Highlights
- Pro
Lists (32)
Sort Name ascending (A-Z)
Adversary Simulation
Adversary simulations10 repositories
AI-LLM
Promp engineering etc.27 repositories
Attack Simulation and Automation
Attack simulation, detection engineering, purple teaming. etc.36 repositories
Blue Team Tools
23 repositories
Data Science
20 repositories
Data Visualization
Interactive dashboarding etc.4 repositories
DFIR
3 repositories
DFIR and Hunting Tools
Useful tools for threat hunting and DFIR35 repositories
DFIR: Cloud
1 repository
Graph
11 repositories
Identity and Cloud
Entra ID, Azure related ttack and defense9 repositories
Jupyter and Python
3 repositories
Knowledge Repos
LOLBins, query repos, etc.2 repositories
Lab Environment and Automation
37 repositories
Malware Analysis and YARA
5 repositories
Microsoft Sentinel and Defender
6 repositories
Red Team: Collection
2 repositories
Red Team: Command and Control
RAT tools etc.18 repositories
Red Team: Credential Access
58 repositories
Red Team: Defense Evasion
95 repositories
Red Team: Discovery
Bloodhound, Kubehound, and other stuff20 repositories
Red Team: Execution
39 repositories
Red Team: Exfiltration
2 repositories
Red Team: Initial Access
Phishing, etc.22 repositories
Red Team: Lateral Movement
18 repositories
Red Team: Persistence
5 repositories
Red Team: Privilege Escalation
15 repositories
Red Team: Reconnaissance
4 repositories
Red Team: Resource Development
40 repositories
Red Team Tools
Red team tools120 repositories
Security Data Science
5 repositories
Training
35 repositories
Stars
6
results
for source starred repositories
written in TypeScript
Clear filter
The open-source, cross-platform API client for GraphQL, REST, WebSockets, SSE and gRPC. With Cloud, Local and Git storage.
🚀 Generate GitHub profile README easily with the latest add-ons like visitors count, GitHub stats, etc using minimal UI.
Crawl a site to generate knowledge files to create your own custom GPT from a URL
BlueHound - pinpoint the security issues that actually matter
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flow…
Blog/Journal on how to backdoor VSCode extensions