Skip to content
View wirzka's full-sized avatar
:shipit:
"Whatcha gonna do when they show up in black suits"
:shipit:
"Whatcha gonna do when they show up in black suits"

Organizations

@xquik @The-Lynx-Team @r00tMI

Block or report wirzka

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

OT Security Lab for ICS networks.

Smalltalk 118 24 Updated Mar 20, 2025

Simple hunting script for suspicious M365 OAuth Apps

Python 271 29 Updated Feb 12, 2025
Python 42 9 Updated Dec 13, 2020

A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs

Python 705 96 Updated Feb 4, 2025

Notes on managing and coordinating the response to major cyber incidents

40 4 Updated May 30, 2020

PowerShell tools to help defenders hunt smarter, hunt harder.

PowerShell 331 36 Updated Mar 5, 2025

Run your own AI cluster at home with everyday devices 📱💻 🖥️⌚

Python 27,190 1,662 Updated Mar 21, 2025

Adversary Emulation Framework

Go 9,085 1,225 Updated Mar 27, 2025

Bambdas collection for Burp Suite Professional and Community.

Java 250 36 Updated Mar 12, 2025

🛰️ Represent any GraphQL API as an interactive graph

TypeScript 7,873 524 Updated Mar 11, 2025

Extract URLs, paths, secrets, and other interesting bits from JavaScript

Go 1,513 106 Updated May 22, 2024

Tools and Techniques for Blue Team / Incident Response

3,025 463 Updated Mar 27, 2025

Tools and Techniques for Red Team / Penetration Testing

6,448 875 Updated Mar 18, 2025

Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research alongside academic and industry peer research which have reco…

8 4 Updated Jan 5, 2025

sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment

YARA 647 75 Updated Mar 19, 2025

This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.

PowerShell 2,268 335 Updated Feb 17, 2025

Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!

C 439 87 Updated Mar 8, 2023

P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

Python 4,154 667 Updated Aug 12, 2024

A low cost, jack-of-all-trades hacking tool, taking inspiration from FlipperZero and P4wnP1, using the RPIZero

Python 351 31 Updated Feb 12, 2025

Raspberry Pi drone flight controller and autopilot

C 33 9 Updated Sep 9, 2024

Purple Team Exercise Framework

686 106 Updated Jan 4, 2024
Python 1 Updated Jan 7, 2025

Get your documents ready for gen AI

Python 25,513 1,523 Updated Mar 26, 2025

CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.

TypeScript 233 30 Updated Mar 20, 2025

Master copies of the DISARM frameworks, with generated files to help you explore the data

Jupyter Notebook 234 37 Updated Mar 26, 2025

A large collection of system log datasets for AI-driven log analytics [ISSRE'23]

2,023 650 Updated Mar 28, 2025

Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.

Python 675 65 Updated Oct 19, 2024

Reversino is a tool for finding subdomains from IP ranges or CIDR subnets.

Python 8 1 Updated Nov 18, 2024

Egress-Assess is a tool used to test egress data detection capabilities

PowerShell 642 143 Updated Aug 9, 2023
Next
Showing results