Pinned Repositories
APT-Lab-Terraform
Purple Teaming Attack & Hunt Lab - Terraform
AzureMonitorCommunity
An open repo for Azure Monitor queries, workbooks, alerts and more
BadBlood
BadBlood fills a Microsoft Active Directory Domain with a structure and thousands of objects.
bl-bfg
BruteLoops
capsulecorp-ad-pentest-hyperv
Ansible + Vagrant + Hyper-V + Vulnerable AD 😎
CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Cohab_Processes
A small Aggressor script to help Red Teams identify foreign processes on a host machine
commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
Syrkadian's Repositories
Syrkadian/APT-Lab-Terraform
Purple Teaming Attack & Hunt Lab - Terraform
Syrkadian/AzureMonitorCommunity
An open repo for Azure Monitor queries, workbooks, alerts and more
Syrkadian/BadBlood
BadBlood fills a Microsoft Active Directory Domain with a structure and thousands of objects.
Syrkadian/bl-bfg
Syrkadian/BruteLoops
Syrkadian/capsulecorp-ad-pentest-hyperv
Ansible + Vagrant + Hyper-V + Vulnerable AD 😎
Syrkadian/CloudPentestCheatsheets
This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage cloud providers.
Syrkadian/Cohab_Processes
A small Aggressor script to help Red Teams identify foreign processes on a host machine
Syrkadian/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
Syrkadian/DO-LAB
Syrkadian/Deploy-Deception
Syrkadian/dropbox
systemd service file for headless dropbox
Syrkadian/efetch
Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.
Syrkadian/Freeze
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
Syrkadian/HostRecon
This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance phase. It gathers information about the local system, users, and domain information. It does not use any 'net', 'ipconfig', 'whoami', 'netstat', or other system commands to help avoid detection.
Syrkadian/KQL
KQL queries for Advanced Hunting
Syrkadian/Microsoft-Sentinel2Go
Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.
Syrkadian/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Syrkadian/peasant
LinkedIn reconnaissance tool
Syrkadian/PlumHound
Bloodhound for Blue and Purple Teams
Syrkadian/PrivescCheck
Privilege Escalation Enumeration Script for Windows
Syrkadian/Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
Syrkadian/red_team_tool_countermeasures
Syrkadian/Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
Syrkadian/Responder
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Syrkadian/ScareCrow
ScareCrow - Payload creation framework designed around EDR bypass.
Syrkadian/sigma
Main Rule Repository
Syrkadian/SOCTests
Syrkadian/sysmon-modular
A repository of sysmon configuration modules