-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
25 lines (25 loc) · 17.4 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<title>Markmap</title>
<style>
* {
margin: 0;
padding: 0;
}
#mindmap {
display: block;
width: 100vw;
height: 100vh;
}
</style>
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.17.0/dist/style.css">
</head>
<body>
<svg id="mindmap"></svg>
<script src="https://cdn.jsdelivr.net/npm/d3@7.8.5/dist/d3.min.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-view@0.17.0/dist/browser/index.js"></script><script src="https://cdn.jsdelivr.net/npm/markmap-toolbar@0.17.0/dist/index.js"></script><script>(()=>{setTimeout(()=>{const{markmap:q,mm:v}=window,j=new q.Toolbar;j.attach(v);const we=j.render();we.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(we)})})()</script><script>((f,d,h,u)=>{const g=f();window.mm=g.Markmap.create("svg#mindmap",(d||g.deriveOptions)(u),h)})(()=>window.markmap,null,{"content":"Oman CyberSecurity","children":[{"content":"Security Operations Center","children":[{"content":"tools","children":[{"content":"Malware Analysis","children":[{"content":"<a href=\"https://www.virustotal.com/gui/home/upload\">Virus Total</a>","children":[],"payload":{"lines":"6,7"}},{"content":"<a href=\"https://bazaar.abuse.ch/\">Malware Bazzar</a>","children":[],"payload":{"lines":"7,9"}}],"payload":{"lines":"5,6"}},{"content":"Indicatiors of compromise","children":[{"content":"<a href=\"https://otx.alienvault.com/\">AlienVault</a>","children":[],"payload":{"lines":"10,12"}}],"payload":{"lines":"9,10"}},{"content":"Monitoring","children":[{"content":"<a href=\"https://www.elastic.co/security/siem\">ElasticSIEM</a>","children":[],"payload":{"lines":"14,15"}},{"content":"<a href=\"https://www.splunk.com/en_us/products/splunk-security-orchestration-and-automation.html\">Splunk</a>","children":[],"payload":{"lines":"15,16"}},{"content":"<a href=\"https://corelight.com/\">Corelight</a>","children":[],"payload":{"lines":"16,17"}},{"content":"<a href=\"https://wazuh.com/\">Wazah</a>","children":[],"payload":{"lines":"17,18"}},{"content":"<a href=\"\">OSINT Toolkit</a>","children":[],"payload":{"lines":"18,20"}}],"payload":{"lines":"12,13"}},{"content":"OSINT","children":[{"content":"<a href=\"https://osint.sh/\">OSINT.sh</a>","children":[],"payload":{"lines":"22,23"}},{"content":"<a href=\"https://dnsdumpster.com/\">DNSDumpster</a>","children":[],"payload":{"lines":"23,24"}},{"content":"<a href=\"https://mxtoolbox.com/\">MXtoolbox</a>","children":[],"payload":{"lines":"24,26"}}],"payload":{"lines":"20,21"}}],"payload":{"lines":"3,4"}},{"content":"Resources","children":[{"content":"Rulesets","children":[{"content":"<a href=\"https://github.com/Yara-Rules/rules\">YARA Detection Rules</a>","children":[],"payload":{"lines":"30,31"}},{"content":"<a href=\"https://www.proofpoint.com/us/resources/data-sheets/et-pro-ruleset\">ETPRO IPS Rules</a>","children":[],"payload":{"lines":"31,32"}},{"content":"<a href=\"https://github.com/elastic/detection-rules\">ElasticSIEM Rules</a>","children":[],"payload":{"lines":"32,34"}}],"payload":{"lines":"28,29"}}],"payload":{"lines":"26,27"}}],"payload":{"lines":"1,2"}},{"content":"GRC","children":[{"content":"Resources","children":[{"content":"<a href=\"https://gdpr-info.eu/\">GDPR</a>","children":[],"payload":{"lines":"38,39"}},{"content":"<a href=\"https://www.mtcit.gov.om/ITAPortal/Our_Projects/Our_Projects_List.aspx?svc=657&NID=52&Odt=37\">MTCIT Standards</a>","children":[],"payload":{"lines":"39,40"}},{"content":"<a href=\"https://www.cssia.org/wp-content/uploads/2020/01/ISO_27001_Standard.pdf\">ISO Framework for CyberSecurity 27001</a>","children":[],"payload":{"lines":"40,41"}},{"content":"<a href=\"https://www.epa.gov/sites/default/files/2015-06/documents/g6-final.pdf\"> Standar Operating Procedures & Work Instructions</a>","children":[],"payload":{"lines":"41,43"}}],"payload":{"lines":"36,37"}}],"payload":{"lines":"34,35"}},{"content":"Blue Team","children":[{"content":"Resources","children":[{"content":"<a href=\"https://www.cisecurity.org/\">CIS</a>","children":[],"payload":{"lines":"45,46"}},{"content":"<a href=\"https://www.nist.gov/\">NIST</a>","children":[],"payload":{"lines":"46,47"}},{"content":"<a href=\"https://attack.mitre.org\">Mitre ATT&CK</a>","children":[],"payload":{"lines":"47,48"}},{"content":"<a href=\"https://learn.microsoft.com/en-us/windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines\">Microsoft</a>","children":[],"payload":{"lines":"48,50"}}],"payload":{"lines":"44,45"}},{"content":"Tools","children":[{"content":"Managment","children":[{"content":"Endpoint Detection & Response","children":[{"content":"<a href=\"https://me-en.kaspersky.com/small-to-medium-business-security/security-center\">Kaspersky Security Center</a>","children":[],"payload":{"lines":"53,54"}},{"content":"<a href=\"https://nucleon-security.com/\">Neculion Security</a>","children":[],"payload":{"lines":"54,55"}},{"content":"<a href=\"https://www.sophos.com/en-us/products/endpoint-antivirus/edr\">Sophos</a>","children":[],"payload":{"lines":"55,56"}}],"payload":{"lines":"52,53"}},{"content":"Device Monitoring","children":[{"content":"<a href=\"https://www.manageengine.com/network-monitoring/\">Manage Engine OPManager</a>","children":[],"payload":{"lines":"57,58"}}],"payload":{"lines":"56,57"}}],"payload":{"lines":"51,52"}},{"content":"Configration Assessment","children":[{"content":"<a href=\"https://www.titania.com/products/nipper\">Nipper Studio</a>","children":[],"payload":{"lines":"59,61"}}],"payload":{"lines":"58,59"}}],"payload":{"lines":"50,51"}}],"payload":{"lines":"43,44"}},{"content":"Penetration Testing","children":[{"content":"Resources","children":[{"content":"<a href=\"https://book.hacktricks.xyz\">HackTricks</a>","children":[],"payload":{"lines":"63,65"}}],"payload":{"lines":"62,63"}},{"content":"Tools","children":[{"content":"Vulnrability Assessment","children":[{"content":"<a href=\"https://portswigger.net/burp\">BurpSuite</a>","children":[],"payload":{"lines":"67,68"}},{"content":"<a href=\"https://www.tenable.com/products/nessus\">Neassus</a>","children":[],"payload":{"lines":"68,70"}}],"payload":{"lines":"66,67"}}],"payload":{"lines":"65,66"}},{"content":"Operating Systems","children":[{"content":"<a href=\"https://blackarch.org\">BlackArch</a>","children":[],"payload":{"lines":"71,72"}},{"content":"<a href=\"https://www.kali.org\">Kali Linux</a>","children":[],"payload":{"lines":"72,73"}},{"content":"<a href=\"https://parrotsec.org\">Parrot OS</a>","children":[],"payload":{"lines":"73,75"}}],"payload":{"lines":"70,71"}}],"payload":{"lines":"61,62"}},{"content":"Research & Development","children":[{"content":"Resources","children":[{"content":"<a href=\"https://www.freecodecamp.org/\">FreeCodeCamp</a>","children":[],"payload":{"lines":"77,78"}},{"content":"<a href=\"https://www.geeksforgeeks.org/\">GeeksForGeeks</a>","children":[],"payload":{"lines":"78,79"}},{"content":"<a href=\"https://stackoverflow.com/\">StackOverflow</a>","children":[],"payload":{"lines":"79,80"}},{"content":"<a href=\"https://stackexchange.com/\">StackExchange</a>","children":[],"payload":{"lines":"80,82"}}],"payload":{"lines":"76,77"}},{"content":"Tools","children":[{"content":"Automation","children":[{"content":"<a href=\"https://zapier.com/\">Zapier</a>","children":[],"payload":{"lines":"84,85"}},{"content":"<a href=\"https://n8n.io/\">N8N</a>","children":[],"payload":{"lines":"85,86"}},{"content":"<a href=\"https://make.powerautomate.com/en-us/\">PowerAutomate</a>","children":[],"payload":{"lines":"86,87"}}],"payload":{"lines":"83,84"}},{"content":"Frameworks","children":[{"content":"Web Application Development","children":[{"content":"<a href=\"https://www.djangoproject.com/\">Django</a>","children":[],"payload":{"lines":"89,90"}},{"content":"<a href=\"https://flask.palletsprojects.com\">Flask</a>","children":[],"payload":{"lines":"90,91"}},{"content":"<a href=\"https://rubyonrails.org\">Rubey on Rails</a>","children":[],"payload":{"lines":"91,92"}}],"payload":{"lines":"88,89"}},{"content":"Mobile Application Development","children":[{"content":"<a href=\"https://flutter.dev/\">Flutter</a>","children":[],"payload":{"lines":"93,95"}}],"payload":{"lines":"92,93"}}],"payload":{"lines":"87,88"}},{"content":"UI/UX Design","children":[{"content":"<a href=\"https://www.figma.com/\">Figma</a>","children":[],"payload":{"lines":"96,98"}}],"payload":{"lines":"95,96"}}],"payload":{"lines":"82,83"}}],"payload":{"lines":"75,76"}},{"content":"Forensic","children":[{"content":"Tools","children":[{"content":"Investigation","children":[{"content":"<a href=\"https://belkasoft.com/x\">BelkSoft X</a>","children":[],"payload":{"lines":"101,102"}},{"content":"<a href=\"https://sociallinks.io/products/sl-crimewall\">CrimeWall</a>","children":[],"payload":{"lines":"102,103"}}],"payload":{"lines":"100,101"}},{"content":"Operating Systems","children":[{"content":"<a href=\"https://csilinux.com/\">CSI Linux</a>","children":[],"payload":{"lines":"104,105"}}],"payload":{"lines":"103,104"}}],"payload":{"lines":"99,100"}},{"content":"Resources","children":[{"content":"<a href=\"https://annamalaiuniversity.ac.in/studport/download/engg/it/resources/Cyber%20Forensics.pdf\">CYBER FORENSICS coursebook -Annamalai University</a>","children":[],"payload":{"lines":"106,108"}}],"payload":{"lines":"105,106"}}],"payload":{"lines":"98,99"}},{"content":"Infrastructure","children":[{"content":"Resources","children":[],"payload":{"lines":"109,110"}},{"content":"Tools","children":[{"content":"Hypervisors","children":[{"content":"<a href=\"https://xenproject.org/\">Xen</a>","children":[],"payload":{"lines":"112,113"}},{"content":"<a href=\"https://www.vmware.com/products/cloud-infrastructure/esxi-and-esx\">VMWare ESXI</a>","children":[],"payload":{"lines":"113,114"}},{"content":"<a href=\"https://www.proxmox.com/en/\">ProxMox</a>","children":[],"payload":{"lines":"114,115"}},{"content":"<a href=\"ttps://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/\">HyperV</a>","children":[],"payload":{"lines":"115,116"}},{"content":"<a href=\"https://cockpit-project.org\">Cockpit Project</a>","children":[],"payload":{"lines":"116,117"}}],"payload":{"lines":"111,112"}},{"content":"Opensource Firewalls","children":[{"content":"<a href=\"https://www.pfsense.org/\">PfSense</a>","children":[],"payload":{"lines":"118,119"}},{"content":"<a href=\"https://opnsense.org/\">OpenSense</a>","children":[],"payload":{"lines":"119,120"}}],"payload":{"lines":"117,118"}},{"content":"Opensource Network Access Control","children":[{"content":"<a href=\"https://www.packetfence.org\">PacketFence</a>","children":[],"payload":{"lines":"121,123"}}],"payload":{"lines":"120,121"}}],"payload":{"lines":"110,111"}}],"payload":{"lines":"108,109"}},{"content":"Service Providers in Oman","children":[{"content":"Computer Parts","children":[{"content":"<a href=\"https://gadgetsoman.com\">Gadgets.om</a>","children":[],"payload":{"lines":"125,126"}},{"content":"<a href=\"https://ideaoman.shop\">Idea.om</a>","children":[],"payload":{"lines":"126,127"}},{"content":"Rahat Computers","children":[],"payload":{"lines":"127,128"}}],"payload":{"lines":"124,125"}},{"content":"ISP","children":[{"content":"<a href=\"https://www.awasr.om\">Awaser</a>","children":[],"payload":{"lines":"129,130"}},{"content":"<a href=\"https://www.omantel.om\">Omantel</a>","children":[],"payload":{"lines":"130,131"}},{"content":"<a href=\"ttps://www.ooredoo.om/\">Ooredoo</a>","children":[],"payload":{"lines":"131,132"}},{"content":"<a href=\"https://www.vodafone.om\">Vodafone</a>","children":[],"payload":{"lines":"132,133"}},{"content":"<a href=\"https://www.redbullmobile.om\">RedBull Mobile</a>","children":[],"payload":{"lines":"133,134"}}],"payload":{"lines":"128,129"}},{"content":"Hosting & Cloud","children":[{"content":"<a href=\"https://www.omandatapark.com\">Oman DataPark</a>","children":[],"payload":{"lines":"135,136"}},{"content":"<a href=\"https://data2cloud.om\">Data2Cloud</a>","children":[],"payload":{"lines":"136,137"}},{"content":"<a href=\"https://www.digitalocean.com\">Digital Ocean</a>","children":[],"payload":{"lines":"137,138"}},{"content":"<a href=\"https://www.omantel.om/business/small-medium-enterprise/ict/data-center-services/cloud-server\">Omantel</a>","children":[],"payload":{"lines":"138,139"}}],"payload":{"lines":"134,135"}},{"content":"Networking & Servers","children":[{"content":"<a href=\"http://www.fireware.com/home\">Fireware</a>","children":[],"payload":{"lines":"140,141"}},{"content":"<a href=\"https://www.ocsinfotech.com\">OCS</a>","children":[],"payload":{"lines":"141,142"}},{"content":"<a href=\"http://www.integsystems.com\">Integrated Systems</a>","children":[],"payload":{"lines":"142,143"}}],"payload":{"lines":"139,140"}},{"content":"Devices","children":[{"content":"<a href=\"https://danatcomputers.com\">Danat Computers</a>","children":[],"payload":{"lines":"144,145"}},{"content":"Rahat Computers","children":[],"payload":{"lines":"145,146"}},{"content":"<a href=\"https://gadgetsoman.com\">Gadgets.om</a>","children":[],"payload":{"lines":"146,147"}}],"payload":{"lines":"143,144"}},{"content":"CyberSecurity","children":[{"content":"<a href=\"https://nssgo.com\">National Security Services Group</a>","children":[],"payload":{"lines":"148,149"}},{"content":"<a href=\"https://www.s-ge.com/en/company/dreamlab-technologies-ag\">DreamLab Technologies</a>","children":[],"payload":{"lines":"149,150"}},{"content":"<a href=\"https://insight.om/\">Insight CyberSecurity</a>","children":[],"payload":{"lines":"150,152"}}],"payload":{"lines":"147,148"}}],"payload":{"lines":"123,124"}},{"content":"Intresting Products","children":[{"content":"Companies","children":[{"content":"Social Links","children":[{"content":"\n<p data-lines=\"155,156\"><a href=\"https://sociallinks.io/products/sl-crimewall\">CrimeWall</a></p>","children":[],"payload":{"lines":"155,156"}},{"content":"\n<p data-lines=\"156,157\"><a href=\"https://sociallinks.io/products/sl-fraud-prevention\">Fraud Prevention</a> A FRAUD DETECTION AND PREVENTION SOLUTION with powerful insights with digital footprints generated from 500+ open sources, including social media, corporate sources, and the Dark Web, to counter payment fraud, fake account creation, and more</p>","children":[],"payload":{"lines":"156,158"}},{"content":"\n<p data-lines=\"158,159\"><a href=\"https://sociallinks.io/products/sl-professional\">SL Professional</a> OSINT tool for conducting in-depth investigations across social media, blockchains, messengers, and the Dark Web in Maltego and i2 platforms.</p>","children":[],"payload":{"lines":"158,159"}},{"content":"\n<p data-lines=\"159,160\"><a href=\"https://sociallinks.io/products/sl-private-platform\">SL Private Platform</a> An enterprise-grade on-premise platform with customization options, private data storage, and our widest range of search methods</p>","children":[],"payload":{"lines":"159,160"}}],"payload":{"lines":"154,155"}},{"content":"Belksoft","children":[{"content":"<a href=\"https://belkasoft.com/x\">Belksoft X Forensic</a> flagship tool by Belkasoft for computer, mobile, drone, car, and cloud forensics. It can help you to acquire and analyze a wide range of mobile and computer devices, run various analytical tasks, perform case-wide searches, bookmark artifacts, and create reports.","children":[],"payload":{"lines":"161,162"}},{"content":"<a href=\"https://belkasoft.com/n\">Belkasoft Incident Investigations</a> investigate hacking attempts of Windows computers.","children":[],"payload":{"lines":"162,163"}},{"content":"<a href=\"https://belkasoft.com/r\">Belkasoft Remote Acquisition</a> remote evidance extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data.","children":[],"payload":{"lines":"163,164"}},{"content":"<a href=\"https://belkasoft.com/t\">Belksoft Triage</a> Perform effective triage analysis of Windows devices right on the incident scene.","children":[],"payload":{"lines":"164,165"}},{"content":"<a href=\"https://belkasoft.com/corporate\">Belksoft Corporate</a> Protect your business assets from malware and hacking attempts, perform cyber incident investigations and incident response, comply with legal requirements and regulations in eDiscovery, respond to insider threats, fight cyberharassment and bullying in the workplace.","children":[],"payload":{"lines":"165,166"}},{"content":"<a href=\"https://belkasoft.com/ram-capturer\">Belksoft Ram Capture</a> Volatile Memory Acquisition Tool.","children":[],"payload":{"lines":"166,167"}}],"payload":{"lines":"160,161"}},{"content":"National Security Services Group","children":[{"content":"<a href=\"https://passray.nssgo.com/\">Passray</a> Detect compromised and defective enterprise passwords to proactively prevent account takeover.","children":[],"payload":{"lines":"168,169"}},{"content":"<a href=\"https://hashstrike.nssgo.com/\">HashStrike</a> highly crafted software and hardware to audit and analyze passwords strength.","children":[],"payload":{"lines":"169,170"}},{"content":"<a href=\"https://dcapsula.nssgo.com/\">Dcapsula</a> Prevent email spoofing and impersonation attacks against your domain combined with a single innovative dashboard.","children":[],"payload":{"lines":"170,171"}}],"payload":{"lines":"167,168"}}],"payload":{"lines":"153,154"}}],"payload":{"lines":"152,153"}}]},{"colorFreezeLevel":5,"maxWidth":300,"initialExpandLevel":1})</script>
</body>
</html>