This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Go to file
2024-01-04 11:53:20 -05:00
adversarial_emulation
ai_research Update ai_model_exchanges.md 2024-01-04 11:53:20 -05:00
buffer_overflow_example Create learn_assembly.md 2023-07-12 14:56:38 -04:00
bug-bounties Update scope_example.md 2023-09-10 14:18:48 -04:00
build_your_own_lab Update README.md 2023-10-23 19:14:13 -04:00
capture_the_flag
cheat_sheets Create The ChatGPT Playbook .pdf 2023-07-29 23:39:27 -04:00
cloud_resources Update README.md 2023-11-21 14:55:31 -05:00
cracking_passwords
crypto Create README.md 2023-09-18 17:07:14 -04:00
cyberops Create cyberops-professional.md 2020-09-07 16:58:57 -04:00
darkweb_research Update README.md 2023-11-02 15:52:51 -04:00
devsecops Create building_devsecops_pipelines.md 2023-08-20 17:00:04 -04:00
dfir Update README.md 2022-06-28 10:07:41 -04:00
docker-and-k8s-security organizing references 2023-08-08 18:35:50 -04:00
exploit_development Update README.md 2023-07-03 15:19:43 -04:00
fuzzing_resources Update README.md 2023-08-24 11:30:34 -04:00
game_hacking
honeypots_honeynets Create cloud_honeynet.md 2023-08-25 17:02:11 -04:00
iot_hacking Update wireless_iot.md 2023-11-08 16:09:36 -05:00
linux-hardening Add files via upload 2023-07-25 14:59:13 -04:00
metasploit_resources
methodology Create static_dynamic_analysis.md 2023-11-03 10:49:28 -04:00
mobile_security
more_payloads
networking Create README.md 2023-01-06 15:43:21 -05:00
osint Update README.md 2023-08-20 15:20:19 -04:00
pcaps organizing pcaps 2023-08-08 18:36:26 -04:00
pen_testing_reports Update README.md 2023-10-12 11:43:30 -04:00
post_exploitation Create php-reverse-shell.php 2022-04-15 10:37:39 -04:00
programming_and_scripting_for_cybersecurity Create check_weak_crypto.py 2023-09-18 19:58:44 -04:00
python_ruby_and_bash Create python_sniffer.py 2021-09-17 12:45:38 -04:00
recon Update README.md 2022-07-21 09:47:46 -04:00
reverse_engineering Update README.md 2023-09-04 18:53:55 +02:00
sbom
SCOR Create wccp_and_pbr_to_wsa.md 2023-12-18 14:13:46 -05:00
social_engineering
threat_hunting Create threat_hunting_process.md 2023-08-20 15:23:24 -04:00
virl_topologies
vulnerability_scanners
vulnerable_servers Added Pentest-Ground to vulnerable websites for training 2023-12-13 21:49:18 +02:00
web_application_testing Create dc31_01.sh 2023-10-19 15:30:07 -04:00
who-and-what-to-follow Update README.md 2022-09-01 20:02:40 -04:00
windows
wireless_resources
.gitignore updating log analyzer 2023-08-18 22:39:35 -04:00
CONTRIBUTING.md
LICENSE Update LICENSE 2023-08-08 23:19:58 -04:00
more_tools.md Add DotDotPwn - Directory Traversal Fuzzer 2023-10-23 18:33:33 -07:00
new_tools.md Adding new tools 2023-07-04 13:20:03 +00:00
README.md Update README.md 2023-08-23 00:42:54 -04:00

Typing SVG

This repository is a comprehensive collection of cybersecurity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos.

Overview

The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive security professionals in honing their skills.

Key Areas of Focus

  • Ethical Hacking Techniques: Guidance on building your hacking environment, learning offensive security techniques, bug bounties, vulnerability research, and exploit development.

  • Reverse Engineering & Malware Analysis: In-depth insights into reverse engineering and analyzing malicious software.

  • Threat Intelligence & Threat Hunting: Resources for understanding, tracking, and proactively searching for potential threats.

  • Digital Forensics & Incident Response (DFIR): Real-life penetration testing reports, techniques, and tools related to digital forensics and incident response.

  • AI Security Research: Exploration of artificial intelligence and machine learning in the context of cybersecurity. This includes researching potential security vulnerabilities in AI algorithms, developing robust AI models resistant to adversarial attacks, understanding AI-driven threat detection, and creating tools that leverage AI to enhance security measures, and more.

How to Use

You can clone this repository or download specific resources to deepen your understanding in the aforementioned areas. For detailed explanations and practical applications, refer to the books, video courses, and training by Omar Santos.

Contributing

If you wish to contribute, please read the CONTRIBUTING.md file.

License

This project is licensed under the MIT License - see the LICENSE.md file for details.

Contact

For any inquiries or feedback, please feel free to contact Omar Santos.