Skip to content

A cybersecurity resource library of knowledge documents, links to tools, and automation scripts.

License

Notifications You must be signed in to change notification settings

Daethyra/Cybersecurity-References

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cybersecurity References 🛡️🔒

HACKERMANS by numrii

Welcome to my personal cybersecurity toolkit.

This directory contains various files, notably Maderas' list of necessary cybersecurity skills and Networking-Basics for learners.

Beyond that, you'll find more advanced, technically focused reference guides on specific topics. There's a load of information on common web application vulnerabilities and how to exploit them in Web-Applications. I'm also in the process of building a collection of Power-Commands for different scenarios, with the goal of having something for every stage of a pentest.

More Documents regarding common web application vulnerabilities, including the OWASP Top Ten. Each with code examples or injection payloads. XSS, SSRF, and CORS are just a few examples. The WebApp Exploit Checklist is a great visual reference.

A collection of documents I found myself referring back to for learning.

More
Continuous Learning
Regulatory Compliance

A collection of my scripts I've found repeated use for in multiple scenarios.

Personal automation scripts

extract_video_audio.py: CLI tool that creates an MP3 audio file from a MP4 file, or files in a directory.

firewall_rules.py: CLI tool that optionally accepts a URL as an argument to download a CSV list of known problematic IP addresses and create block rules for Windows Firewall or iptables for Linux.

The default URL downloads the "Botnet C2 Indicators of Compromise (IOCs)" from FEODOtracker, which contains "information on tracked botnet c2s but also IP addresses that were acting as a botnet C2 within the past 30 days."

hashfile_validator.py: A CLI tool that automatically detects and validates cryptographic hash checksums against files. It supports MD5, SHA1, SHA256, SHA384, and SHA512, with optional JSON output and additional file information. The tool uses Windows' built-in Certutil for hash calculation.

https_ngrok_config.yml: A sample configuration file that starts an Ngrok HTTPS endpoint w/ OAuth support.

regex_generator.py: Generates regex patterns to detect keyword variations, including obfuscated and evasive text, for precise matching.

repo_structure_visualizer.py: A Python script that automatically generates an interactive HTML navigation interface for a GitHub repository's directory structure. Adaptable for any repository.

Reset-DockerWslIntergration.ps1: PowerShell script that stops Docker Desktop, Stops WSL, and Unregisters the Docker Destop data.

Useful-Repositories/README.md: A document with links to useful cybersecurity-related GitHub repositories.

How to Contribute

Please feel encouraged to contribute your own knowledge files, automation scripts, or useful repository link(s). Links go in the Useful-Repositories document.

See the CONTRIBUTING.md file for guidelines on how to contribute.

📜 License

Distributed under the MIT License. See LICENSE for more information.