Welcome to my personal collection of cybersecurity resources, tools, and references.
Personal automation scripts
extract_video_audio.py
: CLI tool that creates an MP3 audio file from a MP4 file, or files in a directory.
firewall_rules.py
: takes in the URL of a CSV file to block known problematic IP addresses.
The default URL downloads the "Botnet C2 Indicators of Compromise (IOCs)" from FEODOtracker, which contains "information on tracked botnet c2s but also IP addresses that were acting as a botnet C2 within the past 30 days."
hashfile_validator.py
: A CLI tool that automatically detects and validates cryptographic hash checksums against files. It supports MD5, SHA1, SHA256, SHA384, and SHA512, with optional JSON output and additional file information. The tool uses Windows' built-in Certutil for hash calculation.
Reset-DockerWslIntergration.ps1
: PowerShell script that stops Docker Desktop, Stops WSL, and Unregisters the Docker Destop data.
This directory contains a collection of documents that can be useful for cybersecurity professionals. It includes a variety of documents that can be useful for different purposes.
- RegulatoryCompliance
- Security and Privacy Controls for Information Systems and Organizations
- Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
- Framework for Improving Critical Infrastructure Cybersecurity
- Continuous Learning
- Starter Penetration Testing Resources by TCM Security
- Sample Datasets
This directory contains various files, notably Maderas' list of necessary cybersecurity skills for learners. It also has a few text processing reference docs, and a list of search engines for pentesters.
Here you'll find documents for common web application vulnerabilities, like those of the OWASP Top Ten. Each document is different, but all of them contain code examples, injection payloads, that could theoretically be used in the wild. XSS, [SSRF], and CORS are just a few examples. The WebApp Exploit Checklist is a great visual reference.
This is a meta-directory with links to useful cybersecurity-related GitHub repositories. You'll find offensive, defensive, and multi-purpose tools.
Please see the README.
This project could be way better than it is, we both know that.
Please consider contributing your own knowledge files, automation scripts, add to the Useful Repositories README, and see the CONTRIBUTING.md file for guidelines on how to contribute.
Distributed under the GNU AGPL-3.0 License. See LICENSE for more information.