Skip to content

Welcome to the Cyber Defence Kit

Introduction

The Cyber Defence Kit started as a personal exploration of open-source cybersecurity tools and evolved into a shared learning resource. Every step was documented—proof-of-concept videos, detailed notes, lessons learned, and practical tips—all shared online to make these tools more accessible and encourage learning. This project aims to inspire others to explore, implement, and understand the potential of open-source cybersecurity solutions.

CDK intro visual.png

Getting Started

To begin leveraging the Cyber Defence Kit:

  1. Understand the Toolkit:
    • Familiarise yourself with the components of the kit.
  2. Set Up Your Environment:
    • EPrepare your system by checking the hardware and software requirements before installation.
    • Prepare your systems for installation (e.g., air-gapped environment considerations).
  3. Learn and Explore:
    • Explore proof of concept videos and documentation on attack simulation.

Important Notes

  • Security First: Always follow security best practices when installing and configuring tools.
  • Air-Gapped Environments: Special considerations are required for installations without internet access.
  • Legal Compliance: Ensure all activities comply with legal and regulatory requirements.

License

Cyber Defence Kit documentation is created by Joseph Jee and licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) License. You are free to share and adapt the content with proper attribution.