Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

syncing dev and main branches #39

Merged
merged 43 commits into from
Nov 8, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
43 commits
Select commit Hold shift + click to select a range
e8b76b2
changed push to dev branch only
brootware May 22, 2022
ba90619
Merge pull request #5 from brootware/dev
brootware May 22, 2022
17e242f
Merge pull request #6 from brootware/dev
brootware May 22, 2022
deb1b09
Merge pull request #7 from brootware/dev
brootware May 22, 2022
f2a0ee4
Merge pull request #8 from brootware/dev
brootware May 22, 2022
3bd6a0c
Merge pull request #9 from brootware/dev
brootware May 22, 2022
7e4f4c7
Merge pull request #10 from brootware/dev
brootware May 22, 2022
427b345
Merge pull request #11 from brootware/dev
brootware May 22, 2022
378189d
Merge pull request #12 from brootware/dev
brootware May 22, 2022
16560c0
Merge pull request #13 from brootware/dev
brootware May 22, 2022
19dcef6
Merge pull request #14 from brootware/dev
brootware May 22, 2022
ad0202d
Merge pull request #15 from brootware/dev
brootware May 22, 2022
d50fb9d
Merge pull request #16 from brootware/dev
brootware May 22, 2022
f3f5d2d
Merge pull request #17 from brootware/dev
brootware May 22, 2022
faf1e92
Add OverTheWire wargames
IAmCoder May 22, 2022
05452e8
Merge pull request #18 from IAmCoder/add-wargames
brootware May 23, 2022
525ea3b
docs: update README.md [skip ci]
allcontributors[bot] May 23, 2022
d5d59a9
docs: update .all-contributorsrc [skip ci]
allcontributors[bot] May 23, 2022
a6f2138
Merge pull request #19 from brootware/all-contributors/add-IAmCoder
brootware May 23, 2022
9f2760a
Merge pull request #20 from brootware/dev
brootware May 23, 2022
13970de
Merge pull request #21 from brootware/dev
brootware May 23, 2022
9537d4f
Merge pull request #22 from brootware/dev
brootware May 24, 2022
37f4ee3
Merge pull request #23 from brootware/dev
brootware May 24, 2022
6bfb032
Merge pull request #24 from brootware/dev
brootware May 24, 2022
0819450
Merge pull request #25 from brootware/dev
brootware May 24, 2022
c215209
Merge pull request #26 from brootware/dev
brootware May 26, 2022
b3b181c
Merge pull request #27 from brootware/dev
brootware May 26, 2022
57d9095
Merge pull request #28 from brootware/dev
brootware Jun 8, 2022
cd9db9a
Merge pull request #29 from brootware/dev
brootware Jun 8, 2022
ded5154
Merge pull request #30 from brootware/dev
brootware Jun 8, 2022
ed631b7
Merge pull request #31 from brootware/dev
brootware Jun 8, 2022
9fc5ebb
Update README.md
brootware Jun 8, 2022
9855f7e
Merge pull request #34 from brootware/dev
brootware Jul 20, 2022
9b1354e
Update ci.yml
brootware Aug 3, 2022
7496c2a
Update README.md
brootware Aug 18, 2022
8e0b7c5
Merge pull request #35 from brootware/dev
brootware Nov 29, 2022
76d8262
added exception to credit link as author has privated it.
Jan 15, 2023
876d0dd
added threat hunting workshops
Mar 13, 2023
84fb92a
modified URL for homepage link
Mar 13, 2023
d12cf23
added bypassing UAC
May 6, 2023
6f12aa5
swapped out bucket challenge for threat intel 101
Nov 8, 2023
e2e77d1
swapped out nmap for echoctf 101 tutorial
Nov 8, 2023
54e98b4
Merge branch 'dev' into main
brootware Nov 8, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 10 additions & 1 deletion .all-contributorsrc
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,19 @@
"doc",
"code"
]
},
{
"login": "IAmCoder",
"name": "Michael Paul Coder",
"avatar_url": "https://avatars.githubusercontent.com/u/1631870?v=4",
"profile": "https://lucidcode.com",
"contributions": [
"doc"
]
}
],
"contributorsPerLine": 7,
"projectName": "Cyber-Security-University",
"projectName": "cyber-security-university",
"projectOwner": "brootware",
"repoType": "github",
"repoHost": "https://github.com",
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,9 @@ on:
branches: [dev]
pull_request:
branches: [main]
schedule:
# Run everyday at 9:00 AM (See https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07)
- cron: "0 9 * * *"

env:
DISABLE_TELEMETRY: 1
Expand Down
31 changes: 17 additions & 14 deletions .mlc_config.json
Original file line number Diff line number Diff line change
@@ -1,15 +1,18 @@
{
"ignorePatterns": [
{
"pattern": "^https://github.com/brootware/Cyber-Security-University/generate"
},
{
"pattern": "^https://play.picoctf.org/practice/challenge/*"
}
],
"timeout": "20s",
"retryOn429": true,
"retryCount": 5,
"fallbackRetryDelay": "30s",
"aliveStatusCodes": [0, 200, 403, 429]
}
"ignorePatterns": [
{
"pattern": "^https://github.com/brootware/Cyber-Security-University/generate"
},
{
"pattern": "^https://play.picoctf.org/practice/challenge/*"
},
{
"pattern": "^https://skerritt.blog/free-rooms/"
}
],
"timeout": "20s",
"retryOn429": true,
"retryCount": 5,
"fallbackRetryDelay": "30s",
"aliveStatusCodes": [200, 403, 429]
}
26 changes: 17 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
<i>Because education should be free.</i>
<br/>

<a href="https://brootware.github.io/cyber-security-university/"><img src="https://visitor-badge.glitch.me/badge?page_id=brootware.cyber-security-university&right_color=blue" /></a>
<a href="https://brootware.github.io/awesome-cyber-security-university/"><img src="https://visitor-badge.glitch.me/badge?page_id=brootware.cyber-security-university&right_color=blue" /></a>
</div>

## Contents
Expand Down Expand Up @@ -66,7 +66,7 @@ Pull requests are welcome with the condition that the resource should be free! P
**Introductory CTFs to get your feet wet**<!-- markdownlint-enable MD036 -->

* [Google Dorking](<https://tryhackme.com/room/googledorking>) - Explaining how Search Engines work and leveraging them into finding hidden content!
* [OHsint](<https://tryhackme.com/room/ohsint>) - Intro to Open Source Intelligence.
* [Osint](<https://tryhackme.com/room/ohsint>) - Intro to Open Source Intelligence.
* [Shodan.io](<https://tryhackme.com/room/shodan>) - Learn about Shodan.io and how to use it for device enumeration.

<!--lint disable double-link-->
Expand All @@ -77,7 +77,7 @@ Pull requests are welcome with the condition that the resource should be free! P
### Level 2 - Tooling

* [Tmux](<https://tryhackme.com/room/rptmux>) - Learn to use tmux, one of the most powerful multi-tasking tools on linux.
* [Nmap](<https://tryhackme.com/room/rpnmap>) - Get experience with Nmap, a powerful network scanning tool.
* [Nmap,Curl and Netcat](<https://echoctf.red/challenge/1>) - Get experience with Nmap, Curl and Netcat for network communications.
* [Web Scanning](<https://tryhackme.com/room/rpwebscanning>) - Learn the basics of automated web scanning.
* [Sublist3r](<https://tryhackme.com/room/rpsublist3r>) - Learn how to find subdomains with Sublist3r.
* [Metasploit](<https://tryhackme.com/room/rpmetasploit>) - An introduction to the main components of the Metasploit Framework.
Expand Down Expand Up @@ -105,6 +105,7 @@ Pull requests are welcome with the condition that the resource should be free! P
* [Ice](<https://tryhackme.com/room/ice>) - Deploy & hack into a Windows machine, exploiting a very poorly secured media server.
* [Lazy Admin](<https://tryhackme.com/room/lazyadmin>) - Easy linux machine to practice your skills.
* [Basic Pentesting](<https://tryhackme.com/room/basicpentestingjt>) - This is a machine that allows you to practice web app hacking and privilege escalation.
* [Bypassing UAC](https://tryhackme.com/room/bypassinguac) - Learn common ways to bypass User Account Control (UAC) in Windows hosts.

<!--lint disable double-link-->
[↑](#contents)<!--lint enable double-link-->
Expand Down Expand Up @@ -182,7 +183,7 @@ Pull requests are welcome with the condition that the resource should be free! P
<!--lint disable double-link-->
[↑](#contents)<!--lint enable double-link-->

### Level 2 - Security Operations & Incident Response
### Level 2 - Security Operations, Incident Response & Threat Hunting

* [Investigating Windows](<https://tryhackme.com/room/investigatingwindows>) - Investigating Windows.
* [Juicy Details](<https://tryhackme.com/room/juicydetails>) - A popular juice shop has been breached! Analyze the logs to see what had happened.
Expand All @@ -192,12 +193,16 @@ Pull requests are welcome with the condition that the resource should be free! P
* [Splunk Boss of the SOC V2](<https://cyberdefenders.org/blueteam-ctf-challenges/16>) - Splunk analysis vol 2.
* [Splunk Boss of the SOC V3](<https://cyberdefenders.org/blueteam-ctf-challenges/8>) - Splunk analysis vol 3.
* [Hunt Conti with Splunk](https://tryhackme.com/room/contiransomwarehgh) - An Exchange server was compromised with ransomware. Use Splunk to investigate how the attackers compromised the server.
* [Hunting for Execution Tactic](https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-3) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Execution (TA0002).
* [Hunting for Credential Access](https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-5) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Credential Access (TA0006).
* [Hunting for Persistence Access](https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-2) - Join Cyborg Security's team of threat hunting instructors for a fun and hands-on-keyboard threat hunting workshop covering the topic of adversarial persistence (TA0003).
* [Hunting for Defense Evation](https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-4) - Join Cyborg Security's expert threat hunters as they dive into the interesting MITRE ATT&CK Tactic of Defense Evasion (TA0005).

<!--lint disable double-link-->
[↑](#contents)
<!--lint enable double-link-->

### Level 3 - Beginner Forensics & Cryptography
### Level 3 - Beginner Forensics, Threat Intel & Cryptography

* [Martryohka doll](<https://play.picoctf.org/practice/challenge/129?category=4&page=1&solved=0>) - Beginner file analysis challenge.
* [The Glory of the Garden](<https://play.picoctf.org/practice/challenge/44?category=4&page=1&solved=0>) - Beginner image analysis challenge.
Expand All @@ -209,7 +214,7 @@ Pull requests are welcome with the condition that the resource should be free! P
* [Illumination](<https://app.hackthebox.com/challenges/illumination>) - Medium level forensics challenge.
* [Emo](<https://app.hackthebox.com/challenges/emo>) - Medium level forensics challenge.
* [Obsecure](<https://app.hackthebox.com/challenges/obscure>) - Medium level forensics challenge.
* [Bucket - Cloud Security Forensics](<https://cyberdefenders.org/blueteam-ctf-challenges/84>) - Medium level cloud security challenge.
* [Intel101 Challenge](<https://cyberdefenders.org/blueteam-ctf-challenges/38>) - Medium level Threat Intel challenge.
* [Introduction to Cryptohack](<https://cryptohack.org/courses/intro/course_details/>) - Medium level cryptography challenge.

<!--lint disable double-link-->
Expand Down Expand Up @@ -252,6 +257,8 @@ Pull requests are welcome with the condition that the resource should be free! P

## Bonus CTF practice and Latest CVEs

* [Bandit](<https://overthewire.org/wargames/bandit/>) - Aimed at absolute beginners and teaches the basics of remote server access.
* [Natas](<https://overthewire.org/wargames/natas/>) - Teaches the basics of serverside web-security.
* [Post Exploitation Basics](<https://tryhackme.com/room/postexploit>) - Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom.
* [Smag Grotto](<https://tryhackme.com/room/smaggrotto>) - An obsecure boot to root machine.
* [Dogcat](<https://tryhackme.com/room/dogcat>) - I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI and break out of a docker container.
Expand Down Expand Up @@ -287,7 +294,7 @@ Pull requests are welcome with the condition that the resource should be free! P
* [Carpe Diem 1](<https://tryhackme.com/room/carpediem1>) - Recover your client's encrypted files before the ransomware timer runs out.
* [Borderlands](<https://tryhackme.com/room/borderlands>) - Compromise a perimeter host and pivot through this network.
* [Jeff](<https://tryhackme.com/room/jeff>) - Hack into Jeff's web server.
* [Year of the [Owl](https://tryhackme.com/room/yearoftheowl) - Owl-themed boot to root machine.
* [Year of the Owl](https://tryhackme.com/room/yearoftheowl) - Owl-themed boot to root machine.
* [Anonymous Playground](<https://tryhackme.com/room/anonymousplayground>) - Want to become part of Anonymous? They have a challenge for you.
* [EnterPrize](<https://tryhackme.com/room/enterprize>) - Enterprise-themed network to hack into.
* [Racetrack Bank](<https://tryhackme.com/room/racetrackbank>) - It's time for another heist.
Expand All @@ -303,7 +310,7 @@ Pull requests are welcome with the condition that the resource should be free! P
### Contributors & stargazers ✨

<!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section -->
[![All Contributors](https://img.shields.io/badge/all_contributors-1-orange.svg?style=flat-square)](#contributors-)
[![All Contributors](https://img.shields.io/badge/all_contributors-2-orange.svg?style=flat-square)](#contributors-)
<!-- ALL-CONTRIBUTORS-BADGE:END -->

Special thanks to everyone who forked or starred the repository ❤️
Expand All @@ -319,7 +326,8 @@ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/d
<!-- markdownlint-disable -->
<table>
<tr>
<td align="center"><a href="https://brootware.github.io"><img src="https://avatars.githubusercontent.com/u/7734956?v=4?s=100" width="100px;" alt=""/><br /><sub><b>Oaker Min</b></sub></a><br /><a href="#infra-brootware" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#maintenance-brootware" title="Maintenance">🚧</a> <a href="https://github.com/brootware/Cyber-Security-University/commits?author=brootware" title="Documentation">📖</a> <a href="https://github.com/brootware/Cyber-Security-University/commits?author=brootware" title="Code">💻</a></td>
<td align="center"><a href="https://brootware.github.io"><img src="https://avatars.githubusercontent.com/u/7734956?v=4?s=100" width="100px;" alt=""/><br /><sub><b>Oaker Min</b></sub></a><br /><a href="#infra-brootware" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#maintenance-brootware" title="Maintenance">🚧</a> <a href="https://github.com/brootware/cyber-security-university/commits?author=brootware" title="Documentation">📖</a> <a href="https://github.com/brootware/cyber-security-university/commits?author=brootware" title="Code">💻</a></td>
<td align="center"><a href="https://lucidcode.com"><img src="https://avatars.githubusercontent.com/u/1631870?v=4?s=100" width="100px;" alt=""/><br /><sub><b>Michael Paul Coder</b></sub></a><br /><a href="https://github.com/brootware/cyber-security-university/commits?author=IAmCoder" title="Documentation">📖</a></td>
</tr>
</table>

Expand Down
Loading