinks
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
☆30Updated 6 years ago
Alternatives and similar repositories for cyberops
Users that are interested in cyberops are comparing it to the libraries listed below
Sorting:
- Who and what to follow in the world of cyber security☆151Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆34Updated 7 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 8 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 weeks ago
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆21Updated 5 months ago
- Digital Forensics with Kali Linux, published by Packt☆97Updated 2 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆21Updated 9 months ago
- Pentest ToolKit☆28Updated 5 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆30Updated 8 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- devops scripts☆33Updated 9 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Mastering Python for Networking and Security published by Packt☆129Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24Updated 9 years ago
- ☆22Updated 9 years ago
- A curated list of awesome infosec resources.☆31Updated 10 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago