![:octocat: :octocat:](https://github.githubassets.com/images/icons/emoji/octocat.png)
-
Rakuten Symphony
- Germany
- https://hamzamhirsi.medium.com
- @HirsiHamza
- in/hamza-mhirsi
Block or Report
Block or report HamzaMhirsi
Contact GitHub support about this userβs behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team pβ¦
HamzaMhirsi / Spider
Forked from buckyroberts/SpiderPython website crawler.
A python script extracts SSL/TLS IOC from malicious pcap files, the script will order the session one by one, make sure to filter the pcap and extract only malicious session before you use the scriβ¦
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
project from 2000-ish that never got the attention it needed. Basically uses whois to gather intel on a target...
In this repository we will catch some fields on TLS traffic, and use Threat Intel to detect if the packets received