Stars
Collection of Cyber Threat Intelligence sources from the deep and dark web
A curated list of awesome YARA rules, tools, and people.
Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.
A visualized overview of the Initial Access Broker (IAB) cybercrime landscape
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory t…
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
📄 Awesome CV is LaTeX template for your outstanding job application
An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evidence. Multiple people can collaborate on a single problem, an…
The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
Master the command line, in one page
A collection of modern/faster/saner alternatives to common unix commands.
Maintained collection of OSINT related resources. (All Free & Actionable)
Scan for misconfigured S3 buckets across S3-compatible APIs!
A curated list of Awesome Threat Intelligence resources
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
Issues to consider when planning a red team exercise.
A curated list of awesome Security Hardening techniques for Windows.
Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.
YARA signature and IOC database for my scanners and tools
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, fi…
NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security configurations and modifications. Making it very simple for…
An informational repo about hunting for adversaries in your IT environment.
Firmware patches for the TYT-MD380 handheld radio.
Some results of my DGA reversing efforts
DPS' Lightweight Investigation Notebook