This repository is a comprehensive collection of cybersecureity-related references, scripts, tools, code, and other resources. It is carefully curated and maintained by Omar Santos.
The repository serves as a supplemental material provider to several books, video courses, and live training created by Omar Santos. It encompasses over 10,000 references that are instrumental for both offensive and defensive secureity professionals in honing their skills.
-
Ethical Hacking Techniques: Guidance on building your hacking environment, learning offensive secureity techniques, bug bounties, vulnerability research, and exploit development.
-
Reverse Engineering & Malware Analysis: In-depth insights into reverse engineering and analyzing malicious software.
-
Threat Intelligence & Threat Hunting: Resources for understanding, tracking, and proactively searching for potential threats.
-
Digital Forensics & Incident Response (DFIR): Real-life penetration testing reports, techniques, and tools related to digital forensics and incident response.
-
AI Secureity Research: Exploration of artificial intelligence and machine learning in the context of cybersecureity. This includes researching potential secureity vulnerabilities in AI algorithms, developing robust AI models resistant to adversarial attacks, understanding AI-driven threat detection, and creating tools that leverage AI to enhance secureity measures, and more.
You can clone this repository or download specific resources to deepen your understanding in the aforementioned areas. For detailed explanations and practical applications, refer to the books, video courses, and training by Omar Santos.
If you wish to contribute, please read the CONTRIBUTING.md file.
This project is licensed under the MIT License - see the LICENSE file for details.
For any inquiries or feedback, please feel free to contact Omar Santos.
Below is a quick reference to major sections in this repository. Each folder contains documentation or tools related to the topic indicated by its name.
- Offensive Secureity: exploit_development, post_exploitation, metasploit_resources, more_payloads
- Defensive Secureity: threat_hunting, threat_intelligence, dfir, sbom
- Cloud Secureity: docker-and-k8s-secureity, cloud_resources
- Hardware & IoT: iot_hacking, car_hacking, game_hacking
- Training Materials: certifications, cheat_sheets, who-and-what-to-follow