MrXcrypt
Search
Search
Dark mode
Light mode
Explorer
Active Directory
AD methodology
Android
Emulator
Start of Debugging
ArcX - CTI
0 Introduction
1 Intro to Threat Actors
2 Threat Vectors
3 Threat Intelligence Cycle
4 Law & Ethics
Bug Bounty
Method
Wordlists
CTF
vsCTF
intro-rev
CVE Exploits
Heartbleed Vulnerability - CVE 2014-0160
DFE codered
0 DFE codered
1 Computer Forensics Fundamental
2 Computer Forensic Investigation Process
3 Understanding Hard Disks & File Systems
4 Data Acquisition & Duplication
5 Defeating Anti-forensics technique
6 Windows Forensics
Email Security
DMARC Record
Enumeration
Nmap Scripts
General Cyber
Cyberlaw
Cybersecurity 101 - Specializations & Job Roles
Incident Response Plan
OWASP Top 10 2021
HackTheBox Writeups
PermX Walkthrough - HackTheBox
Sea Walkthrough - HackTheBox
Sightless Walkthrough - HackTheBox
Strutted Walkthrough - HackTheBox
Machine Hacking
Linux
OSCP
OSCP strategy
OSINT
0 Open Source Intelligence
1 Basic OSINT
2 Workflow of OSINT
3 Sock Puppets OSINT
4 Tools for OSINT
Portswigger Writeups
SSRF Portswigger labs 1
SSRF Portswigger labs 2
SOC level 1
0 Cyber Defence Frameworks
0 Junior Security Analyst intro
0 The Career
1 SOC
1 Pyramid of Pain
0 What is Pyramid of Pain
1 Hash Values (Trivial)
2 IP Address (Easy)
3 Domain Names (Simple)
4 Host Artifacts (Annoying)
5 Tools (Challenging)
6 TTPs (Tough)
2 Cyber Kill Chain
0 Intro & Kill Chain
1 Reconnaissance
2 Weaponization
3 Delivery
4 Exploitation
5 Installation
6 Command & Control
7 Action on Objectives
3 Unified Kill Chain
0 Intro & Threat Modelling
1 Phase In
2 Phase Through
3 Phase Out
4 Diamond Model
0 The Diamond Model
1 Meta Features
2 Components
5 MITRE
0 Intro to MITRE
1 ATT&CK Framework
2 CAR Knowledge Base
3 MITRE Engage
4 MITRE Defend
5 Att&ck Emulation Plans
1 Cyber Threat Intelligence
0 Intro to Cyber Threat Intel
0 Intro to CTI
1 CTI Lifecycle
2 CTI Standards & Frameworks
1 Threat Intelligence Tools
0 urlscan.io
1 abuse.ch
2 PhishTool
2 Yara
0 Intro to YARA
1. Expanding on YARA Rules
2. YARA Tools
3. LOKI & YARA rule set
4. yarGen
5 Valhalla
3 OpenCTI
0 OpenCTI & Data Model
1 OpenCTI Dashboard
4 MISP
0 MISP Intro & features
1 Event Management
2 Feeds & Taxonomies
2 Network Security and Traffic Analysis
0 Traffic Analysis
0 Network Security & Network Data
1 Traffic Analysis
1 Snort
0 Snort & IDS-IPS
1. Operation Modes
2 Snort Rule Structure
3 Points to Remember
3 Endpoint Security Monitoring
0 Intro to Endpoint security
0 Endpoint Security Fundamentals
2 Endpoint Logging & Monitoring
3 Event Log Analysis
1 Wazuh
0 Intro to wazuh
4 Security Information and Event Management
0 Intro to SIEM
0 Network Visibility through SIEM
1 Log Sources & Log ingestion
2 Analysis Logs & Alerts
Web Security
Captcha Bypass
Tabnabbing
Web Hacking
Home
❯
tags
❯
Tag: OSINT
Tag: OSINT
1 item with this tag.
Feb 28, 2025
Cybersecurity 101 - Specializations & Job Roles
Cybersecurity
Specializations
OffensiveSecurity
DefensiveSecurity
PenetrationTesting
RedTeam
BugBountyHunter
SecurityAnalyst
SOCAnalyst
BlueTeam
ThreatHunting
ThreatIntelligence
VulnerabilityAnalysis
Maltego
Shodan
OSINT
MalwareAnalysis
Cryptography
DigitalForensics
IncidentResponse
GRC
GovernanceRiskCompliance
ProductSecurity
DevSecOps
CISO
SecurityManagement
SecurityArchitect
CyberThreats
Certifications
TryHackMe
HackTheBox
CaptureTheFlag
CSO