This document is titled "Brain Farts" and contains a list of tasks to complete (ideas from the brain that happen to pop out that need to be released). The tasks are divided into categories such as job boards, news sources, courses, and groups to join. The list is not yet complete and some of the tasks are not fully categorised.
Requires review and categorisation
- The Cyber Security Body Of Knowledge CyBOK https://www.cybok.org/knowledgebase1_1/
- https://thedfirreport.com/
- CISA Resources https://www.cisa.gov/resources-tools/all-resources-tools
- List of Secure Products https://www.ncsc.gov.uk/section/products-services/verify-suppliers
- Bug bounty programmes https://bbradar.io/
- Malware Reports https://app.any.run/submissions/?_gl=1*1lhd77i*_gcl_au*ODk4OTU0MTM1LjE2ODUwMjMxMDQ.*_ga*MTI2ODM4MTA1MS4xNjg1MDIzMTA0*_ga_53KB74YDZR*MTY4NTAyMzEwNC4xLjEuMTY4NTAyMzQ2OS42MC4wLjA.&_ga=2.211252307.733293331.1685023104-1268381051.1685023104/
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts) https://lolbas-project.github.io/
- https://ioc.wiki/
- https://creativecommons.org/licenses/by-sa/4.0/deed.en
- https://github.com/telekom-security
- Creating an open source honey pot: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part1)/#installation
- Tools and Techniques Library https://www.trellix.com/en-us/advanced-research-center/advanced-threat-research/tools-techniques-library.html
- https://securelist.com/
- https://github.com/threat-hunting/awesome-threat-intelligence
- Team Cymru: Digital Risk Management - Digital Threat Assessment and Tools (team-cymru.com)
- Subscribe to Reports | The Shadowserver Foundation
- https://www.softsideofcyber.com/ Robert Wood