awesome-incident-response
vulhub
Our great sponsors
awesome-incident-response | vulhub | |
---|---|---|
4 | 17 | |
7,114 | 16,186 | |
- | 2.1% | |
5.6 | 8.9 | |
30 days ago | 10 days ago | |
Dockerfile | ||
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-incident-response
-
Cybersecurity Repositories
Incident Response
- Questions about getting into DF
-
I started a new role as a Incident Response Analyst and wanted to get some advice.
Here is a good github page that discusses tons of IR stuff. https://github.com/meirwah/awesome-incident-response
-
Has this sub done any curated reasearch collection sharing?
GitHub sounds totally viable. You might consider styling it after something like Awesome Lists. (Ex: Awesome Incident Response). But yes, totally viable.
vulhub
- HackTheBox - Writeup Builder [Retired]
-
Valkey Is Rapidly Overtaking Redis
This is pretty materially not fine:
https://github.com/vulhub/vulhub/tree/master/redis/CVE-2022-...
- 2 physical computers 1 vm
-
Making sense of Apache httpd's CVE-2023-25690
I just found this commit (https://github.com/vulhub/vulhub/pull/413/files) for vulnhub containing a POC. I still don't understand exactly how they get to secret.txt in their example but it's a huge step forward. Plenty of mistakes in the Changelog.
- I am setting up a pen testing lab , I want to generate some vulnerabilities on a windows server 2019 (VM)
-
How to create vulnerable machines
A GitHub repo called vulnhub contains numerous Dockerfiles to build vulnerable containers of various popular software. If you’re just getting started this is a good way to have one machine where you deploy vulnerable docker containers to poke at.
- Vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose
- How can I make a ‘bad image’ that will generate ECR scan vulnerabilities?
- Pre-Built Vulnerable Environments Based on Docker-Compose
What are some alternatives?
Kuiper - Digital Forensics Investigation Platform
docker-openvpn-client-socks - Expose an OpenVPN tunnel as a SOCKS proxy
cyberchef-recipes - A list of cyber-chef recipes and curated links
docker-bloodhound - BloodHound Docker Ready to Use
dfir-orc - Forensics artefact collection tool for systems running Microsoft Windows
SniDust - SmartDNS Proxy to hide your GeoLocation. Based on DnsDist and nginx
DevSecOps - Ultimate DevSecOps library
docker-dev-ssl-proxy - A simple nginx proxy behind a self-generated & self-signed SSL certificate (local HTTPS). Also utilized in development of https://speaker.app / https://github.com/zenOSmosis/speaker.app.
DFIRMindMaps - A repository of DFIR-related Mind Maps geared towards the visual learners!
frigate-synology-dsm7 - Dockerfile and docker-compose file to enable google coral USB accelerators in containers on Synology DSM 7
awesome-sre - A curated list of Site Reliability and Production Engineering resources.
asterisk-docker - Asterisk + chan_dongle in docker.