txuswashere / the-book-of-secret-knowledge
the-book-of-secret-knowledge A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools, and more.
☆15Updated 11 months ago
Alternatives and similar repositories for the-book-of-secret-knowledge:
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆21Updated 8 years ago
- CLI generator for Velociraptor offline collector☆9Updated 5 months ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆27Updated 2 years ago
- ☆29Updated 6 years ago
- SANS Slingshot Linux Distribution☆45Updated 4 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆16Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated 10 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- Resources for learning about application security☆54Updated 8 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Updated 4 years ago
- Repo for Cybercloud Tutorials hosted at cybercloud.guru☆2Updated 5 months ago
- Python for Defenders Course Resources☆16Updated 11 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 10 months ago
- Hunting Newly Registered Domains☆10Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Resources for DFIR. And more.☆11Updated 7 months ago
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- Penetration Testing Lab☆23Updated 10 years ago
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- Python command line tool used for generating GIAC Certification indexes.☆25Updated last year
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆37Updated 3 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆33Updated 7 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago