Lists (1)
Sort Name ascending (A-Z)
Stars
This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms
A collection of companies that disclose adversary TTPs after they have been breached
Build real C projects with 18 beginner-friendly challenges. Learn by doing with guided coding exercises and practical applications.
A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload
A Python script that parses your SUID/SGID enumeration output and checks which binaries are exploitable according to GTFOBins. Supports both online and offline (local database) modes.
🎓 Path to a free self-taught education in Computer Science!
Collection of malware analysis, binary exploitation and reverse engineering related resources
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure code reviews. Features common vulnerabilities found in real-wor…
A repository for learning various heap exploitation techniques.
Sliver CheatSheet for OSEP
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A template for members of the MyDFIR SOC Community to showcase their work
The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypass | Windows AV evasion
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting point.
My notes while studying for the PNPT from TCM Security.
xforcered / PhrackCTF
Forked from chompie1337/PhrackCTFBinary Exploitation Phrack CTF Challenge
Es una herramienta para hacer geolocalizacion - hecha en python - es multifuente y correlaciona info de multiples fuentes
Weaponize DLL hijacking easily. Backdoor any function in any DLL.
Collection of Cyber Threat Intelligence sources from the deep and dark web
Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.
HTNotes - Make your Hack The Box notes with Obsidian