Pinned Repositories
AzDetectSuite
A collection of ARM-based detections for Azure/AzureAD based TTPs
hawk
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft 365 Defender.
microsoft-365-docs
This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.
Microsoft-Sentinel-Queries
KQL queries for cyber defense and for solving daily issues
Nucleimonst3r
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
osint_toolkit
A full stack web application that combines many tools and services for security analysts into a single tool.
pe-bear
Portable Executable reversing tool with a friendly GUI
Neo314dw's Repositories
Neo314dw/AzDetectSuite
A collection of ARM-based detections for Azure/AzureAD based TTPs
Neo314dw/hawk
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
Neo314dw/hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Neo314dw/KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft 365 Defender.
Neo314dw/microsoft-365-docs
This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.
Neo314dw/Microsoft-Sentinel-Queries
KQL queries for cyber defense and for solving daily issues
Neo314dw/Nucleimonst3r
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
Neo314dw/osint_toolkit
A full stack web application that combines many tools and services for security analysts into a single tool.
Neo314dw/pe-bear
Portable Executable reversing tool with a friendly GUI
Neo314dw/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Neo314dw/RegRipper3.0
RegRipper3.0
Neo314dw/subzy
Subdomain takeover vulnerability checker
Neo314dw/Threat-Actor-Profile-Guide
The Threat Actor Profile Guide for CTI Analysts