Skip to content
View drb-ra's full-sized avatar

Block or report drb-ra

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement

PowerShell 160 25 Updated Dec 5, 2024
Python 126 10 Updated Mar 3, 2025

Windows inside a Docker container.

Shell 33,841 2,379 Updated Mar 27, 2025

Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop

Jupyter Notebook 67 10 Updated Mar 24, 2025

Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenarios.

Go 180 16 Updated Sep 4, 2024

Powershell Linter

Rust 50 1 Updated Mar 17, 2025

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

196 19 Updated Jul 3, 2024

Powershell Based tool for gathering information related to O365 intrusions and potential Breaches

PowerShell 823 128 Updated Mar 7, 2025

Elastic Security Labs releases

Python 61 7 Updated Mar 27, 2025
Python 20 4 Updated Nov 30, 2023

Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.

Python 32 4 Updated Mar 11, 2025

RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact

Python 1,638 255 Updated Mar 13, 2025

KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Python 1,395 257 Updated Mar 3, 2025

Extract C2 Traffic

C++ 248 36 Updated Nov 25, 2024

A light-weight first-stage C2 implant written in Nim (and Rust).

Rust 858 111 Updated Mar 9, 2025

A collection of fascinating and bizarre Censys Search Queries

Python 1,069 121 Updated Mar 27, 2025

Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles

Python 164 23 Updated Mar 25, 2025

RedEye is a visual analytic tool supporting Red & Blue Team operations

TypeScript 2,703 281 Updated Oct 20, 2023

Windows kernel and user mode emulation.

Python 1,619 241 Updated Feb 28, 2025

Security ML models encoded as Yara rules

Python 215 27 Updated Jul 6, 2023

http://firewalla.com

JavaScript 568 132 Updated Mar 26, 2025

DEFCON30 Talk Material, References and Extra Bits

37 4 Updated Oct 30, 2022
Python 105 16 Updated Nov 15, 2023

An OOB interaction gathering server and client library

Go 3,657 386 Updated Mar 24, 2025

Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessment. It comes preconfigured with all essential tools and utilit…

Dockerfile 271 47 Updated Mar 24, 2025

Data exfiltration and covert communication tool

Go 38 8 Updated Jan 10, 2023

Automated Red Team Infrastructure deployement using Docker

Python 1,234 205 Updated Aug 24, 2022

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

Python 3,133 660 Updated Mar 27, 2025

☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud

Go 1,962 234 Updated Mar 21, 2025
Next
Showing results