Pinned Repositories
custom-wordlists
Collection of custom popculture wordlists for password cracking
Cyberthreat-Intelligence
Get the skinny on trending hacker groups, malware, and viruses that pose a dangerous threat to information systems
find-command-in-Linux
brief tutorial on using the find command in Linux systems
ICS-security-project
Western Interconnection Cyber Security and Mission Assurance full report & PP presentation
Patch-Tuesday-Updates
Summary of the most current security updates and patches released by Microsoft and other major apps
top-60-programming-languages
Quick cheatsheet on top 60 programming languages
vulnerability-database-cheatsheet
vulnerability intelligence, security research
Windows-Log-Analysis
Event codes to monitor for early detection of malware and anomalous activity
Cheroxx's Repositories
Cheroxx/custom-wordlists
Collection of custom popculture wordlists for password cracking
Cheroxx/Cyberthreat-Intelligence
Get the skinny on trending hacker groups, malware, and viruses that pose a dangerous threat to information systems
Cheroxx/ICS-security-project
Western Interconnection Cyber Security and Mission Assurance full report & PP presentation
Cheroxx/vulnerability-database-cheatsheet
vulnerability intelligence, security research
Cheroxx/Windows-Log-Analysis
Event codes to monitor for early detection of malware and anomalous activity
Cheroxx/find-command-in-Linux
brief tutorial on using the find command in Linux systems
Cheroxx/Patch-Tuesday-Updates
Summary of the most current security updates and patches released by Microsoft and other major apps
Cheroxx/top-60-programming-languages
Quick cheatsheet on top 60 programming languages