Skip to content

Welcome to the Cyber Defence Kit

Introduction

The Cyber Defence Kit began as a personal exploration of open-source cybersecurity tools and grew into a shared learning resource. Each step was documented through proof-of-concept videos, notes, lessons learned, and practical tips, all shared openly to make these tools more accessible. The goal is to encourage others to explore, implement, and understand open-source cybersecurity solutions.

CDK intro visual.png

Getting Started

To begin leveraging the Cyber Defence Kit:

  1. Understand the Toolkit:
    • Familiarise yourself with the components of the kit.
  2. Set Up Your Environment:
    • Prepare your system by checking the hardware and software requirements before installation.
    • Prepare your systems for installation (e.g., air-gapped environment considerations).
  3. Learn and Explore:
    • Explore proof of concept videos and documentation on attack simulation.

Important Notes

  • Security First: Always follow security best practices when installing and configuring tools.
  • Air-Gapped Environments: Special considerations are required for installations without internet access.
  • Legal Compliance: Ensure all activities comply with legal and regulatory requirements.

Licence

Cyber Defence Kit documentation is created by Joseph Jee and licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) Licence. You are free to share and adapt the content with proper attribution.