Stars
This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
Harvest Linux forensic data for operational triage of an event.
A curated list of awesome remote jobs and resources. Inspired by https://github.com/vinta/awesome-python
A repository of DFIR-related Mind Maps geared towards the visual learners!
NoNameCon "Hunt for APT in network logs" workshop materials
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Detect kerberos attacks in pcap files
A collection of awesome penetration testing resources, tools and other shiny things
Infection Monkey - An open-source adversary emulation platform
A curated collection of free DevOps related eBooks
DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Automation for internal Windows Penetrationtest / AD-Security
Machine Learning for Cyber Security
A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in executables and training various ML models.
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscal…
Sysmon EDR POC Build within Powershell to prove ability.
AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to…
A complete computer science study plan to become a software engineer.
D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects
Guidance for mitigation web shells. #nsacyber
A python package for use in generating fake data for SOC and security automation.