Pinned Repositories
airgap-distro
Bootable live usb/cd linux distribution containing AirGap Vault.
Crypto-Encryption-and-Decryption-Tools
Crypto Encryption and Decryption Tools
Cybersecurity-Resources
A Library of various cybersecurity resources
docker-kasm
Kasm Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
forensix-2202
Network security Critical-Vuln detail explanations
https-replit.com-join-huctjpvkbg-willardreidsteen
Coding project tutorial - colaborative
PenTest-Report-Samples
Sample of a PenTest Report - From Offensive Security
powerbi-desktop-samples
Power BI Desktop sample files for the monthly release. Here you can find the PBIX files used in the monthly release videos.
securityonion
Security Onion 2 - Linux distro for threat hunting, enterprise security monitoring, and log management
Upenn-CyberSecurity-SIEM-System-Information-Event-Management-SPLUNK
SIEM-Splunk_Resource
Scarletcurve188's Repositories
Scarletcurve188/Cybersecurity-Resources
A Library of various cybersecurity resources
Scarletcurve188/docker-kasm
Kasm Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
Scarletcurve188/https-replit.com-join-huctjpvkbg-willardreidsteen
Coding project tutorial - colaborative
Scarletcurve188/PenTest-Report-Samples
Sample of a PenTest Report - From Offensive Security
Scarletcurve188/powerbi-desktop-samples
Power BI Desktop sample files for the monthly release. Here you can find the PBIX files used in the monthly release videos.
Scarletcurve188/ansible-examples
A few starter examples of ansible playbooks, to show features and how they work together. See http://galaxy.ansible.com for example roles from the Ansible community for deploying many popular applications.
Scarletcurve188/apiify---SPLUNK
Wrap any binary into a cached webserver
Scarletcurve188/autopsy_addon_modules
Repo to store compiled modules or links to 3rd party add-on modules.
Scarletcurve188/awesome-godot
A curated list of free/libre plugins, scripts and add-ons for Godot
Scarletcurve188/beef
The Browser Exploitation Framework Project
Scarletcurve188/securityonion
Security Onion 2 - Linux distro for threat hunting, enterprise security monitoring, and log management
Scarletcurve188/bitnami
Bitnami container images
Scarletcurve188/GodGenesis
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
Scarletcurve188/godot-build-scripts
Build scripts used for official Godot Engine builds with https://github.com/godotengine/build-containers
Scarletcurve188/godot-demo-projects
Demonstration and Template Projects
Scarletcurve188/grist-electron
Desktop Grist, packaged with Electron
Scarletcurve188/jail
An nsjail Docker image for CTF pwnables. Easily create secure, isolated inetd-style services.
Scarletcurve188/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Scarletcurve188/learn-python
📚 Playground and cheatsheet for learning Python. Collection of Python scripts that are split by topics and contain code examples with explanations.
Scarletcurve188/linkedin-skill-assessment-solutions
This post will provide you with all Linkedin Assessment Quiz Answers for free. The LinkedIn Skill Assessment feature allows you to demonstrate your knowledge of the skills you’ve added on your profile by completing assessments specific to those skills.
Scarletcurve188/mimikatz
A little tool to play with Windows security
Scarletcurve188/Mindmap
SEIM Mind maps CYBERSEC
Scarletcurve188/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Scarletcurve188/pentest-reports
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Scarletcurve188/pure-bash-bible
📖 A collection of pure bash alternatives to external processes.
Scarletcurve188/pure-sh-bible
📖 A collection of pure POSIX sh alternatives to external processes.
Scarletcurve188/pytest
The pytest framework makes it easy to write small tests, yet scales to support complex functional testing
Scarletcurve188/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
Scarletcurve188/Splunk-7-Essentials-Third-Edition
Splunk 7 Essentials - Third Edition, published by Packt
Scarletcurve188/TryHackMe-Writeups
Writeups/walkthroughs for TryHackMe PwnBoxes/Challenges/Rooms