All Projects โ†’ rmusser01 โ†’ Infosec_reference

rmusser01 / Infosec_reference

Licence: mit
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

Programming Languages

CSS
56736 projects
HTML
75241 projects

Projects that are alternatives of or similar to Infosec reference

Pentesting toolkit
๐Ÿดโ€โ˜ ๏ธ Tools for pentesting, CTFs & wargames. ๐Ÿดโ€โ˜ ๏ธ
Stars: โœญ 1,268 (-69.53%)
Mutual labels:  hacking, pentesting, infosec, forensics, reverse-engineering
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: โœญ 870 (-79.1%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec, privilege-escalation
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: โœญ 62 (-98.51%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: โœญ 1,136 (-72.71%)
Mutual labels:  hacking, pentesting, infosec, red-team
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: โœญ 1,392 (-66.55%)
Mutual labels:  hacking, pentesting, penetration-testing, privilege-escalation
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: โœญ 2,775 (-33.33%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: โœญ 775 (-81.38%)
Mutual labels:  hacking, pentesting, infosec, red-team
Gitjacker
๐Ÿ”ช Leak git repositories from misconfigured websites
Stars: โœญ 1,249 (-69.99%)
Mutual labels:  hacking, pentesting, penetration-testing, red-team
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: โœญ 5,615 (+34.91%)
Mutual labels:  hacking, pentesting, infosec, red-team
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: โœญ 182 (-95.63%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Remote Desktop Caching
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: โœญ 171 (-95.89%)
Mutual labels:  hacking, penetration-testing, forensics, blueteam
Rebel Framework
Advanced and easy to use penetration testing framework ๐Ÿ’ฃ๐Ÿ”Ž
Stars: โœญ 183 (-95.6%)
Mutual labels:  hacking, forensics, information-security, reverse-engineering
Dirsearch
Web path scanner
Stars: โœญ 7,246 (+74.1%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: โœญ 556 (-86.64%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Nishang
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Stars: โœญ 5,943 (+42.79%)
Mutual labels:  hacking, penetration-testing, infosec, red-team
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: โœญ 3,521 (-15.4%)
Mutual labels:  hacking, pentesting, penetration-testing, information-security
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: โœญ 382 (-90.82%)
Mutual labels:  hacking, pentesting, penetration-testing, privilege-escalation
Nmap
Idiomatic nmap library for go developers
Stars: โœญ 391 (-90.61%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: โœญ 11,466 (+175.49%)
Mutual labels:  hacking, penetration-testing, privilege-escalation, reverse-engineering
Awesome Shodan Queries
๐Ÿ” A collection of interesting, funny, and depressing search queries to plug into shodan.io ๐Ÿ‘ฉโ€๐Ÿ’ป
Stars: โœญ 2,758 (-33.73%)
Mutual labels:  hacking, pentesting, penetration-testing, infosec

InfoSec Reference

### An Information Security Reference That Doesn't Suck

Goal:

  • The goal of this project is to act as a free resource for anyone interested in learning more about Information Security.
    • A list of techinques, tools and tactics to learn from or reference.
    • Rich resource of infosec knowledge for anyone to browse through as a jumping off point for various niches OR as a reference/recall method for stuff.
    • Something like a "Yellow Pages" in the sense of you know something exists, but what was it called....
      • 'If you give a man a fish, he is hungry again in an hour. If you teach him to catch a fish, you do him a good turn.'
    • To be clear, these aren't personal notes. I keep this repo maintained as a way of having pointers to information that I feel might help build someone's skillset or increase their understanding of attacks/methods/defenses.
  • This project is not meant to condone illegal or malicious activities.
  • For a HTML version of this reference, check out: https://rmusser.net/docs(I'm not a webdev. Can you tell?).
  • For latest content updates, check the git history.
  • Want to contribute a link?
    • Anything relevant that isn't already in or covered would be/is appreciated.
  • If this resource has helped you in any way(and didn't increase your frustration), please consider making a donation to Doctors Without Borders or Amnesty International.

Index - Table of Contents

  • A Quote:

    • "As the Americans learned so painfully in Earth's final century, free flow of information is the only safeguard against tyranny. The once-chained people whose leaders at last lose their grip on information flow will soon burst with freedom and vitality, but the free nation gradually constricting its grip on public discourse has begun its rapid slide into despotism. Beware of he who would deny you access to information, for in his heart he dreams himself your master."
    • Commissioner Pravin Lal, Peacekeeping Forces (Alpha Centauri, 1999)
  • Another Quote:

    • "Nowhere does Bokonon warn against a personโ€™s trying to discover the limits of his karass and the nature of the work God Almighty has had it do. Bokonon simply observes that such investigations are bound to be incomplete. In the autobiographical section of The Books of Bokanon he writes a parable on the folly of pretending to discover, to understand: I once knew an Episcopalian lady in Newport, Rhode Island, who asked me to design and build a doghouse for her Great Dane. The lady claimed to understand God and His Ways of Working perfectly. She could not understand why anyone should be puzzled about what had been or about what was going to be. And yet, when I showed her a blueprint of the doghouse I proposed to build, she said to me, โ€œIโ€™m sorry, but I never could read one of those things.โ€ โ€œGive it to your husband or your minister to pass on to God,โ€ I said, โ€œand, when God finds a minute, Iโ€™m sure heโ€™ll explain this doghouse of mine in a way that even you can understand.โ€ She fired me. I shall never forget her. She believed that God liked people in sailboats much better than He liked people in motorboats. She could not bear to look at a worm. When she saw a worm, she screamed. She was a fool, and so am I, and so is anyone who thinks he sees what God is Doing, [writes Bokonon].
    • Cat's Cradle(The Books of Bokonon), Kurt Vonnegut
  • Thucydides, The Peloponnesian War - Athenian envoys:

    • For ourselves, we shall not trouble you with specious pretencesโ€”either of how we have a right to our empire because we overthrew the Mede, or are now attacking you because of wrong that you have done usโ€”and make a long speech which would not be believed; and in return we hope that you, instead of thinking to influence us by saying that you did not join the Lacedaemonians, although their colonists, or that you have done us no wrong, will aim at what is feasible, holding in view the real sentiments of us both; since you know as well as we do that right, as the world goes, is only in question between equals in power, while the strong do what they can and the weak suffer what they must.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].