Skip to main content

Content Resources > Security

42 resources

Simulate Attacks with Infection Monkey – Cyber Security Simulation, Validation, and Mitigation

Infection Monkey is an open-source breach & attack simulator that helps validate controls & identify how attackers might exploit your network.
Security

Splunk Security Event Monitoring – Blue Team Series with Hackersploit

Splunk is the first data-to-everything platform powered by artificial intelligence, advanced data search, and optimized data streaming.
Security

Intrusion Detection with Suricata – Blue Team Series with Hackersploit

In this video, we'll cover the process of installing, configuring, and using Suricata for intrusion detection.
Security

Intrusion Detection with Wazuh – Blue Team Series with Hackersploit

In this episode of our Blue Team series with @HackerSploit, we cover intrusion detection with Wazuh, an open source detection application.
Security

Intrusion Detection with Snort – Blue Team Series with Hackersploit

In this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, a powerful intrusion detection app.
Security

Network Traffic Analysis with Wireshark – Blue Team Series with Hackersploit

This series will cover Blue Team techniques and tools used by security analysts and SOC teams, such as Wireshark.
Security

What Exactly is High Availability? Failover & High Availability Demonstration from ZSecurity

High availability (HA) is a term that describes a website or application with maximum uptime and accessibility for the content stored on it.
Security

Windows Defense Evasion – Lateral Movement Techniques | Red Team Series 13-13

In the final video of our Hackersploit Red Team series we will take a look at Windows Defense Evasion and lateral movement techniques.
Security

Linux Defense Evasion – Linux Rootkits | Red Team Series 12-13

In this video portion of our Red Team Series we will cover Linux Rootkits.
Security

Linux Defense Evasion – Hiding Processes | Red Team Series 11-13

In this part of our Hackersploit Security Series we will cover Linux Defense Evasion techniques.
Security

Linux Persistence Techniques | Red Team Series 10-13

In this video in our Hackersploit Red Team series, we will cover part 10 of our series on Linux Persistence Techniques.
Security

Linux Privilege Escalation Techniques | Red Team Series 9-13

In this video in our Hackersploit Red Team Series, we will cover Linux privilege escalation techniques.
Security