Lists (2)
Sort Name ascending (A-Z)
Stars
PA Toolkit is a collection of traffic analysis plugins focused on security
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Misconfiguration Manager is a central knowledge base for all known Microsoft Configuration Manager tradecraft and associated defensive and hardening guidance.
Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BASH.
This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers
A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.
Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names
Tools and Techniques for Red Team / Penetration Testing
Sysmon configuration file template with default high-quality event tracing
A tool designed to make physical devices detectable by malware and make system look like virtual machine.
✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective…
A web app that sorts your playlists by a wide range of Echo Nest parameters
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
This repo includes ChatGPT prompt curation to use ChatGPT better.
Open-source, self-hosted, zero-based budgeting.
A collection of enhancements for UnifiOS based devices
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
A set of Zeek scripts to detect ATT&CK techniques.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Bugcrowd’s baseline priority ratings for common security vulnerabilities
Information released publicly by NCC Group's Cyber Incident Response Team
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)