No description
Find a file
2021-07-25 12:35:02 +00:00
adversarial_emulation Adding adversary emulation tools 2020-10-15 21:16:27 -04:00
buffer_overflow_example Create mitigations.md 2021-07-17 11:56:53 -04:00
bug-bounties Update README.md 2020-09-09 13:36:59 -04:00
build_your_own_lab Update README.md 2021-04-02 21:16:27 -04:00
capture_the_flag Update encrypt.py 2020-05-11 01:59:25 -04:00
cheat_sheets Create msfvenom.md 2021-07-18 23:19:16 -04:00
cloud_resources Adding cloud security tools 2021-03-31 11:52:08 -04:00
cracking_passwords adding quick_recon to osint 2021-02-14 22:18:02 -05:00
crypto Update crypto_algorithms.md 2019-07-12 07:50:07 -04:00
cyberops Create cyberops-professional.md 2020-09-07 16:58:57 -04:00
devsecops Create README.md 2020-08-30 23:34:14 -04:00
dfir Create README.md 2020-10-19 13:38:24 -04:00
docker-and-k8s-security Create Kubernetes Goat.pdf 2021-04-11 22:25:32 -04:00
exploit_development Update README.md 2019-05-30 15:20:45 -04:00
fuzzing_resources Update README.md 2021-02-20 21:58:31 -05:00
game_hacking Create README.md 2019-02-06 13:03:34 -05:00
honeypots_honeynets Adding Honeypot / Honeynet Resources 2021-06-17 13:42:53 -04:00
IoT Link Updates 2021-02-04 14:00:46 -08:00
metasploit_resources adding metasploit info 2018-01-17 22:57:47 -05:00
mobile_security Update output.json 2018-06-18 23:34:43 -04:00
osint Adding breached data search tools 2021-06-18 18:48:37 -04:00
pcaps Adding pcap files repos for testing 2020-11-14 20:45:51 -05:00
pen_testing_reports Update README.md 2019-01-31 23:02:57 +01:00
post_exploitation Create misc-windows-post-exploitation.md 2021-07-18 23:33:45 -04:00
programming_and_scripting_for_cybersecurity Create dns-recon2.sh 2021-07-18 23:37:18 -04:00
recon Create smb_enumeration_tips.md 2021-07-18 23:48:12 -04:00
reverse_engineering Update README.md 2021-07-10 16:33:57 -04:00
SCOR Update README.md 2020-09-09 13:58:33 -04:00
social_engineering Update README.md 2020-12-16 13:20:52 -05:00
threat_hunting adding threat hunting references 2018-05-09 11:33:10 -04:00
virl_topologies adding VIRL topology 2018-06-02 01:19:42 -04:00
vulnerability_scanners Link Updates 2021-02-04 14:00:46 -08:00
vulnerable_servers adding nodegoat and railsgoat 2020-08-31 00:06:37 -04:00
web_application_testing Update cookie_stealer_payload.md 2021-03-27 15:48:22 -04:00
who-and-what-to-follow Rename streamers-and-youtube/README.md to who-and-what-to-follow/README.md 2020-09-22 23:01:08 -04:00
windows Windows PowerShell Cheat Sheet Link Update 2021-03-07 23:44:33 -08:00
wireless_resources updating wireless resources 2021-04-01 19:31:42 -04:00
.gitignore updating wireless resources 2021-04-01 19:31:42 -04:00
CONTRIBUTING.md Update CONTRIBUTING.md 2018-11-18 22:52:59 -05:00
LICENSE Update LICENSE 2020-03-28 00:22:15 -04:00
more_tools.md Update more_tools.md 2020-03-23 13:17:52 -04:00
new_tools.md Adding new tools 2021-07-25 12:35:02 +00:00
README.md Update README.md 2021-03-14 20:24:08 -04:00

Cyber Security Resources

This repository includes thousands of cybersecurity-related references and resources and it is maintained by Omar Santos. This GitHub repository has been created to provide supplemental material to several books, video courses, and live training created by Omar Santos and other co-authors. It provides over 9,000 references, scripts, tools, code, and other resources that help offensive and defensive security professionals learn and develop new skills. This GitHub repository provides guidance on how build your own hacking environment, learn about offensive security (ethical hacking) techniques, vulnerability research, exploit development, reverse engineering, malware analysis, threat intelligence, threat hunting, digital forensics and incident response (DFIR), includes examples of real-life penetration testing reports, and more.

The Art of Hacking Series

The Art of Hacking Series is a series of video courses and live training that help you get up and running with your cybersecurity career. The following are the different video courses that are part of the Art of Hacking series:

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), CompTIA PenTest+ and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series Omar Santos.

Live Training

Other Live Training and Video Courses: https://h4cker.org/training