Reda-BELHAJ's Stars
frankwxu/digital-forensics-lab
Free hands-on digital forensics labs for students and faculty
JohnHammond/recaptcha-phish
Phishing with a fake reCAPTCHA
djsime1/awesome-flipperzero
🐬 A collection of awesome resources for the Flipper Zero device.
frkngksl/Huan
Encrypted PE Loader Generator
TCM-Security/pnpt-wordlists
staze0/openctiXqradar
tidalcyber/cyber-threat-profiling
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
BornToBeRoot/PowerShell_IPv4NetworkScanner
Powerful asynchronus IPv4 network scanner for PowerShell
Pennyw0rth/NetExec
The Network Execution Tool
SigmaHQ/sigma
Main Sigma Rule Repository
h4x0r-dz/Leaked-Credentials
how to look for Leaked Credentials !
0xStarlight/CRTP-Notes
Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing
Ferdibrgl/HTB-certifiedCBBH
# HTB-certified-bug-bounty-hunter-exam-cheetsheet All cheetsheets with main information about CBBH role path in one place.
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
tsale/TeleTracker
TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and gather useful channel information easily.
cddmp/enum4linux-ng
A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for security professionals and CTF players.
urbanadventurer/WhatWeb
Next generation web scanner
CERN-CERT/pDNSSOC
Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.
cert-orangecyberdefense/ransomware_map
Map tracking ransomware, by OCD World Watch team
dikraMasrour/NotebookDocGen
oasis-tcs/tac-ontology
OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology
looCiprian/GC2-sheet
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.
DefensiveOrigins/APT06202001
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
bellingcat/octosuite
GitHub Data Analysis Framework.
societe-generale/swordphish-awareness
Swordphish Phishing Awareness Tool
karimhabush/cyberowl
A daily updated summary of the most frequent types of security advisories currently being reported from different sources.
rivitna/Malware
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
InQuest/malware-samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction