Pinned Repositories
USOM-link-kontrol
USOM zararlı link kontrolünü sağlayan python kodu
AMSI.fail
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
AMSITrigger
The Hunt for Malicious Strings
avml
AVML - Acquire Volatile Memory for Linux
awesome-forensics
A curated list of awesome forensic analysis tools and resources
awesome-incident-response
A curated list of tools for incident response
awesome-memory-forensics
A curated list of awesome Memory Forensics for DFIR
awesome-yara
A curated list of awesome YARA rules, tools, and people.
BloodHound
Six Degrees of Domain Admin
Breacher
An advanced multithreaded admin panel finder written in python.
Muhammeday9un's Repositories
Muhammeday9un/awesome-memory-forensics
A curated list of awesome Memory Forensics for DFIR
Muhammeday9un/avml
AVML - Acquire Volatile Memory for Linux
Muhammeday9un/kerbrute
A tool to perform Kerberos pre-auth bruteforcing
Muhammeday9un/BloodHound
Six Degrees of Domain Admin
Muhammeday9un/windows-itpro-docs
This repository is used for Windows client for IT Pro content on Microsoft Learn.
Muhammeday9un/sigma
Main Rule Repository
Muhammeday9un/awesome-yara
A curated list of awesome YARA rules, tools, and people.
Muhammeday9un/PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Made with ❤️ by @last0x00
Muhammeday9un/smartbrute
Password spraying and bruteforcing tool for Active Directory Domain Services
Muhammeday9un/rules
Repository of yara rules
Muhammeday9un/validation-guides
Guides that help you verify the proper function of Sigma rule implementations
Muhammeday9un/AMSITrigger
The Hunt for Malicious Strings
Muhammeday9un/LinEnum
Scripted Local Linux Enumeration & Privilege Escalation Checks
Muhammeday9un/AMSI.fail
C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.
Muhammeday9un/process_ghosting
Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted file
Muhammeday9un/volatility3
Volatility 3.0 development
Muhammeday9un/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Muhammeday9un/Windows-Artifacts
Muhammeday9un/hindsight
Web browser forensics for Google Chrome/Chromium
Muhammeday9un/forensicssetup
An open source project aimed to replicate the Windows SIFT Machine and tools used during SANS Courses minus any payware software.
Muhammeday9un/Free-Automated-Malware-Analysis-Sandboxes-and-Services
Muhammeday9un/Digital-Forensics-Books-Wiki
Muhammeday9un/awesome-forensics
A curated list of awesome forensic analysis tools and resources
Muhammeday9un/Pentest-Cheatsheets
Muhammeday9un/CyLR
CyLR - Live Response Collection Tool
Muhammeday9un/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Muhammeday9un/ModSecurity
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx that is developed by Trustwave's SpiderLabs. It has a robust event-based programming language which provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis. With over 10,000 deployments world-wide, ModSecurity is the most widely deployed WAF in existence.
Muhammeday9un/wordlists
Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
Muhammeday9un/naxsi
NAXSI is an open-source, high performance, low rules maintenance WAF for NGINX
Muhammeday9un/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF