Stars
Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Search Engines ADs scanner - spotting malvertising in search engines has never been easier!
Windows Ransomware Detection and Protection, Published by Packt
🖥 Control your display's brightness & volume on your Mac as if it was a native Apple Display. Use Apple Keyboard keys or custom shortcuts. Shows the native macOS OSDs.
Directory Services Internals (DSInternals) PowerShell Module and Framework
This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!
A PowerShell script that automates the security assessment of Microsoft 365 environments.
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Tools and Techniques for Red Team / Penetration Testing
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.
HardeningKitty - Checks and hardens your Windows configuration
List of red team resources
A curated list of awesome forensic analysis tools and resources
A collection of awesome security hardening guides, tools and other resources
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Simple tool to configure Windows Filtering Platform (WFP) which can configure network activity on your computer.
This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."