Starred repositories
This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
📜 33 JavaScript concepts every developer should know.
Security Certification Roadmap HTML5/CSS3 version
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.
Fast and easy script to manage pentesting training apps
A list of public penetration test reports published by several consulting firms and academic security groups.
Mastering Linux Security and Hardening Second Edition, Published by Packt
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
Passive service locator, a python sniffer that identifies servers, clients, names and much more
Small and highly portable detection tests based on MITRE's ATT&CK.
Chaos - BGP and Traffic Simulation for Evaluation of Internet Resiliency Systems
An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take adva…
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
Compliance automation framework, focused on SOC2
This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulnerable applications running in Docker containers and thousa…
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar…
A Course on Intermediate Level Linux Exploitation
Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet.