ATAschert / Threat-Hunters-KB

Threat Hunter's Knowledge Base

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Threat Hunter's Knowledge Base

Description

Useful Threat Hunting resources: blogs, books, trainings, people to follow, research articles, talks etc.

Windows Internals & Security

Books

  • Windows Security Monitoring, Scenarios and Patterns (Andrei Miroshnikov)
  • Windows Internals (Part 1,2)
  • Windows System Programming Part 1,2 (Pavel Yosifovich)
  • Windows Kernel Programming (Pavel Yosifovich)

Trainings

  • Windows Internals (Pavel Yosifovich)
  • Windows Process Injection for Red-Blue Teams (PentesterAcademy, Pavel Yosifovich)
  • WinDbg Fundamentals: User Mode (PentesterAcademy, Pavel Yosifovich)
  • WinDbg Fundamentals: Kernel Mode (PentesterAcademy, Pavel Yosifovich)
  • Windows API Exploitation Recipes: Processes, Tokens and Memory RW (PentesterAcademy)
  • WMI Attacks and Defense (PentesterAcademy, Nikhil Mittal)
  • Windows System Programming: Fundamentals (PentesterAcademy, Pavel Yosifovich)

Links

Active Directory

Books

Trainings

  • Attacking and Defending Active Directory (PentesterAcademy, Nikhil Mittal)
  • Advanced Windows Tradecraft (Nikhil Mittal)

Labs

  • Attacking and Defending Active Directory (PentesterAcademy)
  • Advanced Red Team Lab (PentesterAcademy, Nikhil Mittal)
  • Global Central Bank: An Enterprise Cyber Range (PentesterAcademy, Nikhil Mittal)
  • Attacking Active Directory with Linux (PentesterAcademy, Nikhil Mittal)

Blogs

Threat Hunting

Books

Trainings

Blogs

Labs

CTF

Links

TTPs

Offensive Security/RedTeam

Books

Trainings

Blogs

People

Linux Internals & Security

Books

  • The Linux Programming Interface: A Linux and UNIX System Programming Handbook (Michael Kerrisk)

macOS Internals & Security

Books

  • MacOS and iOS Internals, Volume I: User Mode
  • MacOS and iOS Internals, Volume II: Kernel Mode
  • MacOS and iOS Internals, Volume III: Security & Insecurity

Trainings

Containers Security

Cloud - Microsoft Azure

Blogs

Cloud - AWS

About

Threat Hunter's Knowledge Base