hsninbil's repositories
awesome-CISSP-CCSP
CISSP study material repository
awesome-soc
A collection of sources of documentation, as well as field best practices, to build/run a SOC
PenTestKit
Useful tools and scripts during Penetration Testing engagements
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
awesome-threat-intel-rss
A curated list of Awesome Threat Intelligence blogs
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
Google-Location-History-Data-Parser
This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manner.
HackTheBox-CTF-Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficulty.
HELK
The Hunting ELK
misp-taxonomies
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
open-source-web-scanners
A list of open source web security scanners
opencve
CVE Alerting Platform
OSCE-Complete-Guide
OSWE, OSEP, OSED
oscp
My OSCP journey
OSCP-Exam-Report-Template-Markdown
:orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
OSCP_notes
Just-notes
OSDD
Sharing ideas about using data diodes
osint_stuff_tool_collection
A collection of several hundred online tools for OSINT
pentest-guide
Penetration tests guide based on OWASP including test cases, resources and examples.
Red-Teaming-Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
security-study-plan
Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...
TheHiveDocs
Documentation of TheHive
Threat-Intel-Feed
Automated threat intel feed parsing and consolidation💻👾🤖
windows-forensic-artifacts
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips with some examples. Work in progress!