PolarBearGod's Stars
horsicq/Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
rmusser01/Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
jakejarvis/awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
steven2358/awesome-generative-ai
A curated list of modern Generative Artificial Intelligence projects and services
infobyte/faraday
Open Source Vulnerability Management Platform
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
ThreatHuntingProject/ThreatHunting
An informational repo about hunting for adversaries in your IT environment.
lkarlslund/Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
wavestone-cdt/EDRSandblast
jiep/offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
MakeYourPet/hexapod
pushsecurity/saas-attacks
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
fox-it/dissect
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats, developed by Fox-IT (part of NCC Group).
Puliczek/awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
cyb3rfox/Aurora-Incident-Response
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
center-for-threat-informed-defense/attack-flow
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
cckuailong/awesome-gpt-security
A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.
cmu-sei/GHOSTS
GHOSTS is a realistic user simulation framework for cyber simulation, training, and exercise
SecurityBrewery/catalyst
Catalyst is an open source SOAR and ticket system that helps to automate alert handling and incident response processes
avi7611/Oscp-Cheat-Sheet
wew oscp
christophetd/mindmaps
:mag: Mindmaps for threat hunting - work in progress.
cgosec/Blauhaunt
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
boozallen/MOTIF
ethack/tht
Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science
bk-cs/rtr
Real-time Response scripts and schema
Silv3rHorn/BulkStrike
BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.
Antonlovesdnb/SANSTHS2021
Hunting Malicious Macros SANS Threathunting Summit 2021 Materials
cburk/dapper
LDAP Enumeration Tool
djjoa/exploit-searcher
Simultaneously search CVEs and exploits across multiple cybersecurity data sources.