Skip to content
View Cyb3r-Monk's full-sized avatar

Highlights

  • Pro

Organizations

@AppliedPurpleTeaming

Block or report Cyb3r-Monk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Adversary Simulation

Adversary simulations
10 repositories

AI-LLM

Promp engineering etc.
27 repositories

Attack Simulation and Automation

Attack simulation, detection engineering, purple teaming. etc.
36 repositories

Blue Team Tools

23 repositories

Data Science

20 repositories

Data Visualization

Interactive dashboarding etc.
4 repositories

DFIR

3 repositories

DFIR and Hunting Tools

Useful tools for threat hunting and DFIR
35 repositories
14 stars written in HTML
Clear filter

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,198 2,095 Updated Oct 1, 2025

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

HTML 5,273 920 Updated May 27, 2025

These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.

HTML 1,719 406 Updated Oct 19, 2025

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

HTML 1,612 190 Updated Aug 29, 2025

Malware samples, analysis exercises and other interesting resources.

HTML 1,587 232 Updated Jan 13, 2024

A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.

HTML 1,201 135 Updated Sep 25, 2025

Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI

HTML 883 99 Updated May 10, 2025

The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifact validation processes as well as increase access to artifa…

HTML 621 49 Updated Oct 20, 2025

Phishing with a fake reCAPTCHA

HTML 617 135 Updated Sep 13, 2024

Embed and hide any file in an HTML file

HTML 492 118 Updated Sep 27, 2017

Chrome browser extension-based Command & Control

HTML 195 21 Updated Jul 2, 2025

Collection of Jupyter Notebooks by @fr0gger_

HTML 183 41 Updated Oct 4, 2025

A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office365 users.

HTML 150 17 Updated Jul 31, 2025