This document is titled "Brain Farts" and contains a list of tasks to complete (ideas from the brain that happen to pop out that need to be released). The tasks are divided into categories such as job boards, news sources, courses, and groups to join. The list is not yet complete and some of the tasks are not fully categorised.

Requires review and categorisation

  1. https://csirtsnetwork.eu/ European Union CSIRTs network is a network composed of EU Member States’ appointed CSIRTs and CERT-EU
  2. The Cyber Security Body Of Knowledge CyBOK https://www.cybok.org/knowledgebase1_1/
  3. https://thedfirreport.com/
  4. CISA Resources https://www.cisa.gov/resources-tools/all-resources-tools
  5. List of Secure Products https://www.ncsc.gov.uk/section/products-services/verify-suppliers
  6. Bug bounty programmes https://bbradar.io/
  7. Malware Reports https://app.any.run/submissions/?_gl=1*1lhd77i*_gcl_au*ODk4OTU0MTM1LjE2ODUwMjMxMDQ.*_ga*MTI2ODM4MTA1MS4xNjg1MDIzMTA0*_ga_53KB74YDZR*MTY4NTAyMzEwNC4xLjEuMTY4NTAyMzQ2OS42MC4wLjA.&_ga=2.211252307.733293331.1685023104-1268381051.1685023104/
  8. Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts) https://lolbas-project.github.io/
  9. https://ioc.wiki/
  10. https://creativecommons.org/licenses/by-sa/4.0/deed.en
  11. https://github.com/telekom-security
  12. Creating an open source honey pot: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part1)/#installation
  13. Tools and Techniques Library https://www.trellix.com/en-us/advanced-research-center/advanced-threat-research/tools-techniques-library.html
  14. https://securelist.com/
  15. https://github.com/threat-hunting/awesome-threat-intelligence
  16. Team Cymru: Digital Risk Management - Digital Threat Assessment and Tools (team-cymru.com)
  17. Subscribe to Reports | The Shadowserver Foundation