- https://github.com/iadgov/Event-Forwarding-Guidance/blob/master/Events/README.md
- https://guides.github.com/features/mastering-markdown/
- https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet
- https://github.com/toolswatch/vFeed
- https://github.com/cve-search/cve-search
- https://gist.github.com/pcostesi/87a04a3bbbdbc4aeb8b787f45eb21197
- https://pypkg.com/pypi/rekall-core/f/rekall/plugins/windows/registry/getsids.py
- <>
https://nvd.nist.gov/vuln-metrics
CVSS v2.0 Ratings
Severity | Base Score |
---|---|
Low | 0.0 - 3.9 |
Medium | 4.0 - 6.9 |
High | 7.0 - 10.0 |
CVSS v3.0 Ratings
- What is the use case for this request? (with as much detail as possible)
- Why is this feature being submitted?
- How would this new feature be used?
- Why can't this be done in the current version?
- Are there any workarounds that you use to navigate around it?
- How important is this request to your company?
- Can a Product Manager contact us about this feature request?
Command line hashes (MD5 / SHA1 / SHA256)
certutil -hashfile <filename> <hash>
Python Simple HTTP Server
(v3)python -m http.server 80
(v2)python -m SimpleHTTPServer 80
Generate a UUID in Python
(Type 1)python3 -c 'import uuid; print(uuid.uuid1())'
(Time and MAC based)
(Type 4)python3 -c 'import uuid; print(uuid.uuid4())'
(Random)
- https://github.com/enaqx/awesome-pentest#protocol-analyzers-and-sniffers
- https://www.systutorials.com/docs/linux/man/1-nfreplay/
- http://www.pmacct.net/
- https://github.com/theonlybrianne/graphdatamap
- https://github.com/insanitybit/grapl
- https://github.com/robcowart/elastiflow
- https://github.com/gdbassett/infosec_analytics_site
- https://www.sans.org/reading-room/whitepapers/logging/defending-graphs-create-graph-data-map-visualize-pivot-paths-39030
- https://briannefahey.com/2019/07/defending-with-graphs
https://www.cyberciti.biz/faq/how-to-add-comments-to-iptables-rules-on-linux/
IPTABLES - Rules and Commands
IPTABLES for beginners
iptables -m comment --comment "comment here"
iptables -A INPUT -i eth1 -m comment --comment "my LAN - " -j DROP