cypher@matrix:~$ sayHi
Hi there 👋
cypher@matrix:~$ whoami
cypher
cypher@matrix:~$ cypher | more
I'm Daniele alias cypher
* Hard worker
* Python Coder
* Running, gym, pizza and sushi lover
* Infosec enthusiast driven by passion, curiosity and willingness to learn
cypher@matrix:~$ cat infosec_interests
Blueteaming, Active directory/ SIEMs, Threat intelligence, Threat Hunting, OSINT and CTFs
cypher@matrix:~$ cat community
- Volunteering as a member in the [R00tMi community](https://twitter.com/R00tMi)
- core admin of [blueteamzone](https://twitter.com/blueteamzone/)
- Actively contributing to the cybersecurity community
cypher@matrix:~$ cat active_pojects
* [OnionIngestor](https://github.com/danieleperera/OnionIngestor)
* [**Confidential**](https://github.com/danieleperera/401)
* [**Confidential**](https://github.com/danieleperera/401)
- Hunting Cyber Criminals: A hacker's guide to Online Intelligence gathering tools and techniques By Vinny Troia
- Intelligence-Driven Incident Response by Scott J. Roberts
- The Cuckoo’s Egg by Clifford Stoll
- Placing the Suspect Behind the Keyboard: DFIR Investigative Mindset by Brett Shavers
- Visual Threat Intelligence: An Illustrated Guide For Threat Researcher by Thomas Roccia
- Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem by Chris Hughes & Nikki Robinson
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation by James Forshaw
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski
- Learn Python the Hard Way
- Incident Response & Computer Forensics by Jason T. Luttgens, Matthew Pepe, Kevin Mandia
- Digital Forensics and Incident Response: A practical guide to deploying digital forensic by Gerard Johansen
- How to Investigate Like a Rockstar by Sparc Flow
- Operator Handbook: Red Team + OSINT + Blue Team Reference by Joshua Picolet
- Structured Analytic Techniques for Intelligence Analysis by Richards J. Heuer Jr., Randolph H. Pherson
- Threat Modeling: Designing for Security by Adam Shostack
- The Psychology of Intelligence Analysis by Richards J. Heuer Jr.
- Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham
- Intrusion Detection Honeypots: Detection through Deception by Chris Sanders
- Practical Threat Intelligence and Data-Driven Threat Hunting by Valentina Palacín
- Handbook of Intelligence Studies by Loch K. Johnson
- Cyber War Will Not Take Place by Thomas Rid
- Rise Of The Machines by Thomas Rid
- Active Measures by Thomas Rid
- Strategic Intelligence for American World Policy by Sherman Kent
- Making Hard Decisions: An Introduction to Decision Analysis by Robert T. Clemen
- Visual Threat Intelligence: An Illustrated Guide For Threat Researcher by Thomas Roccia
- The Art & Science of Intelligence Analysis by Julian Richards
- Intelligence: From Secrets to Policy by Mark M. Lowenthal
- Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda by Robert Wallace, H. Keith Melton, Henry R. Schlesinger
- Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense by Jean Nestor M. Dahj
- Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers by Aaron Roberts
- The Threat Intelligence Handbook: A Practical Guide for Security Teams to Unlocking the Power of Intelligence by Recorded Future
- Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics by Yuri Diogenes, Erdal Özkaya
- Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan by Jeff Bollinger, Brandon Enright, Matthew Valites
- Analyzing Intelligence: National Security Practitioners' Perspectives by Roger Z. George
- Japanese Candlestick Charting Tecniques: A Contemporary Guide to the Ancient Investment by Steve Nison
- The Bitcoin Standard: The Decentralized Alternative to Central Banking by Saifedean Ammous
- Mastering Bitcoin: Unlocking Digital Cryptocurrencies by Andreas M. Antonopoulos
- Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos
- The Total Money Makeover: A Proven Plan for Financial Fitness by Dave Ramsey
- The Little Book of Common Sense Investing: The Only Way to Guarantee Your Fair Share of Stock Market Returns by John C. Bogle
Author | Description | Resource URL |
---|---|---|
Sarah Jones | A Brief History of Attribution Mistakes - analyse the mistakes made by others so that you do not repeat them | securityandtechnology.org |
Sergio Caltagirone, Andrew Pendergast, and Chris Betz | The Diamond Model of Intrusion Analysis - A comprehensive guide that presents a structured method for analyzing cyber intrusions, emphasizing the interconnectedness of adversaries, capabilities, victims, and infrastructure in the cyber threat landscape. | activeresponse.org |
Blake Strom | MITRE ATT&CK™: Design and Philosophy - This book provides a thorough exploration of the MITRE ATT&CK framework, revealing its design principles, philosophy, and application. | mitre.org |
Blake Strom | MITRE ATT&CK™: Design and Philosophy - This book provides a thorough exploration of the MITRE ATT&CK framework, revealing its design principles, philosophy, and application. | mitre.org |
For more in detail information visit my Portfolio