axelarator's Stars
EFForg/rayhunter
Rust tool to detect cell site simulators on an orbic mobile hotspot
infinition/Bjorn
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potential vulnerabilities. Bjorn can perform brute force attacks, file stealing, host zombification, and supports custom attack scripts.
nathom/streamrip
A scriptable music downloader for Qobuz, Tidal, SoundCloud, and Deezer
activescott/lessmsi
A tool to view and extract the contents of an Windows Installer (.msi) file.
Censys-Research/censeye
exislow/tidal-dl-ng
Multithreaded TIDAL Media Downloader Next Generation! Up to HiRes Lossless / TIDAL MAX 24-bit, 192 kHz.
0x90n/InfoSec-Black-Friday
All the deals for InfoSec related software/tools this Black Friday
lejacobroy/tidalrr-fork
Tidal download & sync with Lidarr support
mchaffe/cloudprefixes
Recon tool to query cloud prefixes for services associated with an IP address
BushidoUK/Ransomware-Tool-Matrix
A resource containing all the tools each ransomware gangs uses
ricardojoserf/TrickDump
Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!
scythe-io/purple-team-exercise-framework
Purple Team Exercise Framework
VirtualAlllocEx/DEFCON-31-Syscalls-Workshop
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
CERT-Polska/mailgoose
A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.
ChrisTitusTech/winutil
Chris Titus Tech's Windows Utility - Install Programs, Tweaks, Fixes, and Updates
elceef/dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
dylanaraps/pure-bash-bible
📖 A collection of pure bash alternatives to external processes.
An0nUD4Y/Evilginx-Phishing-Infra-Setup
Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs
muchdogesec/txt2stix
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
curated-intel/CTI-fundamentals
A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence
xapax/security
Stuff about it-security that might be good to know
c2links/NoWhere2Hide
C2 Active Scanner
WithSecureLabs/lolcerts
A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors
peasead/elastic-container
Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine
yeti-platform/yeti
Your Everyday Threat Intelligence
muchdogesec/awesome_threat_intel_blogs
A curated list of Awesome Threat Intelligence Blogs
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
rmceoin/gmalvertising
Hacked up scripts to perform google searches
cyberark/PipeViewer
A tool that shows detailed information about named pipes in Windows
target/strelka
Real-time, container-based file scanning at enterprise scale