Pinned Repositories
A-Red-Teamer-diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
abuselookup-gui
A GUI to query the API of abuse.ch.
advanced-binary-analysis
Materials for the Binary Analysis Workshop presented at NorthSec 2020
Antivirus-Artifacts
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
Awesome-Cloud-PenTest
awesome-powershell
A curated list of delightful PowerShell modules and resources
awesome-reMarkable
A curated list of projects related to the reMarkable tablet
yls
YARA Language Server
KareyPyer's Repositories
KareyPyer/lebowski-api
Big Lebowski API
KareyPyer/swap
for pipelines test
KareyPyer/kql-for-dfir
A guide to using Azure Data Explorer and KQL for DFIR
KareyPyer/lemongraph
Log-based transactional graph engine
KareyPyer/fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
KareyPyer/intel_collector
Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.
KareyPyer/Huntress
PowerShell tool to triage systems
KareyPyer/ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
KareyPyer/fractalrabbit
Simulate realistic trajectory data seen through sporadic reporting
KareyPyer/crawlergo
A powerful browser crawler for web vulnerability scanners
KareyPyer/datalake_misp_integration
KareyPyer/thiri-notebook
The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat hunting rules.
KareyPyer/UGFraud
An Unsupervised Graph-based Toolbox for Fraud Detection
KareyPyer/binxelview
Binxelview binary image explorer
KareyPyer/AzureRT
AzureRT - A Powershell module implementing various Azure Red Team tactics
KareyPyer/collatz-2
C++ and Python programs to analyse the Collatz conjecture.
KareyPyer/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Malware Bazaar, ThreatFox, Triage and it is able to scan Android devices against VT.
KareyPyer/loki
KareyPyer/vulnerable-apps
KareyPyer/elk-docker
Elasticsearch, Logstash, Kibana (ELK) Docker image
KareyPyer/binary_viewer
A binary visualization tool to aid with reverse engineering and malware detection similar to Cantor.Dust
KareyPyer/Kansa
A Powershell incident response framework
KareyPyer/ready
A cross-platform implementation of various reaction-diffusion systems.
KareyPyer/vectorizers
Vectorizers for a range of different data types
KareyPyer/MaleX
A curated dataset of malware and benign Windows executable samples for malware researchers
KareyPyer/PowerDecode
PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs code dynamic analysis, extracting malware hosting URLs and checking http response.It can also detect if the malware attempts to inject shellcode into memory.
KareyPyer/hypertools
A Python toolbox for gaining geometric insights into high-dimensional data
KareyPyer/AzureHunter
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
KareyPyer/SecuML
Machine Learning for Computer Security
KareyPyer/maxima-jupyter
A Maxima kernel for Jupyter, based on CL-Jupyter (Common Lisp kernel)