Pinned Repositories
Amass
In-depth Attack Surface Mapping and Asset Discovery
awesome-cybersecurity-blueteam
:computer:š”ļø A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
awesome-infosec
A curated list of awesome infosec courses and training resources.
awesome-osint
:scream: A curated list of amazingly awesome OSINT
breach-parse
A tool for parsing breached passwords
Bug-Bounty-Toolz
BBT - Bug Bounty Tools
cybermonk3y
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
cybermonk3y's Repositories
cybermonk3y/awesome-cybersecurity-blueteam
:computer:š”ļø A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
cybermonk3y/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
cybermonk3y/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
cybermonk3y/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
cybermonk3y/Amass
In-depth Attack Surface Mapping and Asset Discovery
cybermonk3y/awesome-infosec
A curated list of awesome infosec courses and training resources.
cybermonk3y/awesome-osint
:scream: A curated list of amazingly awesome OSINT
cybermonk3y/breach-parse
A tool for parsing breached passwords
cybermonk3y/Bug-Bounty-Toolz
BBT - Bug Bounty Tools
cybermonk3y/cybermonk3y
cybermonk3y/DFIR-Tools
This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR
cybermonk3y/EnterprisePurpleTeaming
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
cybermonk3y/EVTX-ATTACK-SAMPLES
Windows Events Attack Samples
cybermonk3y/Free_CyberSecurity_Professional_Development_Resources
An awesome list of FREE resources for training, conferences, speaking, labs, reading, etc that are free. Originally built during COVID-19 for cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock. Now its taken on a life of its own and will persist, COVID be damned.
cybermonk3y/google-cloud-4-words
The Google Cloud Developer's Cheat Sheet
cybermonk3y/infosec-jupyterthon
A community event for security researchers to share their favorite notebooks
cybermonk3y/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
cybermonk3y/malware-samples
Malware samples, analysis exercises and other interesting resources.
cybermonk3y/Mindmaps_ALL
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
cybermonk3y/powershell-profile
Pretty PowerShell that looks good and functions almost as good as Linux terminal
cybermonk3y/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
cybermonk3y/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
cybermonk3y/RsaCtfTool
RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
cybermonk3y/security-stack-mappings
This project empowers defenders with independent data on which native security controls of leading technology platforms areĀ mostĀ useful inĀ defending against the adversary TTPs they care about.
cybermonk3y/SOC-Scripts
cybermonk3y/strelka
Real-time, container-based file scanning at enterprise scale
cybermonk3y/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
cybermonk3y/ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
cybermonk3y/ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
cybermonk3y/VS-Code