E-mails, subdomains and names Harvester - OSINT
Python
Updated May 3, 2019
An Information Security Reference That Doesn't Suck
Python
Updated Apr 10, 2019
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
XSLT
Updated Dec 10, 2018
Curated list of Unix binaries that can be exploited to bypass system security restrictions
HTML
Updated Apr 16, 2019
Investigate malicious Windows logon by visualizing and analyzing Windows event log
JavaScript
Updated Mar 24, 2019
The goal of this repository is to document the most common techniques to bypass AppLocker.
PowerShell
Updated Mar 19, 2019
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
XSLT
Updated Apr 3, 2019
Real Intelligence Threat Analytics
#455 opened 16 days ago by sapp50
1
#449 opened 25 days ago by ethack
#335 opened 4 months ago by ethack
1
Go
Updated May 1, 2019
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Python
Updated Jan 29, 2019
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
JavaScript
Updated Mar 13, 2019
This repository contains full code examples from the book Gray Hat C#
C#
Updated Jul 21, 2017
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, …
Python
Updated Sep 21, 2018
bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
#5 opened about 1 year ago by GeekMasher
JavaScript
Updated Jan 8, 2019
Automatically generated actionable analytics designed to combat threats based on MITRE's ATT&CK.
Python
Updated May 1, 2019
Test Blue Team detections without running any attack.
C#
Updated Apr 2, 2019
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files …
Python
Updated Aug 4, 2018
Blue Team Scripts
Shell
Updated Mar 28, 2019
A collection of scripts I've written to help red and blue teams with malware persistence techniques.
PowerShell
Updated May 30, 2018
Open-Source Obfuscated Command Detection Tool
CSS
Updated May 1, 2019
A PowerShell module to deploy active directory decoy objects.
PowerShell
Updated Jan 9, 2019
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Roff
Updated Oct 6, 2018
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
Python
Updated Jul 23, 2018
This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.
Python
Updated Aug 10, 2018
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Python
Updated Nov 4, 2018
Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.
Shell
Updated Dec 6, 2018
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Python
Updated Aug 22, 2018
Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a quick reputation lo…
Python
Updated Mar 21, 2019
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
HTML
Updated Mar 18, 2018
A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files…
C++
Updated May 31, 2018
Collect IPFIX / Netflow v9 Records and Ship them to RITA for Analysis
Go
Updated Apr 5, 2019