Defensive Resources
Defensive Platforms #
- HTB of blue team training
- BTL1 and BTL2 certification
- Blue team simulations and practice
- Blue team training
- CCD certification
Malware #
- Malware workshops and resources
- Reverse engineering puzzles
- Malware samples archive
- Interactive malware sandbox
- Malware encyclopedia and intel
- Malware training ( Zero2Automated)
- Dead link, malware leak archive
Forensics #
- Forensic courses, labs, and certifications
- DFIR blog and tutorials
- Forensic files for testing / training
- Forensic datasets for testing / training
- Autopsy tool training
- Malware / memory forensics training
Other #
T-Pot - The All In One Honeypot Platform 🐝
- Honeypot platform tool
- DFIR resource site
- Cybersecurity courses
- Digital forensics software solutions
Metasploitable Hardening Guide
- Metasploitable defensive guide
- Defense security training and PurpleLabs
- Defensive labs + cert (EDS)
- Defensive training
The DFIR Report - Real Intrusions by Real Attackers, The Truth Behind the Intrusion
- DFIR Report reference / collection
- APT list with info
https://start.me/p/wMrA5z/cyber-threat-intelligence
- Threat intel stuff
Lists #
- List of binaries that aren’t suspicious
LOTS Project - Living Off Trusted Sites
- Trusted site exploitation research
- List of Windows APIs that map to malware techniques
- List of file extensions used by attackers