Update render script and Makefile

This commit is contained in:
Jonas Zeunert
2024-04-22 21:54:39 +02:00
parent 2d63fe63cd
commit 4d0cd768f7
10975 changed files with 47095 additions and 4031084 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
 Awesome Cyber Security University !Awesome (https://awesome.re/badge.svg) (https://awesome.re)
▐ A curated list of awesome and free educational resources that focuses on learn by doing.
@@ -34,20 +34,20 @@
Cyber Security University is A curated list of awesome and free educational resources that focus on learning by doing.
There are 6 parts to this. Introduction and Pre-security, Free Beginner Red Team Path, Free Beginner Blue Team Path, Bonus practices/latest CVEs and Extremely Hard rooms to do. The tasks are linear in nature of 
the difficulty. So it's recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
There are 6 parts to this. Introduction and Pre-security, Free Beginner Red Team Path, Free Beginner Blue Team Path, Bonus practices/latest CVEs and Extremely Hard rooms to do. The tasks are 
linear in nature of the difficulty. So it's recommended to do it in order. But you can still jump around and skip some rooms If you find that you are already familiar with the concepts.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both red and blue team 
path completion badges. You can copy the HTML code for them and add it to the content page below once you have completed them.
As you go through the curriculum, you will find completion badges that are hidden within this README.md (https://github.com/brootware/Cyber-Security-University/blob/main/README.md) for both 
red and blue team path completion badges. You can copy the HTML code for them and add it to the content page below once you have completed them.
↑ (#contents)
Contributing
Pull requests are welcome with the condition that the resource should be free! Please read the contribution guide in the wiki (https://github.com/brootware/Cyber-Security-University/wiki) if you wish to add 
tools or resources.
Pull requests are welcome with the condition that the resource should be free! Please read the contribution guide in the wiki (https://github.com/brootware/Cyber-Security-University/wiki) if 
you wish to add tools or resources.
Introduction and Pre-Security
@@ -195,15 +195,16 @@
⟡ Splunk Boss of the SOC V1 () - Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information.
⟡ Splunk Boss of the SOC V2 () - Splunk analysis vol 2.
⟡ Splunk Boss of the SOC V3 () - Splunk analysis vol 3.
⟡ Hunt Conti with Splunk (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
⟡ Hunt Conti with Splunk
 (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
⟡ Hunting for Execution Tactic
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
⟡ Hunting for Credential Access
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
⟡ Hunting for Persistence Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting 
workshop covering the topic of adversarial persistence (TA0003).
⟡ Hunting for Defense Evation
 (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).
⟡ Hunting for Credential Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK
Tactic of Credential Access (TA0006).
⟡ Hunting for Persistence Access (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard 
threat hunting workshop covering the topic of adversarial persistence (TA0003).
⟡ Hunting for Defense Evation (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK 
Tactic of Defense Evasion (TA0005).
↑ (#contents)