# DRAFTS

- [GS](/drafts/gs.md)
- [Mobile Application Security](/drafts/gs/mobile-application-security.md)
- [Reverse Engineering](/drafts/gs/reverse-engineering.md)
- [Web Application Security](/drafts/gs/web-application-security.md)
- [Information Security](/drafts/gs/information-security.md): Introduction to Information security and all the boring stuff
- [Cryptography](/drafts/gs/cryptography.md)
- [Operational Security](/drafts/gs/operational-security.md)
- [DS](/drafts/ds.md)
- [Threat Intelligence](/drafts/ds/threat-intelligence.md)
- [ELK Stack](/drafts/ds/threat-intelligence/elk-stack.md)
- [Elasticsearch](/drafts/ds/threat-intelligence/elk-stack/elasticsearch.md)
- [Kibana](/drafts/ds/threat-intelligence/elk-stack/kibana.md)
- [SELKS](/drafts/ds/threat-intelligence/elk-stack/selks.md)
- [Yara](/drafts/ds/threat-intelligence/yara.md)
- [Threat Hunting](/drafts/ds/threat-hunting.md)
- [Malware Analysis](/drafts/ds/malware-analysis.md)
- [Fundamentals](/drafts/ds/malware-analysis/fundamentals.md)
- [Forensics](/drafts/ds/forensics.md)
- [Network Forensics](/drafts/ds/forensics/network-forensics.md)
- [Wireshark](/drafts/ds/forensics/network-forensics/wireshark.md)
- [TCP Dump](/drafts/ds/forensics/network-forensics/tcp-dump.md)
- [Memory Forensics](/drafts/ds/forensics/memory-forensics.md)
- [Volatility](/drafts/ds/forensics/memory-forensics/volatility.md)
- [Disk Forensics](/drafts/ds/forensics/disk-forensics.md)
- [Autopsy](/drafts/ds/forensics/disk-forensics/autopsy.md)
- [Windows Forensics](/drafts/ds/forensics/windows-forensics.md)
- [Linux Forensics](/drafts/ds/forensics/linux-forensics.md)
- [Security Operations](/drafts/ds/security-operations.md)
- [Intrusion Detection & Prevention](/drafts/ds/security-operations/intrusion-detection-and-prevention.md)
- [Splunk](/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk.md)
- [Splunk Basics](/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk/splunk-basics.md)
- [Integrating Suricata with Splunk](/drafts/ds/security-operations/intrusion-detection-and-prevention/splunk/integrating-suricata-with-splunk.md)
- [Suricata](/drafts/ds/security-operations/intrusion-detection-and-prevention/suricata.md): Suricata Intrusion Detection System
- [Intro to Suricata](/drafts/ds/security-operations/intrusion-detection-and-prevention/suricata/intro-to-suricata.md)
- [Snort](/drafts/ds/security-operations/intrusion-detection-and-prevention/snort.md)
- [Snort Basics](/drafts/ds/security-operations/intrusion-detection-and-prevention/snort/snort-basics.md)
- [Security Information and Event Management (SIEM)](/drafts/ds/security-operations/security-information-and-event-management-siem.md)
- [Security Orchestration, Automation and Response (SOAR)](/drafts/ds/security-operations/security-orchestration-automation-and-response-soar.md)
- [HL](/drafts/hl.md)
- [Hardware](/drafts/hl/hardware.md)
- [OS](/drafts/os.md)
- [Network Exploitation](/drafts/os/network-exploitation.md)
- [Cloud Exploitation](/drafts/os/cloud-exploitation.md)
