- Abatchy's blog
- Alpha cybersecurity
- Black Hills Information Security
- HackingArticles.in
- IronGeek Incident Response
- Jack Hacks
- Kentosec
- PinkysPlanet
- VetSec
- Analyzing LInux logs with Loggly
- APT Groups and operations
- CobaltStrike Walkthrough
- Cobalt Strike Offense-In-Depth
- Creatring a C2 Profile in CobaltStrike
- Disable core dumps (Linux)
- DShield Honeypot
- Forensic Test Images
- Getting Started with MITRE ATT&CK
- Hardening Unix/Linux Servers
- Blakkheim's guide
- LinuxAudit's guide
- Hardening compilers
- HostAdvice's guide
- Limiting user's access
- Ubuntu server docs
- Hawkeye forensics
- HBlock automatic hosts file hardening
- The HoneyDrive Project
- The Honeynet Project
- Internet Engineering Task Force
- Linux Private i
- Lynis Automated Compliance Auditing
- Long-Tail analysis with PowerShell
- MITRE’s Cascade server
- Packet CAPture exercises
- Palo Alto’s Unit 42 Playbooks
- Robtex domain registrar
- Remove exif data from images
- Remove PII from places like MyLife
- SANS Internet Storm Center diaries
- SANS live IR with PowerShell
- Setting a grub password
- Suggestions on random usernames
- Unshorten any URL
- Verify running processes domain-wide
- VirusTotal
- Wordpress malware removal guide
- Create your own Certificate Authority in CentOS
- Deploying Enterprise Certificate Authority (Windows Server)
- Fix Broken CRL / CA Deployment Issues
- Where to find ca.pl (you will need this to roll a RHEL CA)
- Authenticate users through Cisco switches with RADIUS
- Belarc Advisor software asset management
- CIS Blueprints for use with Azure
- CIS Critical Controls, inventorying running software
- Cryptographic Module Verification
- Exchange 2019 Preferred Architecture
- Full disk encryption with LUKS
- How to design a Disaster Recovery Plan
- How to silently configure OneDrive for business with InTune
- ISECOM Research
- ISO 27103 Information Technology Security Techniques
- NIST Framework for Improving Critical Infrastructure Cybersecurity
- NIST Policy on Hash Functions
- NIST SP 800-37 Rev 2 Risk Management Framework
- NIST SP 800-66 Rev 1. Introductory Guide for Implementing HIPPA Security Rules
- NIST SP 800-115 Conducting Technical Risk Assessments
- NIST SP 800-147B BIOS Protection Guidelines for Servers
- NIST SP 800-160B Systems Security Engineering, Approach: Trustworthy Secure Systems
- NIST SP 800-160B Systems Security Engineering, Approach: Developing Cyber-Resilient Systems
- PCI-DSS Compliance
- Security considerations for OEMs
- Swimlane SOAR
- Title 15 CFR § 740.17 Encryption Commodities, Software and Technology
- Title 18 US Codes § 1029 and 1030 Computer and Wire Fraud
- What is your system’s survival time?
- Aide File Integrity
- Auditd Linux Auditing System
- Remote Logging with Sysstat
- Rsyslog Remote Monitoring System
- A Guide to Machine Learning for Appsec
- Deep Exploit
- How to build a deep learning machine
- How to build a malware detection system with Machine Learning
- How to bypass those fancy Machine Learning malware detectors
- Apple Configuration profiles
- Brew package manager for macOS
- Creating an 802.1x profile for macOS
- Devolutions Cloud
- Digital Signatures for Email
- Endpoint self-protection in macOS
- How to enroll macOS with InTune
- How to join your mac to a Windows domain
- How to reverse engineer malware on a Mac (without getting infected)
- macOS scripting for sysadmins
- Nathaniel Landau's legendary .bash_profile
- Bad ass bash aliases
- BitchX tips and tricks
- Blank Unicode characters
- Corelan’s articles
- Crowdstrike Falcon
- Cybersecurity Supply vs Demand Heatmap
- Easy2Boot multiboot thumb drives
- Fix the locale bug in Kali Linux 2019.4
- Grafana & Prometheus monitoring & reporting
- Homelab Hero
- How to host a Tor hidden service
- How to build a TICK stack
- How to build an Infosec lab on the cheap
- How to Build your own U2F Token
- MS Virtual Machines
- Privacy Rights Clearing House
- Regenerate .bashrc from current shell
- Tor Network Directory
- Windows 10 Secure Boot SMM whitepaper
- CCIE R&S Resources
- Configuring stateful firewall rules with Juniper
- GNS3 Academy
- Factory reset a Cisco switch
- Homelab basics: DNS
- IPTables essentials
- Network Design Templates
- The OpenWRT Project
- OSX Application Firewall
- PAN-OS Administrator's Guide
- Subnet Calculator
- Subnetting Mastery
- System Design Templates
- UFW Essentials
- USB to UART Bridge
- Windows 10 Firewall Log
- Windows 10 Firewall with Advanced Security
- ZeroTier
- Duplicate an AD account
- Export AD members
- Get description of AD user
- Generate a list of usernames
- Join a domain
- Manipulate Packages Remotely with WMI
- NIC bonding
- PSWinDocumentation module
- Build a TIG Stack (Telegraf, InfluxDB, Grafana)
- Grafana Documentation
- Monitoring network stats with Telegraf
- Monitor vSphere with Docker
- Petey5000's Docker TIG Pi guide
- Telegraf Ping plugin documentation
- Build a Nintendo Pi
- Build a TorBox from scratch
- Caddy with SSL proxy into the homelab
- Get USB-C Ethernet working on Pi 4 (Deprecated?)
- Kismet Wireless IDS on Pi
- Pi-Hole DNS Filtering
- SnooPi Wireless Auditing
- Sticky Fingers Kali Pi Wireless Auditing
- Unifi on RPi step by step
- APT2 Adversary Emulation
- AV bypass with mimikatz
- Azure AD Connect for Red Teamers
- Azure interaction with Powerzure scripts
- BadUSB
- Beyond LLMNR Spoofing
- Binay Exploits
- Buffer Overflow interactive guide
- Buffer Overslow (32bit) made easy with VeteranSec
- Buffer Overflow whitepaper by Punisher
- Chrome Passwords, Extracting and making use of
- CTF Challenges (HackingArticles.in)
- DLL injector, remote
- Egghunter Exploitation Tutorial
- Exploit Writing pt 1 (Corelan)
- File Contents, 5 Ways to view a file in Linux
- Firmware, Dell Servers, Security Advisory 2018 fun
- Ghostpack from harmj0y
- GreatSct, Appsec Whitelisting Bypass
- HackMOD
- Hacking law firms with abandoned domain names
- HighOn.Coffee's Penetration Testing Tools Cheat Sheet
- IDA pro, how to create an anonymous database
- Impacket and Kerberos to get DA
- IPMI Pentesting
- IPRotate, change your IP with each burp request via AWS cloudfront
- Kali in Hyper-V
- Metasploit, Hiding shell using PrependGate
- Nmap guide for getting around firewalls and IDS
- Nmap preset scans explained
- Paywall Bypass
- PEB WinDBG analysis and process manipulation
- Penetration Testing Execution Standard
- Pentesterland's list of bug bounty writeups
- Pipl search (OSINT)
- Pivoting Tips (artkond)
- Pivoting Techniques (bigrot.sh)
- Powershell for Pentesters
- PowerShell Living off the Land
- PowerShell, encoding and decoding base64 strings
- Privesc automation script for the lazy (HackingArticles.in)
- Privesc Fundamentals (FuzzySecurity)
- Privesc in Linux (g0tmi1k)
- Privesc using PATH
- Privesc with Buffer Overflow
- Red Team Toolkit
- RFID Thief
- SANS Penetration Testing blog
- Scanner, how to write your own
- Scrapy (OSINT)
- Serverless Red Team Infrastructure pt 1
- Shells, upgrading to interactive
- Silence noisy neighbors by transmitting through their speakers
- Speed up your binary exploits
- Sploitus Exploit Search Engine
- SQL server connection strings
- Steganography Encoder
- Stego, embed powershell script into a PNG file
- Stego, Invoke-PSImage
- Vitalysim's Awesome Hacking Resources
- Vincent Yiu's Red Team Tips
- Weaponizing Kerberos Protocol Flaws
- Proxy Code Execution with WMIC
- Ansible scaling and automation
- Chef Configuration Management
- Puppet infrastructure automation and delivery
- XenServer
- ASCII Art Generator for the SSH login prompt
- Customize the MOTD
- HMAC comparisons
- Hardening Guidelines for Ubuntu (Incl. Kex and cipher suites are different on RHEL)
- Notes on the SSH configuration file and it's settings
- Notes on SSH tunneling limitations
- PKI with SSH Setup Guide (Cyberciti)
- Setting up strong SSH server keys
- Top 20 SSH Server Best Practices
- Secure Splunk with SSL
- Splunk + Docker
- Splunk + Security Onion walkthrough (YouTube)
- Disable Splunk's 'Transparent Huge Page' feature
- Install Splunk Universal Forwarders
- Splunkbase
- Splunk Education Enrollment
- Splunk Security Essentials (YouTube)
- Threat Detection with Splunk (YouTube)
- Threat Validation with Splunk (YouTube)
- Threat Response with Sysmon and Splunk (YouTube)
- Automated Build, Active Directory Hunting Lab in Azure
- Awesome Windows Domain Hardening Resources
- Control Panel One-Liners
- Deploy Server Certificates for RADIUS
- Fix broken Domain Trust without rejoining
- Fix Broken Windows Update Errors
- SmartCard Authentication in Windows 10
- NTSystems.IT Server 2019 RADUIS Guidelines
- Troubleshooting Server 2019 RADUIS issues
- Set a Lock Screen on Windows 10 Pro with GPO like a boss
- A sysadmin's guide to containers
- Ansible for vSphere VM security
- Basic ESXi setup for the uninitiated
- Create vSphere Distributed Switch
- Creating a Management Network for vSphere Integrated Containers
- Dell's Customization of ESXi and it's advantages
- How to auto-start VMs in ESXi
- How to back up the ESXi host config
- Install ESX onto the same drive you're installing it from (don't ask me how this works)
- Kubernetes Cheat Sheet
- Kubernetes on vSphere with Terraform and Kubespray
- Monitor ESXi with Telegraf
- OS Deployment with ESXi
- Protect the Docker Daemon Socket
- Reset the ESXi root password
- Reset vCenter root password