Block or Report
Block or report elektrikalan
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLists (19)
Sort Name ascending (A-Z)
attack_tools
blueteam
cheat sheet
ddos
dns_tools
forensics
gpt
ioc
linux
Malware
mobil
ndr
osint
ransomware_test
test çalışmaları için kullanılacak scriptlersuricata
sysmon
threat intelligence
web_attcak
wifi
Stars
Language: C
Sort by: Most stars
A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP…
World's fastest and most advanced password recovery utility
A little tool to play with Windows security
Small and highly portable detection tests based on MITRE's ATT&CK.
User mode file system library for windows with FUSE Wrapper
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
A tool to dump the login password from the current linux user
Mirror of Apache HTTP Server. Issues: http:https://issues.apache.org
A native, user-mode, multi-process, graphical debugger.
Simple (relatively) things allowing you to dig a bit deeper than usual.
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
A memory-based evasion technique which makes shellcode invisible from process start to end.
Another Windows Local Privilege Escalation from Service Account to System
A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5