Stars
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…
Penetration testing notes consolidated from many sources including courses, certifications, videos, and other documented notes
Small and highly portable detection tests based on MITRE's ATT&CK.
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of U…
🎲 An open source app to choose randomly between numbers, answers, options and so on
Grab cam shots & GPS location from target's phone front camera or PC webcam just sending a link.
Cross-Platform Android Remote Administration Tool | Official maintained repository for the AhMyth R.A.T Project | A dedicated revival of the original repository at https://GitHub.com/AhMyth/AhMyth-…
Tool to extract indicators of compromise from security reports in PDF format
Sample queries for Advanced hunting in Microsoft 365 Defender
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into account…
VLC extension to remove videos from the filesystem
A curated list of Awesome Threat Intelligence Blogs
a replacement for the image viewing mode built into Firefox and Chrome-based web browsers.
A zero dependencies, customizable, pure Javascript widget for navigating, managing, uploading, and downloading files and folders or other hierarchical object structures on any modern web browser.
Various Process Injection Techniques
x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)
🏡 A Book for Anyone to Get Started with Unix