Lists (1)
Sort Name ascending (A-Z)
Starred repositories
🛜 ESPectre 👻 - Motion detection system based on Wi-Fi spectre analysis (CSI), with Home Assistant integration.
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo…
Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"
A helper SDK to wrap the Google SecOps API for common security use cases
ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.
Open security analytics. Understand, monitor, and protect your product from cyber threats, account takeovers, bots, and abuse.
Dream Recorder is an open-source venture by Modem. Developed in close collaboration with Mark Hinch (software & hardware), Ben Levinas and Joe Tsao (industrial design), and Alexis Jamet (illustrati…
All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
A collection of sample agents built with Agent Development Kit (ADK)
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…
E4GL30S1NT - Simple Information Gathering Tool
real time face swap and one-click video deepfake with only a single image
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Agentic-RAG explores advanced Retrieval-Augmented Generation systems enhanced with AI LLM agents.
Simple hunting script for suspicious M365 OAuth Apps
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Notes on managing and coordinating the response to major cyber incidents
PowerShell tools to help defenders hunt smarter, hunt harder.
Run your own AI cluster at home with everyday devices 📱💻 🖥️⌚
Bambdas collection for Burp Suite Professional and Community.
🛰️ Represent any GraphQL API as an interactive graph
Extract URLs, paths, secrets, and other interesting bits from JavaScript
Tools and Techniques for Blue Team / Incident Response