CAshad0w's Stars
elastic/detection-rules
gf13579/splunk_easm_worker
microsoft/PQCrypto-VPN
Post-quantum Cryptography VPN
GreyNoise-Intelligence/2024-09-noise-storms
Notes and receipts (PCAPs) for TCP and ICMP Noise Storms
ufrisk/pcileech
Direct Memory Access (DMA) Attack Software
carmaa/inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
michaelkedey/learn-terraform-spotify
Create a playlist on Spotify by writing it as a Terraform configuration
securityjoes/Crowdstrike-Deploy
The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
geerlingguy/mac-dev-playbook
Mac setup and configuration via Ansible.
sickcodes/Docker-OSX
Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.
iknowjason/CMLab
Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Chef, Puppet, SaltStack, DSCv2, DSCv3.
selmux/ICS-Security
ICS security resources
MzHmO/WhoIsWho
Amazing whoami alternatives
kgretzky/evilginx2
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Nukem9/QuickDllProxy
A header-only DLL proxy stub generation library built with C++20.
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
whoozle/android-file-transfer-linux
Android File Transfer for Linux (and macOS!)
inspec/inspec
InSpec: Auditing and Testing Framework
certsocietegenerale/IRM
Incident Response Methodologies 2022
cyb3rmik3/KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
ziishaned/learn-regex
Learn regex the easy way
cisagov/LME
Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-time alerting, helping small to medium-sized organizations secure their infrastructure.
ECTO-1A/AppleJuice
Apple BLE proximity pairing message spoofing
phantomcyber/playbooks
Phantom Community Playbooks
rodolfomarianocy/OSCP-Tricks-2023
OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines
Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
sergiomarotco/Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
whoisflynn/OSCP-Exam-Report-Template
Modified template for the OSCP Exam and Labs. Used during my passing attempt