Skip to content

Home

This repository contains structurally organized, security related quick references, cheat-sheets, and resources maintained by ayomawdb.

Please check different categories for more details.

Home page is reserved mainly to list down pending analysis and pending research items, and also to point to other similar security related knowledge bases.

Training Platforms

Cheatsheets

curl https://cht.sh/:cht.sh | sudo tee /usr/local/bin/cht.sh
chmod +x /usr/local/bin/cht.sh

mkdir ~/.bash.d
curl https://cheat.sh/:bash_completion > ~/.bash.d/cht.sh
chmod +x ~/.bash.d/cht.sh
. ~/.bash.d/cht.sh
# and add . ~/.bash.d/cht.sh to ~/.bashrc

mkdir  ~/.zsh.d
curl https://cheat.sh/:zsh > ~/.zsh.d/_cht
echo 'fpath=(~/.zsh.d/ $fpath)' >> ~/.zshrc

Day-to-day Tools

Other Collections

Blogs

POC Repos

Important files

Podcasts

Graphs

Pending Analysis CVEs

  • Cisco
    • CVE-2019-1653 - Allows a remote attacker to get sensitive device configuration details without a password.
    • CVE-2019-1652 - Allows a remote attacker to inject and run admin commands on the device without a password.
  • EternalRomance (MS17-010)
  • Stuxnet CVEs

Pending Analysis Tweets

Pending Analysis Tools

Discord Channels

VMS

ATT&CK

Buy

Pending DIY Projects

Web

Tools

Pending Reads

Analysis of following malware: * Badrabbit * NotPetya * Lazarus * https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf

VPN Services: * NordVPN * MonoVM

Local Security Experts

Scripts

tr -s ' ' | tr '\t' ' ' | sed 's/:/ |/' | sed 's/- /| /' | sed -e 's/$/ |/'

Tools

Incidence Response

Webinars

Completed Courses