Priority logs for SIEM ingestion
by National Cyber Security Centre Category: Governance Tags: SIEM, logs License: CC BY 4.0 203 downloads
Top C&C Methods
by Hadess Category: RedTeam Tags: C&C License: Not Specified 148 downloads
The Last Dance with msfvenom
by Hadess Category: RedTeam Tags: metasploit, msvenom License: Not Specified 205 downloads
Powershell Tips & Tricks for Pentester
by Hadess Category: Pentesting Tags: powershell License: Not Specified 135 downloads
Attacking Nginx
by DevSecOps Category: RedTeam Tags: nginx License: Not Specified 182 downloads
Gettng Started in ICS/OT Cyber Security
by UtilSec Category: IoT Tags: lab, ics, OT License: Not Specified 315 downloads
WI-FI Hacking Notes
by Jai Bhattacharya Category: Network Tags: wifi License: Not Specified 533 downloads
Understanding Data Security Risk
by CSA Category: Risk Tags: risk, data License: Not Specified 267 downloads
Credential Dumping SAM
by Ignite Technologies Category: RedTeam Tags: credential, dumping, SAM License: Not Specified 220 downloads
Credential Dumping Fake Services
by Ignite Technologies Category: RedTeam Tags: dump, creds License: Not Specified 239 downloads
Beginner Guide For Pentester Students
by mic.tec Category: Pentesting Tags: pentesting License: Not Specified 697 downloads
Detailed guide on HTML injection
by Ignite Technologies Category: Pentesting Tags: injection, html License: Not Specified 463 downloads
Detailed Guide On Remote File Inclusion
by Ignite Technologies Category: Pentesting Tags: rfi License: Not Specified 568 downloads
Cybersecurity Reference Architecture
by Department Of Defense Category: Architecture Tags: architecture License: TLP: Clear 886 downloads
Introduction to cyber security
by Jeetendra Pande Category: Career Tags: cybersecurity License: CC BY-SA 4.0 544 downloads