talltechy / infosec_it-conferences-and-certs-usa
USA based Information Security & I.T. Conferences
☆33Updated 2 years ago
Alternatives and similar repositories for infosec_it-conferences-and-certs-usa:
Users that are interested in infosec_it-conferences-and-certs-usa are comparing it to the libraries listed below
- Learn you a book for some infosec good☆62Updated 5 years ago
- For storing of the volumes☆4Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- automate your MISP installs☆67Updated 4 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆66Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- All my slides for any talks☆23Updated 5 months ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆60Updated 3 years ago
- ☆40Updated 4 years ago
- ☆30Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆54Updated 7 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- ☆26Updated 7 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Automated Enumeration Script for Pentesting☆34Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 7 months ago
- ☆54Updated 3 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago