Various cybersecurity/hacker examples, snippets and code
-
Updated
Aug 19, 2022
Various cybersecurity/hacker examples, snippets and code
Script that gets all MITRE ATT&CK techniques from the enterprise overview and writes them into a power point
"Road Map to CyberSecurity" my project aimed at providing a comprehensive and systematic guide to learning and developing skills in the field of cybersecurity. This roadmap serves as an excellent resource for both beginners and professionals alike, covering a wide range of essential topics in cybersecurity
Captcha-image generator that are non-solvable by OCR(using genetic algorithm)
Personal Bloodhound Community Edition notes
Honeycheck detects rogue dhcp servers and provides a modular and fully configurable action environment in case they are found
IOC validation with Python
LEVEL-UP é um exercício diário de desenvolvimento constante em Hacking
A collection of small scripts and howto's that where create at one point to solve a certain issue
Documentation of the Red vs Blue project from the CWRU Cybersecurity course.
A set of blue team scripts for hardening Linux systems focusing on competitions and locking a system down.
Adversaries commonly abuse the Local Security Authority Subsystem Service (LSASS) to dump credentials for privilege escalation, data theft, and lateral movement. The process is a fruitful target for adversaries because of the sheer amount of sensitive information it stores in memory.
Add a description, image, and links to the blueteam topic page so that developers can more easily learn about it.
To associate your repository with the blueteam topic, visit your repo's landing page and select "manage topics."