Please feel free to fork this repository and add resources.
A curated list of amazingly awesome awesomeness.
How Hackers Steal Web Session Cookies From Facebook in Chrome?
https://gbhackers.com/how-hackers-steal-web-session-cookies-from-facebook-in-chrome/
Bugcrowd run a free online conference called LevelUp which is focused on bug bounties
https://www.bugcrowd.com/resources/levelup/
Katie Paxton-Fear
https://www.youtube.com/user/RapidBug
https://www.youtube.com/watch?v=qqmyAxfGV9c
Portswigger Web Security Academy is really good for learning different bug classes
https://portswigger.net/web-security
The DEFCON AppSec village has a few videos on their channel
https://www.appsecvillage.com/
Web App Hacking With Tib3rius | The Hacker Factory With Phillip Wylie
Easy Playbooks to Make Ransomware Criminals Cry
https://www.helminfosec.com/post/easy-playbooks-to-make-ransomware-criminals-cry
ACSC cyber security challenge
https://www.cyber.gov.au/acsc/view-all-content/news/acsc-cyber-security-challenge
CTF Events
https://ctftime.org/event/list/
PwnTillDawn Online Battlefield
https://online.pwntilldawn.com/
BlueTeam CTF Challenges
https://cyberdefenders.org/labs/
People streaming their CTF hacking live
https://www.linkedin.com/posts/joshuacmason_cjshrekt-twitch-activity-6803838984083542016-ia4T
Capture the Flag? Change Your Life
https://www.youtube.com/watch?v=9WhQUItNNMw
Offensive Security Proving Grounds (PG)
https://www.offensive-security.com/labs/
Cyber KnockOut at RSACTM 2021
https://play.katzcy.com/cyber_knockout_rsac
Downloadable CTF virtual machines (install them into VirtualBox on your own machine)
Hacker101 has a great CTF with the advantage that you can earn private invites
Hack the box
Try Hack Me
RangeForce
Setup Practice Ctf's from Vulnhub on Kali Linux
https://null-byte.wonderhowto.com/how-to/setup-practice-ctfs-from-vulnhub-kali-linux-0170228/
US Cyber Games
MemLabs
https://github.com/stuxnet999/MemLabs
MemLabs is an educational, introductory set of CTF-styled challenges which is aimed to encourage students, security researchers and also CTF players to get started with the field of Memory Forensics.
PwnTillDawn JuniorDev (10.150.150.38)
https://more4money.medium.com/juniordev-10-150-150-38-f54de60de13c
Cheatsheet-God
https://github.com/OlivierLaflamme/Cheatsheet-God
Wireshark Cheat Sheet
https://www.comparitech.com/net-admin/wireshark-cheat-sheet/
Kali Linux Commands List : Hackers Cheat Sheet
https://www.ethicalhackx.com/kali-linux-commands-list/
Hacking Cheatsheet : List of commands and techniques for penetration testing
https://github.com/kobs0N/Hacking-Cheatsheet
Report: Cloud Security Breaches Surpass On-Prem Ones for the First Time
SANS book: Practical Guide to Security in the AWS Cloud
https://pages.awscloud.com/Book-SEC-mult-SANS-Practical-Guide-Security-AWS-Cloud.html
How effective is basic account hygiene at preventing hijacking
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html
Cybersecurity Quarterly
https://issuu.com/cybersecurityquarterly
CISA Bad Practices
https://www.cisa.gov/BadPractices
May 24, 2021 Australian Cyber Security Growth Network (AustCyber) Secure By Design: Cyber Resilience for Industry (South Australia, Australia)
https://www.youtube.com/watch?v=cLuE5sDhA9s
Association for computing Machinary
AustCyber
CyberSeek
IEEE
https://spectrum.ieee.org/webinars
IoT Security Institute (IoTSI)
https://iotsecurityinstitute.com/iotsec/index.php
Women in the IT Channel
https://www.iotssa.com/women-in-the-it-channel/
PrintNightmare python scanner
https://github.com/byt3bl33d3r/ItWasAllADream
How secure is your RMM, and what can you do to better secure it?
https://www.gavsto.com/how-secure-is-your-rmm-and-what-can-you-do-to-better-secure-it/
Zoom CIS Compliance Scans
https://github.com/turbot/steampipe-mod-zoom-compliance
How to Audit Privileged Access in Active Directory?
https://www.linkedin.com/pulse/how-audit-privileged-access-active-directory-sanjay-tandon/
Blue Team Labs Online - A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting.
YARA Rules Guide: Learning this Malware Research Tool
https://www.varonis.com/blog/yara-rules/
Who’s most likely to hack your systems?
https://archerint.com/whos-most-likely-to-hack-your-systems/
How to Install and Set-up Sysmon for Windows Endpoint Devices
Sysmon is a component of the Microsoft Sysinternals Suite that runs as a kernel driver and may monitor and report on system events. Businesses frequently utilize it as part of their tracking and logging systems.
AaronLocker
https://github.com/microsoft/AaronLocker
Awesome Honeypots
https://github.com/paralax/awesome-honeypots
The Art of the Honeypot Account: Making the Unusual Look Normal
Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot
https://adsecurity.org/?p=3513
CISA Protect your Network: Strengthen your cybersecurity with our Incident Response Training
https://www.youtube.com/playlist?list=PL-BF3N9rHBLJaSbTRPyWYj56f0m2uDQD7
Black Hills Information Security Discord community
https://discord.com/invite/bhis
Hacking Articles
Cyber Insecurity (Neal Bridges)
15 Ways to Bypass the PowerShell Execution Policy
Browser In The Browser (BITB) Attack
This article explores a phishing technique that simulates a browser window within the browser to spoof a legitimate domain.
Attacking Active Directory: 0 to 0.9
https://zer1t0.gitlab.io/posts/attacking_ad/
Live Attack Simulation
https://www.cybereason.com/live-attack-simulation-02-04-21
SQL Injection Demo
https://www.linkedin.com/posts/davidbombal_sql-injection-activity-6793926606864818176-8zpm
Ultimate Password Cracking Techniques Used by Hackers
https://thycotic.com/company/blog/event/webinar-how-your-company-passwords-get-hacked/
LinkedIn and career finding
https://www.cyberhuntingguide.net/career-finding.html
Breaking into Cybersecurity cheatsheet
Cyber Security Interview Questions [Real]
https://www.ethicalhackx.com/cyber-security-interview-questions/
A Conversation With Mayor-Turned-Hacker, Joe Helle | The Hacker Factory With Phillip Wylie
ASD jobs:
Breaking into Cybersecurity cheatsheet
Digital Guardians At The Gate: Job Hunting In 2021
Recruiter recommendations for junior level cyber security applicants:
Seek
Veterans employment
https://www.withyouwithme.com/
What is the Applicant Tracking System (ATS)?
https://blogs.chapman.edu/career/2021/02/12/what-is-the-applicant-tracking-system-ats/
Managing Governance, Risk, and Compliance for a Resilient Organization
SecTalk Sydney
https://www.linkedin.com/posts/chadsaliby_security-sydney-cyber-activity-6769919241660563456-F7m1
GitHub Guide
https://guides.github.com/activities/hello-world/
Detailed write up from CISCO TALOS regarding Dark Utilities C2 service: Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns
Securing and Testing Your APIs - The Workshop
Hacking Articles Pentest Lab Setup
https://www.hackingarticles.in/category/pentest-lab-setup/
Active Directory Pentesting: Lab Setup
https://www.hackingarticles.in/active-directory-pentesting-lab-setup/
Penetration Testing Lab Setup:Cloud Computing
https://www.hackingarticles.in/penetration-testing-lab-setupcloud-computing/
Cybersecurity home lab
Home routers are being hijacked using vulnerability disclosed just 2 days ago
Actively exploited bug bypasses authentication on millions of routers
https://www.databreaches.net/actively-exploited-bug-bypasses-authentication-on-millions-of-routers/
Hackers Exploiting New Auth Bypass Bug Affecting Millions of Arcadyan Routers
https://thehackernews.com/2021/08/hackers-exploiting-new-auth-bypass-bug.html
StealthWorker botnet targets Synology NAS devices to drop ransomware
https://seclists.org/dataloss/2021/q3/126
Voluntary Code of Practice Securing the Internet of Things for Consumers
A Wolf in Sheep's Clothing: Dissecting Living off the Land Techniques
https://www.sans.org/webcasts/wolf-sheeps-clothing-dissecting-living-land-techniques-114615
A Complete Malware Analysis Tutorials, Cheatsheet & Tools list for Security Professionals
https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/
Malware collection
https://github.com/Red-Laboratory/Malware-collection
vx-underground
https://github.com/vxunderground
Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of technics, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.
For defenders, this project can provide valuable information when trying to detect DLL Hijacking attempts. Although detecting DLL Hijacking isn't always without challenge, it is certainly possible to monitor for behaviour that may be indicative of abuse. To further support defenders, out-of-the-box Sigma rules are provided through this website. A σSigma feed containing detection rules for all entries part of this project is available too.
For red teamers, this project can help identify DLLs that can be used to achieve DLL Hijacking. The aim of this project is not to make it easy to abuse the recorded vulnerabilities; as such, PoCs, code templates or tuturials are not provided.
THE DARK WEB - Using the Dark Web for OSINT Investigations
https://events.skopenow.com/q2-2021-dark-web-webinar
How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information
https://gbhackers.com/external-black-box-penetration-testing/
Active Directory Exploitation Cheat Sheet
https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/active-directory
Active Countermeasures Webcasts
https://www.activecountermeasures.com/webcasts/
Wild West Hackin Fest (pay what you can) training from Balck Hills Security
https://wildwesthackinfest.com/training-schedule/
FragAttacks (fragmentation and aggregation attacks)
The impact of attacks can also be reduced by manually configuring your DNS server so that it cannot be poisoned. Specific to your Wi-Fi configuration, you can mitigate attacks (but not fully prevent them) by disabling fragmentation, disabling pairwise rekeys, and disabling dynamic fragmentation in Wi-Fi 6 (802.11ax) devices. Note, live testing OS available.
Open Source Intelligence (OSINT) Tools & Resources
The Ultimate OSINT Collection by hatless1der
Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
Cyber Security Global Summit'21 (July 27 to 29, 2021)
Critical Vulnerabilities in Network Devices: Past, Present & Future (July 17, 2021)
https://www.linkedin.com/events/6813402945061748738/
CISO Critical Infrastructure Online A/NZ (July 13, 2021)
https://www.linkedin.com/events/6795888806701731840/
Administering AWS Infrastructure || Free Technical Workshop (July 9, 2021)
https://www.linkedin.com/events/6813395109871157248/
Australian Healthcare Week 2021
https://ahwathome.ap1.pathable.com/
OptivCon Virtual
https://gateway.on24.com/wcc/experience/optiv/1237620/3161384/
AWS Summit Online for Australia & New Zealand
https://aws.amazon.com/events/summits/online/anz/
Cyber World Congress: Virtual Cyber Security Event
Free registration (voucher on this page): https://www.linkedin.com/events/6742073406709137408/
Dell Technologies’ multi-day summit Building Cybersecurity Pathways for All Students:
Microsoft Cloud Training Events
https://www.microsoft.com/en-au/cloud-training-events/
Mitre Attack conference
https://attack.mitre.org/resources/attackcon/
New to Cyber Summit 2021 - Live Online
https://www.sans.org/event/newtocyber-summit-2021
OWASP Lightning Events - How to turn your Cybersecurity Hobby into a Career - An Introduction to Bugbounties - March 15, 2021:
Security Skills Bootcamp
https://www.microsoft.com/en-au/cloud-training-events/security-cloud-skills-in-a-week
Think2021 IBM conference
https://ibm.app.swapcard.com/event/think21
The Modern SOC Summit sumo logic
https://modernsoc21.sumologicevents.com/
Virtual Cybersecurity Summit ANZ
https://events.ismg.io/event/virtual-cybersecurity-summit-anz-2021/
Cryptii - Modular conversion, encoding and encryption online
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
https://gchq.github.io/CyberChef/
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Australian Cyber Conference 2021
https://cyberconference.com.au/canberra/
BSides Canberra 2021
Active Directory Enumeration: BloodHound
https://www.hackingarticles.in/active-directory-enumeration-bloodhound/
Windows Privilege Escalation: SeImpersonatePrivilege
https://www.hackingarticles.in/windows-privilege-escalation-seimpersonateprivilege/
Kali Linux networking
HackTricks - amazing online resource detailing hundreds of penetration testing technics
Cobalt Strike
How to Identify Cobalt Strike on Your Network
This is how the Cobalt Strike penetration testing tool is being abused by cybercriminals
Privileged Access - The Proverbial Keys to the Kingdom
https://www.paramountdefenses.com/insights/privileged-access
List of 100 Most Vulnerable Apps, Systems & Platforms to Practice Penetration Testing -2021
https://ethicalhackersacademy.com/blogs/ethical-hackers-academy/practice-penetration-testing
How to bypass Defender in a few easy steps
https://arty-hlr.com/blog/2021/05/06/how-to-bypass-defender/
10 Best Free Web Application Penetration Testing Tools 2021
https://cybersecuritynews.com/web-application-pentesting-tools/
How to Write Penetration Testing Report
Burp Suite for Pentester
https://github.com/Ignitetechnologies/BurpSuite-For-Pentester
Malware Campaign Utilizes Microsoft Executable MSBuild
https://www.avertium.com/malware-campaign-utilizes-microsoft-msbuild/
Penetration Testing Tools Reference Guide
https://www.engetsu-consulting.com/2021/02/05/penetration-testing-tools-reference-guide/
The Pentester Blueprint
Upgrade your Hacking Tools
https://robertscocca.medium.com/upgrade-your-common-hacking-tools-45ba700d42bb
Want to Hack? Learn The Cyber Kill Chain
https://www.youtube.com/watch?v=oCUrkc_0tmw
Why Good SOC Analysts Know Offense & Defense
https://www.youtube.com/watch?v=nit5LBiYcNo
Red Team Phishing Campaign Open-Source Framework (GOPHISH)
Atomic Red Team
https://github.com/redcanaryco/atomic-red-team
Atomic Red Team: Hands-on Getting Started Guide (Black Hills Security)
https://register.gotowebinar.com/register/2656603025618084366?source=BHISLI
I'll Let Myself In: Tactics of Physical Pen Testers
Python Socket server
https://pythonprogramming.net/python-binding-listening-sockets/
Ransomware Readiness Assessment CSET v10.3
https://github.com/cisagov/cset/releases/tag/v10.3.0.0
CISA Ransomware Outbreak
https://www.cisa.gov/publication/ransomware-outbreak
Raccine - A Simple Ransomware Protection
https://github.com/Neo23x0/Raccine
Ransomware: Survive by outrunning the guy next to you
https://www.zdnet.com/article/ransomware-survive-by-outrunning-the-guy-next-to-you/
Computer Security - IT security news, articles and tools
https://www.reddit.com/r/ComputerSecurity/
r/cyber: The 5th Domain of Warfare
https://www.reddit.com/r/cyber/
cyberlaws: Legal News Related ToTechnology And The Net
https://www.reddit.com/r/cyberlaws/
cybersecurity
https://www.reddit.com/r/cybersecurity/
Cybersecurity and Privacy for Beginners
https://www.reddit.com/r/Cybersecurity101/
Cyber Security Jobs
https://www.reddit.com/r/CyberSecurityJobs/
Data Recovery
https://www.reddit.com/r/datarecovery/
Hacking and cracking, done respectfully
https://www.reddit.com/r/ethicalhacking/
Exploit Development
https://www.reddit.com/r/ExploitDev/
r/fulldisclosure - Vulnerability Disclosure and Network Security Topics
https://www.reddit.com/r/fulldisclosure/
Hack Bloc
https://www.reddit.com/r/HackBloc/
Hackers
https://www.reddit.com/r/hackers/
HackerSec
https://www.reddit.com/r/hackersec/
hacking: security in practice
https://www.reddit.com/r/hacking/
A forum for the security professionals and white hat hackers.
https://www.reddit.com/r/Hacking_Tutorials/
Your Hacking Tutorial by Zempirians
https://www.reddit.com/r/HowToHack/
Information Security
https://www.reddit.com/r/Information_Security/
Information Security News
https://www.reddit.com/r/InfoSecNews/
Malware Analysis & Reports
https://www.reddit.com/r/Malware/
Managed Service Providers
/r/netsec - Information Security News & Discussion
https://www.reddit.com/r/netsec/
Network Security: News and Information
https://www.reddit.com/r/NetworkSecurity/
pwned
https://www.reddit.com/r/pwned/
Red Team Security
https://www.reddit.com/r/redteamsec/
SecurityCTF : CTF announcements & writeups
https://www.reddit.com/r/securityCTF/
Web Security - developing and maintaining secure websites
https://www.reddit.com/r/websecurity/
Red Canary’s 2021 Threat Detection Report
https://redcanary.com/threat-detection-report/
2020 Cost of a Data Breach Report
https://www.ibm.com/security/data-breach
Reduce the risk of human error with security awareness training done right
https://www.mimecast.com/products/awareness-training/
Cybersecurity: Don't blame employees—make them feel like part of the solution
Gamification is the future of cybersecurity training | Cyber Work Podcast
https://www.infosecinstitute.com/podcast/gamification-making-cybersecurity-training-fun/
https://www.youtube.com/watch?v=F4fZkBe5FUo
Become a Microsoft Security Ninja Resources
https://www.linkedin.com/pulse/become-microsoft-security-ninja-resources-katie-anderson/
Introduction to OWASP Top 10 2021
Secure Controls Framework (SCF)
https://www.securecontrolsframework.com/
ACSC ReportCyber (AU) Cyber crime reporting Australia
https://www.cyber.gov.au/acsc/report
CIS Benchmarks Demo
https://www.cisecurity.org/webinar/cis-benchmarks-demo/
Consumer Data Right (CDR) legislation - Australia
https://www.oaic.gov.au/consumer-data-right/cdr-legislation/
Notifiable Data Breach Scheme - Austaalia
https://www.oaic.gov.au/privacy/notifiable-data-breaches/
Data Breach Notification Laws – An Ultimate Guide for Businesses - Australia
https://www.webberinsurance.com.au/data-breach-notification-laws-ultimate-guide
Reported data breaches in Australia (NDB) - Australia
https://www.webberinsurance.com.au/data-breaches-list
Podcast OzCyber Unlocked Industry-led cyber security standards – why are they important?
CIS Benchmarks March 2021 Update
https://www.cisecurity.org/blog/cis-benchmarks-march-2021-update/
CORIE framework launched to test cyber resilience of Australia's financial services industry
https://www.cfr.gov.au/news/2020/mr-20-06.html
MITRE Attack
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
https://www.youtube.com/watch?v=oCUrkc_0tmw
(ENISA) Risk and threat assessment - Threat Landscape Mind Map (PDF)
SQL Injection Demo
https://www.linkedin.com/posts/davidbombal_sql-injection-activity-6793926606864818176-8zpm
Greylog - free and open source log proccessing and reporting
LetsDefend Memory Analysis challenge
Letsdefend - demonstration
https://www.linkedin.com/posts/stefan-wa_letsdefend-lab-review-activity-6801238044851658752-hfZb
Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center (SOC)
https://gbhackers.com/event-logs-cyber-security-operations-center/
Sitdown with a SOC Star: 11 Questions With Haylee Mills of Charles Schwab
Say Goodbye to Your Big Alert Pipeline, and Say Hello to Your New Risk-Based Approach” at the Splunk .conf conference in 2018
https://conf.splunk.com/files/2018/recordings/say-goodbye-to-your-sec1479.mp4
Threat Explainer: Supply Chain Attacks
https://blogs.cisco.com/security/threat-explainer-supply-chain-attacks
Learn new skills and discover the power of Microsoft products with step-by-step guidance. Start your journey today by exploring our learning paths and modules.
Cyber@ANZ - 5 to 6 hour free cyber security course (with completion certificate)
AWS Summit Online for Australia & New Zealand
https://aws.amazon.com/events/summits/online/anz/
Fortinet NSE 1 and 2 coures
https://training.fortinet.com/local/staticpage/view.php?page=certifications
Splunk Boss of Ops + O11y - May 14 - click on show all events
https://splunk.swoogo.com/2021gps/boo?linkId=115140433
Splunk Education Resources (Fundamentals 1, webinairs, etc)
https://education.splunk.com/free
Splunk Fundamentals 1
https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html
Microsoft Ignite Skills: Complete/Learn a New Skill & Earn Microsoft Cert. Exam
TCM Security - The Super Bundle (look for a discount code on Heaths twitter account)
https://academy.tcm-sec.com/p/the-super-bundle
What to hunt for and how to hunt for it - using the Open Threat Hunting Framework IRL
Make Your Incident Response and Threat Hunting Easier With Powershell Hunting Tools
Kansa is a framework for incident response using PowerShell. This framework can be used within an enterprise to collect data for incident response, breach hunts, and environment baseline creation.
KrebsOnSecurity Hit By Huge New IoT Botnet “Meris” (MikroTik routers)
https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/
Netgear Authentication Bypass Allows Router Takeover
https://threatpost.com/netgear-authentication-bypass-router-takeover/167469/
CISA Offers New Mitigation for PrintNightmare Bug
https://threatpost.com/cisa-mitigation-printnightmare-bug/167515/
CISA-FBI Guidance for MSPs and their Customers Affected by the Kaseya VSA Supply-Chain Ransomware Attack
Kaseya Supply-Chain Attack Hits Nearly 40 Service Providers With REvil Ransomware
https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html
Vigilance - public vulnerability remdiation
https://vigilance.fr/?langue=2
SANS Internet Storm Center
Microsoft Patch Tuesday by Morphus Labs
https://patchtuesdaydashboard.com/
uncover is a go wrapper using APIs of well known search engines to quickly discover exposed hosts on the internet. It is built with automation in mind, so you can query it and utilize the results with your current pipeline tools.
Joe Sandbox
https://www.joesandbox.com/analysispaged/0
cb_looper - extract and parse cobalt strike C2 configs
https://gitlab.com/interdiction_/cb_looper
Confluence CVE-2021-26084 vulnerability
https://github.com/search?q=CVE-2021-26084
Nuclei - vulnerability scanner
https://github.com/projectdiscovery/nuclei
Bad patching practices are a breeding ground for zero-day exploits, Google warns
https://www.cyberscoop.com/project-zero-google-zero-days-patching/
End-of-Support Software Report List
https://www.cisecurity.org/blog/end-of-support-software-report-list-2/
Plex Media servers are being abused for DDoS attacks
https://www.zdnet.com/article/plex-media-servers-are-being-abused-for-ddos-attacks/
AttackIQ
GB hackers on Security
System Monitor (Sysmon) is a Windows system service and device driver
https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
Sysmon 14.0 — FileBlockExecutable
https://medium.com/@olafhartong/sysmon-14-0-fileblockexecutable-13d7ba3dff3e
Secure home working on personal IT (NCSC UK)
https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it
The Big Threat to Security Teams by Chloé Messdaghi
https://www.youtube.com/watch?v=oC9Zp8xzThA
Microsoft warns: Watch out for this new malware that steals passwords, webcam and browser data
How To Hack A Hospital
https://www.youtube.com/watch?v=iNrfnnGGeJs
Let's Automate: LINUX PRIVILEGE ESCALATION - Part 1
https://www.youtube.com/watch?v=gc2cFwT_Fd0
Windows Defender vs Ransomware in 2021
https://www.youtube.com/watch?v=ZbYx8V2RTjc
Leaky John Deere API’s: Serious Food Supply Chain Vulnerabilities Discovered by Sick Codes, Kevin Kenney & Willie Cade.
At the HEART of the SolarWinds Breach - Privileged Access in Active Directory
https://blog.paramountdefenses.com/2021/05/at-the-heart-of-the-solarwinds-breach.html
Detecting cyber threats and preventing
https://docs.google.com/document/d/1_DaciFToZjitG4tLCqOKKQPJvRAZ_gpobjHuoj_sjaY/
New tools to block legacy authentication in your organization
ITSP Magazine RSA Broadcast Alley
https://path.rsaconference.com/flow/rsac/us21/itsp/page/itsp
Pipeline Ransomware Attack: What We Know and How to Prepare
https://pages.checkpoint.com/amer-security-best-practices-for-ot-may-2021.html
Notetaking Software - Keep track of course material and building cheatsheets/blogs/writeups.
Screenshot capture/image-editing software
(Programming) - (RegExr) Regular Expression Interactive Builder, Tester and Learning Resource