Skip to content
View pr0b3r7's full-sized avatar

Highlights

  • Pro

Organizations

@humanaoffsec @HackerHermanos

Block or report pr0b3r7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

ATLAS Adversarial ML

AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac
28 repositories

TA0001 Initial Access

Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA0001
60 repositories

TA0002 Execution

Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002
319 repositories

TA0003 Persistence

Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA0003
34 repositories

TA0004 Privilege Escalation

Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA0004
92 repositories

TA0005 Defense Evasion

Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005
325 repositories

TA0006 Credential Access

Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006
135 repositories

TA0007 Discovery

Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007
152 repositories

TA0008 Lateral Movement

Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA0008
77 repositories

TA0009 Collection

Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA0009
21 repositories

TA0010 Exfiltration

Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA0010
10 repositories

TA0011 Command and Control (C2)

Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011
247 repositories

TA0040 Impact

Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA0040
6 repositories

TA0042 Resource Development

Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042
386 repositories

TA0043 Reconnaissance

Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043
168 repositories

Threat Hunting

Threat Hunting related repositories
123 repositories

Starred repositories

2 stars written in Verilog
Clear filter

Collection of malicious logic

Verilog 10 3 Updated Jul 26, 2020

Pwn2Win 2020 Challenges

Verilog 1 Updated Jun 9, 2020