Cybersecurity and AI Resources by Omar Santos
Index
Initializing search
Cybersecurity and AI Resources by Omar Santos
Home
About Omar
SCOR
SCOR
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
What is 802.1X?
Access Control: Understanding Attribute-Based Access Control (ABAC)
Change of Authorization (CoA)
Additional Information about Cisco FTD Clustering
A Few GETVPN References
Collection of Cisco IPsec VPN Example Configurations and Troubleshooting Guides
RADIUS, TACACS+, and Diameter
Traditional Networking Planes and Introduction to Software Defined Networking
Remote Access and Site-to-site VPN Troubleshooting References
VXLANs
YANG NETCONF RESTCONF
Content security fundamentals
Integrating Development, Operations, and Security: A Guide to DevOps, CI/CD, and DevSecOps
Kubernetes Resources
Python and Programmability Tutorials and Labs in DevNet
Cisco Platform Exchange Grid (pxGrid)
Serverless Computing: Revolutionizing Application Development and Deployment
SMTP Authentication, Encryption, and DKIM
Configuring WCCP or Policy-Based Routing to Send Traffic to WSA
Tips and Resources about Zone-based Firewalls
Adversarial emulation
Adversarial emulation
Adversarial Emulation Tools
Ai research
Ai research
AI Security Research Resources
AI Coding Tools
AI Security Tools
Model security testing
AI monitoring tools
Prompt Engineering and Templates
AI for Incident Response
AI for Incident Response
Dynamic Obfuscation of Attack Vectors
GPTs
GPTs
Cybersecurity GPTs and Colab Notebooks
LLM frameworks
LLM frameworks
LLM Frameworks
LangChain
LangChain
LangChain Resources
ML Fundamentals
ML Fundamentals
Examples of AI and machine learning applications and use cases
Supervised, Unsupervised, and Reinforcement Learning
AI Model Exchanges
Several Resources and "Cheat Sheets"
A glossary for AI-related terms:
Introduction to LLMs and SLMs
Datasets for AI / ML Research
Introduction to Vector Databases
Ai generated
Ai generated
AI Generated Content
Data
Data
AI Generated Articles
Actor-Critic Methods
Association Rules: Apriori and FP-Growth
What is DBSCAN?
Decision Trees: Understanding the Basics
Gaussian Mixture Models (GMM)
Gradient Boosting Machines (GBM)
Independent Component Analysis (ICA)
Latent Dirichlet Allocation (LDA)
Monte Carlo Tree Search (MCTS)
Naïve Bayes
Neural Networks: Unlocking the Power of Artificial Intelligence
Policy Gradients
Principal Component Analysis (PCA)
Proximal Policy Optimization (PPO)
Random Forests
SARSA: An Introduction to Reinforcement Learning
Support Vector Machines (SVM)
Temporal Difference Learning (TD Learning)
Trust Region Policy Optimization (TRPO)
Understanding k-Nearest Neighbors (k-NN)
t-SNE: Dimentionality Reduction Technique
Ai generated python scripts
Ai generated python scripts
Actor Critic Methods
Association Rules (Apriori, FP Growth)
DBSCAN
Decision Trees
Gaussian Mixture Models (GMM)
Gradient Boosting Machines (GBM)
Independent Component Analysis (ICA)
Latent Dirichlet Allocation (LDA)
Monte Carlo Tree Search (MCTS)
Naïve Bayes
Neural Networks
Policy Gradients
Principal Component Analysis (PCA)
Proximal Policy Optimization (PPO)
Random Forests
SARSA
Support Vector Machines (SVM)
Temporal Difference Learning (TD Learning)
Trust Region Policy Optimization (TRPO)
k Nearest Neighbors (k NN)
t SNE
Use cases
Use cases
Use Cases
How AI is Revolutionizing 3D Printing
How AI is Revolutionizing Agriculture
How AI is Revolutionizing Astronomical Research
How AI is Revolutionizing Augmented Reality (AR)
How AI is Helping and Revolutionizing: Autonomous Drones
How AI is Revolutionizing Bioinformatics
AI Revolutionizing Chatbots and Virtual Assistants
How AI is Revolutionizing Content Creation
How AI is Helping and Revolutionizing Credit Scoring
How AI is Revolutionizing Customer Segmentation
How AI is Revolutionizing Cybersecurity
AI Revolutionizing Drug Discovery
How AI is Revolutionizing E-commerce Visual Recognition
How AI is Revolutionizing E-learning Platforms
How AI is Revolutionizing Elderly Care Robotics
How AI is Revolutionizing Energy Consumption Optimization
How AI is Revolutionizing Facial Recognition
How AI is Revolutionizing Fraud Detection
How AI is Revolutionizing Handwriting Recognition
The Role of AI in Revolutionizing Healthcare Diagnosis
How AI is Revolutionizing Human Resources (HR)
AI Revolutionizing Language Learning Apps
How AI is Revolutionizing Language Translation Services
How AI is Revolutionizing Learning Analytics in Education
AI Revolutionizing Legal Document Analysis
How AI is Revolutionizing Natural Language Processing (NLP)
How AI is Revolutionizing Online Gaming
How AI is Revolutionizing Personalized Marketing
How AI is Revolutionizing Predictive Analytics
How AI is Revolutionizing Predictive Maintenance
How AI is Revolutionizing Recommendation Systems
AI Revolutionizing Retail Inventory Management
How AI is Revolutionizing Robotics in Manufacturing
How AI is Revolutionizing Search Engine Optimization (SEO)
How AI is Revolutionizing Seismic Interpretation
How AI is Revolutionizing Self-Driving Cars
How AI is Helping and Revolutionizing Sentiment Analysis
How AI is Revolutionizing Simulation and Modeling
AI Revolutionizing Smart Agriculture
How AI is Revolutionizing Smart Grids
How AI is Revolutionizing Smart Home Devices
How AI is Revolutionizing Social Media Monitoring
How AI is Revolutionizing Speech Recognition
How AI is Revolutionizing Supply Chain Optimization
How AI is Revolutionizing Telemedicine
How AI is Revolutionizing Traffic Management
How AI is Revolutionizing Virtual Reality (VR)
How AI is Revolutionizing Voice-Activated Assistants
AI Revolutionizing Waste Management
How Artificial Intelligence is Revolutionizing Weather Forecasting
RAG
RAG
RAG Resources
Server-Side Request Forgery Prevention Cheat Sheet
Ai risk management
Ai risk management
AI Risk Management Frameworks and AI Security Resources
Detecting AI Usage Within a Company: Strategies and Best Practices
Ethics privacy
Ethics privacy
AI Ethics and Privacy Resources
Fine tuning
Fine tuning
Fine-Tuning Tips
Labs
Labs
Different Labs for Omar's O'Reilly Live Training
Using the OpenAI API with Python
Using Gorilla CLI
Lab Guide: Natural Language Processing with NLTK/Spacy
Machine Learning Basics with Scikit-learn
Lab Guide: Image Recognition with TensorFlow and Keras
Open interpreter examples
Open interpreter examples
Secretcorp
Prompt engineering
Prompt engineering
Prompt Engineering Resources
Bug bounty prompt generator
Bug bounty prompt generator
AI Prompt Generator for Bug Bounty Vulnerabilities
Prompt injection
Prompt injection
Prompt Injection
Training environment security
Training environment security
Securing AI Training and Fine-Tuning Environments
Vector databases
Vector databases
Vector Databases
Buffer overflow example
Buffer overflow example
Buffer Overflow Example
Additional Buffer Overflow Examples
ARM Architecture Resources
Calculating Offsets for Buffer Overflows
Learning Assembly for the Purpose of Principles of Reverse Engineering
Memory-Safe Programming Languages: Recommendations to Combat Buffer Overflows
Mitigations for Buffer Overflows and Code Execution Prevention
What about Registers?
Buffer Overflow Example When Copying Data to a Buffer
Demeter
Demeter
Prep
Bug bounties
Bug bounties
Bug Bounty Tips and Information
Omar's Bug Bounty Program Scope Template
Build your own lab
Build your own lab
Building Your Own Cybersecurity Lab and Cyber Range
Lab Automation - Ansible, Vagrant, and Terraform
Docker Resources
Security Onion, RedHunt OS, Proxmox, and Open vSwitch
Terraform
Terraform
Building Cybersecurity Labs with Terraform: On-Premises and Cloud Solutions
Capture the flag
Capture the flag
Capture The Flag (CTF) Information
Car hacking
Car hacking
Car Hacking and Security
Certifications
Certifications
Lists of Cybersecurity Certifications
Additional materials for certs
Additional materials for certs
Understanding IDS/Firewall Evasion Countermeasures
Detecting honeypots and sandboxes
Techniques for Evading IDS
Exploring IDS, IPS, Firewall, and Honeypot Solutions
Tools to Evade IDS, IPS, and Firewalls
Cheat sheets
Cheat sheets
NMAP Cheat Sheet
UFW: Uncomplicated Firewall — Cheat Sheet
Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC)
awk cheatsheets
Insecure Protocols and Services
msfvenom Cheat Sheet
Regular Expression Cheat Sheets and Resources
Tshark Cheat Sheet
Linux
Linux
Linux metacharacters
User Management Basic Commands
Cloud resources
Cloud resources
Cloud Security Resources
Cloud Logging
Understanding Cloud Security: Risks, Threats, and Challenges
Using Boto3, the AWS SDK for Python, to enumerate EC2 instances
Cloud Pen Testing High-level Best Practices
Security Assessment in the Cloud: Key Considerations and Questions for Your Cloud Service Provider
Cracking passwords
Cracking passwords
Understanding Password Cracking
Daniel Miessler's SecLists is the Bomb!
Cracked Passwords
Cracked Passwords
Crypto
Crypto
Crypto Security Resources
Generating a Certificate Using OpenSSL
Cryptographic Algorithms
Crypto Frameworks and Libraries
Cryptography Ethical Hacking Tools
Disk Encryption Tools
GPG: Generating Keys, Encrypting, and Decrypting Files
Challenges
Challenges
A Few Cryptographic Challenges
Challenge 1: Caesar Cipher Shift
Challenge 2: Simple RSA Encryption
Challenge 3: Hash Collision Challenge
Challenge 4: Classic Vigenère Cipher
Challenge 5: Implement Diffie-Hellman Key Exchange
Challenge 6: Digital Signature Forgery
Frequency Analysis Attack on Substitution Cipher
Elliptic Curve Key Pair Generation
RSA Public Key Crack
Darkweb research
Darkweb research
DarkWeb Research Resources
Devsecops
Devsecops
DevSecOps Resources
Building DevSecOps Pipelines
Overview of DevSecOps Pipelines
Securing Code and Applications
Dfir
Dfir
Digital Forensics and Incident Response (DFIR) Resources
Pcaps
Pcaps
Index
Snort
Snort
Snort Resources
Threat hunting analysis main
Threat hunting analysis main
Threat Hunting Analysis
Volatility exercises
Volatility exercises
Volatility Exercises
Docker and k8s security
Docker and k8s security
Hands-On Kubernetes and Docker Security Training Resources
Elastic Kubernetes Service (EKS)
Google Kubernetes Engine (GKE)
Podman vs Docker
Docker
Docker
Additional Docker Security Tools and Resources
Audit Rules in Docker
Container Technology Concepts
Docker Swarm and Linux Firewall Implementations
SECCOMP
Kubernetes
Kubernetes
Kubernetes Security Resources
Example of a Network Policy in Kubernetes
Kubernetes Secrets
Exploit development
Exploit development
Exploit Development References
Foundational cybersecurity concepts
Foundational cybersecurity concepts
Index
Undertanding Information Security Controls
Cyber laws
Social Engineering Countermeasures
Fuzzing resources
Fuzzing resources
Fuzzing Resources
Game hacking
Game hacking
Game Hacking
Honeypots honeynets
Honeypots honeynets
Honeypots and HoneyNets
Building a Honeynet in the Cloud: A Step-by-Step Guide
Iot hacking
Iot hacking
Internet of Things (IoT) Hacking Resources
IoT Hacking CLUS CTF Flags
Wireless IoT Protocols and Implementations
Learning paths
Learning paths
AI and AI Security Learning Path
Cybersecurity Fundamentals Learning Path
Ethical Hacking Learning Path
Governance, Risk, and Compliance Learning Path
Linux hardening
Linux hardening
Linux Hardening Tips
BIOS and Security Settings
A Comparative Overview of SELinux, AppArmor, Yama, TOMOYO Linux, and Smack
Container-optimized Linux distributions
iptables, nftables, UFW, and firewalld
Port Knocking and Single Packet Authorization (SPA)
SELinux Lab Notes
SELinux in Ubuntu Lab
Understanding and Using SELinux
Metasploit resources
Metasploit resources
Metasploit Resources
Methodology
Methodology
Penetration Testing Methodologies
Post-engagement Cleanup
Planning and Scoping a Penetration Testing Assessment
Static dynamic analysis
Mobile security
Mobile security
Mobile Device Security
More payloads
More payloads
A Collection of Miscellaneous Payloads for WebSploit Labs
XML External Entity (XXE) Injection Payloads
Networking
Networking
Basic Networking Resources
Oreilly resources
Oreilly resources
Recommended Follow Up O'Reilly Resources for Cybersecurity and AI
Osint
Osint
Open-source Intelligence (OSINT)
DNS Zone Transfer
Pcaps
Pcaps
List of Interesting Packet Capture (.pcap) Files
Pen testing reports
Pen testing reports
Public Pen Testing Reports
Post exploitation
Post exploitation
Post Exploitation Resources
Misc Windows Post Exploitation Tasks
MSFVenom
Powershell commands
Programming and scripting for cybersecurity
Programming and scripting for cybersecurity
Python-related References
Bash resources
Basic Programming Resources and Tutorials
Getting Started to Perform Security Code Reviews
JavaScript References
Perl Resources
Tips for Text Manipulation
Exploitation
Exploitation
Cool Python Tricks
Parsing auth log
Parsing auth log
Bash tips
Post exploitation
Post exploitation
Example of Creating a C2 Using Python
Example of Exfiltration over IPv6 Using Scapy
Reverse Shell Commands
Recon scripts
Recon scripts
Useful SNMP Commands
Dns recon
Dns recon
DNS Resolution + WHOIS
DNS Reconnassaince
How to Create a Sub-Domain Finder in Python
Finding sensitive files
Finding sensitive files
Sensitive File Scanner
Scanning
Scanning
Using Scapy to Scan a System
Sniffing packet capturing
Sniffing packet capturing
Simple Scapy Packet Capture
Useful tcpdump commands
Python ruby and bash
Python ruby and bash
Index
Recon
Recon
Active and Passive Reconnaissance Tips and Tools
Introducing Nuclei: A Fast and Customizable Vulnerability Scanner
Exploring Maltego
What is Nikto?
NMAP and AD Example
How to Run Recon-NG in the O'Reilly Labs Environment
Smb enumeration tips
General Rules for Avoiding Detection During Scanning
Web Application Security Testing Methodology
Regulations
Regulations
A Set of Resources Related to Cybersecurity Regulations Around the World
Reverse engineering
Reverse engineering
Reverse Engineer References
Social engineering
Social engineering
Social Engineering
Threat hunting
Threat hunting
Threat Hunting Resources
Intro to threat hunting
Threat Hunting Process
Zeek tips
Virl topologies
Virl topologies
VIRL Topologies
Vulnerability scanners
Vulnerability scanners
Security Vulnerability Scanners
Vulnerable servers
Vulnerable servers
Vulnerable Apps, Servers, and Websites
Web application testing
Web application testing
Web Application Testing References
Attacking Application Logic Flaws and Shared Environments
Cookie Stealer Payload
Docker References
Popular SQL Injection Tools
SQL Injection (SQLi) Evasion Techniques
SSRF Test Script
A collection of XSS vectors
Additional exploits
Additional exploits
Additional Exploits Used in WebSploit Labs
Who and what to follow
Who and what to follow
Blogs, YouTube Channels, Twitch Streamers, and Podcasts
Windows
Windows
Resources for Windows-based Assessments
Useful LDAP Queries
Advanced BloodHound Queries Collection
Wireless resources
Wireless resources
Wireless Attack Resources
Tools
Using Kernel Modules to Simulate Wireless Adapters to Practice Pen Testing
Penetration Testing and Wireless Adapters
The Yardstick One and RFcat Notes
Z-Wave Resources and Tools
ZigBee Resources
Index
Adding pcap files