This library contains list of tools and methodologies accompanied with resources. The main goal is to provide to the engineers a guide through opensource DevSecOps tooling....
Category: CISO2CISO ToolBox Series
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and resources.
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed...
CISO2CISO Toolbox Series – Cyber Security Blogs / Cyber Security RSS Feeds List –
The most complete list compiled of Cyber Security Web Sites, Blogs & RSS Feeds with more that 660 sites including general IT Security Blogs & Forums,...
PCI DSS Quick Reference Guide – Understanding the Payment Card Industry – Data Security Standar version 3.2.1
Introduction: Protecting Cardholder Data with PCI Security Standards The twentieth century U.S. criminal Willie Sutton was said to rob banks because “that’s where themoney is.” The...
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
Introduction to the Framework and Schema This document describes the Open Cybersecurity Schema Framework (OCSF) and its taxonomy,including the core cybersecurity event schema built with the...
Cybersecurity for SCADA Systems by William T. Shaw
In the 1960s, when the first computer-based supervisory control and data acquisition systems (SCADA) were being developed, there was no cultural concept of needing to provide...
Nmap for Pentesters – A Beginners Guide By Ignite Technologies
IntroductionNmap (“Network Mapper”) is a free and open-source (licenced) utility for network discovery and securityauditing. Many systems and network administrators also find it useful for tasks...
40 Methods for Privilege Escalation P1 by Hadess
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from...
Blue Team Cheat Sheets by Chris Davis
NETWORKING / BLUE TEAM TOOLSCommon Ports………………………………………………………………………………………… 1IPv4/TCP-UDP-ICMP Headers, Subnetting…………………………………………………. 2IPv6/TCP Header ……………………………………………………………………………………. 6OSI Model,……………………………………………………………………………………………… 9HTTP, FTP, Decimal to Hex Conversion …………………………………………………… 1220 Critical Security Controls ……………………………………………………………………....
How to Build a Security Operation Center in Budget by AT&T Cybersecurity
Introduction SOC basics Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks...