Update and add index
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Cyber Security University [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Cyber Security University [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA curated list of awesome and free educational resources that focuses on learn by doing.[39m
|
||||
|
||||
@@ -34,20 +34,19 @@
|
||||
|
||||
[38;5;12mCyber Security University is A curated list of awesome and free educational resources that focus on learning by doing.[39m
|
||||
|
||||
[38;5;12mThere[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12m6[39m[38;5;12m [39m[38;5;12mparts[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthis.[39m[38;5;12m [39m[38;5;12mIntroduction[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPre-security,[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mBeginner[39m[38;5;12m [39m[38;5;12mRed[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mPath,[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mBeginner[39m[38;5;12m [39m[38;5;12mBlue[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mPath,[39m[38;5;12m [39m[38;5;12mBonus[39m[38;5;12m [39m[38;5;12mpractices/latest[39m[38;5;12m [39m[38;5;12mCVEs[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mExtremely[39m[38;5;12m [39m[38;5;12mHard[39m[38;5;12m [39m[38;5;12mrooms[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdo.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mtasks[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m
|
||||
[38;5;12mlinear[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mnature[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdifficulty.[39m[38;5;12m [39m[38;5;12mSo[39m[38;5;12m [39m[38;5;12mit's[39m[38;5;12m [39m[38;5;12mrecommended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder.[39m[38;5;12m [39m[38;5;12mBut[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mstill[39m[38;5;12m [39m[38;5;12mjump[39m[38;5;12m [39m[38;5;12maround[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mskip[39m[38;5;12m [39m[38;5;12msome[39m[38;5;12m [39m[38;5;12mrooms[39m[38;5;12m [39m[38;5;12mIf[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12malready[39m[38;5;12m [39m[38;5;12mfamiliar[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mconcepts.[39m
|
||||
[38;5;12mThere[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12m6[39m[38;5;12m [39m[38;5;12mparts[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthis.[39m[38;5;12m [39m[38;5;12mIntroduction[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPre-security,[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mBeginner[39m[38;5;12m [39m[38;5;12mRed[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mPath,[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mBeginner[39m[38;5;12m [39m[38;5;12mBlue[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mPath,[39m[38;5;12m [39m[38;5;12mBonus[39m[38;5;12m [39m[38;5;12mpractices/latest[39m[38;5;12m [39m[38;5;12mCVEs[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mExtremely[39m[38;5;12m [39m[38;5;12mHard[39m[38;5;12m [39m[38;5;12mrooms[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdo.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mtasks[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mlinear[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mnature[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdifficulty.[39m[38;5;12m [39m[38;5;12mSo[39m[38;5;12m [39m[38;5;12mit's[39m[38;5;12m [39m
|
||||
[38;5;12mrecommended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder.[39m[38;5;12m [39m[38;5;12mBut[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mstill[39m[38;5;12m [39m[38;5;12mjump[39m[38;5;12m [39m[38;5;12maround[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mskip[39m[38;5;12m [39m[38;5;12msome[39m[38;5;12m [39m[38;5;12mrooms[39m[38;5;12m [39m[38;5;12mIf[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12malready[39m[38;5;12m [39m[38;5;12mfamiliar[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mconcepts.[39m
|
||||
|
||||
|
||||
[38;5;12mAs[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mgo[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcurriculum,[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mwill[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mcompletion[39m[38;5;12m [39m[38;5;12mbadges[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mhidden[39m[38;5;12m [39m[38;5;12mwithin[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[48;5;235m[38;5;249m[1mREADME.md[0m[38;5;12m [39m[38;5;12m(https://github.com/brootware/Cyber-Security-University/blob/main/README.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mboth[39m[38;5;12m [39m
|
||||
[38;5;12mred[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mblue[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mpath[39m[38;5;12m [39m[38;5;12mcompletion[39m[38;5;12m [39m[38;5;12mbadges.[39m[38;5;12m [39m[38;5;12mYou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mcopy[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mHTML[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12madd[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mpage[39m[38;5;12m [39m[38;5;12mbelow[39m[38;5;12m [39m[38;5;12monce[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mcompleted[39m[38;5;12m [39m[38;5;12mthem.[39m
|
||||
[38;5;12mAs[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mgo[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcurriculum,[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mwill[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mcompletion[39m[38;5;12m [39m[38;5;12mbadges[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mhidden[39m[38;5;12m [39m[38;5;12mwithin[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[48;5;235m[38;5;249m[1mREADME.md[0m[38;5;12m [39m[38;5;12m(https://github.com/brootware/Cyber-Security-University/blob/main/README.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mboth[39m[38;5;12m [39m[38;5;12mred[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mblue[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mpath[39m[38;5;12m [39m[38;5;12mcompletion[39m[38;5;12m [39m[38;5;12mbadges.[39m[38;5;12m [39m[38;5;12mYou[39m[38;5;12m [39m
|
||||
[38;5;12mcan[39m[38;5;12m [39m[38;5;12mcopy[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mHTML[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12madd[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcontent[39m[38;5;12m [39m[38;5;12mpage[39m[38;5;12m [39m[38;5;12mbelow[39m[38;5;12m [39m[38;5;12monce[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mcompleted[39m[38;5;12m [39m[38;5;12mthem.[39m
|
||||
|
||||
|
||||
[38;5;14m[1m↑[0m[38;5;12m (#contents)[39m
|
||||
|
||||
[38;2;255;187;0m[4mContributing[0m
|
||||
|
||||
[38;5;12mPull[39m[38;5;12m [39m[38;5;12mrequests[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mwelcome[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcondition[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mresource[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mfree![39m[38;5;12m [39m[38;5;12mPlease[39m[38;5;12m [39m[38;5;12mread[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mcontribution[0m[38;5;14m[1m [0m[38;5;14m[1mguide[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mwiki[0m[38;5;12m [39m[38;5;12m(https://github.com/brootware/Cyber-Security-University/wiki)[39m[38;5;12m [39m[38;5;12mif[39m[38;5;12m [39m
|
||||
[38;5;12myou[39m[38;5;12m [39m[38;5;12mwish[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12madd[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mresources.[39m
|
||||
[38;5;12mPull requests are welcome with the condition that the resource should be free! Please read the [39m[38;5;14m[1mcontribution guide in the wiki[0m[38;5;12m (https://github.com/brootware/Cyber-Security-University/wiki) if you wish to add tools or resources.[39m
|
||||
|
||||
[38;2;255;187;0m[4mIntroduction and Pre-Security[0m
|
||||
|
||||
@@ -195,16 +194,12 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSplunk Boss of the SOC V1[0m[38;5;12m () - Part of the Blue Primer series, learn how to use Splunk to search through massive amounts of information.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSplunk Boss of the SOC V2[0m[38;5;12m () - Splunk analysis vol 2.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSplunk Boss of the SOC V3[0m[38;5;12m () - Splunk analysis vol 3.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunt Conti with Splunk[0m
|
||||
[38;5;12m (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting for Execution Tactic[0m
|
||||
[38;5;12m (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mCredential[0m[38;5;14m[1m [0m[38;5;14m[1mAccess[0m[38;5;12m [39m[38;5;12m(https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mJoin[39m[38;5;12m [39m[38;5;12mCyborg[39m[38;5;12m [39m[38;5;12mSecurity's[39m[38;5;12m [39m[38;5;12mexpert[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunters[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mdive[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12minteresting[39m[38;5;12m [39m[38;5;12mMITRE[39m[38;5;12m [39m[38;5;12mATT&CK[39m
|
||||
[38;5;12mTactic[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mCredential[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12m(TA0006).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mPersistence[0m[38;5;14m[1m [0m[38;5;14m[1mAccess[0m[38;5;12m [39m[38;5;12m(https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mJoin[39m[38;5;12m [39m[38;5;12mCyborg[39m[38;5;12m [39m[38;5;12mSecurity's[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunting[39m[38;5;12m [39m[38;5;12minstructors[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfun[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhands-on-keyboard[39m[38;5;12m [39m
|
||||
[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunting[39m[38;5;12m [39m[38;5;12mworkshop[39m[38;5;12m [39m[38;5;12mcovering[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtopic[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12madversarial[39m[38;5;12m [39m[38;5;12mpersistence[39m[38;5;12m [39m[38;5;12m(TA0003).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mDefense[0m[38;5;14m[1m [0m[38;5;14m[1mEvation[0m[38;5;12m [39m[38;5;12m(https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mJoin[39m[38;5;12m [39m[38;5;12mCyborg[39m[38;5;12m [39m[38;5;12mSecurity's[39m[38;5;12m [39m[38;5;12mexpert[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunters[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mdive[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12minteresting[39m[38;5;12m [39m[38;5;12mMITRE[39m[38;5;12m [39m[38;5;12mATT&CK[39m[38;5;12m [39m
|
||||
[38;5;12mTactic[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDefense[39m[38;5;12m [39m[38;5;12mEvasion[39m[38;5;12m [39m[38;5;12m(TA0005).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunt Conti with Splunk[0m[38;5;12m (https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting for Execution Tactic[0m[38;5;12m (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting for Credential Access[0m[38;5;12m (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mPersistence[0m[38;5;14m[1m [0m[38;5;14m[1mAccess[0m[38;5;12m [39m[38;5;12m(https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mJoin[39m[38;5;12m [39m[38;5;12mCyborg[39m[38;5;12m [39m[38;5;12mSecurity's[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunting[39m[38;5;12m [39m[38;5;12minstructors[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfun[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhands-on-keyboard[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mhunting[39m[38;5;12m [39m[38;5;12mworkshop[39m[38;5;12m [39m[38;5;12mcovering[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mtopic[39m[38;5;12m [39m[38;5;12mof[39m
|
||||
[38;5;12madversarial[39m[38;5;12m [39m[38;5;12mpersistence[39m[38;5;12m [39m[38;5;12m(TA0003).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunting for Defense Evation[0m[38;5;12m (https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).[39m
|
||||
|
||||
|
||||
[38;5;14m[1m↑[0m[38;5;12m (#contents)[39m
|
||||
@@ -323,11 +318,9 @@
|
||||
|
||||
[38;5;12mSpecial thanks to everyone who forked or starred the repository ❤️[39m
|
||||
|
||||
[38;5;14m[1m![0m[38;5;12mStargazers[39m[38;5;12m [39m[38;5;12mrepo[39m[38;5;12m [39m[38;5;12mroster[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12m@brootware/awesome-cyber-security-university[39m[38;5;14m[1m [0m[38;5;14m[1m(https://reporoster.com/stars/dark/brootware/awesome-cyber-security-university)[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/brootware/awesome-cyber-security-university/stargazers)[39m
|
||||
[38;5;14m[1m![0m[38;5;12mStargazers repo roster for @brootware/awesome-cyber-security-university[39m[38;5;14m[1m (https://reporoster.com/stars/dark/brootware/awesome-cyber-security-university)[0m[38;5;12m (https://github.com/brootware/awesome-cyber-security-university/stargazers)[39m
|
||||
|
||||
[38;5;14m[1m![0m[38;5;12mForkers[39m[38;5;12m [39m[38;5;12mrepo[39m[38;5;12m [39m[38;5;12mroster[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12m@brootware/awesome-cyber-security-university[39m[38;5;14m[1m [0m[38;5;14m[1m(https://reporoster.com/forks/dark/brootware/awesome-cyber-security-university)[0m[38;5;12m [39m
|
||||
[38;5;12m(https://github.com/brootware/awesome-cyber-security-university/network/members)[39m
|
||||
[38;5;14m[1m![0m[38;5;12mForkers repo roster for @brootware/awesome-cyber-security-university[39m[38;5;14m[1m (https://reporoster.com/forks/dark/brootware/awesome-cyber-security-university)[0m[38;5;12m (https://github.com/brootware/awesome-cyber-security-university/network/members)[39m
|
||||
|
||||
[38;5;12mThanks goes to these wonderful people ([39m[38;5;14m[1memoji key[0m[38;5;12m (https://allcontributors.org/docs/en/emoji-key)):[39m
|
||||
|
||||
|
||||
Reference in New Issue
Block a user