├── .gitbook └── assets │ ├── 280 (1).pdf │ ├── 280.pdf │ ├── Breaches (1).html │ ├── Breaches.html │ ├── Business (1).html │ ├── Business.html │ ├── Communities (1).html │ ├── Communities.html │ ├── Currencies.html │ ├── Docker-Security-Cheatsheet_hp8lh3.pdf │ ├── Documents (1).html │ ├── Documents.html │ ├── Domain.html │ ├── EasyDork.html │ ├── EasyOSINT.html │ ├── Email (1).html │ ├── Email.html │ ├── EricZimmermanCommandLineToolsCheatSheet-v1.0 (1) (1).pdf │ ├── EricZimmermanCommandLineToolsCheatSheet-v1.0 (1).pdf │ ├── EricZimmermanCommandLineToolsCheatSheet-v1.0 (2).pdf │ ├── EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf │ ├── Facebook.html │ ├── Gaining_the_Advantage_Cyber_Kill_Chain.pdf │ ├── IP (1) (1).html │ ├── IP (1).html │ ├── IP (2).html │ ├── IP(1).html │ ├── IP.html │ ├── Images (1).html │ ├── Images.html │ ├── Instagram (1).html │ ├── Instagram.html │ ├── License.html │ ├── LinkedIn (1).html │ ├── LinkedIn.html │ ├── Location.html │ ├── Name (1).html │ ├── Name.html │ ├── Pastes.html │ ├── Pentestingactivedirectory.png │ ├── Search (1).html │ ├── Search.html │ ├── Telephone (1).html │ ├── Telephone.html │ ├── Threat Object (1) (1).xmind │ ├── Threat Object (1).xmind │ ├── Threat Object (2).xmind │ ├── Threat Object.png │ ├── Threat Object.xmind │ ├── Twitter (1).html │ ├── Twitter.html │ ├── Username (1).html │ ├── Username.html │ ├── Videos (1).html │ ├── Videos.html │ ├── canvas.png │ ├── image (1) (1) (1).png │ ├── image (1) (1).png │ ├── image (1).png │ ├── image (10) (1).png │ ├── image (10).png │ ├── image (11).png │ ├── image (12).png │ ├── image (13).png │ ├── image (14).png │ ├── image (15).png │ ├── image (16).png │ ├── image (17) (1).png │ ├── image (17).png │ ├── image (18).png │ ├── image (19).png │ ├── image (2) (1) (1).png │ ├── image (2) (1).png │ ├── image (2) (2).png │ ├── image (2).png │ ├── image (20).png │ ├── image (21).png │ ├── image (22).png │ ├── image (23).png │ ├── image (24).png │ ├── image (25) (1).png │ ├── image (25).png │ ├── image (26).png │ ├── image (27).png │ ├── image (28).png │ ├── image (29).png │ ├── image (3) (1) (1).png │ ├── image (3) (1).png │ ├── image (3).png │ ├── image (30).png │ ├── image (31).png │ ├── image (32) (1).png │ ├── image (32).png │ ├── image (33).png │ ├── image (34).png │ ├── image (35).png │ ├── image (36).png │ ├── image (37).png │ ├── image (38).png │ ├── image (39).png │ ├── image (4) (1).png │ ├── image (4).png │ ├── image (40).png │ ├── image (41).png │ ├── image (42).png │ ├── image (5) (1) (1).png │ ├── image (5) (1).png │ ├── image (5).png │ ├── image (6) (1).png │ ├── image (6).png │ ├── image (7) (1) (1).png │ ├── image (7) (1).png │ ├── image (7).png │ ├── image (8) (1) (1).png │ ├── image (8) (1).png │ ├── image (8) (2).png │ ├── image (8) (3).png │ ├── image (8).png │ ├── image (9) (1).png │ ├── image (9).png │ ├── image.png │ ├── mitre_data_source_analysis.pdf │ ├── proxy-image.jpeg │ ├── proxy-image.png │ ├── s0cm0nkeyOSINT (1).html │ ├── s0cm0nkeyOSINT (2).html │ ├── s0cm0nkeyOSINT (3).html │ ├── s0cm0nkeyOSINT (4).html │ ├── s0cm0nkeyOSINT (5) (1).html │ ├── s0cm0nkeyOSINT (5) (2).html │ ├── s0cm0nkeyOSINT (5).html │ ├── s0cm0nkeyOSINT (6).html │ ├── s0cm0nkeyOSINT (7).html │ ├── s0cm0nkeyOSINT (8).html │ ├── s0cm0nkeyOSINT (9).html │ └── s0cm0nkeyOSINT.html ├── README.md ├── SUMMARY.md ├── blue-defense ├── README.md ├── active-defense.md ├── blue-toolbox.md ├── device-hardening │ ├── README.md │ ├── ad-security-checks.md │ └── windows-hardening-commands.md ├── event-and-log-analysis.md ├── event-detection │ ├── README.md │ ├── detection-use-cases │ │ ├── README.md │ │ ├── authentication-logon.md │ │ ├── command-line.md │ │ ├── detection-use-cases.md │ │ ├── dns.md │ │ ├── endpoint.md │ │ ├── general-network-traffic.md │ │ ├── http.md │ │ ├── smtp.md │ │ ├── user-behavior-monitoring.md │ │ └── windows-event-id-logging-list.md │ ├── ids-ips.md │ ├── siem-and-enrichment.md │ └── sysmon.md ├── packet-analysis.md ├── query-languages.md ├── stegonography.md ├── terminology-and-mapping.md ├── threat-hunting.md └── vulnerability-management..md ├── cloud.md ├── code-tools ├── README.md ├── bash │ ├── README.md │ ├── cli-components.md │ ├── common-commands.md │ ├── heartbleed-vuln-check.md │ ├── install-scripts.md │ └── nmap-diffing.md ├── learn-to-code.md ├── powershell │ ├── README.md │ └── common-commands.md └── regex.md ├── containers.md ├── cyber-intelligence ├── README.md ├── intel-feeds-and-sources.md ├── osint │ ├── README.md │ ├── cyber-search.md │ ├── dark-web-search.md │ ├── domain.md │ ├── files-media-breach-paste-code.md │ ├── ip-address.md │ ├── misc-osint.md │ ├── name-phone-gov-record.md │ ├── search-engines │ │ ├── README.md │ │ ├── google-dorking-cheatsheet.md │ │ └── goohak.sh-code.md │ ├── socmint-social-media.md │ └── username-email.md └── threat-data.md ├── dfir-digital-forensics-and-incident-response ├── README.md ├── binary-analysis-reverse-engineering.md ├── file-analysis.md ├── interact-with-remote-machine.md ├── ir-event-log-cheatsheet.md ├── linux-dfir-commands.md ├── macos-dfir-commands.md ├── malware.md ├── memory-forensics │ ├── README.md │ └── volatility.md ├── sandboxing.md ├── windows-dfir-check-by-mitre-tactic.md ├── windows-dfir-checks.md ├── windows-event-logs.md ├── windows-process-information.md ├── windows-remediation-commands.md ├── windows-system-enumeration.md └── yara.md ├── grey-privacy-tor-opsec ├── README.md ├── jolly-rogers-security-for-beginners.md ├── pgp-guide.md └── tor.md ├── red-offensive ├── README.md ├── exploitation-and-targets │ ├── offensive-frameworks.md │ ├── shells.md │ └── special-targets.md ├── offensive-toolbox │ ├── README.md │ └── utility-commands.md ├── physical-security-testing.md ├── post-exploitation │ ├── c2-frameworks.md │ ├── file-transfer.md │ └── network-attacks-harvesting-mitm.md ├── red-purple-teaming.md ├── scanning-active-recon │ ├── README.md │ ├── nmap.md │ └── recon-frameworks.md ├── social-engineering.md ├── testing-methodology │ ├── active-directory.md │ ├── exploit-dev-buffer-overflow.md │ ├── exploit-research.md │ ├── exploitation.md │ ├── lateral-movement.md │ ├── password-attacks.md │ ├── payloads-and-obfuscation │ │ └── msfvenom-commands.md │ └── post-exploitation │ │ ├── README.md │ │ ├── defense-evasion.md │ │ ├── enumeration-and-harvesting.md │ │ ├── meterpreter-post-auth-runbook.md │ │ ├── persistence.md │ │ └── privilege-escalation.md └── wireless-hacking.md ├── security-logging ├── README.md ├── device-discovery-and-asset-inventory.md ├── how-to-log.md ├── log-source-evaluation.md ├── logging-cloud.md ├── logging-guide-network-services.md ├── logging-guide-windows-endpoint-logs.md └── logging-user-behavior-monitoring.md ├── training ├── README.md ├── books-and-reading.md ├── ctf-practice.md ├── cyber-security-certifications │ ├── README.md │ └── oscp.md ├── practice-lab.md └── the-awesome-lists.md ├── web-app-hacking ├── README.md ├── attacks-and-vulnerabilities │ ├── README.md │ ├── broken-authentication.md │ ├── business-logic-flaws.md │ ├── clickjacking.md │ ├── command-injection.md │ ├── csrf.md │ ├── deserialization.md │ ├── http-host-header-attacks.md │ ├── http-request-smuggling.md │ ├── insecure-direct-object-reference.md │ ├── owasp-7-xss-cross-site-scripting.md │ ├── sql-injection │ │ ├── README.md │ │ ├── manual-injection-methodology.md │ │ ├── sql-methodology.md │ │ └── sql-tips-and-tricks.md │ ├── web-cache-poisoning.md │ ├── web-sockets.md │ └── xxe-xml-external-entity-attacks.md ├── burp-suite.md ├── scanning-utilities.md ├── web-app-testing-frameworks.md └── web-technologies │ ├── README.md │ ├── oauth-2.0.md │ ├── ssl-tls-and-certificates.md │ └── web-application-firewall.md ├── yellow-ai-machine-learning-and-foss.md └── yellow-neteng-sysadmin.md /.gitbook/assets/280 (1).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/280 (1).pdf -------------------------------------------------------------------------------- /.gitbook/assets/280.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/280.pdf -------------------------------------------------------------------------------- /.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (1) (1).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (1) (1).pdf -------------------------------------------------------------------------------- /.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (1).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (1).pdf -------------------------------------------------------------------------------- /.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (2).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0 (2).pdf -------------------------------------------------------------------------------- /.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/EricZimmermanCommandLineToolsCheatSheet-v1.0.pdf -------------------------------------------------------------------------------- /.gitbook/assets/Gaining_the_Advantage_Cyber_Kill_Chain.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/s0cm0nkey/Security-Reference-Guide/e587de06fbb9245cd7949fe7ac21d5bcf1d99b8f/.gitbook/assets/Gaining_the_Advantage_Cyber_Kill_Chain.pdf -------------------------------------------------------------------------------- /.gitbook/assets/License.html: -------------------------------------------------------------------------------- 1 | 2 | 3 | 12 |
13 | 14 |
21 |
|
47 |
48 | LICENSE v2.0 49 | 50 | These tools, scripts, tutorials, and files are released to you for free. You may modify and use the content any way you desire, including personal and government use, as long as you respect the following restrictions. 51 | 52 | NonCommercial: You may not use the material for commercial purposes, including training programs. 53 | 54 | NonDistribution: You may not distribute the material, including digital, internet, and physical distribution. 55 | 56 | Copyright: 2021 Michael Bazzell 57 | 58 | The software is provided “as is”, without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and non-infringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software. 59 | |
60 |
46 |
|
72 |
73 |
74 |
78 | 87 | 88 | 92 | 101 | 102 | 106 | 109 | 110 | 114 | 117 | 118 | 122 | 125 | 126 | 127 | 128 | 129 | |
130 |
21 |
|
47 | 48 | 49 | 50 | 51 | 52 | | 53 |