This document is titled "Brain Farts" and contains a list of tasks to complete (ideas from the brain that happen to pop out that need to be released). The tasks are divided into categories such as job boards, news sources, courses, and groups to join. The list is not yet complete and some of the tasks are not fully categorised.

Requires review and categorisation

  1. The Cyber Security Body Of Knowledge CyBOK https://www.cybok.org/knowledgebase1_1/
  2. https://thedfirreport.com/
  3. CISA Resources https://www.cisa.gov/resources-tools/all-resources-tools
  4. List of Secure Products https://www.ncsc.gov.uk/section/products-services/verify-suppliers
  5. Bug bounty programmes https://bbradar.io/
  6. Malware Reports https://app.any.run/submissions/?_gl=1*1lhd77i*_gcl_au*ODk4OTU0MTM1LjE2ODUwMjMxMDQ.*_ga*MTI2ODM4MTA1MS4xNjg1MDIzMTA0*_ga_53KB74YDZR*MTY4NTAyMzEwNC4xLjEuMTY4NTAyMzQ2OS42MC4wLjA.&_ga=2.211252307.733293331.1685023104-1268381051.1685023104/
  7. Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts) https://lolbas-project.github.io/
  8. https://ioc.wiki/
  9. https://creativecommons.org/licenses/by-sa/4.0/deed.en
  10. https://github.com/telekom-security
  11. Creating an open source honey pot: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part1)/#installation
  12. Tools and Techniques Library https://www.trellix.com/en-us/advanced-research-center/advanced-threat-research/tools-techniques-library.html
  13. https://securelist.com/
  14. https://github.com/threat-hunting/awesome-threat-intelligence
  15. Team Cymru: Digital Risk Management - Digital Threat Assessment and Tools (team-cymru.com)
  16. Subscribe to Reports | The Shadowserver Foundation
  17. https://www.softsideofcyber.com/ Robert Wood