Pinned Repositories
AtomicPurpleTeam
Atomic Purple Team Framekwork and Lifecycle
Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
BadPasswordsNISTGuidelines
Data Analysis Project
CobaltStrike-C2-Servers
Cobalt Strike/C2 Servers
Dark-Halo-samples
APT 29 samples sunburst
SharpC2
.NET C2 Framework Proof of Concept
MichaelKoczwara's Repositories
MichaelKoczwara/Awesome-CobaltStrike-Defence
Defences against Cobalt Strike
MichaelKoczwara/CobaltStrike-C2-Servers
Cobalt Strike/C2 Servers
MichaelKoczwara/AtomicPurpleTeam
Atomic Purple Team Framekwork and Lifecycle
MichaelKoczwara/BadPasswordsNISTGuidelines
Data Analysis Project
MichaelKoczwara/Dark-Halo-samples
APT 29 samples sunburst
MichaelKoczwara/DFIRMindMaps
A repository of DFIR-related Mind Maps geared towards the visual learners!
MichaelKoczwara/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
MichaelKoczwara/petaqc2
Petaq - Purple Team Command & Control Server
MichaelKoczwara/pointer
Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.
MichaelKoczwara/apkleaks
Scanning APK file for URIs, endpoints & secrets.
MichaelKoczwara/Awesome-CobaltStrike
cobaltstrike的相关资源汇总 / List of Awesome CobaltStrike Resources
MichaelKoczwara/C2JARM
C2 JARM
MichaelKoczwara/checkov
Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes and other infrastructure-as-code-languages with Checkov by Bridgecrew.
MichaelKoczwara/Cobaltstrike_4.3_Source
Cobaltstrike4.3源码
MichaelKoczwara/CobaltStrikeScan
Scan files or process memory for CobaltStrike beacons and parse their configuration
MichaelKoczwara/CobaltstrikeSource
Cobaltstrike4.1 Source
MichaelKoczwara/eviloffice
Inject Macro and DDE code into Excel and Word documents (reverse shell)
MichaelKoczwara/ghidra
Ghidra is a software reverse engineering (SRE) framework
MichaelKoczwara/privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
MichaelKoczwara/SharpC2
.NET C2 Framework Proof of Concept
MichaelKoczwara/3XPL01t5
Random Exploits
MichaelKoczwara/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
MichaelKoczwara/CobaltStrike
CobaltStrike's source code
MichaelKoczwara/Conti
Conti TTPs mapped to MITRE ATT@CK
MichaelKoczwara/ghidra_scripts
Scripts for the Ghidra software reverse engineering suite.
MichaelKoczwara/hidden-cry
Windows Crypter/Decrypter Generator with AES 256 bits key
MichaelKoczwara/imaginaryC2
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads.
MichaelKoczwara/ParamSpider
Mining parameters from dark corners of Web Archives
MichaelKoczwara/terragoat
TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
MichaelKoczwara/Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.