Skip to content

jb49088/cybersecurity_notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

cybersecurity_notes

1,000+ interconnected cybersecurity notes built in Neovim, complete with tags and links. Designed for both learning and long-term knowledge management.

Code Statistics

-------------------------------------------------------------------------------
Language                     files          blank        comment           code
-------------------------------------------------------------------------------
Markdown                      1145           7917              4          15863
-------------------------------------------------------------------------------
SUM:                          1145           7917              4          15863
-------------------------------------------------------------------------------

Project Structure

cybersecurity_notes
├── notes
│   ├── aaa_server.md
│   ├── abstraction.md
│   ├── acceptable_use_policy_(aup).md
│   ├── access_badge_cloning.md
│   ├── access_badge.md
│   ├── access_control_list_(acl).md
│   ├── access_control_vestibule.md
│   ├── access_point_(ap).md
│   ├── access_restrictions.md
│   ├── accountability.md
│   ├── account_change_audit.md
│   ├── account.md
│   ├── active_directory_(ad).md
│   ├── active_packet_sniffing.md
│   ├── adaptive_identity.md
│   ├── address_resolution_protocol_(arp).md
│   ├── address_space_layout_randomization_(aslr).md
│   ├── ad_hoc_assessment.md
│   ├── advanced_encryption_standard_(aes).md
│   ├── advanced_package_tool_(apt).md
│   ├── advanced_persistent_threat_(apt).md
│   ├── adversarial_ai.md
│   ├── adversarial_tactics,_techniques,_and_common_knowledge_(att&ck).md
│   ├── adware.md
│   ├── aggregate_functions.md
│   ├── aircrack_ng.md
│   ├── air_gap.md
│   ├── alert.md
│   ├── algorithm.md
│   ├── alias.md
│   ├── alteration.md
│   ├── amplification_attack.md
│   ├── analysis.md
│   ├── and.md
│   ├── angler_phishing.md
│   ├── annual_loss_expectancy_(ale).md
│   ├── annual_rate_of_occurrence_(aro).md
│   ├── anomaly_based_detection.md
│   ├── anonymization.md
│   ├── antivirus_(av).md
│   ├── api_token.md
│   ├── application_allow_list_⁄_deny_list.md
│   ├── application.md
│   ├── application_programming_interface_(api).md
│   ├── application_security_monitoring.md
│   ├── archiving.md
│   ├── arch_linux.md
│   ├── argon2.md
│   ├── argument_(linux).md
│   ├── argument_(python).md
│   ├── armor_virus.md
│   ├── arp_poisoning.md
│   ├── artificial_intelligence_(ai).md
│   ├── asset_classification.md
│   ├── asset_inventory.md
│   ├── asset_lifecycle_management.md
│   ├── asset.md
│   ├── asset_ownership.md
│   ├── asset_tracking.md
│   ├── assign_and_reassign_variables_in_python.md
│   ├── asymmetric_encryption.md
│   ├── asynchronous_transfer_mode_(atm).md
│   ├── attack_surface.md
│   ├── attack_vector.md
│   ├── attestation.md
│   ├── attribute_based_access_control_(abac).md
│   ├── audit_checklist.md
│   ├── authentication,_authorization,_and_accounting_(aaa).md
│   ├── authentication_&_authorization_technologies.md
│   ├── authentication_header_(ah).md
│   ├── authentication.md
│   ├── authorization.md
│   ├── authorization_model.md
│   ├── automated_indicator_sharing_(ais).md
│   ├── automation.md
│   ├── autopsy.md
│   ├── availability.md
│   ├── backdoor.md
│   ├── backout_plan.md
│   ├── backup.md
│   ├── baiting.md
│   ├── bandwidth.md
│   ├── base16.md
│   ├── base64.md
│   ├── baseline.md
│   ├── basic_auth.md
│   ├── basic_filters_on_sql_queries.md
│   ├── basic_input_⧸_output_system_(bios).md
│   ├── basic_queries.md
│   ├── basic_service_set_identifier_(bssid).md
│   ├── basic_sql_query.md
│   ├── bcrypt.md
│   ├── best_practices_for_log_collection_and_management.md
│   ├── between.md
│   ├── binary_exploitation.md
│   ├── bind_shell.md
│   ├── biometrics.md
│   ├── birthday_attack.md
│   ├── bit.md
│   ├── blockchain.md
│   ├── block_cipher.md
│   ├── blowfish.md
│   ├── blueborne.md
│   ├── bluesmack.md
│   ├── bluesnarfing.md
│   ├── bluetooth.md
│   ├── bogus_dns.md
│   ├── bollards.md
│   ├── boolean.md
│   ├── bootkit.md
│   ├── bootloader.md
│   ├── boot_sector_virus.md
│   ├── border_gateway_protocol_(bgp).md
│   ├── botnet.md
│   ├── bourne_again_shell_(bash).md
│   ├── bourne_shell_(sh).md
│   ├── bracket_notation.md
│   ├── brand_impersonation.md
│   ├── breach.md
│   ├── bridge.md
│   ├── bridge_protocol_data_unit_(bpdu).md
│   ├── bring_your_own_device_(byod).md
│   ├── brute_force_attack.md
│   ├── buffer_overflow.md
│   ├── bug_bounty.md
│   ├── built_in_function.md
│   ├── burp_suite.md
│   ├── business_continuity_considerations.md
│   ├── business_continuity_plan_(bcp).md
│   ├── business_email_compromise_(bec).md
│   ├── business_impact_analysis_(bia).md
│   ├── business_partners_agreement_(bpa).md
│   ├── bus_topology.md
│   ├── c2_node.md
│   ├── cal.md
│   ├── capacity_planning.md
│   ├── captcha.md
│   ├── capture_the_flag_(ctf).md
│   ├── carriage_return_line_feed_(crlf)_injection.md
│   ├── cascading_style_sheets_(css).md
│   ├── cat,_echo_&_less.md
│   ├── cd.md
│   ├── cef_(common_event_format).md
│   ├── cellular_network.md
│   ├── center_for_internet_security_(cis).md
│   ├── centos.md
│   ├── central_processing_unit_(cpu).md
│   ├── certificate_authority_(ca).md
│   ├── certificate_of_destruction.md
│   ├── certificate_revocation_list_(crl).md
│   ├── certificate_signing_request_(csr).md
│   ├── chain_of_custody.md
│   ├── challenge_handshake_authentication_protocol_(chap).md
│   ├── change_management.md
│   ├── channel_service_unit_(csu).md
│   ├── checksum.md
│   ├── chmod_&_chown.md
│   ├── choose_your_own_device_(cyod).md
│   ├── chronicle.md
│   ├── cia_triad.md
│   ├── cipher_based_message_authentication_code_(cmac).md
│   ├── cipher_block_chaining_(cbc).md
│   ├── cipher_feedback_(cfb).md
│   ├── cipher_lock.md
│   ├── cipher.md
│   ├── ciphertext.md
│   ├── cissp_security_domains.md
│   ├── classless_inter_domain_routing_(cidr).md
│   ├── clear.md
│   ├── client_server_model.md
│   ├── clone_phishing.md
│   ├── closed_circuit_television_(cctv).md
│   ├── cloud_access_security_broker_(casb).md
│   ├── cloud_computing.md
│   ├── cloud_managed_access_points.md
│   ├── cloud_responsibility_matrix.md
│   ├── cloud_service_provider_(csp).md
│   ├── code_injection.md
│   ├── code.md
│   ├── code_signing.md
│   ├── cold_site.md
│   ├── combining_operators.md
│   ├── command_and_control_(c2).md
│   ├── command_injection.md
│   ├── command_line_interface_(cli).md
│   ├── command.md
│   ├── comma_separated_value_(csv).md
│   ├── comment.md
│   ├── common_event_format_(cef).md
│   ├── common_vulnerabilities_and_exposures_(cve).md
│   ├── common_vulnerability_scoring_system_(cvss).md
│   ├── communicate_effectively_with_stakeholders.md
│   ├── compare_operating_systems.md
│   ├── comparison_operators.md
│   ├── compliance.md
│   ├── compliance_monitoring.md
│   ├── compliance_reporting.md
│   ├── components_of_a_detection_signature.md
│   ├── computer_emergency_response_team_(cert).md
│   ├── computer_incident_response_team_(cirt).md
│   ├── conditional_statement.md
│   ├── confidentiality.md
│   ├── configuration_enforcement.md
│   ├── configuration_file.md
│   ├── containerization.md
│   ├── containment.md
│   ├── content_filtering.md
│   ├── content_management_system_(cms).md
│   ├── contingency_planning_(cp).md
│   ├── continuity_of_operations_planning_(coop).md
│   ├── continuous_integration.md
│   ├── continuous_learning_in_sql.md
│   ├── controlled_zone.md
│   ├── controller_based_access_point_(cap).md
│   ├── control_objectives.md
│   ├── control_plane.md
│   ├── cookie.md
│   ├── corporate_owned,_personally_enabled_(cope).md
│   ├── corrective_action_report_(car).md
│   ├── cost.md
│   ├── counter_mode_cbc_mac_protocol_(ccmp).md
│   ├── counter_mode_(ctm).md
│   ├── cp_&_mv.md
│   ├── credential_stuffing.md
│   ├── crossover_error_rate_(cer).md
│   ├── cross_site_request_forgery_(csrf).md
│   ├── cross_site_request_forgery_(csrf)_token.md
│   ├── cross_site_request.md
│   ├── cross_site_scripting_(xss).md
│   ├── crowdsourcing.md
│   ├── cryptographic_erasure.md
│   ├── cryptographic_key.md
│   ├── cryptography.md
│   ├── cryptojacking.md
│   ├── cso_online.md
│   ├── curl.md
│   ├── cve_numbering_authority_(cna).md
│   ├── cvss_metrics.md
│   ├── cyberchef.md
│   ├── cyberhac.md
│   ├── cybersecurity_insurance.md
│   ├── cyber_threat_framework_(ctf).md
│   ├── cyber_threat_intelligence_(cti).md
│   ├── cyclical_redundancy_check_(crc).md
│   ├── dark_web_intelligence.md
│   ├── dark_web.md
│   ├── database_administrator_(dba).md
│   ├── database.md
│   ├── data_center.md
│   ├── data_classifications.md
│   ├── data_encryption_standard_(des).md
│   ├── data_execution_prevention_(dep).md
│   ├── data_exfiltration.md
│   ├── data_governance_policy.md
│   ├── datagram_congestion_control_protocol_(dccp).md
│   ├── data_inventory.md
│   ├── data_lifecycle_stages.md
│   ├── data_loss_prevention_(dlp).md
│   ├── data_masking.md
│   ├── data.md
│   ├── data_minimization.md
│   ├── data_packet.md
│   ├── data_plane.md
│   ├── data_protection_policy.md
│   ├── data_retention.md
│   ├── data_roles.md
│   ├── data_sovereignty.md
│   ├── data_states.md
│   ├── data_structures.md
│   ├── data_subject.md
│   ├── data_types.md
│   ├── dd.md
│   ├── deauthentication_attack.md
│   ├── debian.md
│   ├── debugger.md
│   ├── debugging.md
│   ├── debug_mode.md
│   ├── decommissioning.md
│   ├── decoy_directories.md
│   ├── decryption.md
│   ├── deep_packet_inspection_(dpi).md
│   ├── default_credentials.md
│   ├── defense_in_depth.md
│   ├── demilitarized_zone_(dmz).md
│   ├── denial_of_service_(dos).md
│   ├── dependencies.md
│   ├── desktop_environment.md
│   ├── destination_network_address_translation_(dnat).md
│   ├── detection.md
│   ├── detection_tools_and_techniques.md
│   ├── determining_scan_frequency.md
│   ├── df_&_mount.md
│   ├── diameter.md
│   ├── dictionary_attack.md
│   ├── dictionary.md
│   ├── diff,_cmp_&_comm.md
│   ├── diffie_hellman_(dh).md
│   ├── diffie_hellman_ephemeral_(dhe).md
│   ├── digital_certificate.md
│   ├── digital_forensics.md
│   ├── digital_security_standard_(dss).md
│   ├── digital_signature_algorithm_(dsa).md
│   ├── digital_signature.md
│   ├── digital_subscriber_line_(dsl).md
│   ├── directory.md
│   ├── directory_traversal.md
│   ├── disassociation_attack.md
│   ├── disaster_recovery_plan_(drp).md
│   ├── disclosure.md
│   ├── discretionary_access_control_(dac).md
│   ├── distance_vector_routing_protocol_(dvrp).md
│   ├── distributed_denial_of_service_(ddos).md
│   ├── dll_injection.md
│   ├── dll_sideloading.md
│   ├── dns_filtering.md
│   ├── dns_over_https_(doh).md
│   ├── dns_poisoning.md
│   ├── dns_tunneling.md
│   ├── domain_based_message_authentication,_reporting,_and_conformance_(dmarc).md
│   ├── domain_hijacking.md
│   ├── domainkeys_identified_mail_(dkim).md
│   ├── domain.md
│   ├── domain_name_system_(dns).md
│   ├── downgrade_attack.md
│   ├── dpkg.md
│   ├── dropper.md
│   ├── due_diligence.md
│   ├── dumpster_diving.md
│   ├── dynamic_code_analysis.md
│   ├── dynamic_host_configuration_protocol_(dhcp).md
│   ├── dynamic_link_library_(dll).md
│   ├── dynamic_page_generation.md
│   ├── ease_of_deployment.md
│   ├── easter_egg.md
│   ├── eavesdropping.md
│   ├── e_discovery.md
│   ├── electronic_codebook_(ecb).md
│   ├── electronic_serial_number_(esn).md
│   ├── elliptic_curve_cryptography_(ecc).md
│   ├── elliptic_curve_diffie_hellman_(ecdh).md
│   ├── elliptic_curve_diffie_hellman_ephemeral_(ecdhe).md
│   ├── elliptic_curve_digital_signature_algorithm_(ecdsa).md
│   ├── email_header_injection.md
│   ├── email_phishing.md
│   ├── embedded_systems.md
│   ├── encapsulating_security_payload_(esp).md
│   ├── encapsulation.md
│   ├── encoding.md
│   ├── encrypted_virus.md
│   ├── encrypting_file_system_(efs).md
│   ├── encryption.md
│   ├── end_of_life_(eol).md
│   ├── end_of_service_life_(eosl).md
│   ├── endpoint_detection_and_response_(edr).md
│   ├── endpoint.md
│   ├── end_to_end_encryption_(e2ee).md
│   ├── enhanced_interior_gateway_routing_protocol_(eigrp).md
│   ├── enterprise_resource_planning_(erp).md
│   ├── enumeration.md
│   ├── enum.md
│   ├── environment_variable.md
│   ├── eric_parker.md
│   ├── escalation.md
│   ├── escalation_policy.md
│   ├── ethernet.md
│   ├── ettercap.md
│   ├── evil_twin.md
│   ├── exception.md
│   ├── exclusive_or_(xor).md
│   ├── exploitable_gaps_in_databases.md
│   ├── export.md
│   ├── exposure_factor_(ef).md
│   ├── extended_detection_and_response_(xdr).md
│   ├── extensible_authentication_protocol_(eap).md
│   ├── extensible_markup_language_(xml).md
│   ├── exterior_gateway_protocol_(egp).md
│   ├── fail_open_⁄_fail_closed.md
│   ├── failover.md
│   ├── false_acceptance_rate_(far).md
│   ├── false_flag_attack.md
│   ├── false_rejection_rate_(frr).md
│   ├── fast_re_route_(frr).md
│   ├── federal_information_processing_standards_(fips_140_3).md
│   ├── federal_information_security_management_act_(fisma).md
│   ├── federation.md
│   ├── fedramp.md
│   ├── fencing.md
│   ├── ferc_nerc.md
│   ├── fido2.md
│   ├── field_programmable_gate_array_(fpga).md
│   ├── file_integrity_monitoring_(fim).md
│   ├── fileless_exploits.md
│   ├── fileless_malware.md
│   ├── file_system_access_control_list_(facl).md
│   ├── filesystem_hierarchy_standard_(fhs).md
│   ├── file_transfer_protocol_(ftp).md
│   ├── file_transfer_protocol_secure_(ftps).md
│   ├── filter_content_in_linux.md
│   ├── filter_dates_and_numbers.md
│   ├── filtering.md
│   ├── filters_with_and,_or,_and_not.md
│   ├── firewall.md
│   ├── firmware.md
│   ├── float.md
│   ├── foreign_key.md
│   ├── frame_relay.md
│   ├── framework.md
│   ├── from.md
│   ├── full_outer_join.md
│   ├── full_packet_capture_(fpc).md
│   ├── function_(python).md
│   ├── functions_and_variables.md
│   ├── fuzzing.md
│   ├── galois_counter_mode_(gcm).md
│   ├── galois_message_authentication_code_(gmac).md
│   ├── gap_analysis.md
│   ├── general_data_protection_regulation_(gdpr).md
│   ├── generator.md
│   ├── generic_routing_encapsulation_(gre).md
│   ├── geofencing.md
│   ├── geolocation.md
│   ├── global_positioning_system_(gps).md
│   ├── gnu.md
│   ├── gnu_privacy_guard_(gpg).md
│   ├── gobuster.md
│   ├── graphical_user_interface_(gui).md
│   ├── grep.md
│   ├── group_policy_object_(gpo).md
│   ├── gtfobins.md
│   ├── guardrails.md
│   ├── hacker.md
│   ├── hackersploit.md
│   ├── hackthebox.md
│   ├── handshake.md
│   ├── hardening.md
│   ├── hardware_security_module_(hsm).md
│   ├── hash_based_message_authentication_code_(hmac).md
│   ├── hashcat.md
│   ├── hash_collision.md
│   ├── hashing.md
│   ├── hash_value.md
│   ├── header_manipulation.md
│   ├── head_&_tail.md
│   ├── health_information_trust_alliance_(hitrust).md
│   ├── health_insurance_portability_and_accountability_act_(hipaa).md
│   ├── hierarchical_database.md
│   ├── high_availability_(ha).md
│   ├── high_level_data_link_control_(hdlc).md
│   ├── hmac_based_one_time_password_(hotp).md
│   ├── hoaxes.md
│   ├── honeyfiles.md
│   ├── honeynet.md
│   ├── honeypot.md
│   ├── honeytokens.md
│   ├── host_based_firewall.md
│   ├── host_header_injection.md
│   ├── hosting_models.md
│   ├── hot_site.md
│   ├── how_to_read_a_wireshark_tcp_⁄_http_log.md
│   ├── html_injection.md
│   ├── hub.md
│   ├── hybrid_cloud.md
│   ├── hybrid_topology.md
│   ├── hypertext_markup_language_(html).md
│   ├── hypertext_transfer_protocol_(http).md
│   ├── hypertext_transfer_protocol_secure_(https).md
│   ├── hypervisor.md
│   ├── icmp_flood.md
│   ├── identity_and_access_management_(iam).md
│   ├── identity.md
│   ├── identity_proofing.md
│   ├── identity_provider_(idp).md
│   ├── ieee_802.11_(wi_fi).md
│   ├── ieee_802.1x.md
│   ├── ifconfig_&_traceroute.md
│   ├── immutable.md
│   ├── impersonation.md
│   ├── import_files_into_python.md
│   ├── import_modules_and_libraries_in_python.md
│   ├── improper_usage.md
│   ├── incident.md
│   ├── incident_response_plan_(irp).md
│   ├── incident_response_policy.md
│   ├── incorporating_comparison_operators.md
│   ├── indentation.md
│   ├── index.md
│   ├── indicators_of_attack_(ioa).md
│   ├── indicators_of_compromise_(ioc).md
│   ├── industrial_control_system_(ics).md
│   ├── infared_(ir).md
│   ├── influence_campagins.md
│   ├── information_privacy∶_regulations_and_compliance.md
│   ├── information_security_(infosec).md
│   ├── information_security_policy.md
│   ├── information_sharing_organization.md
│   ├── information_systems_security.md
│   ├── information_technology_(it).md
│   ├── infrastructure_as_a_service_(iaas).md
│   ├── infrastructure_as_code_(iac).md
│   ├── initialization_vector_(iv).md
│   ├── injection_attack.md
│   ├── inner_join.md
│   ├── input_sanitization.md
│   ├── input_validation.md
│   ├── insecure_protocols.md
│   ├── inside_operating_systems.md
│   ├── insider_threat.md
│   ├── instant_messaging_(im).md
│   ├── institute_of_electrical_and_electronics_engineers_(ieee).md
│   ├── integer.md
│   ├── integrated_development_environment_(ide).md
│   ├── integrity.md
│   ├── intermediate_distribution_frame_(idf).md
│   ├── intermediate_system_to_intermediate_system_(is_is).md
│   ├── international_data_encryption_algorithm_(idea).md
│   ├── international_organization_for_standardization_(iso).md
│   ├── internet_assigned_numbers_authority_(iana).md
│   ├── internet_control_message_protocol_(icmp).md
│   ├── internet_group_management_protocol_(igmp).md
│   ├── internet_key_exchange_(ike).md
│   ├── internet.md
│   ├── internet_message_access_protocol_(imap).md
│   ├── internet_message_access_protocol_secure_(imaps).md
│   ├── internet_of_things_(iot).md
│   ├── internet_protocol_(ip).md
│   ├── internet_protocol_security_(ipsec).md
│   ├── internet_relay_chat_(irc).md
│   ├── internet_service_provider_(isp).md
│   ├── interoperability.md
│   ├── interpreter.md
│   ├── interpreting_the_cvss_vector.md
│   ├── interpret_network_communications_with_packets.md
│   ├── introduction_to_databases.md
│   ├── intrusion_detection_system_(ids).md
│   ├── intrusion_prevention_system_(ips).md
│   ├── investigate_packet_details.md
│   ├── ip_address.md
│   ├── ip_spoofing.md
│   ├── iptables.md
│   ├── iso_∕_iec_270001.md
│   ├── iterative_statement.md
│   ├── jailbreaking_⁄_rooting.md
│   ├── javascript.md
│   ├── javascript_object_notation_(json).md
│   ├── john_the_ripper.md
│   ├── join_tables_in_sql.md
│   ├── journaling.md
│   ├── jump_server.md
│   ├── just_in_time_permissions.md
│   ├── kali_linux.md
│   ├── kerberos.md
│   ├── kerchoff’s_principle.md
│   ├── kernel_based_virtual_machine_(kvm).md
│   ├── key_derivation_function_(kdf).md
│   ├── key_distribution_center_(kdc).md
│   ├── key_encryption_key_(kek).md
│   ├── key_escrow.md
│   ├── key_exchange.md
│   ├── keylogger.md
│   ├── key_management_system.md
│   ├── key_rotation.md
│   ├── key_stretching.md
│   ├── krebs_on_security.md
│   ├── lateral_movement.md
│   ├── layer_2_tunneling_protocol_(l2tp).md
│   ├── ldap_injection.md
│   ├── least_privilege.md
│   ├── left_join.md
│   ├── legacy_platforms.md
│   ├── legal_hold.md
│   ├── library.md
│   ├── lighting.md
│   ├── lightweight_directory_access_protocol_(ldap).md
│   ├── lightweight_directory_access_protocol_secure_(ldaps).md
│   ├── lightweight_extensible_authentication_protocol_(leap).md
│   ├── like.md
│   ├── linux_architecture.md
│   ├── linux_commands_cheat_sheet.md
│   ├── linux_kernel.md
│   ├── linux.md
│   ├── linux_resources.md
│   ├── list_concatenation.md
│   ├── list.md
│   ├── lists_and_the_security_analyst.md
│   ├── living_off_the_land_(lol).md
│   ├── ln.md
│   ├── load_balancer.md
│   ├── loader.md
│   ├── local_area_network_(lan).md
│   ├── log_forwarders.md
│   ├── logic_bomb.md
│   ├── logic_error.md
│   ├── login_banner.md
│   ├── log_management.md
│   ├── log.md
│   ├── loopback_address.md
│   ├── lost_key_pairs.md
│   ├── ls.md
│   ├── mac_address.md
│   ├── machine_learning_(ml).md
│   ├── macos.md
│   ├── macro_virus.md
│   ├── mad_hat.md
│   ├── mail_gateway.md
│   ├── main_distribution_frame_(mdf).md
│   ├── maintain_awareness_with_network_monitoring.md
│   ├── malware_analysis.md
│   ├── malware.md
│   ├── managed_security_service_provider_(mssp).md
│   ├── managed_service_provider_(msp).md
│   ├── management_information_base_(mib).md
│   ├── mandatory_access_control_(mac).md
│   ├── man.md
│   ├── masquerading.md
│   ├── master_boot_record_(mbr).md
│   ├── master_service_agreement_(msa).md
│   ├── maximum_transmission_unit_(mtu).md
│   ├── mean_time_between_failures_(mtbf).md
│   ├── mean_time_to_failure_(mttf).md
│   ├── mean_time_to_recover_(mttr).md
│   ├── media_access_control_(mac).md
│   ├── memorandum_of_agreement_(moa).md
│   ├── memorandum_of_understanding_(mou).md
│   ├── memory_injection.md
│   ├── memory_(ram).md
│   ├── mesh_access_points.md
│   ├── mesh_topology.md
│   ├── message_authentication_code_(mac).md
│   ├── message_digest_5_(md5).md
│   ├── message_integrity_code_(mic).md
│   ├── metadata.md
│   ├── metamorphic_virus.md
│   ├── metasploit.md
│   ├── method.md
│   ├── metrics.md
│   ├── metropolitan_area_network_(man).md
│   ├── microservice_architecture.md
│   ├── microsoft_challenge_handshake_authentication_protocol_(mschap).md
│   ├── misconfiguration.md
│   ├── misinformation_and_disinformation.md
│   ├── mkdir.md
│   ├── mobile_device_management_(mdm).md
│   ├── modem.md
│   ├── module.md
│   ├── monitoring_as_a_service_(maas).md
│   ├── monolithic_architecture.md
│   ├── more_about_regular_expressions.md
│   ├── more_on_conditionals_in_python.md
│   ├── more_on_filters_with_and,_or,_and_not.md
│   ├── more_on_loops_in_python.md
│   ├── motherboard.md
│   ├── multi_factor_authentication_(mfa).md
│   ├── multifunction_device_(mfd).md
│   ├── multifunction_printer_(mfp).md
│   ├── multimedia_message_service_(mms).md
│   ├── multipartite_virus.md
│   ├── multi_protocol_label_switching_(mpls).md
│   ├── nano.md
│   ├── national_institute_of_standards_and_technology_(nist).md
│   ├── near_field_communication_(nfc).md
│   ├── need_to_know.md
│   ├── netcat.md
│   ├── netflow.md
│   ├── network_access_control_(nac).md
│   ├── network_address_translation_(nat).md
│   ├── network_attached_storage_(nas).md
│   ├── network_based_firewall.md
│   ├── networkchuck.md
│   ├── network_configuration_protocol_(netconf).md
│   ├── network_database.md
│   ├── network_hardening.md
│   ├── network_hardening_tools.md
│   ├── network_interface_card_(nic).md
│   ├── network.md
│   ├── network_protocol_analyzer.md
│   ├── network_protocol.md
│   ├── network_security_applications.md
│   ├── network_security_policy.md
│   ├── network_segmentation.md
│   ├── network_stack.md
│   ├── network_time_protocol_(ntp).md
│   ├── network_traffic.md
│   ├── network_virtual_appliance_(nva).md
│   ├── new_technology_file_system_(ntfs).md
│   ├── new_technology_lan_manager_(ntlm).md
│   ├── next_generation_firewall_(ngfw).md
│   ├── nftables.md
│   ├── nist_cybersecurity_framework_(csf).md
│   ├── nist_incident_response_lifecycle.md
│   ├── nist_risk_management_framework_(rmf).md
│   ├── nist_special_publication_(s.p.)_800_53.md
│   ├── nixos.md
│   ├── nmap.md
│   ├── nonce.md
│   ├── non_disclosure_agreement_(nda).md
│   ├── non_repudiation_and_hashing.md
│   ├── non_repudiation.md
│   ├── nosql_injection.md
│   ├── not.md
│   ├── oauth.md
│   ├── obfuscation.md
│   ├── object_identifier_(oid).md
│   ├── object.md
│   ├── ocsp_stapling.md
│   ├── one_time_password_(otp).md
│   ├── online_certificate_status_protocol_(ocsp).md
│   ├── on_path_attack.md
│   ├── on_path_browser_attack.md
│   ├── openid_connect.md
│   ├── openid.md
│   ├── open_shortest_path_first_(ospf).md
│   ├── open_shortest_path_first_version_3_(ospfv3).md
│   ├── open_source_intelligence_(osint).md
│   ├── open_source.md
│   ├── openssl.md
│   ├── opensuse.md
│   ├── open_systems_interconnection_(osi)_model.md
│   ├── open_vulnerability_and_assessment_language_(oval).md
│   ├── operating_system_(os).md
│   ├── operational_technology_(ot).md
│   ├── operator.md
│   ├── operators_for_filtering_dates_and_numbers.md
│   ├── operators.md
│   ├── ophcrack.md
│   ├── order_by.md
│   ├── or.md
│   ├── out_of_bounds_write.md
│   ├── over_the_air_(ota).md
│   ├── overview_of_detection_tools.md
│   ├── overview_of_tcmdump.md
│   ├── package_management_tool.md
│   ├── package_manager.md
│   ├── package.md
│   ├── package_monitoring.md
│   ├── packet_capture_(pcap).md
│   ├── packet_captures_with_tcpdump.md
│   ├── packet_mirroring.md
│   ├── packet_sniffing.md
│   ├── parallel_processing.md
│   ├── parameter_(python).md
│   ├── parameters.md
│   ├── parrotos.md
│   ├── parsing.md
│   ├── passive_packet_sniffing.md
│   ├── passkey.md
│   ├── pass_the_hash_(pth)_attack.md
│   ├── passwd.md
│   ├── password_authentication_protocol_(pap).md
│   ├── password_based_key_derivation_function_2_(pbkdf2).md
│   ├── passwordless_authentication.md
│   ├── password_manager.md
│   ├── password.md
│   ├── password_policy.md
│   ├── password_spraying.md
│   ├── password_vault.md
│   ├── path_hijacking.md
│   ├── payment_card_industry_data_security_standard_(pci_dss).md
│   ├── peer_to_peer_model.md
│   ├── peer_to_peer_(p2p).md
│   ├── penetration_test.md
│   ├── pen_test_classification.md
│   ├── pen_testing_strategies.md
│   ├── perfect_forward_secrecy_(pfs).md
│   ├── peripheral_devices.md
│   ├── permission_commands_(linux).md
│   ├── permissions.md
│   ├── personal_area_network_(pan).md
│   ├── personal_electronic_device_(ped).md
│   ├── personal_identity_verification_(piv).md
│   ├── personally_identifiable_information_(pii).md
│   ├── phases_of_pen_tests.md
│   ├── phishing.md
│   ├── piggybacking.md
│   ├── ping_of_death.md
│   ├── pipe.md
│   ├── pkcs_12_(p12).md
│   ├── plain_old_telephone_service_(pots).md
│   ├── plaintext.md
│   ├── platform_as_a_service_(paas).md
│   ├── playbook.md
│   ├── pluggable_authentication_modules_(pam).md
│   ├── pointer.md
│   ├── point_to_point_protocol_(ppp).md
│   ├── point_to_point_tunneling_protocol_(pptp).md
│   ├── policy_administrator.md
│   ├── policy_based_access_control_(pbac).md
│   ├── policy_decision_point_(pdp).md
│   ├── policy_enforcement_point_(pep).md
│   ├── policy_engine.md
│   ├── policy.md
│   ├── polymorphic_virus.md
│   ├── port_address_translation_(pat).md
│   ├── port_filtering.md
│   ├── port_forwarding.md
│   ├── port.md
│   ├── port_mirroring.md
│   ├── port_triggering.md
│   ├── post_office_protocol_(pop).md
│   ├── post_office_protocol_version_3_secure_(pop3s).md
│   ├── posture_assessment.md
│   ├── potentially_unwanted_application_(pua).md
│   ├── potentially_unwanted_program_(pup).md
│   ├── power_distribution_unit_(pdu).md
│   ├── power_on_self_test_(post).md
│   ├── powershell.md
│   ├── power_supply.md
│   ├── prepared_statement.md
│   ├── pre_shared_key_(psk).md
│   ├── pretexting.md
│   ├── pretty_good_privacy_(pgp).md
│   ├── primary_key.md
│   ├── principle.md
│   ├── privacy_enhanced_mail_(pem).md
│   ├── private_branch_exchange_(pbx).md
│   ├── private_key.md
│   ├── privilege_audit.md
│   ├── privileged_access_management_(pam).md
│   ├── privilege_escalation.md
│   ├── process_hollowing.md
│   ├── process_of_attack_simulation_and_threat_analysis_(pasta).md
│   ├── professor_messer.md
│   ├── program_virus.md
│   ├── proprietary_intelligence.md
│   ├── protected_extensible_authentication_protocol_(peap).md
│   ├── protected_health_information_(phi).md
│   ├── proxy_auto_configuration_(pac).md
│   ├── proxy_server.md
│   ├── ps,_kill_&_killall.md
│   ├── public_key_cryptography_standards_(pkcs).md
│   ├── public_key_infrastructure_(pki).md
│   ├── public_key.md
│   ├── pwd.md
│   ├── pyramid_of_pain.md
│   ├── python_and_cybersecurity.md
│   ├── python_environments.md
│   ├── python_functions_in_cybersecurity.md
│   ├── python.md
│   ├── quality_of_service_(qos).md
│   ├── query_a_database.md
│   ├── query.md
│   ├── query_minimization.md
│   ├── quid_pro_quo.md
│   ├── race_condition.md
│   ├── race_integrity_primitive_evaluation_message_digest_(ripemd).md
│   ├── radio_frequency_identification_(rfid).md
│   ├── radio_frequency_(rf)_jamming.md
│   ├── radio_frequency_(rf).md
│   ├── rainbow_table.md
│   ├── ransomware.md
│   ├── rapid_application_development_(rad).md
│   ├── r_⁄_cybersecurity.md
│   ├── real_life_ddos_attack.md
│   ├── real_time_operating_system_(rtos).md
│   ├── real_time_transport_protocol_(rtp).md
│   ├── reconnaissance.md
│   ├── recovery_agent_(ra).md
│   ├── recovery.md
│   ├── recovery_point_objective_(rpo).md
│   ├── recovery_testing.md
│   ├── recovery_time_objective_(rto).md
│   ├── red,_blue_&_purple_teams.md
│   ├── red_hat_enterprise_linux_(rhel).md
│   ├── redirection_(linux).md
│   ├── redundant_array_of_independent_disks_(raid).md
│   ├── reference_guide_sql.md
│   ├── reflection_attack.md
│   ├── registration_authority_(ra).md
│   ├── regular_expression_(regex).md
│   ├── regulation.md
│   ├── relational_database_management_system_(rdbms).md
│   ├── relational_database.md
│   ├── relative_file_path.md
│   ├── reliable_user_datagram_protocol_(rudp).md
│   ├── relying_party_(rp).md
│   ├── remote_access_policy.md
│   ├── remote_access_server_(ras).md
│   ├── remote_access_trojan_(rat).md
│   ├── remote_authentication_dial_in_user_service_(radius).md
│   ├── remote_code_execution_(rce).md
│   ├── remote_desktop_protocol_(rdp).md
│   ├── remotely_triggered_black_hole_(rtbh).md
│   ├── replay_attack.md
│   ├── replication.md
│   ├── reporting.md
│   ├── research_and_development_in_advanced_communications_technologies_in_europe_(race).md
│   ├── resilience.md
│   ├── resource_reuse.md
│   ├── responsible_disclosure_program.md
│   ├── responsiveness.md
│   ├── restricted_zone.md
│   ├── r_⁄_ethicalhacking.md
│   ├── return_on_investment_(roi).md
│   ├── return_statement.md
│   ├── reverse_address_resolution_protocol_(rarp).md
│   ├── reverse_engineering.md
│   ├── reverse_shell.md
│   ├── right_join.md
│   ├── right_to_audit_clause.md
│   ├── r_⁄_infosec.md
│   ├── ring_topogoly.md
│   ├── risk_appetite.md
│   ├── risk_assessment.md
│   ├── risk_based_authentication_(rba).md
│   ├── risk_identification.md
│   ├── risk_management.md
│   ├── risk.md
│   ├── risk_register.md
│   ├── risk_report.md
│   ├── risk_tolerance.md
│   ├── risk_transference.md
│   ├── rivest_cipher_4_(rc4).md
│   ├── rivest_cipher_5_(rc5).md
│   ├── rivest_cipher_6_(rc6).md
│   ├── rivest_shamir_adleman_(rsa).md
│   ├── rm.md
│   ├── r_⁄_netsec.md
│   ├── role_based_access_control_(rbac).md
│   ├── roles_in_response.md
│   ├── root_cause_analysis_(rca).md
│   ├── root_directory.md
│   ├── rootkit.md
│   ├── root_of_trust.md
│   ├── router.md
│   ├── routing_information_protocol_(rip).md
│   ├── routing_information_protocol_version_2_(ripv2).md
│   ├── rule_based_access_control_(rbac).md
│   ├── rules_of_engagement_(roe).md
│   ├── salting.md
│   ├── sandbox.md
│   ├── sanitization.md
│   ├── scalability.md
│   ├── scanner_maintenance.md
│   ├── scareware.md
│   ├── script.md
│   ├── scrypt.md
│   ├── search_methods_with_siem_tools.md
│   ├── search_processing_language_(spl).md
│   ├── secure_access_service_edge_(sase).md
│   ├── secure_boot.md
│   ├── secure_cookies.md
│   ├── secure_enclave.md
│   ├── secure_hash_algorithm_1_(sha_1).md
│   ├── secure_hash_algorithm_2_(sha_2).md
│   ├── secure_hash_algorithm_3_(sha_3).md
│   ├── secure_hypertext_transfer_protocol_(shttp).md
│   ├── secure_⁄_multipurpose_internet_mail_extensions_(s_⁄_mime).md
│   ├── secure_real_time_transport_protocol_(srtp).md
│   ├── secure_shell_(ssh).md
│   ├── secure_sockets_layer_(ssl).md
│   ├── secure_socket_tunneling_protocol_(sstp).md
│   ├── secure_the_cloud.md
│   ├── secure_web_gateway_(swg).md
│   ├── security_assertion_markup_language_(saml).md
│   ├── security_assessment.md
│   ├── security_audits.md
│   ├── security_baselines.md
│   ├── security_content_automation_protocol_(scap).md
│   ├── security_controls.md
│   ├── security_guards.md
│   ├── security_guidelines_in_action.md
│   ├── security_information_and_event_management_(siem).md
│   ├── security_key.md
│   ├── security_measure.md
│   ├── security_operations_center_(soc).md
│   ├── security_orchestration,_automation,_response_(soar).md
│   ├── security_posture.md
│   ├── security_zones.md
│   ├── select.md
│   ├── self_encrypting_drives_(sed).md
│   ├── self_signed_certificate.md
│   ├── selinux.md
│   ├── sender_policy_framework_(spf).md
│   ├── sensitive_personally_identifiable_information_(spii).md
│   ├── sensors.md
│   ├── separation_of_duties_(sod).md
│   ├── server_clustering.md
│   ├── serverless_architecture.md
│   ├── server.md
│   ├── server_message_block_(smb).md
│   ├── service_level_agreement_(sla).md
│   ├── service.md
│   ├── service_set_identifier_(ssid).md
│   ├── session_fixation.md
│   ├── session_hijacking.md
│   ├── session_id.md
│   ├── session_key.md
│   ├── session.md
│   ├── session_timeout.md
│   ├── set.md
│   ├── set_user_id_(suid).md
│   ├── shared_responsibility.md
│   ├── shellcode.md
│   ├── shell_scripting.md
│   ├── shim.md
│   ├── short_message_service_(sms).md
│   ├── shoulder_surfing.md
│   ├── side_channel_attacks.md
│   ├── sideloading.md
│   ├── signature_based_detection.md
│   ├── simple_certificate_enrollment_protocol_(scep).md
│   ├── simple_mail_transfer_protocol_(smtp).md
│   ├── simple_main_transfer_protocol_secure_(smtps).md
│   ├── simple_network_management_protocol_(snmp).md
│   ├── simple_object_access_protocol_(soap).md
│   ├── simulation.md
│   ├── simultaneous_authentication_of_equals_(sae).md
│   ├── single_loss_expectancy_(sle).md
│   ├── single_sign_on_(sso).md
│   ├── site_survey.md
│   ├── smishing.md
│   ├── smurf_attack.md
│   ├── snapshot.md
│   ├── social_engineering.md
│   ├── social_engineering_policy.md
│   ├── social_media_phishing.md
│   ├── software_as_a_service_(saas).md
│   ├── software_defined_networking_(sdn).md
│   ├── software_defined_wide_area_network_(sd_wan).md
│   ├── software_development_kit_(sdk).md
│   ├── software_development_life_cycle_methodology_(sdlm).md
│   ├── software_development_lifecycle_(sdlc).md
│   ├── software_update.md
│   ├── sort.md
│   ├── spam_over_internet_messaging_(spim).md
│   ├── spear_phishing.md
│   ├── speed.md
│   ├── splunk_cloud.md
│   ├── splunk_enterprise.md
│   ├── spyware.md
│   ├── sql_cheat_sheet.md
│   ├── sql_injection_(sqli).md
│   ├── ssh_file_transfer_protocol_(sftp).md
│   ├── ssh.md
│   ├── ssl_stripping.md
│   ├── standalone_access_point.md
│   ├── standard_error.md
│   ├── standard_error_(stderr).md
│   ├── standard_input_(stdin).md
│   ├── standard.md
│   ├── standard_output_(stdout).md
│   ├── star_topology.md
│   ├── statement_of_work_(sow).md
│   ├── static_code_analyzer.md
│   ├── stealth_virus.md
│   ├── steganography.md
│   ├── storage_area_network_(san).md
│   ├── stream_cipher.md
│   ├── stream_control_transmission_protocol_(sctp).md
│   ├── string_concatenation.md
│   ├── string.md
│   ├── strings_and_the_security_analyst.md
│   ├── structured_exception_handler_(seh).md
│   ├── structured_query_language_(sql).md
│   ├── structured_threat_information_expression_(stix).md
│   ├── style_guide.md
│   ├── subject_alternative_name_(san).md
│   ├── subnet.md
│   ├── subnetting.md
│   ├── subscriber_identity_module_(sim).md
│   ├── substring.md
│   ├── sudoers_file.md
│   ├── sudo.md
│   ├── summarizing_cvss_scores.md
│   ├── supervisory_control_and_data_acquisition_(scada).md
│   ├── supply_chain_analysis.md
│   ├── supply_chain_attack.md
│   ├── suricata.md
│   ├── switched_port_analyzer_(span).md
│   ├── switch.md
│   ├── symmetric_encryption.md
│   ├── syn_flood.md
│   ├── syntax_error.md
│   ├── syntax.md
│   ├── syslog.md
│   ├── system_and_organization_controls_(soc)_reports.md
│   ├── system_hardening.md
│   ├── system_on_chip_(soc).md
│   ├── tabletop_exercise.md
│   ├── tactics,_techniques,_and_procedures_(ttp).md
│   ├── tailgating.md
│   ├── tar,_zip_&_unzip.md
│   ├── tcpdump_cheat_sheet.md
│   ├── tcpdump.md
│   ├── tcp_⁄_ip_model.md
│   ├── technical_debt.md
│   ├── telemetry.md
│   ├── telnet.md
│   ├── temporal_key_integrity_protocol_(tkip).md
│   ├── terminal_access_controller_access_control_system_plus_(tacacs+).md
│   ├── test_access_point_(tap).md
│   ├── thc_hydra.md
│   ├── the_containment,_eradication,_and_recovery_phase_of_the_lifecycle.md
│   ├── the_evolution_of_hash_functions.md
│   ├── the_hacker_news.md
│   ├── the_owasp_top_10.md
│   ├── the_pc_security_channel.md
│   ├── the_triage_process.md
│   ├── the_value_of_documentation.md
│   ├── the_where_clause_and_basic_operators.md
│   ├── threat_actor.md
│   ├── threat_hunting.md
│   ├── threat_intelligence.md
│   ├── threat_landscape.md
│   ├── threat.md
│   ├── threat_modeling.md
│   ├── ticket_granting_ticket_(tgt).md
│   ├── time_based_one_time_password_(totp).md
│   ├── time_of_check_to_time_of_use_(toctou).md
│   ├── tokenization.md
│   ├── tokens.md
│   ├── top.md
│   ├── topology.md
│   ├── touch.md
│   ├── transaction_signature_(tsig).md
│   ├── transmission_control_protocol_(tcp).md
│   ├── transport_layer_security_(tls).md
│   ├── triage.md
│   ├── triple_des_(3des).md
│   ├── trivial_file_transfer_protocol_(tftp).md
│   ├── trojan_horse.md
│   ├── trunking.md
│   ├── trusted_automated_exchange_of_indicator_information_(taxii).md
│   ├── trusted_platform_module_(tpm).md
│   ├── tryhackme.md
│   ├── tuple.md
│   ├── twofish.md
│   ├── type_error.md
│   ├── types_of_joins.md
│   ├── typo_squatting.md
│   ├── ubuntu.md
│   ├── udp_flood.md
│   ├── unauthorized_access.md
│   ├── uncontrolled_zone.md
│   ├── unified_access_points.md
│   ├── unified_endpoint_management_(uem).md
│   ├── unified_extensible_firmware_interface_(uefi).md
│   ├── unified_threat_management_(utm).md
│   ├── uniform_resource_identifier_(uri).md
│   ├── uninterruptible_power_supply_(ups).md
│   ├── universal_resource_locator_(url).md
│   ├── universal_serial_bus_(usb).md
│   ├── unmanned_aerial_vehicle_(uav).md
│   ├── unshielded_twisted_pair_(utp).md
│   ├── unskilled_attacker.md
│   ├── url_scanning.md
│   ├── usage_audit.md
│   ├── usb_on_the_go_(usb_otg).md
│   ├── user_acceptance_testing_(uat).md
│   ├── user_access_reviews.md
│   ├── useradd_&_usermod.md
│   ├── user_behavior_analytics_(uba).md
│   ├── user_datagram_protocol_(udp).md
│   ├── user_interface.md
│   ├── user.md
│   ├── user_provisioning.md
│   ├── variable_length_subnet_masking_(vlsm).md
│   ├── variables.md
│   ├── vendor_management_policy.md
│   ├── vendor_monitoring.md
│   ├── version_control.md
│   ├── video_teleconferencing_(vtc).md
│   ├── virtual_desktop_environment_(vde).md
│   ├── virtual_desktop_infrastructure_(vdi).md
│   ├── virtual_hosting.md
│   ├── virtualization.md
│   ├── virtual_local_area_networks_(vlan).md
│   ├── virtual_machine_escape.md
│   ├── virtual_machine_(vm).md
│   ├── virtual_private_cloud_(vpc).md
│   ├── virtual_private_network_(vpn).md
│   ├── virus.md
│   ├── virustotal.md
│   ├── vishing.md
│   ├── visual_basic_(vb).md
│   ├── voice_over_internet_protocol_(voip).md
│   ├── void_linux.md
│   ├── void.md
│   ├── vulnerability_assessment.md
│   ├── vulnerability_life_cycle.md
│   ├── vulnerability.md
│   ├── vulnerability_scanning.md
│   ├── vulnerability_scanning_tools.md
│   ├── warm_site.md
│   ├── watering_hole_attack.md
│   ├── web_application_firewall_(waf).md
│   ├── web_application.md
│   ├── web_based_exploits.md
│   ├── webcrawler.md
│   ├── web_shell.md
│   ├── wget.md
│   ├── whaling.md
│   ├── whereis_&_whatis.md
│   ├── where.md
│   ├── whoami.md
│   ├── wide_area_network_(wan).md
│   ├── wi_fi_protected_access_iii_(wpa3).md
│   ├── wi_fi_protected_access_ii_(wpa2).md
│   ├── wi_fi_protected_access_(wpa).md
│   ├── wi_fi_protected_setup_(wps).md
│   ├── wildcard_certificate.md
│   ├── wildcard.md
│   ├── wildcard_(sql).md
│   ├── window_manager.md
│   ├── windows.md
│   ├── wired_equivalent_privacy_(wep).md
│   ├── wireguard.md
│   ├── wireless_jamming.md
│   ├── wireless_lan_controller_(wlc).md
│   ├── wireless_local_area_network_(wlan).md
│   ├── wireless_transport_layer_security_(wtls).md
│   ├── wireshark.md
│   ├── wordlist.md
│   ├── work_order_(wo).md
│   ├── workstation.md
│   ├── world_writable_file.md
│   ├── worm.md
│   ├── x.500.md
│   ├── x.509.md
│   ├── xml_injection.md
│   ├── xpath_injection.md
│   ├── yara_l.md
│   ├── yellowdog_updater_modified_(yum).md
│   ├── zero_day.md
│   ├── zero_trust.md
│   ├── zigbee.md
│   └── zombie.md
└── README.md

2 directories, 1227 files

About

1,000+ interconnected cybersecurity notes built in Neovim, complete with tags and links. Designed for both learning and long-term knowledge management.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors