Skip to content
View krooth's full-sized avatar
  • Active Countermeasures
  • Addis Ababa, Ethiopia

Block or report krooth

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Go 514 52 Updated Feb 16, 2026

A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.

448 36 Updated Feb 13, 2026

Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science

Shell 149 14 Updated Feb 1, 2026

A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.

PowerShell 1,437 136 Updated Feb 18, 2026

Indicators of Compromise (IOCs) from malware or suspicious network traffic

127 13 Updated Feb 3, 2026

Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.

PowerShell 1,157 114 Updated Feb 18, 2026

Tools for working with Zeek logs

Shell 1 Updated Jun 19, 2025

Extracts fields from zeek logs, compatible with zeek-cut

Python 25 3 Updated Jul 10, 2024

Proxmox VE Helper-Scripts (Community Edition)

Shell 26,235 2,439 Updated Feb 18, 2026

Quick shell script by Chris Brenton at ACM to share SSH Public keys for people to confirm fingerprints on first ssh.

Shell 3 Updated May 2, 2025

This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.

Python 78 20 Updated Sep 14, 2025
Jupyter Notebook 1 Updated Sep 6, 2024

Create lab environment for Linux Command Line course

Shell 49 15 Updated Sep 24, 2024

WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities.

Python 430 45 Updated Jan 15, 2026

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

YAML 12,661 1,514 Updated Feb 12, 2026

The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Access Model.

138 12 Updated Sep 28, 2024
Jupyter Notebook 8 4 Updated Sep 6, 2024

Yet another draw.io Shapes Collection

129 8 Updated Jan 18, 2025

An awesome list of resources on deception-based security with honeypots and honeytokens

180 27 Updated Dec 23, 2024

A simple, lightweight PowerShell script to remove pre-installed apps, disable telemetry, as well as perform various other changes to customize, declutter and improve your Windows experience. Win11D…

PowerShell 39,731 1,539 Updated Feb 17, 2026

Diagrams used in my YouTube Videos

198 172 Updated Feb 15, 2025

Attack Detect Defend Course Pre-Requisites

1 Updated Jun 20, 2024

A little tool to play with Windows security

C 21,269 4,034 Updated May 11, 2025

Six Degrees of Domain Admin

PowerShell 10,548 1,791 Updated Aug 1, 2025

AD Lab setup for learning infosec

HTML 2 Updated Mar 7, 2024

BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…

PowerShell 2,222 293 Updated Jun 7, 2023

An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.

C++ 47,755 2,676 Updated Feb 7, 2026

Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.

C 14,760 2,160 Updated Feb 18, 2026

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

Go 12,048 1,224 Updated Feb 18, 2026
Next