Angelo T. Aschert's Projects
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
A collection of android security related resources
Checklist of the most important security countermeasures when designing, testing, and releasing your API
The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
Small and highly portable detection tests based on MITRE's ATT&CK.
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A collection of various awesome lists for hackers, pentesters and security researchers
A curated list of tools for incident response
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
A curated list of Awesome Threat Intelligence resources
🐶 A curated list of Web Security materials and resources.
A new way to see and navigate directory trees : https://dystroy.org/broot
In Progress
The command line vault (Windows, macOS, & Linux).
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Collect security logs and send them over syslog
Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups
IOC from articles, tweets for archives
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
A platform for community discussion. Free, open, simple.
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Cloud Native Runtime Security
Free Security and Hacking eBooks
📝 Modern documentation format and toolchain using Git and Markdown
Open-Source Phishing Toolkit
Top 100 Hacking & Security E-Books (Free Download)
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
An evolving how-to guide for securing a Linux server.