Stars
Contextal Platform, a powerful, open-source cybersecurity solution designed for contextual threat detection and intelligence.
Internationalized Domain Names for Python (IDNA 2008 and UTS #46)
🔪 Dumper & ripper for Telegram bots by token
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
This repo covers some code execution and AV Evasion methods for Macros in Office documents
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Exposing phishing kits, creators and malicious actors.
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research the possibility of applying machine learning and neural networ…
PowerShell Runspace Post Exploitation Toolkit
PowerShell Remote Download Cradle Generator & Obfuscator
Python installable command line utiltity for mitigation of host and key compromises.
Small and highly portable detection tests based on MITRE's ATT&CK.
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Search bitspoofing/typosquatting crypto scammers on Twitter
Wiki to collect Red Team infrastructure hardening resources
The premier source of truth powering network automation. Open source under Apache 2. Try NetBox Cloud free: https://netboxlabs.com/free-netbox-cloud/
Run PowerShell with rundll32. Bypass software restrictions.
EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public expl…
A list of public penetration test reports published by several consulting firms and academic security groups.