Lists (4)
Sort Name ascending (A-Z)
Stars
Timeline of Active Directory changes with replication metadata
Automation to assess the state of your M365 tenant against CISA's baselines
Research code & papers from members of vx-underground.
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Kubernetes Security Training Platform - focusing on security mitigation
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
To audit the security of read-only domain controllers
Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine
A modern 64-bit position independent implant template
Tooling to generate metadata for Win32 APIs in the Windows SDK.
Simple (relatively) things allowing you to dig a bit deeper than usual.
A curated list of GPT agents for cybersecurity
A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.
Awesome list of keywords and artifacts for Threat Hunting sessions
Free hands-on digital forensics labs for students and faculty
List of awesome reverse engineering resources
Centralized resource for listing and organizing known injection techniques and POCs
Digital Forensics and Incident Response (DFIR)
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
Important notes and topics on my journey towards mastering Windows Internals
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.