Tracy Reed, CISSP, CCSK, RHCE, ATP's starred repositories
NLTK-Book-Resource
Notes and solutions to complement the official NLTK book
roundcubemail
The Roundcube Webmail suite
Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download)
awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
python-training
Python training for business analysts and traders
dockerfile-security
A collection of OPA rules to statically analyze Dockerfiles to improve security
kubernetes-the-hard-way
Bootstrap Kubernetes the hard way. No scripts.
opentelemetry-collector
OpenTelemetry Collector
auditd-attack
A Linux Auditd rule set mapped to MITRE's Attack Framework
ansible-for-kubernetes
Ansible and Kubernetes examples from Ansible for Kubernetes Book
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
google-drive-ocamlfuse
FUSE filesystem over Google Drive
ansible-wireguard
Create a VPN server with WireGuard
rapid7_OSINT
All the tools you need to make your own mind up from the Open Data Sets
pwnagotchi
(⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
cis-rhel-ansible
Ansible playbooks for CIS Benchmarks on RHEL/CentOS 6