Skip to content
View kp625544's full-sized avatar
Block or Report

Block or report kp625544

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.

Vue 292 52 Updated Jul 31, 2024

Deploy a Private Burpsuite Collaborator using boto3 Python Library

Python 56 10 Updated Feb 20, 2020

A honeypot for the Log4Shell vulnerability (CVE-2021-44228).

Python 89 27 Updated Apr 26, 2022

A Docker image containing useful forensics tools.

4 1 Updated Apr 12, 2018

A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.

Go 380 53 Updated Apr 24, 2024

A repository that maps commonly used attacks using MSRPC protocols to ATT&CK

305 40 Updated May 30, 2023

A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.

525 109 Updated Mar 24, 2023

CLI tool for open source and threat intelligence

Python 1,153 185 Updated Dec 12, 2023

Like Prometheus, but for logs.

Go 23,116 3,355 Updated Aug 17, 2024

Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readines…

Python 10,420 1,492 Updated Aug 16, 2024

shodan bot on whatsapp

Python 6 Updated Dec 13, 2020

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…

PowerShell 1,220 245 Updated Jun 1, 2023

Nullcon 2020 and Owasp Seasides 2020 demo content and jupter notebooks

Jupyter Notebook 3 2 Updated Mar 9, 2020

A python package for use in generating fake data for SOC and security automation.

Python 158 25 Updated Jun 22, 2024
Python 1 Updated Oct 7, 2020

A rapid API for the Project Sonar dataset

Go 640 97 Updated May 5, 2023

Linux Kernel Hacking

C 608 118 Updated Apr 10, 2024

SIEGMA - Transform Sigma rules into SIEM consumables

Python 139 20 Updated Jun 14, 2023

Bucky (An automatic S3 bucket discovery tool)

PHP 189 27 Updated Jan 6, 2022

Scripts to extract files from SCM directories left on web servers

Python 34 10 Updated Jun 19, 2023

This repository contains all the supplement material for the book "The art of sub-domain enumeration"

Python 633 152 Updated Jan 30, 2019

Find interesting Amazon S3 Buckets by watching certificate transparency logs.

Python 1,740 208 Updated Dec 7, 2022

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.

Python 983 166 Updated Feb 5, 2021

List of resources and notes for passing the Certified Kubernetes Application Developer (CKAD) exam.

727 423 Updated Apr 15, 2021

IntelOwl: manage your Threat Intelligence at scale

Python 3,470 411 Updated Aug 17, 2024

Translate STIX 2 Patterning Queries

Python 30 8 Updated Oct 4, 2018

A tool to assist with network-based hunting for GRU's Drovorub malware c2

Python 25 6 Updated Aug 28, 2020

This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.

2,488 497 Updated Sep 21, 2023

Hands on labs and code to help you learn, measure, and build using architectural best practices.

Python 1,968 1,049 Updated May 7, 2024