sfhussain8's Projects
Cybersecurity of Machine Learning and Artificial Intelligence
Like all persons of the Library, I have traveled in my youth; I have wandered in search of a book, perhaps the catalogue of catalogues...
Automated Security Risk Identification Using AutomationML-based Engineering Data
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
APT & CyberCriminal Campaign Collection
A curated list of awesome lists
:computer:š”ļø A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
a list of cybersecurity internships
Google Cloud Platform Certification resources.
A collection of hacking / penetration testing resources to make you better!
A curated list of tools for incident response
Defund the Police.
:octocat: Machine Learning for Cyber Security
A curated list of amazingly awesome PHP libraries, resources and shiny things.
The Patterns of Scalable, Reliable, and Performant Large-Scale Systems
A collected list of awesome security talks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php.
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
A curated list of storage open source tools. Backups, redundancy, sharing, distribution, encryption, etc.
A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.
:notebook_with_decorative_cover: :books: A curated list of awesome resources : articles, books, videos, tools, podcasts about technical writing
A curated list of Awesome Threat Intelligence resources
Basic concept of how a ransomware works. Open sources ransomware
Basics of MySQL
Code Sample of Book "Effective Python: 59 Specific Ways to Write Better Pyton" by Brett Slatkin
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to this. Gerald is hosting this for others to access. If anybody knows where the original is linked, please provide to me and I'll link to it and remove this.
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or setup with Docker.