-
BlackLotus Public
Forked from ldpreload/BlackLotusBlackLotus UEFI Windows Bootkit
-
mockbin Public
Forked from Kong/insomnia-mockbinMock, Test & Track HTTP Requests and Response for Microservices
JavaScript MIT License UpdatedDec 30, 2022 -
AtomicTestHarnesses Public
Forked from redcanaryco/AtomicTestHarnessesPublic Repo for Atomic Test Harness
PowerShell BSD 3-Clause "New" or "Revised" License UpdatedNov 17, 2022 -
-
tomcat-jmxproxy-rce-exp Public
Forked from Squirre17/tomcat-jmxproxy-rce-expApache Tomcat JMXProxy RCE
-
InstallerFileTakeOver Public
Forked from klinix5/InstallerFileTakeOver -
gdrv-loader Public
Forked from fengjixuchui/gdrv-loaderKernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities) to load a unsigned driver
C UpdatedOct 2, 2021 -
DrvLoader Public
Forked from gavz/DrvLoaderA post exploitation utility for loading signed kernel drivers using both the undocumented NtLoadDriver function and by directly interfacing with the Windows Service Control Manager (SCM)
C++ UpdatedAug 23, 2021 -
UltimateAppLockerByPassList Public
Forked from api0cradle/UltimateAppLockerByPassListThe goal of this repository is to document the most common techniques to bypass AppLocker.
-
attack_range Public
Forked from splunk/attack_rangeA tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
-
amsi-tracer Public
Forked from manyfacedllama/amsi-tracerLeverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) passed into AMSI during dynamic execution.
-
CBR-Queries Public
Collection of useful, up to date, Carbon Black Response Queries
-
attack_range_local Public
Forked from splunk/attack_range_localBuild a attack range in your local machine
HTML Apache License 2.0 UpdatedOct 2, 2020 -
windows-dll-hijacking Public
Forked from wietze/windows-dll-hijackingProject for identifying executables and DLLs vulnerable to relative path DLL hijacking.
Python GNU General Public License v3.0 UpdatedJun 18, 2020 -
PngSip Public
Forked from vcsjones/PngSipAuthenticode for PNG files
C MIT License UpdatedJun 8, 2020 -
PELoader Public
Forked from rvrsh3ll/PELoaderLoad PE via XML Attribute
-
Scripts Public
Forked from outflanknl/ScriptsSmall scripts that make life better
JavaScript UpdatedJan 27, 2020 -
-
CBResponse-Splunk-Hunting Public
Analyzing Carbon Black Response endpoint telemetry in Splunk
-
hunt-detect-prevent Public
Lists of sources and utilities utilized to hunt, detect and prevent evildoers.
-
cbr-process-geoip Public
Forked from tstillz/cbr-process-geoipFinding anomalies for specific processes based on their GeoIP connections
Python UpdatedOct 4, 2018 -
-
-
pewpew Public
Forked from abdaton/pewpew⭐ ⭐ ⭐ Build your own IP Attack Maps with SOUND!
JavaScript UpdatedMar 13, 2018 -
subTee-gits-backups Public
Forked from tuian/subTee-gits-backupssubTee gists code backups
-
coinhive-block Public
Forked from Marfjeh/coinhive-blockTo block the malware domains of coin-hive.
Makefile MIT License UpdatedDec 14, 2017 -
webshells Public
Forked from BlackArch/webshellsVarious webshells. We accept pull requests for additions to this collection.
-
cbrcli Public
Forked from ctxis/cbrcliCommand line interface to Carbon Black Response
Python UpdatedNov 17, 2017 -
cb-response-splunk-app Public
Forked from M-Smith-contact/cb-response-splunk-appCb Response - Splunk Integration
Python Other UpdatedOct 3, 2017