Pinned Repositories
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity
adapt
ADAPT is a tool that performs automated Penetration Testing for WebApps.
ADTimeline
Timeline of Active Directory changes with replication metadata
ammasajan
Config files for my GitHub profile.
analyst-scripts
Scripts to analyze stuff
AndroidMalware_2019
Popular Android threats in 2019
AndroidMalware_2020
Popular Android malware seen in 2020
ansible-for-devops
Ansible for DevOps examples.
codeignitorTemplate
Custom Codeignator Template with Authentication
ammasajan's Repositories
ammasajan/mysql-group-replication-docker
Setting up Group Replication with Docker MySQL images.
ammasajan/quant-trading
Python quantitative trading strategies including VIX Calculator, Pattern Recognition, Commodity Trading Advisor, Monte Carlo, Options Straddle, Shooting Star, London Breakout, Heikin-Ashi, Pair Trading, RSI, Bollinger Bands, Parabolic SAR, Dual Thrust, Awesome, MACD
ammasajan/mquery
YARA malware query accelerator (web frontend)
ammasajan/cucm-cdr1
ammasajan/Yara-Rules
Repository of YARA rules made by Trellix ATR Team
ammasajan/ADTimeline
Timeline of Active Directory changes with replication metadata
ammasajan/Docker-Templates
Docker configurations for TheHive, Cortex and 3rd party tools
ammasajan/ursadb
Trigram database written in C++, suited for malware indexing
ammasajan/Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
ammasajan/signator-rules
Collection of rules created using YARA-Signator over Malpedia
ammasajan/sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
ammasajan/Proxy-Attackchain
proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool
ammasajan/log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
ammasajan/CVE-2021-44228-Scanner
Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
ammasajan/SSRFire
An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects
ammasajan/win-brute-logon
Crack any Microsoft Windows users password without any privilege (Guest account included)
ammasajan/SIGMA-detection-rules
Set of SIGMA rules (>150) mapped to MITRE Att@k tactic and techniques
ammasajan/timesketch
Collaborative forensic timeline analysis
ammasajan/ScriptsDump
All type of powerhell scripts, some usefull some useless
ammasajan/sigma-rules
Sigma rules from Joe Security
ammasajan/Zircolite
A standalone SIGMA-based detection tool for EVTX.
ammasajan/EVTX-to-MITRE-Attack
Set of EVTX samples (>170) mapped to MITRE Att@k tactic and techniques to measure your SIEM coverage or developed new use cases.
ammasajan/Wynis
Audit Windows Security with best Practice
ammasajan/pySigma
Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)
ammasajan/Windows-auditing-mindmap
Set of Mindmaps providing a detailed overview of the different #Windows auditing capacities and event log files.
ammasajan/APT-Hunter
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
ammasajan/MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
ammasajan/LogonTracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
ammasajan/Kunyu
Kunyu, more efficient corporate asset collection
ammasajan/finta
Common financial technical indicators implemented in Pandas.