Stars
《Hello 算法》:动画图解、一键运行的数据结构与算法教程。支持 Python, Java, C++, C, C#, JS, Go, Swift, Rust, Ruby, Kotlin, TS, Dart 代码。简体版和繁体版同步更新,English version in translation
21 Lessons, Get Started Building with Generative AI
经济学人(含音频)、纽约客、卫报、连线、大西洋月刊等英语杂志免费下载,支持epub、mobi、pdf格式, 每周更新
The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the pro…
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."
This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 solely and completely with "BurpSuite".
Code included as part of the MustLearnKQL blog series
PowerShell Digital Forensics & Incident Response Scripts.
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
All the deals for InfoSec related software/tools this Black Friday
Interesting APT Report Collection And Some Special IOCs
Serverless plugin for least privileges.
Automation to assess the state of your M365 tenant against CISA's baselines
Documentation and scripts to properly enable Windows event logs.
List of Awesome Red Teaming Resources
A complete computer science study plan to become a software engineer.
Rapidly Search and Hunt through Windows Forensic Artefacts
Collection of Jupyter Notebooks by @fr0gger_
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Product Group in conjunction with the Microsoft Detection and Resp…
List of Computer Science courses with video lectures.
A collection of awesome security hardening guides, tools and other resources
Transform Linux Audit logs for SIEM usage