Stars
All insights extracted from relevant context engineering and memory papers
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Compiled list of links from "Ask HN: Where can I post my startup to get beta users?"
About Bring macOS “Quick Look” feature to Windows, BUT modified version
TheHive is a Collaborative Case Management Platform, now distributed as a commercial version
SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incident response. It enriches alerts using VirusTotal & AbuseIPDB…
Langflow is a powerful tool for building and deploying AI-powered agents and workflows.
It is a full-stack blog web application built with React on the frontend and Django/DRF on the backend integrated with AWS-S3 & AWS-RDS services.
A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that may be discovered during a penetration test.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Active Directory ACL exploitation with BloodHound
c0vertX - The Art of Hiding Messages in Plain Sight
These are my checklists which I use during my hunting.
A fast enumeration tool for Windows Active Directory Pentesting written in Go
Gonna share my writeups and resources here
Automated Recon for Pentesting & Bug Bounty
This tool can retrieve : 1.Deleted tweets and replies ,Even if The account is suspended 2 .Old bios and Timestamp of The tweets
Microsoft » Windows 10 : Security Vulnerabilities
The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.
contains materials for all my youtube playlists