Skip to content
View megioliver's full-sized avatar
🎯
Focusing
🎯
Focusing
  • Jakarta, Indonesia

Block or report megioliver

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracting the malware's final stage configuration.

C# 139 2 Updated Sep 21, 2024

MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs

PowerShell 678 57 Updated May 30, 2024

内网资产收集、探测主机存活、端口扫描、域控定位、文件搜索、各种服务爆破(SSH、SMB、MsSQL等)、Socks代理,一键自动化+无文件落地扫描

C# 207 18 Updated Aug 10, 2024

Automates interactions with the Blum airdrop platform, including claiming rewards, managing farming sessions, completing tasks, and playing games.

JavaScript 138 85 Updated Sep 13, 2024

Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab

PowerShell 2,009 389 Updated Apr 12, 2024

VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allo…

Go 103 12 Updated Aug 26, 2024

Artifact collection tool for *nix systems

Rust 192 21 Updated Mar 20, 2024

C2 over google cloud storage buckets

Python 4 Updated Sep 5, 2024

Active Directory password filter featuring breached password checking and custom complexity rules

C# 496 52 Updated Nov 4, 2024

HookChain: A new perspective for Bypassing EDR Solutions

C 402 66 Updated Nov 13, 2024

↕️🤫 Stealth redirector for your red team operation security

Go 627 68 Updated Aug 11, 2024

The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)

PowerShell 257 35 Updated Feb 3, 2022

A resource containing all the tools each ransomware gangs uses

734 79 Updated Nov 9, 2024

TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.

Jupyter Notebook 451 96 Updated Nov 13, 2024

Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination IP addresses are parsed based on the server name in TLS Cli…

Python 139 17 Updated Jul 23, 2024

Customizable Linux Persistence Tool for Security Research and Detection Engineering.

Shell 410 42 Updated Sep 3, 2024

Awesome Security lists for SOC/CERT/CTI

GLSL 709 83 Updated Nov 14, 2024

Open Breach and Attack Simulation Platform

Java 683 73 Updated Nov 13, 2024

An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.

Shell 1,056 170 Updated Jul 18, 2024

PoC - Authenticated Remote Code Execution in VMware vCenter Server (Exploit)

Python 37 7 Updated Jul 16, 2024
PowerShell 173 63 Updated Aug 23, 2024

An aggressor script that can help automate payload building in Cobalt Strike

C# 111 18 Updated Jan 22, 2024

Scan files or process memory for CobaltStrike beacons and parse their configuration

C# 900 116 Updated Aug 19, 2021

Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )

Python 152 17 Updated Sep 4, 2024

Tools, tips, tricks, and more for exploring ICS Security.

HTML 1,640 440 Updated Aug 2, 2024

This is a simulation of attack by (Ember Bear) APT group targeting energy Organizations in Ukraine the attack campaign was active from least March 2021, The attack chain starts wit spear phishing e…

Python 6 3 Updated Jul 4, 2024

Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows

11 1 Updated May 27, 2024

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…

Python 2,966 444 Updated Nov 13, 2024

ResearchDev - XDR & SIEM Detection

HTML 62 5 Updated Oct 15, 2024

VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios

1,392 164 Updated Sep 13, 2024
Next