YSGoh's Stars
secretsquirrel/the-backdoor-factory
Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors
mandiant/macos-UnifiedLogs
rvrsh3ll/PySQLRecon
Offensive MSSQL toolkit written in Python, based off SQLRecon
certsocietegenerale/IRM
Incident Response Methodologies 2022
surajpkhetani/AutoSmuggle
Utility to craft HTML or SVG smuggled files for Red Team engagements
wand3rlust/Hitchhikers-Guide-to-URL-Analysis
Collection of Tools & Techniques for analyzing URLs
cybergoatpsyops/detections
Placeholder for my detection repo and misc detection engineering content
An0nUD4Y/Evilginx2-Phishlets
Evilginx3 Phishlets version (0.2.3 & above) Only For Testing/Learning Purposes
thefLink/Hunt-Weird-Syscalls
ETW based POC to identify direct and indirect syscalls
blackhillsinfosec/skyhook
A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.
center-for-threat-informed-defense/cti-blueprints
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
cyb3rxp/awesome-soc
A collection of sources of documentation, as well as field best practices, to build/run a SOC
christophetd/Adaz
:wrench: Deploy customizable Active Directory labs in Azure - automatically.
strandjs/IntroLabs
These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.
alexandreborges/malwoverview
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
elceef/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
jstrosch/malware-samples
Malware samples, analysis exercises and other interesting resources.
bytecode77/r77-rootkit
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
microsoft/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
Aetsu/OffensivePipeline
OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.
hackerschoice/gsocket
Connect like there is no firewall. Securely.
Kyuu-Ji/Awesome-Azure-Pentest
A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.
shramos/Awesome-Cybersecurity-Datasets
A curated list of amazingly awesome Cybersecurity datasets
fabacab/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links
WithSecureLabs/chainsaw
Rapidly Search and Hunt through Windows Forensic Artefacts
ninoseki/mihari
A query aggregator for OSINT based threat hunting
jakevdp/PythonDataScienceHandbook
Python Data Science Handbook: full text in Jupyter Notebooks
lucky-luk3/Infosec_Notebooks
cyb3rfox/Aurora-Incident-Response
Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders