Skip to content

n0rsejack/Infosec-Resources

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 

Repository files navigation

My Infosec Resources

Table of Contents

Resources

Resources

CTF Walk Throughs

Name Description
CTF Walkthroughs HighOn.Coffee CTF Walkthroughs
OpenSOC Write Up OpenSOC Write Up
Blue Team Villiage OpenSOC Write Up Blue Team Villiage OpenSOC
Awesome CTF Cheatsheet Awesome CTF Cheatsheet

CTF's

Name Description
Awesome-CTF Awesome-CTF
Hack the Box HTB
Hack the Box Academy Hack the Box Academy
Web Security Academy Web Security Academy
OWASP Juice Shop OWASP Juice Shop
Pentester Lab Pentester Lab
VULNHUB VULNHUB
TryHackMe TryHackMe
Pentester Academy Pentester Academy
Attack & Defense [Attack and Defense]
HackingLAB [Hacking LAB]
Over the Wire Over the Wire
CTF Time [CTF Time]
Mutillidae [Mutillidae]
Damn Vulnerable Web Application [DVWA]
Metasploitable 2 [Metasploitable 2]
Metasploitable 3 [Metasploitable 3]

APT's

Name Description
Naming Conventions Cyber Threat Actor Naming Conventions
APT & CyberCriminal Campaign Collection CyberMonitor
Threat Hunter Playbook Cyb3rWard0g Threat Hunter Playbook
APT Threat Tracking APT Threat Tracking

Red Team

Pen Testing Frameworks

Name Description
Penetration Testing Framework 0.59 Penetration Testing Framework
The Penetration Testing Execution Standard PTES
Open Source Security Testing Methodology Manual (OSSTMM) OSSTMM
NIST Guideline on Network Security Testing NIST SP800-115
OWASP Testing Guide OWASP Testing Guide

Blue Team

Blue Team Tools

Name Description
urlscan.io urlscan
echotrail.io echotrail
any.run any.run
Threat Connect Threat Connect
AlienVault OTX AlientVault OTX
IBM X-Force Exchange IBM X-Force Exchange
Threat Crowd Threat Crowd
Threat Miner Threat Miner
Virus Total Virus Total
Hybrid Analysis Hybrid Analysis
Passive Total Passive Total
URL Void URL Void
IP Void IP Void
Zmap Project Zmap Project
Zmap Project Research Zmap Project Research
SIEMonster SIEMonster
Keeping Infrastructure as Code Secure-KICS KICS
Velociraptor Velociraptor
Blue Hound Blue Hound

Blue Team Frameworks

Name Description

Blue Team Best Practices

Name Description
Network Segmentation Best Practices for Network Segmentation
OWASP Network Segmentation OWASP Network Segmentation

Logging Resources

Name Description
Malware Archaeology Malware Archaeology Cheet Sheets
Malware Archaelogy Powershell logging Cheatsheet MA Powershell Logging Cheatsheet
Powershell & Commandline Logging Powershell & Commandline Logging
Command Shell Logging ATT&CK ID: DS0017 -> T1059.003 Red Canary Command Shell Logging
Command Shell Logging ATT&CK ID: DS0017 -> T1059.001 Red Canary Powershell Logging

Threat Research

Name Description
Blackfog State of Ransomware Blackfog State of Ransomware
ThreatMon Advanced Ransomware Monitoring ThreatMon
DataBreaches.net DataBreaches.net
Mitre ATT&CK Mitre ATT&CK

Annual Threat Reports

Name Description
Verizon DBIR Verizon DBIR
Mandiant M-Trends M-Trends Report
CrowdStrike Global Threat Report CrowdStrike Global Threat Report
Red Canary Threat Detection Report Red Canary Threat Detection Report
The DFIR Report The DFIR Year in Review Report
Microsoft Digital Defense Report Microsoft Digital Defense Report
Orange Cyberdefense Security Navigator Orange Cyberdefense Security Navigator

DFIR

Name Description
Top 20 and 200 most scanned ports in the cybersecurity industry Top 20 and 200 most scanned ports
Intelligence Concepts - F3EAD Intelligence Concepts - F3EAD
Cyber Threat Intelligence SIG - Intelligence Lifecycle - F3EAD Cycle FIRST Intelligence Lifecycle - F3EAD
Kill Chain - (F2T2EA, 4F's, 5F's, Cyber Kill Chain, Mitre, and Unified Kill Chain) Kill Chains
Diamond Model of Intrusion Analysis Diamond Model of Intrusion Analysis
Diamond Model used in Practice by ThreatConnect Diamond Model used on Chinese APT
30 Best Blue Team Tools 30 Best Blue Team Tools
Security Soup Security Soup
Jai Minton DFIR Resources Digital Forensics and Incident Response Cheetsheet

OSINT

Name Description
Bellingcat's Digital Forensics Tools Digital Forensics Tools
Github Jivoi Awesome OSINT Jivoi Awesome OSINT

CTI

Name Description
Cyber Threat Intelligence Self-Study Plan CTI Self-Study Plan
Intelligence Concepts - F3EAD Intelligence Concepts - F3EAD
Cyber Threat Intelligence SIG - Intelligence Lifecycle - F3EAD Cycle FIRST Intelligence Lifecycle - F3EAD
Using the Estimative Language Taxonomy in MISP Using the Estimative Language Taxonomy in MISP
Analytic Levels of Confidence and Probability Yardstick Levels of Confidence & Probability Yardstick

Training

Name Description
OSCP-Survival-Guide Getsecnow
Detailed Guide to OSCP Prep Detailed Guide to OSCP Prep
Offensive Security's PWK & OSCP Review Offensive Security's PWK & OSCP Review
OSCP: Offensive Security Certification & PWK Review intrd-OSCP Review
OSCP: Hakluke's Ultimate Guide Haklukes OSCP Guide
OSCP: A Detailed Guide on OSCP Preparation JasonMax at Peerlyst OSCP Guide
OSCP: Peerlyst Wiki Collection How to Get the OSCP Wiki
awesomeinfosec awesomeinfosec
Awesome-Hacking Awesome-Hacking
Bettercap Tutorial A Bettercap Tutorial
Pentesters Lab Pentesters Lab
DoGByTe-ZN Infosec-resources-for-all
GIAC - GPEN Reference MeteorMusic
Awesome Malware Analysis rshipp
How to Build a Treat Hunting Platform using ELK Stack Threat Hunting ELK Stack
Network Security Monitoring CNIT50: Network Security Monitoring
Incident Response CNIT 152: Incident Response
Practical Malware Analysis CNIT 126: Practical Malware Analysis
Samsclass Samsclass
The Easiest Metasploit Guide You'll Ever Read Metasploit Guide
Malware Analysis RPISEC Malware Analysis
Awesome Hacking Resources Vitalysim Hacking Resources
Tools and Resources to Prepare for a CTF InfoSec Institute
Awesome Security Awesome Security
Awesome CTF Awesome CTF
Awesome Incident Response Awesome Incident Response
Incident Response IncidentResponse
Blue Team Labs Blue Team Labs
Boss of the SOC BOTS Boss of the SOC
Splunk Threat Hunting Splunk Threat Hunting
OpenSOC OpenSOC
How to install Elastic SIEM and Elastic EDR Install Elastic SIEM and Elastic EDR
LetsDefend Blue Team Training LetsDefend Blue Team Training
Blue Team Labs Online Blue Team Labs Online
TCM Security Training TCM Security Training
Cisco Live on Demand Cisco Live on Demand

Additional Resources

Name Description
Github Awesome Security Github Awesome Security Search
Github Awesome Security Sindresorhus Sindresorhus Awesome-Security
Github Meirwah Awesome Incident Response Awesome Incident Response
Github Hslatman Awesome Threat Intelligence Awesome Threat Intelligence
Github Coreb1t Awesome Pentest Cheatsheets Awesome Pen Test Cheatsheets
Github 0x4D31 Awesome Threat Detection Awesome Threat Detection
Github Awesome Penetration Testing Awesome Penetration Testing
Infosec Career Advice Starting an InfoSec Career - The Megamix
Easily Report Phishing and Malware Reporting Phishing and Malware
Github Awesome Windows Domain Hardening Awesome Windows Domain Hardening
My Time at NetWars Tournament of Champions NetWars Tournament Experience
Penetration Testing Tools Cheatsheet Highon.Coffee Pentesting Cheatsheet
Peerlyst Infosec Cheatsheet Complete List of Infosec Cheatsheets
PwnWiki.io Pwn Wiki
Zeltser Blocklists Zeltser Blocklists
Zeltser Cheatsheets Zeltser Cheatsheets
Cyber Intel Sites 8 Great Sites for Cyber Threat Intel
Threatintel.EU A Study on Threat Intelligence Platforms (TIPs)
Linux Journey Linux Journey
Threat Huning with HELK Threat Hunting & Adversary Emulation
BrakeSec BDIR BrakeSec BDIR
How to Build and Run SOC Peerlyst Claus Houmann SOC Info
The Peerlyst Wiki The Peerlyst Wiki
Information Security Reading List MalwareJedi InfoSec Reading List
ROCK NSM ROCK NSM
Red Teaming Simulation Toolkit Red Teaming Adversary Simulation Toolkit
ADLabDeployer ADLabDeployer
DetectionLab DetectionLab
Awesome Cyber Security BlueTeam Awesome Cyber Security Blue Team
RMusser InfoSec Resources RMusser InfoSec Resources
Awesome Incident Response Awesome Incident Response
Awesome Threat Detection and Hunting Awesome Threat Detection and Hunting
Cyber Adversary Emulation Install Setup Mitre Caldera The Automated Cyber Adversary Emulation System
How I get started into Threat Hunting How I get started into Threat Hunting
Great List of Resources to Build an Enterprise Grade Home Lab List of Resources to Build Enterprise Home Lab
Windows Privilege Escalation Fundamentals Window Privesc & Good IR Scripts
Basics of Windows Incident Response by Jordan Potti Basics of Windows IR
IR Tales From Hold My Beer Security IR Tales
Cyberthreat Intelligence Study Plan Cyberthreat Intelligence Study Plan
DFIRmadness 5pillars 5pillars of Cybersecurity
DFIR Reference Frameworks DFIR Reference Frameworks
TCM Practical-Ethical-Hacking-Resources TCM Practical-Ethical-Hacking-Resources
Blackfog State of Ransomware Blackfog State of Ransomware
APT Cyber Campaigns APT Cyber Campaigns
Security Awareness Training Statistics & Trends 2022 Edition Security Awareness Stats and Trends 2022
The Record Ransomware Tracker The Record Ransomware Tracker
Security Awareness Training Security Awareness Training
Enterprise Grade Home Lab List of Tools for Enterise Grade Home Lab
CyberScoop CyberScoop
FedScoop FedScoop
StateScoop StateScoop
Blue Team Home Labs Blue Team Home Labs
Ransomware Reports Ransomware Reports
Awesome Phishing Awesome Phishing
Curated Ukraine Cyber Crisis Curated Intel
Ukraine Cyber Crisis Ukraine Cyber Crisis Intel
SANS Ukraine Cyber Crisis SANS Ukraine Cyber Crisis
Cisco Mappings to Cyber Frameworks Cisco Mappings to Cyber Frameworks
Cisco Talos OSQueries TALOS OSQueries
OSQuery ATT&CK OSQuery ATT&CK

Warfare Studies

Air Force Intelligence and Security Doctrine Air Force Doctrine Documents
Air Basic Doctrine Vol. 1 Air Force Basic Doctrine Vol. 1
Air Force Leadership Vol. 2 Air Force Leadership Vol. 2
AFPD 1-2 Air Force Glossary Air Glossary
DOD Dictionary of Military Associated Terms DOD Dictionary or Terms
AFPD 1-04 Legal Support to Operations, 04 March 2012
AFDP 2-0 Global Integrated Intelligence, Surveillance, & Reconnaissance Operations Global Integrated ISR Ops
AFDP 3-0 Operations and Planning Operations and Planning
AFPD 3-01 Counterair Ops Counterair Operations
AFPD 3-2 Irregular Warfare Irregular Warfare
AFPD 3-03 Counterland Operations Counterland Operations
AFPD 3-04 Countersea Operations Countersea Operations
AFPD 3-05 Special Operations Special Ops
AFPD 3-10 Force Protection Force Protection
AFPD 3-12 Cyberspace Operations Cyberspace Operations
AFPD 3-13 Information Operations Information Operations
AFDD 3-13.1 Electronic Warfare, 5 November 2001, incorporating Change 1, 28 July 2011
AFPD 3-14 Counterspace Operations Counterspace Ops
AFDD 3-17 Air Mobility Operations, 1 March 2006, incorporating Change 1, 28 July 2011
AFPD 3-22 Foreign Internal Defense Foreign Internal Defense
AFPD 3-27 Homeland Operations Homeland Ops
AFPD 3-30 Command and Control Command and Control
AFPD 3-50 Personnel Recovery Operations Personnel Recovery
AFPD 3-59 Weather Operations Weather Ops
AFPD 3-60 Targeting Targeting
AFPD 3-61 Public Affairs Operations Public Affairs
AFPD 3-70 Strategic Attack Strategic Attack
AFPD 4-0 Combat Support Combat Support
FAS Intelligence Resource Program Air Force Doctrine Documents
U.S. Air Force Doctrine Site U.S. Air Force Doctrine

Names to follow

Twitter

Name Description
Andrew Kalat @Lerg
ATT&CK @MITREattack
Bad Packets @bad_packets
BenHeise @benheise
bk Ben Koehl @bkMSFT
Black Hills Information Security @BHInfoSecurity
BleepingComputer @BleepinComputer
Brett Shavers @Brett_Shavers
briankrebs @briankrebs
Bryan Brake @bryanbrake
Christopher Hadnagy @humanhacker
Cisco Talos Intelligence Group @TalosSecurity
Center for Internet Security (CIS) @CISecurity
Chris Crowley @CCrowMontance
Chris Sanders @chrissanders88
Christopher Glyer @cglyer
Cybersecurity and Infrastructure Security Agency @CISAgov
Cybersecurity Canon @CyberSecCanon
Cybersecurity and Infrastructure Security Agency @CISAInfraSec
DarkReading @DarkReading
DEF CON @defcon
DFRLab @DFRLab
Dutch Osint Guy Nico @dutch_osintguy
Eric Capuano @eric_capuano
Florian Roth @Cyb3rops
GreyNoise @GreyNoiseIO
Heath Adams @thecybermentor
IO Link @IOLink
Ismael Valenzuela @aboutsecurity
Jake Williams @MalwareJake
James Lyne @jameslyne
Jason Blanchard @BanjoCrashland
Jeremy Dallman @jdallman
Johannes Ullrich @johullrich
John Hammond @_JohnHammond
John Hubbard @SecHubb
John Hultquist @JohnHultquist
Josh Brower @DefensiveDepth
Justin Seitz @xKaliSec
Justin Warner @sixdub
KaliTut @jms_dot_py
Katie Nickels @likethecoins
kirbstr @kirbstr
KitPloit - Hacker Tools @KitPloit
Lenny Zeltser @lennyzeltser
Lesley Carhart @hacks4pancakes
Maliciouslink @Maliciouslink
MalwareTech @MalwareTechBlog
malware traffic analysis @malware_traffic
Matt Bromiley @_bromiley
Metacurity @Metacurity
Microsoft Security @msftsecurity
Microsoft Security Intelligence @MsftSecIntel
MSTIC Team Members @JohnLaTwC
NETRESEC @netresec
Nick Carr @ItsReallyNick
nixintel @nixintel
Offensive Security @offsectraining
Omar Ωr Santos @santosomar
Phil Hagen @santosomar
Phill Moore @PhilHagen
Phillip Wylie @PhillipWylie
Rachel Tobac @RachelTobac
Ramin @MalwareRE
RedHunt Labs @RedHuntLabs
RedTeamVillage @RedTeamVillage_
ReversingLabs @ReversingLabs
Rob Fuller @mubix
Ryan "Chaps" Chapman @rj_chap
SANS CyberDefense @SANSDefense
SANS SANS DFIR @sansforensics
SANS ISC @sans_isc
SANS Institute @SANSInstitute
SANS Offensive Operations @SANSOffensive
Securitymapper @SecurityMapper
SecurityTrails @securitytrails
strandjs @strandjs
Tim Medin @TimMedin
Tinker @TinkerSec
The CyberWire @thecyberwire
Threatpost @threatpost
Troy Hunt @troyhunt
US-CERT @USCERT_gov
We Are OSINTCurious @OsintCurious
Whitney Champion @shortxstack
Wild West Hackin' Fest @WWHackinFest

Podcasts

Name Description
Black Hills Information Security Black Hills Information Security
Blueprint Podcast by John Hubbard Blueprint Podcast
Breaking Down Security Podcast Breaking Down Security Podcast
Cipher Brief Open Source Report Cipher Brief Open Source Report
Cyberwire Daily Cyberwire Daily
Darknet Diaries Podcast Darknet Diaries Podcast
Defensive Security Podcast Defensive Security Podcast
Internet Storm Center Internet Storm Center
Malicious Life Podcast Malicious Life Podcast
OSINT Curious Podcast OSINT Curious Podcast
Privacy Security and OSINT Podcast Privacy Security and OSINT Podcast
Recorded Future Podcast Recorded Future Podcast
The Hacker Factory Podcast Hacker Factory Podcast
7 Minute Security 7 Minute Security

Note

Disclaimer, I do not support, encourage, partake, or condone hacking, attacking or targeting users of any kind. This information is clearly meant to help cybersecurity teams in doing their jobs and learning skills necessary for Redteam/Blueteam activities.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published