Welcome to my personal collection of cybersecurity resources, tools, and references.
This directory contains a collection of documents that can be useful for cybersecurity professionals. It includes a variety of documents that can be useful for different purposes.
- RegulatoryCompliance
- Security and Privacy Controls for Information Systems and Organizations
- Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
- Framework for Improving Critical Infrastructure Cybersecurity
- Continuous Learning
- Starter Penetration Testing Resources by TCM Security
- Sample Datasets
This directory contains various files, notably Maderas' list of necessary cybersecurity skills for learners. It also has a few text processing reference docs, and a list of search engines for pentesters.
Here you'll find documents for common web application vulnerabilities, like those of the OWASP Top Ten. Each document is different, but all of them contain code examples, injection payloads, that could theoretically be used in the wild. XSS, [SSRF], and CORS are just a few examples. The WebApp Exploit Checklist is a great visual reference.
Personal automation scripts
extract_video_audio.py
: CLI tool that creates an MP3 audio file from a MP4 file, or files in a directory.
firewall_rules.py
: CLI tool that optionally accepts a URL as an argument to download a CSV list of known problematic IP addresses and create block rules for Windows Firewall or iptables
for Linux.
The default URL downloads the "Botnet C2 Indicators of Compromise (IOCs)" from FEODOtracker, which contains "information on tracked botnet c2s but also IP addresses that were acting as a botnet C2 within the past 30 days."
hashfile_validator.py
: A CLI tool that automatically detects and validates cryptographic hash checksums against files. It supports MD5, SHA1, SHA256, SHA384, and SHA512, with optional JSON output and additional file information. The tool uses Windows' built-in Certutil for hash calculation.
https_ngrok_config.yml
: A sample configuration file that starts an Ngrok HTTPS endpoint w/ OAuth support.
regex_generator.py
: Generates regex patterns to detect keyword variations, including obfuscated and evasive text, for precise matching.
repo_structure_visualizer.py
: A Python script that automatically generates an interactive HTML navigation interface for a GitHub repository's directory structure. Adaptable for any repository.
Reset-DockerWslIntergration.ps1
: PowerShell script that stops Docker Desktop, Stops WSL, and Unregisters the Docker Destop data.
Useful-Repositories/README.md
: A document with links to useful cybersecurity-related GitHub repositories.
This project could be way better than it is, we both know that.
Please consider contributing your own knowledge files, automation scripts, add to the Useful Repositories README, and see the CONTRIBUTING.md file for guidelines on how to contribute.
Distributed under the MIT License. See LICENSE for more information.