Charleston InfoSec Group Website
-
Updated
Mar 30, 2018 - HTML
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Charleston InfoSec Group Website
Breakdown of OverTheWire CTF Game
Python command line tool to use HIPB services.
Python 3 implementation of the two-square cipher (aka double Playfair).
a security operations centre developed using osquery and the ELK stack
A small Kali Linux in Docker
ProcAID Stage One
Cybersecurity cheatsheets, payloads, scripts, tools and playbooks
TryHackMe notes, code, PoC, solutions, writeups, scribbles, drafts...
A tool to help find subdomain takeover vulnerabilities
Presentation file(s) for the Security Incident Response talk
MAC address spoofer
Created by The cybersecurity community