Skip to content

A cybersecurity resource library of knowledge documents, links to tools, and automation scripts.

License

Notifications You must be signed in to change notification settings

Daethyra/Cybersecurity-References

Repository files navigation

Cybersecurity References 🛡️🔒

Welcome to my personal collection of cybersecurity resources, tools, and references.

📁 Directory Structure

Personal automation scripts

extract_video_audio.py: CLI tool that creates an MP3 audio file from a MP4 file, or files in a directory.

firewall_rules.py: takes in the URL of a CSV file to block known problematic IP addresses.

The default URL downloads the "Botnet C2 Indicators of Compromise (IOCs)" from FEODOtracker, which contains "information on tracked botnet c2s but also IP addresses that were acting as a botnet C2 within the past 30 days."

hashfile_validator.py: A CLI tool that automatically detects and validates cryptographic hash checksums against files. It supports MD5, SHA1, SHA256, SHA384, and SHA512, with optional JSON output and additional file information. The tool uses Windows' built-in Certutil for hash calculation.

Reset-DockerWslIntergration.ps1: PowerShell script that stops Docker Desktop, Stops WSL, and Unregisters the Docker Destop data.

This directory contains a collection of documents that can be useful for cybersecurity professionals. It includes a variety of documents that can be useful for different purposes.

This directory contains various files, notably Maderas' list of necessary cybersecurity skills for learners. It also has a few text processing reference docs, and a list of search engines for pentesters.

Here you'll find documents for common web application vulnerabilities, like those of the OWASP Top Ten. Each document is different, but all of them contain code examples, injection payloads, that could theoretically be used in the wild. XSS, [SSRF], and CORS are just a few examples. The WebApp Exploit Checklist is a great visual reference.

This is a meta-directory with links to useful cybersecurity-related GitHub repositories. You'll find offensive, defensive, and multi-purpose tools.

Please see the README.

How to Contribute

This project could be way better than it is, we both know that.

Please consider contributing your own knowledge files, automation scripts, add to the Useful Repositories README, and see the CONTRIBUTING.md file for guidelines on how to contribute.

📜 License

Distributed under the GNU AGPL-3.0 License. See LICENSE for more information.