Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-blueteam
A list of resources to build a information security team.
https://github.com/brianreitz/awesome-blueteam
- The why, what, and how of threat research - Matt Graeber, RedCanary
- Introducing the Funnel of Fidelity - Jared Atkinson, SpecterOps
- What Happens When You Type Your Password Into Windows? - Steve Syfuhs, Microsoft
- How Does Windows Defender Credential Guard Work? - Steve Syfuhs, Microsoft
- Reading Your Way Around UAC, Part 1 - your-way-around-uac-part-2.html)**, **[Part 3](https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-3.html)** - James Forshaw, Google Project Zero
- Introduction to Windows tokens for security practitioners - Will Burgess, Elastic
- Restricting SMB-based lateral movement in a Windows environment - Palantir
- Detecting Windows Endpoint Compromise with SACLs - Dane Stuckey, Palantir
- The Illustrated TLS Connection - Michael Driscoll
- Portable Executable File Format - Krzysztof Kowalczyk
- DigitalOcean Tutorials - DigitalOcean
- How To Use Journalctl to View and Manipulate Systemd Logs
- Tools Analysis Result Sheet - JPCERT/CC
- Simple Anomaly Detection Using Plain SQL - Haki Benita
- CyberChef - GCHQ
Programming Languages