├── .github └── workflows │ └── ci.yml ├── .gitignore ├── README.md ├── docs ├── BlueTeam │ ├── 0x03_blue_team-resources.md │ ├── 0x0_蓝队概览.md │ └── 0x1_蓝队资源整合.md ├── RedTeam │ ├── 0x02_red_team.md │ ├── 0x03渗透测试进阶.md │ ├── 0x0_红队概览.md │ ├── 0x1_薄弱端口和服务.md │ ├── 0x2_常见网站架构和攻击手法.md │ └── assets │ │ └── 渗透测试进阶.pdf ├── SOC安全运营 │ ├── 0x0_对安全运营的理解.md │ ├── 0x2_安全运营做什么.md │ ├── 0x3_安全运营的要素.md │ ├── 0x4_安全运营相关文章.md │ └── assets │ │ ├── 安全运营之路.pdf │ │ └── 安全运营之路.xmind ├── assets │ ├── images │ │ ├── favicon.png │ │ └── test.jpg │ └── logo.png ├── index.md ├── 企业安全建设 │ ├── 0x01security_projects.md │ ├── 0x02安全思维导图.md │ ├── 0x03安全系统架构设计.md │ ├── 0x04一个人的安全部之企业信息安全建设规划.md │ ├── 0x05安全意识教育.md │ ├── 3x0_安全数据分析平台的架构.md │ ├── 3x1_ATTACK矩阵的SOC建设.md │ ├── 3x3_相关文章.md │ ├── 3x4_企业风控平台建设.md │ ├── 3x5_电报监控平台建设.md │ ├── 3x6_企业安全中价值需求和成熟度模型.md │ ├── 3x7_理解企业安全运营中的威胁交换.md │ ├── 3x8_MITRE_Shield知识库.md │ ├── 3x9_数据驱动安全2.0.md │ ├── 3xA_入侵检测_防护系统的建设.md │ └── assets │ │ └── 安全系统架构设计.pdf ├── 威胁建模 │ └── 0x08_threat_simulation.md ├── 威胁情报 │ ├── 0x05_threat_intelligence.md │ ├── 1x0_安全威胁情报简述.md │ ├── 1x1_如何实现威胁情报共享.md │ ├── 1x2_威胁狩猎.md │ ├── 1x3_威胁情报与全流量异常检测案例分析.md │ ├── 1x4_移动恶意代码分析及威胁情报.md │ ├── 1x5_如何进行情报搜集.md │ ├── 1x6_情报研判.md │ ├── 1x7_终端数据挖掘.md │ ├── 1x8_WeChat内容审查研究1.md │ ├── 1x9_威胁情报自动化生产.md │ ├── 1xB_威胁情报库建设.md │ ├── 1xC_威胁情报运营生命周期.md │ ├── 1xD_威胁情报数据源.md │ ├── 1xE_威胁情报的落地.md │ ├── 1xF_威胁情报的困境.md │ ├── 1xG_情报研究方法论_收集.md │ ├── 1xH_关于情报学的资料集合.md │ ├── 1xI_情报驱动安全自动化.md │ ├── 1xJ_国内外安全公司整理.md │ ├── 1xK_xday威胁分析与对战技巧.md │ ├── 1xL_如何评估威胁情报.md │ └── 1xM_对Starlink的测绘.md ├── 威胁狩猎 │ ├── 0x04_threat_hunting.md │ ├── 0x0_MITRE ATT&CK实践入门.md │ ├── 0x1_威胁狩猎学习笔记.md │ ├── 0x2_威胁狩猎实战.md │ ├── 0x3_全流量威胁狩猎.md │ ├── 0x4_威胁狩猎相关资源.md │ ├── 0x7_相关研究者和团队.md │ ├── 0x8_社交媒体情报搜集实战.md │ ├── 0x9_低信誉网站托管服务清单.md │ ├── 0xA_威胁狩猎之行为向量.md │ ├── 0xB_狩猎数据收集.md │ ├── 2x0_README.md │ └── assets │ │ ├── ATT&CK实践入门.pdf │ │ ├── Framework-for-Threat-Hunting-Whitepaper.pdf │ │ ├── MITRE ATT&CK实践入门.pdf │ │ ├── MITRE ATT&CK实践入门.xmind │ │ ├── The-Hunters-Handbook.pdf │ │ ├── hunt-evil.pdf │ │ ├── huntpedia.pdf │ │ ├── legit-services.pdf │ │ ├── mitre-getting-started-with-attack-october-2019.pdf │ │ ├── specterops-CapabilityAbstraction.pdf │ │ ├── specterops-DetectionSpectrum.pdf │ │ ├── specterops-IntroducingtheFunnelofFidelity.pdf │ │ ├── varonis.com-EQLforThreatHunting.pdf │ │ └── varonis.com-SysmonThreatAnalysisGuide.pdf ├── 安全事件响应 │ ├── 0x06_incident_response.md │ ├── 6x0_应急响应.md │ ├── 6x1_溯源案例.md │ ├── 6x2_数据驱动的威胁检测和攻击溯源_学习笔记.md │ ├── 6x3_日志、告警和事件.md │ ├── 6x5_从流量中进行恶意C2信息的检测.md │ ├── 6x6_隐蔽通讯的检测.md │ └── 6x9_常见端口与对应服务.md ├── 安全证书考试 │ ├── CCNP学习笔记 │ │ └── CCNP.md │ ├── CISP学习笔记 │ │ └── CISP学习笔记.md │ ├── OSCP学习笔记 │ │ ├── 0x01_OSCP学习记录.md │ │ └── Metasploitable.md │ └── 信息安全工程师 │ │ ├── assets │ │ ├── 1.txt │ │ └── 2020信息安全工程师考试大纲.pdf │ │ ├── 学习笔记.md │ │ ├── 学习资料.md │ │ └── 教程学习笔记.md ├── 数字取证 │ └── 0x09_digital_forensics.md ├── 网络学习 │ └── 0x01.md ├── 蜜罐 │ └── 0x07_honeypots.md └── 靶场练习 │ └── 0x01.md └── mkdocs.yml /.github/workflows/ci.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/.github/workflows/ci.yml -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/.gitignore -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/README.md -------------------------------------------------------------------------------- /docs/BlueTeam/0x03_blue_team-resources.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/BlueTeam/0x03_blue_team-resources.md -------------------------------------------------------------------------------- /docs/BlueTeam/0x0_蓝队概览.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/BlueTeam/0x0_蓝队概览.md -------------------------------------------------------------------------------- /docs/BlueTeam/0x1_蓝队资源整合.md: -------------------------------------------------------------------------------- 1 | # 蓝队资源整合 2 | 3 | 参考:https://github.com/fabacab/awesome-cybersecurity-blueteam 4 | 5 | -------------------------------------------------------------------------------- /docs/RedTeam/0x02_red_team.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/RedTeam/0x02_red_team.md -------------------------------------------------------------------------------- /docs/RedTeam/0x03渗透测试进阶.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/RedTeam/0x03渗透测试进阶.md -------------------------------------------------------------------------------- /docs/RedTeam/0x0_红队概览.md: -------------------------------------------------------------------------------- 1 | # 红队概览 2 | 3 | *未知攻,焉知防* 4 | 5 | -------------------------------------------------------------------------------- /docs/RedTeam/0x1_薄弱端口和服务.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/RedTeam/0x1_薄弱端口和服务.md -------------------------------------------------------------------------------- /docs/RedTeam/0x2_常见网站架构和攻击手法.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/RedTeam/0x2_常见网站架构和攻击手法.md -------------------------------------------------------------------------------- /docs/RedTeam/assets/渗透测试进阶.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/RedTeam/assets/渗透测试进阶.pdf -------------------------------------------------------------------------------- /docs/SOC安全运营/0x0_对安全运营的理解.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/0x0_对安全运营的理解.md -------------------------------------------------------------------------------- /docs/SOC安全运营/0x2_安全运营做什么.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/0x2_安全运营做什么.md -------------------------------------------------------------------------------- /docs/SOC安全运营/0x3_安全运营的要素.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/0x3_安全运营的要素.md -------------------------------------------------------------------------------- /docs/SOC安全运营/0x4_安全运营相关文章.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/0x4_安全运营相关文章.md -------------------------------------------------------------------------------- /docs/SOC安全运营/assets/安全运营之路.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/assets/安全运营之路.pdf -------------------------------------------------------------------------------- /docs/SOC安全运营/assets/安全运营之路.xmind: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/SOC安全运营/assets/安全运营之路.xmind -------------------------------------------------------------------------------- /docs/assets/images/favicon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/assets/images/favicon.png -------------------------------------------------------------------------------- /docs/assets/images/test.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/assets/images/test.jpg -------------------------------------------------------------------------------- /docs/assets/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/assets/logo.png -------------------------------------------------------------------------------- /docs/index.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/index.md -------------------------------------------------------------------------------- /docs/企业安全建设/0x01security_projects.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/0x01security_projects.md -------------------------------------------------------------------------------- /docs/企业安全建设/0x02安全思维导图.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/0x02安全思维导图.md -------------------------------------------------------------------------------- /docs/企业安全建设/0x03安全系统架构设计.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/0x03安全系统架构设计.md -------------------------------------------------------------------------------- /docs/企业安全建设/0x04一个人的安全部之企业信息安全建设规划.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/0x04一个人的安全部之企业信息安全建设规划.md -------------------------------------------------------------------------------- /docs/企业安全建设/0x05安全意识教育.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/0x05安全意识教育.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x0_安全数据分析平台的架构.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x0_安全数据分析平台的架构.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x1_ATTACK矩阵的SOC建设.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x1_ATTACK矩阵的SOC建设.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x3_相关文章.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x3_相关文章.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x4_企业风控平台建设.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x4_企业风控平台建设.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x5_电报监控平台建设.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x5_电报监控平台建设.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x6_企业安全中价值需求和成熟度模型.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x6_企业安全中价值需求和成熟度模型.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x7_理解企业安全运营中的威胁交换.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x7_理解企业安全运营中的威胁交换.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x8_MITRE_Shield知识库.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x8_MITRE_Shield知识库.md -------------------------------------------------------------------------------- /docs/企业安全建设/3x9_数据驱动安全2.0.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3x9_数据驱动安全2.0.md -------------------------------------------------------------------------------- /docs/企业安全建设/3xA_入侵检测_防护系统的建设.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/3xA_入侵检测_防护系统的建设.md -------------------------------------------------------------------------------- /docs/企业安全建设/assets/安全系统架构设计.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/企业安全建设/assets/安全系统架构设计.pdf -------------------------------------------------------------------------------- /docs/威胁建模/0x08_threat_simulation.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁建模/0x08_threat_simulation.md -------------------------------------------------------------------------------- /docs/威胁情报/0x05_threat_intelligence.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/0x05_threat_intelligence.md -------------------------------------------------------------------------------- /docs/威胁情报/1x0_安全威胁情报简述.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x0_安全威胁情报简述.md -------------------------------------------------------------------------------- /docs/威胁情报/1x1_如何实现威胁情报共享.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x1_如何实现威胁情报共享.md -------------------------------------------------------------------------------- /docs/威胁情报/1x2_威胁狩猎.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x2_威胁狩猎.md -------------------------------------------------------------------------------- /docs/威胁情报/1x3_威胁情报与全流量异常检测案例分析.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x3_威胁情报与全流量异常检测案例分析.md -------------------------------------------------------------------------------- /docs/威胁情报/1x4_移动恶意代码分析及威胁情报.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x4_移动恶意代码分析及威胁情报.md -------------------------------------------------------------------------------- /docs/威胁情报/1x5_如何进行情报搜集.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x5_如何进行情报搜集.md -------------------------------------------------------------------------------- /docs/威胁情报/1x6_情报研判.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x6_情报研判.md -------------------------------------------------------------------------------- /docs/威胁情报/1x7_终端数据挖掘.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x7_终端数据挖掘.md -------------------------------------------------------------------------------- /docs/威胁情报/1x8_WeChat内容审查研究1.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x8_WeChat内容审查研究1.md -------------------------------------------------------------------------------- /docs/威胁情报/1x9_威胁情报自动化生产.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1x9_威胁情报自动化生产.md -------------------------------------------------------------------------------- /docs/威胁情报/1xB_威胁情报库建设.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xB_威胁情报库建设.md -------------------------------------------------------------------------------- /docs/威胁情报/1xC_威胁情报运营生命周期.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xC_威胁情报运营生命周期.md -------------------------------------------------------------------------------- /docs/威胁情报/1xD_威胁情报数据源.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xD_威胁情报数据源.md -------------------------------------------------------------------------------- /docs/威胁情报/1xE_威胁情报的落地.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xE_威胁情报的落地.md -------------------------------------------------------------------------------- /docs/威胁情报/1xF_威胁情报的困境.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xF_威胁情报的困境.md -------------------------------------------------------------------------------- /docs/威胁情报/1xG_情报研究方法论_收集.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xG_情报研究方法论_收集.md -------------------------------------------------------------------------------- /docs/威胁情报/1xH_关于情报学的资料集合.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xH_关于情报学的资料集合.md -------------------------------------------------------------------------------- /docs/威胁情报/1xI_情报驱动安全自动化.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xI_情报驱动安全自动化.md -------------------------------------------------------------------------------- /docs/威胁情报/1xJ_国内外安全公司整理.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xJ_国内外安全公司整理.md -------------------------------------------------------------------------------- /docs/威胁情报/1xK_xday威胁分析与对战技巧.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xK_xday威胁分析与对战技巧.md -------------------------------------------------------------------------------- /docs/威胁情报/1xL_如何评估威胁情报.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xL_如何评估威胁情报.md -------------------------------------------------------------------------------- /docs/威胁情报/1xM_对Starlink的测绘.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁情报/1xM_对Starlink的测绘.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x04_threat_hunting.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x04_threat_hunting.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x0_MITRE ATT&CK实践入门.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x0_MITRE ATT&CK实践入门.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x1_威胁狩猎学习笔记.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x1_威胁狩猎学习笔记.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x2_威胁狩猎实战.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x2_威胁狩猎实战.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x3_全流量威胁狩猎.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x3_全流量威胁狩猎.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x4_威胁狩猎相关资源.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x4_威胁狩猎相关资源.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x7_相关研究者和团队.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x7_相关研究者和团队.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x8_社交媒体情报搜集实战.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x8_社交媒体情报搜集实战.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0x9_低信誉网站托管服务清单.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0x9_低信誉网站托管服务清单.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0xA_威胁狩猎之行为向量.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0xA_威胁狩猎之行为向量.md -------------------------------------------------------------------------------- /docs/威胁狩猎/0xB_狩猎数据收集.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/0xB_狩猎数据收集.md -------------------------------------------------------------------------------- /docs/威胁狩猎/2x0_README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/2x0_README.md -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/ATT&CK实践入门.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/ATT&CK实践入门.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/Framework-for-Threat-Hunting-Whitepaper.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/Framework-for-Threat-Hunting-Whitepaper.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/MITRE ATT&CK实践入门.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/MITRE ATT&CK实践入门.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/MITRE ATT&CK实践入门.xmind: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/MITRE ATT&CK实践入门.xmind -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/The-Hunters-Handbook.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/The-Hunters-Handbook.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/hunt-evil.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/hunt-evil.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/huntpedia.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/huntpedia.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/legit-services.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/legit-services.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/mitre-getting-started-with-attack-october-2019.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/mitre-getting-started-with-attack-october-2019.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/specterops-CapabilityAbstraction.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/specterops-CapabilityAbstraction.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/specterops-DetectionSpectrum.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/specterops-DetectionSpectrum.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/specterops-IntroducingtheFunnelofFidelity.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/specterops-IntroducingtheFunnelofFidelity.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/varonis.com-EQLforThreatHunting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/varonis.com-EQLforThreatHunting.pdf -------------------------------------------------------------------------------- /docs/威胁狩猎/assets/varonis.com-SysmonThreatAnalysisGuide.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/威胁狩猎/assets/varonis.com-SysmonThreatAnalysisGuide.pdf -------------------------------------------------------------------------------- /docs/安全事件响应/0x06_incident_response.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/0x06_incident_response.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x0_应急响应.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x0_应急响应.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x1_溯源案例.md: -------------------------------------------------------------------------------- 1 | # 溯源案例整理 2 | 3 | 4 | 5 | [1] 溯源黑帽利用 Web 编辑器漏洞非法植入 SEO 页面事件,SanLorewalker@知道创宇404积极防御实验室,https://paper.seebug.org/1273/#2 6 | 7 | -------------------------------------------------------------------------------- /docs/安全事件响应/6x2_数据驱动的威胁检测和攻击溯源_学习笔记.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x2_数据驱动的威胁检测和攻击溯源_学习笔记.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x3_日志、告警和事件.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x3_日志、告警和事件.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x5_从流量中进行恶意C2信息的检测.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x5_从流量中进行恶意C2信息的检测.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x6_隐蔽通讯的检测.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x6_隐蔽通讯的检测.md -------------------------------------------------------------------------------- /docs/安全事件响应/6x9_常见端口与对应服务.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全事件响应/6x9_常见端口与对应服务.md -------------------------------------------------------------------------------- /docs/安全证书考试/CCNP学习笔记/CCNP.md: -------------------------------------------------------------------------------- 1 | # 学习 2 | -------------------------------------------------------------------------------- /docs/安全证书考试/CISP学习笔记/CISP学习笔记.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/CISP学习笔记/CISP学习笔记.md -------------------------------------------------------------------------------- /docs/安全证书考试/OSCP学习笔记/0x01_OSCP学习记录.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/OSCP学习笔记/0x01_OSCP学习记录.md -------------------------------------------------------------------------------- /docs/安全证书考试/OSCP学习笔记/Metasploitable.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/OSCP学习笔记/Metasploitable.md -------------------------------------------------------------------------------- /docs/安全证书考试/信息安全工程师/assets/1.txt: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /docs/安全证书考试/信息安全工程师/assets/2020信息安全工程师考试大纲.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/信息安全工程师/assets/2020信息安全工程师考试大纲.pdf -------------------------------------------------------------------------------- /docs/安全证书考试/信息安全工程师/学习笔记.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/信息安全工程师/学习笔记.md -------------------------------------------------------------------------------- /docs/安全证书考试/信息安全工程师/学习资料.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/信息安全工程师/学习资料.md -------------------------------------------------------------------------------- /docs/安全证书考试/信息安全工程师/教程学习笔记.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/安全证书考试/信息安全工程师/教程学习笔记.md -------------------------------------------------------------------------------- /docs/数字取证/0x09_digital_forensics.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/数字取证/0x09_digital_forensics.md -------------------------------------------------------------------------------- /docs/网络学习/0x01.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/网络学习/0x01.md -------------------------------------------------------------------------------- /docs/蜜罐/0x07_honeypots.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/蜜罐/0x07_honeypots.md -------------------------------------------------------------------------------- /docs/靶场练习/0x01.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/docs/靶场练习/0x01.md -------------------------------------------------------------------------------- /mkdocs.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/h4m5t/SecNotes/HEAD/mkdocs.yml --------------------------------------------------------------------------------