Lists (1)
Sort Name ascending (A-Z)
Stars
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
Comfortably monitor your Internet traffic 🕵️♂️
Open Breach and Attack Simulation & Security Validation Platform
PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection rules, simulate logs, and undertake various security tasks,…
A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
Malware repository component for samples & static configuration with REST API interface.
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Fetch information about a public Google document.
A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters to share knowledge, collaborate on techniques, and advance t…
Composable building blocks to build Llama Apps
Open-source Fabric templates for cybersecurity and compliance
ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.
Open source templates you can use to bootstrap your security programs
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )
HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. Features include intelligent threat analysis, automated deny…
🎨 Diagram as Code for prototyping cloud system architectures
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos ma…
Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.
Markov Model libraries, optimized for cracking-focused password generations.
This project aims to compare and evaluate the telemetry of various EDR products.