โจ Curriculum for Information Security Specialists
A hands-on curriculum to become a successful cybersecurity engineer based on roles such as Pentest, AppSec, Cloud Security, DevSecOps, etc. Includes free and paid resources, tools and concepts.
โบ Link to GitHub
@geekcode ๐
A hands-on curriculum to become a successful cybersecurity engineer based on roles such as Pentest, AppSec, Cloud Security, DevSecOps, etc. Includes free and paid resources, tools and concepts.
โบ Link to GitHub
@geekcode ๐
Open Source cyber security tools for professionals ๐
1. Zeek: https://zeek.org/
Network Security Monitoring
2. ClamAV: https://www.clamav.net/
Antivirus
3. OpenVAS: https://www.openvas.org/
Vulnerability Scanner
4. TheHive: https://lnkd.in/e7aVCRUZ
Incident Response
5. PFSense: https://www.pfsense.org/
Security appliance (firewall/VPN/router)
6. Elastic: https://www.elastic.co/de/
Analytics
7. Osquery: https://www.osquery.io/
Endpoint visibility
8. Arkime: https://arkime.com/
Packet capture and search
9. Wazuh: https://wazuh.com/
XDR and SIEM
10. Alien Vault Ossim: https://lnkd.in/eShQt29h
SIEM
11. Velociraptor: https://lnkd.in/eYehEaNa
Forensic and IR
12. MISP project: https://lnkd.in/emaSrT57
Information sharing and Threat Intelligence
13. Kali: https://www.kali.org/
Security OS
14. Parrot: https://www.parrotsec.org/
Security OS
15. OpenIAM: https://www.openiam.com/
IAM
16. Yara: https://lnkd.in/eEJegEak
Patterns
17. Wireguard: https://www.wireguard.com/
VPN
18. OSSEC: https://www.ossec.net/
HIDS
19. Suricata: https://suricata.io/
IDS/IPS
20. Shuffler: https://shuffler.io/
SOAR
21. Phish Report: https://phish.report/
Anti Phishing
22. Graylog: https://lnkd.in/eAFuUmuw
Logmanagement
23. Trivy: https://lnkd.in/e7JxXStY
DevOps/IaC Scanning
24. OpenEDR: https://openedr.com/
EDR
25. Metasploit: https://lnkd.in/e4ECX-py
Pentest
26. NMAP: https://nmap.org/
Share & Support Us โค๏ธ
@geekcode ๐
1. Zeek: https://zeek.org/
Network Security Monitoring
2. ClamAV: https://www.clamav.net/
Antivirus
3. OpenVAS: https://www.openvas.org/
Vulnerability Scanner
4. TheHive: https://lnkd.in/e7aVCRUZ
Incident Response
5. PFSense: https://www.pfsense.org/
Security appliance (firewall/VPN/router)
6. Elastic: https://www.elastic.co/de/
Analytics
7. Osquery: https://www.osquery.io/
Endpoint visibility
8. Arkime: https://arkime.com/
Packet capture and search
9. Wazuh: https://wazuh.com/
XDR and SIEM
10. Alien Vault Ossim: https://lnkd.in/eShQt29h
SIEM
11. Velociraptor: https://lnkd.in/eYehEaNa
Forensic and IR
12. MISP project: https://lnkd.in/emaSrT57
Information sharing and Threat Intelligence
13. Kali: https://www.kali.org/
Security OS
14. Parrot: https://www.parrotsec.org/
Security OS
15. OpenIAM: https://www.openiam.com/
IAM
16. Yara: https://lnkd.in/eEJegEak
Patterns
17. Wireguard: https://www.wireguard.com/
VPN
18. OSSEC: https://www.ossec.net/
HIDS
19. Suricata: https://suricata.io/
IDS/IPS
20. Shuffler: https://shuffler.io/
SOAR
21. Phish Report: https://phish.report/
Anti Phishing
22. Graylog: https://lnkd.in/eAFuUmuw
Logmanagement
23. Trivy: https://lnkd.in/e7JxXStY
DevOps/IaC Scanning
24. OpenEDR: https://openedr.com/
EDR
25. Metasploit: https://lnkd.in/e4ECX-py
Pentest
26. NMAP: https://nmap.org/
Share & Support Us โค๏ธ
@geekcode ๐
๐1
How FBI hackers or Forensics Team identify fake Images
https://infosecwriteups.com/how-fbi-hackers-or-forensics-team-identify-fake-images-5574109ba959
@geekcode
https://infosecwriteups.com/how-fbi-hackers-or-forensics-team-identify-fake-images-5574109ba959
@geekcode
โจ๏ธ Google CTF: Skills Repository
Job sets along with Google CTF solutions between 2017 and 2023.
โบ Link to CTF
#CTF #geeks
@geekcode ๐
Job sets along with Google CTF solutions between 2017 and 2023.
โบ Link to CTF
#CTF #geeks
@geekcode ๐
How to get started with Cyber Security
โฐ Wednesday, 04 Oct 2023 4:00PM IST (04 Oct 2023 10:30 UTC)
https://www.sans.org/webcasts/how-get-started-cyber-security/
#event
@geekcode ๐
โฐ Wednesday, 04 Oct 2023 4:00PM IST (04 Oct 2023 10:30 UTC)
https://www.sans.org/webcasts/how-get-started-cyber-security/
#event
@geekcode ๐
SANS Institute
How to get started with Cyber Security | SANS Institute
SANS Foundations is the most comprehensive, certified cybersecurity course, for beginners, on the market. Created as a solution for entry-level cybersecurity students, professionals, or graduates, who reported hitting โthe wallโ in their first technicalโฆ
AWS PENTESTING
https://github.com/redskycyber/Cloud-Security/blob/main/AWS-Security-Pentesting-Resources.md
Join us : @geekcode ๐
https://github.com/redskycyber/Cloud-Security/blob/main/AWS-Security-Pentesting-Resources.md
Join us : @geekcode ๐
๐คWhatWeb - WhatWeb's next generation web scanner identifies websites.
Its purpose is to answer the question: โWhat kind of website is this?โ
WhatWeb also identifies version numbers, email addresses, account IDs, web platform modules, SQL errors, and more.
๐GitHub
@geekcode
Its purpose is to answer the question: โWhat kind of website is this?โ
WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistical/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1,800 plugins, each of which recognizes something different .
WhatWeb also identifies version numbers, email addresses, account IDs, web platform modules, SQL errors, and more.
๐GitHub
@geekcode
Forwarded from Cyber Agents
๐ Hacker IntelBroker claims to have stolen Apple source codes
IntelBroker on BreachForums claimed to have stolen the source code for several internal tools from Apple.
๐ According to the report, โApple.com suffered a data breach in June 2024,โ which led to the disclosure of information. IntelBroker claims that as a result it has obtained the source code for the following internal company tools: AppleConnect-SSO, Apple-HWE-Confluence-Advanced and AppleMacroPlugin.
@cyberagents
IntelBroker on BreachForums claimed to have stolen the source code for several internal tools from Apple.
๐ According to the report, โApple.com suffered a data breach in June 2024,โ which led to the disclosure of information. IntelBroker claims that as a result it has obtained the source code for the following internal company tools: AppleConnect-SSO, Apple-HWE-Confluence-Advanced and AppleMacroPlugin.
Little is known about Apple-HWE-Confluence-Advanced and AppleMacroPlugin. But AppleConnect-SSO is an authentication system that allows you to access certain applications on the Apple network. This system is known to be integrated with the Directory Services database to provide secure access to internal resources.
@cyberagents
Monitor file system changes using fsmon
โช๏ธsupports Linux, iOS, OS X, Android
โช๏ธidentify when are binaries loaded (root)
โช๏ธget dropped payloads (root)
โช๏ธidentify when are which files opened at app's runtime (db, txt, log, temp...) (non-root)
https://www.mobile-hacker.com/2024/06/24/monitoring-android-file-system-with-fsmon/
@geekcode
โช๏ธsupports Linux, iOS, OS X, Android
โช๏ธidentify when are binaries loaded (root)
โช๏ธget dropped payloads (root)
โช๏ธidentify when are which files opened at app's runtime (db, txt, log, temp...) (non-root)
https://www.mobile-hacker.com/2024/06/24/monitoring-android-file-system-with-fsmon/
@geekcode
Mobile Hacker
Monitoring Android file system with fsmon
FileSystem Monitor (fsmon) allows you to monitor file system events at runtime on Linux, OSX, iOS and Android systems. Useful for bug bounty hunters, malware analyst