0xSultan's Stars
InQuest/awesome-yara
A curated list of awesome YARA rules, tools, and people.
Fadi002/unshackle
Open-source tool to bypass windows and linux passwords from bootable usb
solomonsonya/Xavier_MemoryAnalysis_Framework
Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.
AlessandroZ/LaZagne
Credentials recovery project
SpecterOps/at-ps
Adversary Tactics - PowerShell Training
RPISEC/Malware
Course materials for Malware Analysis by RPISEC
WKL-Sec/WMIExec
Set of python scripts which perform different ways of command execution via WMI protocol.
pwn1sher/WMEye
WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
0xStarlight/CRTP-Notes
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
frkngksl/NimExec
Fileless Command Execution for Lateral Movement in Nim
PaulNorman01/Forensia
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
hevnsnt/Awesome_Incident_Response
Awesome Incident Response
gentilkiwi/kekeo
A little toolbox to play with Microsoft Kerberos in C
mthcht/ThreatHunting-Keywords
Awesome list of keywords and artifacts for Threat Hunting sessions
Significant-Gravitas/AutoGPT
AutoGPT is the vision of accessible AI for everyone, to use and to build on. Our mission is to provide the tools, so that you can focus on what matters.
olafhartong/sysmon-modular
A repository of sysmon configuration modules
splunk/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
kmaasrud/awesome-obsidian
🕶️ Awesome stuff for Obsidian
west-wind/Threat-Hunting-With-Splunk
Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise
olafhartong/ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
splunk/security_content
Splunk Security Content
MHaggis/hunt-detect-prevent
Lists of sources and utilities utilized to hunt, detect and prevent evildoers.
MHaggis/sysmon-dfir
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
M0kh/VirusTotal-Checker
A python script that checks a list of URLs or hashes on Virustotal
jschicht/LogFileParser
Parser for $LogFile on NTFS
andreafortuna/malhunt
Hunt malware with Volatility
Mr-Un1k0d3r/PowerLessShell
Run PowerShell command without invoking powershell.exe
ufrisk/LeechCore
LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent
evild3ad/MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR