Block or Report
Block or report 920wY0u20wnCh11d
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
Too Long; Don't Watch。使用 OpenAI 的 GPT3 幫忙把課程影片截圖並總結,產出繁體中文的 Docx 檔報告
文章 Attack Code 的详细全文。安全和开发总是具有伴生属性,尤其是云的安全方向,本篇文章是希望能帮助到读者的云安全入门材料。Full text of the article Attack Code. Security and development always have concomitant attributes, and this is especially true wit…
🔍 Mindmaps for threat hunting - work in progress.
Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines.
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Miscellaneous tools for BloodHound
My note about Cyber Security, in Chinese, English or Meow language
Resources for our Active Directory security workshops
一个攻防知识仓库 Red Teaming and Offensive Security
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Course materials for teaching cybersecurity in a Capture the Flag environment
A repository for learning various heap exploitation techniques.
List of Computer Science courses with video lectures.
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Automate the creation of a lab environment complete with security tooling and logging best practices