Highlights
- Pro
Lists (32)
Sort Name ascending (A-Z)
Adversary Simulation
Adversary simulationsAI-LLM
Promp engineering etc.Attack Simulation and Automation
Attack simulation, detection engineering, purple teaming. etc.Blue Team Tools
Data Science
Data Visualization
Interactive dashboarding etc.DFIR
DFIR and Hunting Tools
Useful tools for threat hunting and DFIRDFIR: Cloud
Graph
Identity and Cloud
Entra ID, Azure related ttack and defenseJupyter and Python
Knowledge Repos
LOLBins, query repos, etc.Lab Environment and Automation
Malware Analysis and YARA
Microsoft Sentinel and Defender
Red Team: Collection
Red Team: Command and Control
RAT tools etc.Red Team: Credential Access
Red Team: Defense Evasion
Red Team: Discovery
Bloodhound, Kubehound, and other stuffRed Team: Execution
Red Team: Exfiltration
Red Team: Initial Access
Phishing, etc.Red Team: Lateral Movement
Red Team: Persistence
Red Team: Privilege Escalation
Red Team: Reconnaissance
Red Team: Resource Development
Red Team Tools
Red team toolsSecurity Data Science
Training
Stars
STUMPY is a powerful and scalable Python library for modern time series analysis
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…
Arsenal is just a quick inventory and launcher for hacking programs
đź’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.
Tool for Active Directory Certificate Services enumeration and abuse
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Fully featured and community-driven hacking environment
PyGraphistry is a Python library to quickly load, shape, embed, and explore big graphs with the GPU-accelerated Graphistry visual graph analyzer
Please no pull requests for this repository. Thanks!
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
A curated list of awesome Dash (plotly) resources
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
dstack is an open-source control plane for running development, training, and inference jobs on GPUs—across hyperscalers, neoclouds, or on-prem.
Microsoft Threat Intelligence Security Tools
The AI Scientist-v2: Workshop-Level Automated Scientific Discovery via Agentic Tree Search
Azure Red Team tool for graphing Azure and Azure Active Directory objects
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover su…
Syscall Shellcode Loader (Work in Progress)
Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling
Digital Forensics artifact repository
Active Directory Integrated DNS dumping by any authenticated user
Send phishing messages and attachments to Microsoft Teams users