Skip to content
View Werneror's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report Werneror

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Hunts out CobaltStrike beacons and logs operator command output

C# 914 109 Updated Sep 4, 2024

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Shell 592 63 Updated Mar 5, 2025

Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events…

PowerShell 796 144 Updated Nov 5, 2023

Detect Tactics, Techniques & Combat Threats

SCSS 2,128 340 Updated Jan 29, 2025

Loki - Simple IOC and YARA Scanner

Python 3,502 594 Updated Nov 25, 2024

A collection of pentest and development tips

1,107 304 Updated May 26, 2022

Adversary Emulation Framework

Go 9,096 1,225 Updated Mar 27, 2025

A Linux Host-based Intrusion Detection System based on eBPF.

C 437 82 Updated Dec 20, 2023

KCon is a famous Hacker Con powered by Knownsec Team.

JavaScript 4,621 1,404 Updated Aug 28, 2024

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerShell 1,895 337 Updated Mar 6, 2025

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

3,375 630 Updated Feb 11, 2023

Scaffolding for BPF application development with libbpf and BPF CO-RE

CMake 1,204 316 Updated Mar 20, 2025

Local penetration testing lab using docker-compose.

Shell 193 54 Updated Jun 7, 2023

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

HTML 4,965 1,181 Updated Feb 13, 2025

Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC

C# 342 38 Updated Jan 6, 2025

A Microservices-based framework for the study of Network Security and Penetration Test techniques

JavaScript 592 106 Updated Sep 25, 2024

Java 内存马开聚会 🎉

Java 691 67 Updated Mar 29, 2025

Open-source vulnerability scanner

NASL 418 47 Updated Nov 16, 2024

应急响应实战笔记,一个安全工程师的自我修养。

5,334 1,289 Updated Jun 26, 2023

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

C 1,634 208 Updated Nov 3, 2024

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Jinja 2,254 374 Updated Mar 29, 2025

The Havoc Framework

Go 7,386 1,046 Updated Jan 23, 2025

一款后渗透免杀工具,助力每一位像我这样的脚本小子快速实现免杀,支持bypass AV/EDR 360 火绒 Windows Defender Shellcode Loader

C++ 1,284 129 Updated Feb 19, 2025

Linux 应急响应手册

500 32 Updated Mar 5, 2025

Windows 应急响应手册

533 36 Updated Jul 10, 2024

Elastic Security detection content for Endpoint

YARA 1,150 132 Updated Mar 25, 2025

A list for Web Security and Code Audit

1,048 192 Updated Dec 3, 2024

蓝队应急工具

YARA 482 49 Updated Jun 10, 2024

Windows安全基线核查加固助手

C# 472 62 Updated May 12, 2024

一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool.

Java 1,838 208 Updated Jan 12, 2025
Next
Showing results