Stars
🔐 Securely share sensitive information with automatic expiration & deletion after a set number of views or duration. Track who, what and when with full audit logs.
A self-hostable complete file-sharing solution that focuses on reliability, security and ease of use.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
⚡ ☁ Azure Visualizer aka 'AzViz' : A #powershell module to automatically generate Azure resource topology diagrams by just typing a PowerShell cmdlet and passing the name of one or more Azure Resou…
A utility like pkg-audit for Arch Linux. Based on Arch Security Team data.
🇦🇶 Bluish color scheme for Vim and Neovim
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Automation for internal Windows Penetrationtest / AD-Security
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
💻🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Collection of awesome color schemes for Neo/vim, merged for quick use.
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s not always obvious which permutations of policies are requir…
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve…
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A collection of malware samples caught by several honeypots i manage
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Setup guide for Office 365 Administrators who are unable to use ATP to configure SPF, DKIM and DMARC.
Active Directory Assessment and Privilege Escalation Script
Takes a file of username:hash and a file of hash:Password. Outputs a list of username:password
OpenVAS Reporting: Convert OpenVAS XML report files to reports
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Parses Sonicwall rules, groups, and services from settings export.
an awesome list of honeypot resources