Stars
Tools and Techniques for Blue Team / Incident Response
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
Welcome to the Cybersecurity Career Accelerator Repository! This repository is tailored to help aspiring cybersecurity professionals prepare for the CompTIA Security+ certification exam, an essenti…
LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. This project gathers procedural examples from public reports …
This repository contains the code listings, examples and other resources for the book "GitOps and Kubernetes", written by Jesse Suen, Alex Matyushentsev, Billy Yuen and Todd Ekenstam, published by …
Pure Malware Development Resource Collections
Organized list of my malware development resources
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Microsoft » Windows 10 : Security Vulnerabilities
Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.
Red Team Roadmap [defination, job positions, skills, tools]
Resources for Windows exploit development
A curated list of Awesome Threat Intelligence resources
A curated list of awesome YARA rules, tools, and people.
A curated list of awesome Memory Forensics for DFIR
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidel…
A concise, directive, specific, flexible, and free incident response plan template
an awesome list of honeypot resources
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Attack and defend active directory using modern post exploitation adversary tradecraft activity
A list of free and open forensics analysis tools and other resources
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Library to interface with ThreatMiner's API for Python 2.x & 3.x