Updating conversion, creating readmes

This commit is contained in:
Jonas Zeunert
2024-04-19 23:37:46 +02:00
parent 3619ac710a
commit 08e75b0f0a
635 changed files with 30878 additions and 37344 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
▐ A curated list of awesome and free educational resources that focuses on learn by doing.
@@ -34,20 +34,19 @@
Cyber Security University is A curated list of awesome and free educational resources that focus on learning by doing.
There are 6 parts to this. Introduction and Pre-security, Free Beginner Red Team Path, Free Beginner Blue Team Path, Bonus practices/latest CVEs and Extremely Hard rooms to do. The tasks are linear in nature of 
the difficulty. So it's recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
There are 6 parts to this. Introduction and Pre-security, Free Beginner Red Team Path, Free Beginner Blue Team Path, Bonus practices/latest CVEs and Extremely Hard rooms to do. The tasks are linear in nature of the difficulty. So it's 
recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both red and blue team 
path completion badges. You can copy the HTML code for them and add it to the content page below once you have completed them.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both red and blue team path completion badges. You 
can copy the HTML code for them and add it to the content page below once you have completed them.
↑ (#contents)
Contributing
Pull requests are welcome with the condition that the resource should be free! Please read the contribution guide in the wiki (https://github.com/brootware/Cyber-Security-University/wiki) if you wish to add 
tools or resources.
Pull requests are welcome with the condition that the resource should be free! Please read the contribution guide in the wiki (https://github.com/brootware/Cyber-Security-University/wiki) if you wish to add tools or resources.
Introduction and Pre-Security
@@ -196,14 +195,11 @@
⟡ Splunk Boss of the SOC V2 () - Splunk analysis vol 2.
⟡ Splunk Boss of the SOC V3 () - Splunk analysis vol 3.
⟡ Hunt Conti with Splunk (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
⟡ Hunting for Execution Tactic
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
⟡ Hunting for Credential Access
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
⟡ Hunting for Persistence Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting 
workshop covering the topic of adversarial persistence (TA0003).
⟡ Hunting for Defense Evation
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).
⟡ Hunting for Execution Tactic (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
⟡ Hunting for Credential Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
⟡ Hunting for Persistence Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of
adversarial persistence (TA0003).
⟡ Hunting for Defense Evation (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).
↑ (#contents)
@@ -322,11 +318,9 @@
Special thanks to everyone who forked or starred the repository ❤️
!Stargazers repo roster for @brootware/awesome-cyber-security-university (https://reporoster.com/stars/dark/brootware/awesome-cyber-security-university) 
(https://github.com/brootware/awesome-cyber-security-university/stargazers)
!Stargazers repo roster for @brootware/awesome-cyber-security-university (https://reporoster.com/stars/dark/brootware/awesome-cyber-security-university) (https://github.com/brootware/awesome-cyber-security-university/stargazers)
!Forkers repo roster for @brootware/awesome-cyber-security-university (https://reporoster.com/forks/dark/brootware/awesome-cyber-security-university) 
(https://github.com/brootware/awesome-cyber-security-university/network/members)
!Forkers repo roster for @brootware/awesome-cyber-security-university (https://reporoster.com/forks/dark/brootware/awesome-cyber-security-university) (https://github.com/brootware/awesome-cyber-security-university/network/members)
Thanks goes to these wonderful people (emoji key (https://allcontributors.org/docs/en/emoji-key)):