yyds-page / cissp-mind-map
CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th
☆68Updated 2 years ago
Related projects: ⓘ
- CISSP Study Materials PDF and Web Copy for 2022☆46Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆137Updated last year
- a mock CISSP exam test simulator using aggregated questions from online sources.☆31Updated 4 years ago
- Tool to discover external and internal network attack surface☆188Updated 3 months ago
- ☆43Updated last year
- Collection of created MindMaps☆151Updated 10 months ago
- ☆32Updated this week
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆50Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆79Updated 3 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆180Updated last week
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago
- Notes for my CISSP study☆10Updated 2 years ago
- Repository resource for threat hunter☆157Updated 6 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆133Updated 5 years ago
- Build a attack range in your local machine☆130Updated last year
- Active Directory Lab for Penetration Testing☆48Updated 3 years ago
- ☆14Updated 5 years ago
- ☆153Updated 9 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆178Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆32Updated 2 years ago
- ChatGPT for Cybersecurity Cookbook, published by Packt☆88Updated 5 months ago
- Incident Response - Fast suspicious file finder☆231Updated 2 years ago
- Windows for Red Teamers☆123Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆121Updated 4 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆105Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆48Updated 6 years ago
- Picus Labs☆42Updated 3 years ago
- https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite☆35Updated 2 weeks ago
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 5 months ago
- Linux Evidence Acquisition Framework☆114Updated 2 years ago