Navpay's Stars
greshake/llm-security
New ways of breaking app-integrated LLMs
Bert-JanP/Open-Source-Threat-Intel-Feeds
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
cipher387/API-s-for-OSINT
List of API's for gathering information about phone numbers, addresses, domains etc
sujayadkesar/cybersecurity-resources
Cybersecurity Resources
fr0gger/Awesome-GPT-Agents
A curated list of GPT agents for cybersecurity
DeepWebOnion/darkweb-links
Verified links to darknet markets and darkweb sites on the Tor Network
JPMinty/MindMaps
Collection of created MindMaps
Sam0x90/CTI
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
LetsDefend/awesome-soc-analyst
Useful resources for SOC Analyst and SOC Analyst candidates.
Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
ozpingux/BasicLinuxForensicScript
Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.
HotCakeX/hotcakex.github.io
Website for Harden Windows Security Repository
HotCakeX/Harden-Windows-Security
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Personal, Enterprise, Government and Military security levels | Read The Rationale https://github.com/HotCakeX/Harden-Windows-Security/blob/main/Rationale.md
rod-trent/AddictedtoKQL
This is an advanced KQL blog series and book
rod-trent/SentinelKQL
Azure Sentinel KQL
rod-trent/SentinelPlaybooks
rod-trent/SentinelWorkbooks
Workbooks for Azure Sentinel
rod-trent/OpenAISecurity
Scripts and Content for working with Open AI
mrwadams/attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
ForensicITGuy/forensicitguy.github.io
ForensicITGuy Blog
ITI/ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
iknowjason/Awesome-CloudSec-Labs
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
mandiant/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
daffainfo/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
LetsDefend/SOC-Interview-Questions
SOC Interview Questions
Bo0oM/fuzz.txt
Potentially dangerous files
jatrost/awesome-kubernetes-threat-detection
A curated list of resources about detecting threats and defending Kubernetes systems.
vectra-ai-research/derf
DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation of repeatable detection samples in the cloud. Built on Google Workflows
sergiomarotco/Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
CyberSecurityUP/Awesome-Red-Team-Operations