Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Guide journalisation Microsoft
A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
Here is my Wireshark Profiles repository. To grab the profiles, click the Release below. These ZIP files contain profiles that can be added to your Wireshark configuration to speed up troubleshooti…
ares-92310 / Exegol
Forked from ThePorgs/ExegolFully featured and community-driven hacking environment
Go CLI and Library for quickly mapping organization network ranges using ASN information.
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
A collection of awesome security hardening guides, tools and other resources
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
No-root network monitor, firewall and PCAP dumper for Android
Extract credentials from lsass remotely
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
Advanced Bash script designed for conducting digital forensics on Linux systems
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.
Best practices for segmentation of the corporate network of any company
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
An evolving how-to guide for securing a Linux server.
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Check your WAF before an attacker does
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.