A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
-
Updated
Jun 10, 2024 - JavaScript
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
My Privacy DNS #Matrix lists for blacklisting
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Security automation content in SCAP, Bash, Ansible, and other formats
👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetration testing and offensive cybersecurity.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Documentation for the Compliant Kubernetes project
This repository contains all the assignments, books and other stuffs of Master of Science in Information Technology at Arizona State University.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
OSINT cheat sheet, list OSINT tools, dataset, article, book and OSINT tips
Some hacking tools & resources that I wrote from scratch or modified.
Decompile, optimize, recompile, and integrate spyware and remote control features into APK and EXE files with LurkerX, the ultimate tool for security researchers, penetration testers, and ethical hackers.
Official website of TWC
Call for papers / accepted papers in top computer security and deep learning fields.
Run TOR conveniently from a docker container.
Ansible role to apply a security baseline. Systemd edition.
Hardening Ubuntu. Systemd edition.
DPULSE - Domain Public Data Collection Service
Created by The cybersecurity community