Pinned Repositories
adhdproject.github.io
APT-Lab-Terraform
Purple Teaming Attack & Hunt Lab - Terraform
APT06202001
Applied Purple Teaming - Infrastructure, Threat Optics, and Continious Improvement - June 6, 2020
AsmInVs
Tutorial for writing x86 / x64 assembly code in Visual Studio
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
attack-eval-scoring
This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/EnterpriseAPT29Eval for round 2 information.
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Awesome-Red-Teaming
List of Awesome Red Teaming Resources
BeaKer
Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana
RADAMSA
StephenHaruna's Repositories
StephenHaruna/adhdproject.github.io
StephenHaruna/APT-Lab-Terraform
Purple Teaming Attack & Hunt Lab - Terraform
StephenHaruna/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
StephenHaruna/Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
StephenHaruna/BloodHound
Six Degrees of Domain Admin
StephenHaruna/Checklists
Red Teaming & Pentesting checklists for various engagements
StephenHaruna/comp_arch_list
List of required readings for three-semester course in Computer Architecture at UCU (Principles of Computer Organization, Computer System Architecture, Operating Systems)
StephenHaruna/CyberSecurityCollections
StephenHaruna/DeimosC2
DeimosC2 is a Golang command and control framework for post-exploitation.
StephenHaruna/DetectionLabELK
DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
StephenHaruna/DomainPasswordSpray
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!
StephenHaruna/dumb-nfuzz
The Dumb Network Fuzzer
StephenHaruna/exploitation-course
Offensive Software Exploitation Course
StephenHaruna/faraday
Collaborative Penetration Test and Vulnerability Management Platform
StephenHaruna/fuxi
Penetration Testing Platform
StephenHaruna/GTFOBins.github.io
Curated list of Unix binaries that can be exploited to bypass system security restrictions
StephenHaruna/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
StephenHaruna/LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
StephenHaruna/Mistica
An open source swiss army knife for arbitrary communication over application protocols
StephenHaruna/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
StephenHaruna/open-source-cs-python
StephenHaruna/pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
StephenHaruna/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
StephenHaruna/PoC
Proofs-of-concept
StephenHaruna/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
StephenHaruna/sigma
Generic Signature Format for SIEM Systems
StephenHaruna/Sn1per
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
StephenHaruna/sof-elk
Configuration files for the SOF-ELK VM, used in SANS FOR572
StephenHaruna/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
StephenHaruna/WitnessMe
Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.