RangerJavelin's Stars
jaywcjlove/awesome-mac
Now we have become very big, Different from the original idea. Collect premium software in various categories.
sundowndev/phoneinfoga
Information gathering framework for phone numbers
trustedsec/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
SigmaHQ/sigma
Main Sigma Rule Repository
codeceptjs/CodeceptJS
Supercharged End 2 End Testing Framework for NodeJS
mantvydasb/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
An0nUD4Y/blackeye
The ultimate phishing tool with 38 websites available!
hysnsec/awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
insecurityofthings/jackit
JackIt - Exploit Code for Mousejack
scythe-io/purple-team-exercise-framework
Purple Team Exercise Framework
ANSSI-FR/ADTimeline
Timeline of Active Directory changes with replication metadata
microsoft/azure-devops-node-api
Azure DevOps Client for Node.js
MicrosoftDocs/SecurityBenchmarks
Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/benchmarks/.
miriamxyra/EventList
EventList
SofianeHamlaoui/Pentest-Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
opencybersecurityalliance/kestrel-lang
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
cisagov/bad-practices
CISA's catalog of bad practices that are exceptionally risky.
ytechie/AzureResourceVisualizer
globalbao/azure-policy-as-code
Bicep and Terraform code examples for policy-as-code workflows. Azure governance guardrails and automation - by @JesseLoudon
jsa2/aad-auth-n-z
Kaidja/EntraID
Automation around Entra ID
rod-trent/SentinelPS
tycloud97/slidev-aws
BenjiSec/AISW
Advanced Interactive Security Workshop
microsoft/ASDET
dazzlejim/AzureRegion2RegionMigration
Guidance on relocating services from one Azure region to another.
To-War/PowerStrike
A PowerShell wrapper for the PSFalcon module to assist with using the CrowdStrike API
paolosalvatori/blob-private-endpoint
This sample demonstrates how to create a Linux Virtual Machine in a virtual network that privately accesses a blob storage account using an Azure Private Endpoint.