Skip to content

vadim-hunter/Threat-Hunters-KB

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 

Repository files navigation

Threat Hunter's Knowledge Base

Description

Useful Threat Hunting resources: blogs, books, trainings, people to follow, research articles, talks etc.

Windows Internals & Security

Books

  • Windows Security Monitoring, Scenarios and Patterns (Andrei Miroshnikov)
  • Windows Internals (Part 1,2)
  • Windows System Programming Part 1,2 (Pavel Yosifovich)
  • Windows Kernel Programming (Pavel Yosifovich)

Trainings

  • Windows Internals (Pavel Yosifovich)
  • Windows Process Injection for Red-Blue Teams (PentesterAcademy, Pavel Yosifovich)
  • WinDbg Fundamentals: User Mode (PentesterAcademy, Pavel Yosifovich)
  • WinDbg Fundamentals: Kernel Mode (PentesterAcademy, Pavel Yosifovich)
  • Windows API Exploitation Recipes: Processes, Tokens and Memory RW (PentesterAcademy)
  • WMI Attacks and Defense (PentesterAcademy, Nikhil Mittal)
  • Windows System Programming: Fundamentals (PentesterAcademy, Pavel Yosifovich)
  • https://www.udemy.com/course/windows-kernel-defense-and-attack-for-beginners-to-expert/

Links

Active Directory

Books

Trainings

  • Attacking and Defending Active Directory (PentesterAcademy, Nikhil Mittal)
  • Advanced Windows Tradecraft (Nikhil Mittal)

Labs

  • Attacking and Defending Active Directory (PentesterAcademy)
  • Advanced Red Team Lab (PentesterAcademy, Nikhil Mittal)
  • Global Central Bank: An Enterprise Cyber Range (PentesterAcademy, Nikhil Mittal)
  • Attacking Active Directory with Linux (PentesterAcademy, Nikhil Mittal)

Blogs

Threat Hunting/Research/Detection Engineering

Books

Trainings

Blogs

Labs

CTF

Links

TTPs

Offensive Security/RedTeam

Books

Trainings

Blogs

People

  • Chetan Nayak (@NinjaParanoid)
  • Dominic Chell (@domchell)
  • @batsec
  • Adam Chester (@xpn)
  • Adam (@Hexacorn)

Linux Internals & Security

Books

  • The Linux Programming Interface: A Linux and UNIX System Programming Handbook (Michael Kerrisk)

macOS Internals & Security

Books

  • MacOS and iOS Internals, Volume I: User Mode
  • MacOS and iOS Internals, Volume II: Kernel Mode
  • MacOS and iOS Internals, Volume III: Security & Insecurity

Trainings

Containers Security

Cloud - Microsoft Azure

Blogs

Books

  • Exam Ref AZ-900 Microsoft Azure Fundamentals
  • Exam Ref AZ-500 Microsoft Azure Security Technologies

Trainings

  • https://www.netspi.com/training/dark-side-ops-azure-cloud-pentesting (NetSPI)
  • Breaching the Cloud (Beau Bullock @dafthack)
  • Azure Pentesting (INE)
  • Attacking and Defending Azure AD Cloud: Beginner's Edition (Nikhil Mittal, Pentester Academy)
  • Microsoft Azure - Beginner's Guide + AZ-900 (Alan Rodrigues, Udemy)
  • AZ-500 Microsoft Azure Security Exam Certification (Alan Rodrigues, Udemy)

Cloud - AWS

Blogs/Articles

Expel

AWS

Books

  • AWS Certified Security Study Guide: Specialty (SCS-C01) Exam
  • AWS Certified SysOps Administrator Study Guide: Associate (SOA-C01) Exam 2nd Edition

Trainings

  • Breaching the Cloud (Beau Bullock @dafthack)
  • AWS Security Bootcamp + Attack Defense AWS Labs (Pentester Academy)

About

Threat Hunter's Knowledge Base

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published