Skip to content

Commit

Permalink
Rearranging the structure 001
Browse files Browse the repository at this point in the history
  • Loading branch information
kaiiyer committed Oct 3, 2022
1 parent 0265975 commit 9e8d3fb
Show file tree
Hide file tree
Showing 4 changed files with 24 additions and 23 deletions.
17 changes: 11 additions & 6 deletions infosec/BlueTeam/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@

- [SANS Internet Storm Center](https://isc.sans.edu/) - ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers.

- [DevSecOps](https://www.devsecops.org/) An informational site for security and business practitioners looking for innovative ways to incorporate security at scale


-------------

## Threat Intelligence
Expand All @@ -22,12 +25,6 @@
- [Detecting Lateral Movement through Tracking Event Logs](https://www.jpcert.or.jp/english/pub/sr/20170612ac-ir_research_en.pdf) by JPCERT


## Threat Hunting

- [Emerging Threats](https://doc.emergingthreats.net/bin/view/Main/WebHome) - Emerging Threats Rule Documentation Wiki containing all current rules

- [fleet](fleetdm.com) - Open source device management, built on osquery

## SIEM

- [Grafana](https://grafana.com) - Grafana is the open source analytics & monitoring solution for every database
Expand All @@ -36,10 +33,17 @@

- [Boss of the SOC](https://www.splunk.com/en_us/blog/tag/boss-of-the-soc.html) - BOTS is a blue-team, jeopardy-style, capture-the-flag-esque (CTF) activity where participants leverage Splunk's Security Suite and other resources to answer a variety of questions about the type of real-world security incidents

## Detection Engineering & Threat Hunting

- [Sigma](https://github.com/SigmaHQ/sigma) - Generic Signature Format for SIEM Systems

- [Vectr.io](https://vectr.io) - Purple Teams through VECTR™ generates success defense metrics and help align Red and Blue Teams towards the same mission: protecting the organization by discovering and plugging detection gaps

- [Emerging Threats](https://doc.emergingthreats.net/bin/view/Main/WebHome) - Emerging Threats Rule Documentation Wiki containing all current rules

- [fleet](fleetdm.com) - Open source device management, built on osquery


## Log Management & Object Storage

- [Fluentd](https://www.fluentd.org) - Fluentd is an open source data collector, which lets you unify the data collection and consumption for a better use and understanding of data.
Expand All @@ -61,3 +65,4 @@
## Tools

- [Digital Forensics and Incident Response](https://www.dfir.training/tools)

8 changes: 8 additions & 0 deletions infosec/RedTeam/bug_bounty.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
## Bug Bounty
- [Bugcrowd](https://forum.bugcrowd.com/) Bugcrowd's community forum of researchers and white-hat hackers discussing information security and bug bounty programs.
- [Bug Bounty POC](https://bugbountypoc.com/) - All Bug Bounty POC write ups by Security Researchers
- [Bug Bounty Findings by Meals](https://seanmelia.wordpress.com/) The blog- 'Bug Bounty Findings by Meals' by Seanmelia
- [NahamSec](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters) A list of resources for those interested in getting started in bug bounties
- [Bugbaba Blog](https://bugbaba.blogspot.com/) Discoveries and Writings of security vulnerabilities that Noman Shaikh have discovered
- [BitQuark](https://bitquark.co.uk/blog/) Security and code discussion, with dissections of recent vulnerabilities discovered as part of vendor bug bounty programmes
- [InfoSec WriteUps](https://medium.com/bugbountywriteup) A collection of awesome write-ups from best hackers in topics ranging from bug bounties, CTFs, vulnhub machines, hardware challenges, real-life encounters and everything else which can help other enthusiasts to learn
1 change: 1 addition & 0 deletions infosec/RedTeam/graphql.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@
- BugDB v1 - https://ctf.hacker101.com/ctf/launch/18
- BugDB v2 - https://ctf.hacker101.com/ctf/launch/19
- BugDB v3 - https://ctf.hacker101.com/ctf/launch/20

## A collective list of public GraphQL APIs
[Apis guru](https://github.com/APIs-guru/graphql-apis) : Public graphql Apis

Expand Down
21 changes: 4 additions & 17 deletions learning-path/blog.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,25 +2,12 @@

- [Securityguard Blog](https://blog.it-securityguard.com/) Security blog of Patrik Fehrenbach
- [BruteLogic](https://brutelogic.com.br/blog/) Brute XSS: Master the art of Cross Site Scripting
- [Securit.ie](https://securit.ie/blog/) When did you last check your stack?
- [Philippeharewood Blog](https://philippeharewood.com/) These aren't the access_tokens you're looking for
- [Bug Bounty Findings by Meals](https://seanmelia.wordpress.com/) The blog- 'Bug Bounty Findings by Meals' by Seanmelia
- [Respect XSS](https://respectxss.blogspot.com/) The blog- 'Respect XSS' by Ashar Javed
- [GracefulSecurity](https://www.gracefulsecurity.com/) *Vlogs* by Holly Grace Williams, has thirteen years of experience in leading Information Security teams
- [Darknet](https://www.darknet.org.uk/) Don't Learn to Hack - Hack to Learn
- [Whitton](https://whitton.io/) Blog by Jack, Active participant of bug bounty programmes since the middle of 2012
- [Tisiphone](https://tisiphone.net/) Blog by Lesley Carhart, Full Spectrum Cyber-Warrior Princess, 20+ year IT industry veteran,speaks and writes about digital forensics and incident response, Industrial Control System Security, OSINT, and information security careers
- [NahamSec](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters) A list of resources for those interested in getting started in bug bounties
- [DevSecOps](https://www.devsecops.org/) An informational site for security and business practitioners looking for innovative ways to incorporate security at scale
- [WeHackPeople](https://wehackpeople.tumblr.com/) Tim Roberts (Z4nsh1n) & Brent White (B!TK!LL3R) are Sr. Security Consultants who specialize in Red Team & Social Engineering Assessments. Moved [here](www.wehackpeople.com)
- [BitQuark](https://bitquark.co.uk/blog/) Security and code discussion, with dissections of recent vulnerabilities discovered as part of vendor bug bounty programmes
- [Arneswinnen](https://www.arneswinnen.net/) Arne Swinnen's Security blog-Just Another Infosec Blog
- [Bug Bounty POC](https://bugbountypoc.com/) - All Bug Bounty POC write ups by Security Researchers
- [Arbazhussain Medium](https://medium.com/@arbazhussain/) -Security blog by Arbaz Hussain
- [Shawarkhan](https://www.shawarkhan.com/) Shawar Khan, A Security Researcher, Bug Bounty Hunter and Red Team Member, has identified major security vulnerabilities in the world's well-known companies & listed in over +100 Halls of Fame
- [Intellectual Ninja](https://blog.kaiiyer.co/) - A Blog that cares about your Privacy by Kai Iyer
- [Detectify](https://blog.detectify.com/) - Security blog from Detectify, Automated security and asset monitoring for all teams.
- [Bugcrowd](https://forum.bugcrowd.com/) Bugcrowd's community forum of researchers and white-hat hackers discussing information security and bug bounty programs.
- [Securitywall](https://securitywall.co/blog.html/) Security blog from Securitywall
- [Hackerone](https://www.hackerone.com/blog) Security blog from Hackerone. Hack for Good
- [My Experiments with Hacking](https://www.gangte.net/) A blog on hacking and cyber security
Expand All @@ -34,19 +21,19 @@
- [Rubidus](https://blog.rubidus.com/) Personal blog by Jonathan Claudius
- [Ak1T4 Medium](https://medium.com/@know.0nix) Blog by WhiteHat Hacker Zen Monk & Bounty Hunter
- [Security Idiots](https://www.securityidiots.com/) Security blog by Security Idiots
- [Hackernoon](https://hackernoon.com/tagged/security) According to technologists, "Privacy is a myth." but "Security is non-negotiable."
- [InfoSec WriteUps](https://medium.com/bugbountywriteup) A collection of awesome write-ups from best hackers in topics ranging from bug bounties, CTFs, vulnhub machines, hardware challenges, real-life encounters and everything else which can help other enthusiasts to learn
- [SQLi Basic](https://sqli-basic.blogspot.com/) This Blog Just for Educational Purpose. One of the best ways is not responsible for the authorities. Stay With us to Learn Basic SQLi with Manual
- [Bugbaba Blog](https://bugbaba.blogspot.com/) Discoveries and Writings of security vulnerabilities that I have discovered - Noman Shaikh
- [Vulnerability-lab](https://vulnerability-lab.com/) Vulnerability research, bug bountiesand vulnerability assessments

## Mail Lists for Pentesters
- [Full Disclosure Mailing List](https://seclists.org/fulldisclosure/): A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community
- [Bugtraq Mailing List](https://seclists.org/bugtraq/) - The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!

## Blog for Malware Analysis & Reverse Engineering
## Malware Analysis & Reverse Engineering
- [MalGamy](https://malgamy.github.io) - A blog for case study and in-depth analysis of malware

## General Security
- [Hackernoon](https://hackernoon.com/tagged/security) According to technologists, "Privacy is a myth." but "Security is non-negotiable."

---------
Thanks for Reading

0 comments on commit 9e8d3fb

Please sign in to comment.